If the IBM HTTP Server for my Web Server logs become too large to open and take up too much disk space, configure the Web Server to roll the logs by day and size.

 

Steps to perform:

IBM HTTP Server has many logs in the Folder “<Installation_Directory>/IBM/HTTPServer/logs”.  You can customize those log files such as the following logs in IBM HTTP Server:

  • Admin Log: admin_access.log
  • Admin Error Log: admin_error.log
  • Access Log: access_log
  • Error Log: error_log

 

  1. Go to the location of your IBM HTTPServer installation ($IHS_HOME or <Installation_DIR>/IBMHTTPServer).
  2. Change to the “conf” directory and open the httpd.conf file.
  3. Locate the line: CustomLog log/access_log common.
  4. Comment out that line, and after it add this line:

 

Change:

CustomLog “|/opt/IBM/HTTPServer/bin/rotatelog -l /opt/IBM/HTTPServer/log/access_log.%Y.%m.%d 5M” common

 

To:

#CustomLog log/access_log common

CustomLog “|/opt/IBM/HTTPServer/bin/rotatelog -l /opt/IBM/HTTPServer/log/access_log.%Y.%m.%d 5M” common

 

  1. Locate the Line: ErrorLog log/error_log.
  2. Comment out that line, and after it add this line:

 

Change:

ErrorLog “|/opt/IBM/HTTPServer/bin/rotatelog -l /opt/IBM/HTTPServer/log/error_log.%Y.%m.%d 5M”

 

To:

# ErrorLog log/error_log

ErrorLog “|/opt/IBM/HTTPServer/bin/rotatelog -l /opt/IBM/HTTPServer/log/error_log.%Y.%m.%d 5M”

 

  1. Then restart IBM HTTPServer.

 

Review the logs in the “<Installation_Directory>/IBM/HTTPServer/logs” directory to see the access log is logging by the Current date.

 

An ever evolving digital world is a double edged sword. While we embrace innovation, with it usually always comes the need to protect ourselves from digital threats. If you’re online no matter how little a footprint, you are vulnerable to data breaches and ransomware. Chuck Brooks, a global Thought Leader in Cybersecurity and Emerging Tech, shares an article on Forbes of the ever present cyber-threats that companies must prioritize to stay ahead and reduce risks. The focus needs to be on the cyber-attack surface and vectors for 2023 and beyond, says Brooks, so we can figure out what can be done to reduce threats and improve resiliency and recovery. There are 6 areas, he believes, with growing threats that should be prioritized for those protecting the expanding digital ecosystem. They include:

  1. Machine learning and Artificial Intelligence. “New paradigms for automation in cybersecurity are emerging from artificial intelligence and machine learning. Computers using AI and ML are built for a variety of fundamental tasks, such as speech recognition, learning and planning, and problem-solving. They make it possible for predictive analytics to make statistical conclusions to reduce risks while consuming fewer resources. Data synthesis is undoubtedly helpful in cybersecurity for reducing threats. AI and ML in the context of cybersecurity can offer a quicker way to discover new attacks, make statistical inferences, and send that information to endpoint protection solutions. Due to the severe lack of experienced cybersecurity employees and expanding attack surface, this is extremely crucial. Cybercriminals are already attacking and investigating the networks of their victims using AI and ML capabilities. Healthcare institutions in particular, small businesses, and organizations, that cannot afford major investments in defensive developing cybersecurity are primary targets.”
  2. Polymorphic Malware. “Malware that is polymorphic uses the idea of polymorphism to avoid detection rather than for efficiency. The concept behind polymorphic malware is that if a specific malware strain is recognized for having particular characteristics, future versions of that infection might avoid detection by making minor changes. Polymorphic malware is currently being shared more frequently by criminal hacking groups and might perhaps become a real issue in the future as it can circumvent two-factor authentication and other authentication security procedures.”
  3. Advanced Botnets. “Artificial intelligence and machine learning advancements have made it possible for botnets to easily automate and quickly scale up cyberattacks. Cybercriminals are increasingly using Bot-as-a-Service to outsource attacks. Although there are several other kinds of botnets, Distributed Denial of Service (DDoS)-style attacks are still regarded as the most frequent danger.”
  4. Ransomware. “Ransomware has increased because of new methods of malware delivery and the ability for criminal hackers to get paid via cryptocurrencies while remaining anonymous. Ransom demands, recovery times, payments, and breach lawsuits are all on the rise as the trend continues. Ransomware-based extortion by hackers who demand payment in cryptocurrency poses a potentially persistent and developing threat.”
  5. Supply Chains. “The supply chain has historically been one of the areas where cyberattacks have been most vulnerable. Supply chain cyber-attacks can be perpetrated by nation state adversaries, espionage operators, criminals, or hacktivists. Their goals are to breach contractors, systems, companies, and suppliers via the weakest links in the chain. This is often done through taking advantage of poor security practices of suppliers, embedding compromised (or counterfeit) hardware and software, or from insider threats within networks.”
  6. Quantum. “When full quantum computing comes online, public key algorithms will become vulnerable and perhaps obsolete – this is termed QDay. There is little doubt that quantum computers will be able to perform faster and more precise computations than classical computers and could pose geo-military threats if in the wrong hands. And that the same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. This is because current cybersecurity protocols typically use pseudo-random numbers to encrypt sensitive information such as passwords, personal data, and quantum computers can crack the methods traditional computers use to generate random numbers, posing a significant threat to any organization using standard encryption tools.”

 

For Full Article, Click Here

Infor recently announced the success Bozeman Health has seen with its healthcare-specific artificial intelligence (AI), supply chain (SCM), and analytics solutions. Per the press release, in partnering with Infor, Bozeman has successfully integrated AI into key processes so that the organization has the tools to be more efficient and accurate to meet demands, and make smarter decisions for supply, vendor and warehouse management. Bozeman Health selected Infor for their deep expertise in the healthcare industry and its ability to provide a scalable, user-friendly, agile solution that could quickly help Bozeman boost efficiency and streamline processes. Additionally, many integrated AI capabilities deployed at Bozeman Health include Infor Coleman Digital Assistant (DA), which empowers employees to find information by simply asking a question via text or voice chat such as stock location, PO status, and more. Time saved means costs save, which can be used to scale and expand the organization. Further, since moving to the cloud with Infor, Bozeman Health has seen significant improvements in productivity and profitability, and the organization continues to find ways to improve processes and increase the reliability of information that gets entered into its systems with the help of Infor’s software.

 

For Full Article, Click Here

At times, you may get the following errors rebuilding the search index for Infor Security Services (ISS):

JVMDUMP039I Processing dump event “systhrow”, detail “java\lang\OutOfMemoryError” at 2023/03/25 19:35:53 – please wait.

 

To resolve these errors, do the following:

Adjust the JVM max memory size for ssoconfig in the GENDIR\java\command\ssoconfig.properties to 4096m

Before: ljx.vm.options=-Xmx512m

After: ljx.vm.options=-Xmx4096m

Next, save and close the file

This change is dynamic and does not require a restart, but you must exit ssoconfig for it to take effect.

After the change is completed and you’ve exited from the ssoconfig menu, you can now go back into ssoconfig -c  to choose the rebuild the search index.

Infor and alliance partner RPI Consultants recently teamed up to successfully implement new business process software for the Town of Apex, North Carolina. Per the press release, in an effort to enhance the lives of its 70,000 residents, the Town of Apex, a municipality in Wake County, North Carolina, has elected to implement Infor’s cloud-based enterprise resource planning (ERP) system to be able to work through a single provider and operate with greater efficiency. Additionally, Apex being a part of Infor’s Government Essentials package will receive the latest version of Infor CloudSuite Public Sector applications, and implementation services by RPI. This program hosts financial, procurement, payroll, workforce management, and other HCM applications built for city, state, and government needs. Moreover, with streamlined solutions for helping growing communities modernize their staffing and constituent services, the package ensures a successful implementation foundation that Apex can build upon for years to come.

 

For Full Article, Click Here

This article shows you a step by step guide on how to resolve the following Lawson error:

“loadResource(): returned identity [User:] already exists

We need to run a list-based sync but first let’s explain what it is.

 

How list-based sync works:
Initially, an XML file containing all the records to be synchronized is required for executing the procedure. Later, the ssoconfig utility is employed to import the file. As a result of the sync command, all the relevant data related to actors/users, identities, and their associated roles (and services if required) is transferred from the “original system” (the one with updated data) to the “target system” (the one in need of an update).

 

Note: Please keep in mind that when synchronizing, if a service is present on the original system but not on the target system, it will be generated on the target system. It is important to note that syncing of services is a one-time process.

By default, during synchronization, Actor Roles are included with other user information and combined. For instance, if an Actor record in the LSF has one role “NormalUser,” and the same Actor is present in Landmark with two roles “NormalUser” and “BenefitsClerk,” then after synchronization, both systems would display “NormalUser” and “BenefitsClerk” for that actor. However, if you prefer to prevent the merging of Actor Role attributes, you can override the default setting in the input file. In this case, you will be asked to decide between Update Local or Update Remote action for each difference, similar to other attributes.

 

Create the XML input file (default behavior for Actor Roles)

Prepare an XML file in the suitable format for importing. The following example depicts the standard approach, where Actor Roles are combined during synchronization.

 

Example File:

XML input file in which you specify behavior of Actor Roles

This instance contains the “mergeActorRoles” attribute, which is present in the file and set to “false.” Consequently, the roles will not be merged, and the specified action in the XML file will be followed instead.

NOTE:  If you require the merging of roles for some Actor records, you should adjust the “mergeActorRoles” attribute to “true.”

 

Example file:

Run the import command using the ssoconfig utility

  1. Execute the import command using the ssoconfig utility. Open a command window and enter the following command:

ssoconfig -S PWD <full_path_and>InputFileName

 

In this command, replace PWD with the security administrative password and <full_path_and>InputFileName with the name of the input file that you created in the previous step.

Once entered, a notification will confirm that the synchronization process has begun.

  1. To monitor the synchronization progress, navigate to the Check Background Sync Status option within the Manage Federation sub-menu.

Validate results.

The transportation industry has had an uplift in technological advances in recent years. From digital ticketing to app-based ride-sharing and food delivery, technology has made transportation widely available and easier to use use for our every day commute. Though it is easy to say that technology in the transportation industry is just getting started. Miroslav Katsarov, is the CEO of Modeshift and Forbes Technology council member, shares an article forecasting three trends in the transportation sector that will positively impact communities.

 

Adoption Of SaaS And MaaS-based Solutions. “Undoubtedly, the most impactful advancement shaping modern transport systems has been the transition from legacy systems—outdated computing software and/or hardware—to software-as-a-service (SaaS) and cloud-based solutions. Since legacy systems are expensive to operate and maintain and are susceptible to cybersecurity vulnerabilities, more and more municipalities are transitioning to SaaS-based solutions, which are generally more flexible, secure and reliable. SaaS solutions, such as contactless payments, also grew in popularity during the Covid-19 pandemic as consumers preferred safer in use transit technologies.

Even further, SaaS is only the first step to modernize legacy systems. Some cities have also embraced another digital trend, mobility as a service (MaaS), which uses tech solutions to find the most convenient, efficient and timely commuting routes. Instead of purchasing individual tickets for specific legs of the trip, MaaS solutions enable commuters to purchase one ticket that covers the entire trip.”

 

Powering Smart Cities With Integrated, Actionable Data. “Utilizing SaaS-based solutions offers another tremendous benefit to local transportation agencies: data collection and sharing. This access allows cities to leverage real-time data, like ridership demand and transportation patterns, to more efficiently plan bus or train routes.”

 

Achieving Equitable And Sustainable Public Transport. “MaaS solutions are a great first step toward an equitable and sustainable transit environment as they drive flexibility, accessibility and greater user experience. MaaS can make riders less dependent on cars and, by doing so, riders would have more affordable ridership options at their disposal. U.S. cities, such as Charlotte and Houston, have implemented strategic plans designed toward assessing how mobility solutions create a more even distribution of transportation services. By reducing the number of personal vehicles, MaaS can also help reduce carbon footprint.”

 

For Full Article, Click Here

If there’s one thing the last few years have taught us is that we are relying on technology more than ever – both in our personal and professional lives. In the UK, for example, technology’s impact in their healthcare has proven beneficial to patients and healthcare workers alike. Convenience, real-time data collection, and accessibility are some benefits that technology did for healthcare. Gavin Bashar, UK & I managing director at Tunstall Healthcare, shares an article on Med-Tech Innovation News of certain technologies trends to consider in the healthcare sector and how we will continue to benefit with these digital advancements.

  1. Hospitals at home will become more common. “Since the pandemic, we have continued to see the growth of virtual wards, and we’re expecting to see them become more of a focus in health and care delivery. Most of the population would rather receive care in the comfort of their own homes, and virtual wards will enable this.”
  2. The growth of consumer engagement. “Consumers across our population are becoming increasingly technologically savvy and understanding of the benefits of digital devices and how to use them. This digital upskilling of the nation will encourage the integration of readily available consumer devices within clinical practices and care delivery, to engage with citizens and support improved health outcomes.”
  3. Improved cohesion to support frontline workers. “Integrated Care Systems (ICSs) are moving to ensure our services can facilitate efficient data-led decision making in care delivery, which is a crucial step in becoming a global leader in population health management. Through this, we will see more cohesion and improved data gathering from technology providers and data companies.

 

For Full Article, Click Here

Introduction:
In today’s fast-paced business environment, companies often undergo digital transformations, migrating from legacy Enterprise Resource Planning (ERP) systems to modern solutions. However, legacy ERP applications often hold valuable historical data that must be preserved for regulatory compliance, historical analysis, and potential future use. Application archiving projects often fall under the responsibilities of IT Application managers at most companies. In this article, we will explore how to effectively archive data for long-term storage, the methods for storing archived data, and data retention strategies that align with the unique needs of large-scale enterprises.

 

How to Archive Data for Long-Term Storage:
Archiving data for long-term storage involves preserving valuable historical records while ensuring data integrity, security, and accessibility. IT Application Managers should consider the following best practices:
a. Data Segmentation: Identify the data that needs to be archived, separating it from the active dataset. ERP applications like Infor Lawson, Oracle, SAP, or PeopleSoft may contain vast amounts of historical data, and careful segmentation ensures the right data is archived.b. Data Validation: Before archiving, ensure data accuracy and completeness. Running data validation checks will help identify and rectify any inconsistencies.c. Compression and Encryption: Compressing and encrypting the archived data optimizes storage space and enhances security, protecting sensitive information from unauthorized access.
d. User access: Perhaps the most critical component of any viable data archive solution, is how accessible it is by users. The right solution should enable users to access archived records without the need to involve IT.

e. Role based security: Of course with ease of access comes responsibility. The right solution needs to enforce well defined security roles to ensure that users are accessing the data they have access to and nothing more.

Methods for Storing Archived Data:
IT Application Managers have various options for storing archived ERP data, including:
a. On-Premises Storage: Keeping archived data on local servers allows for complete control over the storage environment, ensuring immediate access to data when needed. Of course on-premises storage can be costly due to infrastructure investments and ongoing maintenance. Additionally, it may face limitations in disaster recovery options and data accessibility for remote employees, potentially hindering seamless operations in geographically dispersed organizations.

b. Cloud-Based Storage: Utilizing cloud computing platforms for data archiving offers scalability, cost-effectiveness, and high availability. Cloud providers like AWS, Azure, or Google Cloud offer secure and reliable solutions for long-term data retention. However storing structured data in the cloud without a structured presentation layer falls short of meeting all of the requirements we previously stated.

c. Cloud-Based Application: Combining the benefits of cloud computing with a well thought-out presentation layer is the ultimate way to address the challenges of ERP data retention. This option provides the freedom to decommission and eliminate on-premise servers while maintaining data integrity and providing users an easy way to continue accessing the data in the cloud.

Data Retention Strategies:
Data retention strategies aim to define the retention period for archived data, ensuring compliance with industry regulations and business needs. IT Application Managers should consider the following approaches:
a. Legal and Regulatory Requirements: Compliance with industry-specific regulations, such as HIPAA, GDPR, or SOX, requires setting appropriate data retention periods to avoid penalties and legal issues.

b. Business Needs: Align data retention policies with the company’s specific business requirements and operational workflows.

c. User Stories: Understanding the needs of your subject matter experts is key to archival success. The SMEs understand the real data needs of the business, audit requirements, and what information needs to be readily accessible.

 

Conclusion:
Archiving old ERP applications is a crucial responsibility for IT Application Managers in large-scale enterprises with extensive data centers and cloud computing operations. By understanding how to archive data effectively, selecting a suitable solution, and implementing data retention strategies, organizations can preserve valuable historical information securely and compliantly. As companies continue to evolve and modernize, the archiving process becomes a strategic investment in the long-term success of their operations. For IT Application Managers seeking a comprehensive and reliable archiving solution, APIX offers a user-friendly, cost-effective, and secure data archiving platform tailored to the unique needs of large enterprises. To learn more, visit https://www.nogalis.com/lawson-data-archive/

Infor recently announced that The Heart of Europe resort on Dubai World Islands is raising the bar for guest experience at its upscale Monaco Hotel using Infor Hospitality Management Solution (HMS) and Infor Sales & Event Management software. Per the press release, The Monaco Hotel has deployed Infor’s industry-specific HMS and will soon go live with the Infor event management solution. A second hotel on the same island will follow suit with both solutions within a few months. With Infor HMS the hotel is able to gather and use integrated, holistic data at multiple touchpoints to provide guests with a seamless, personalized, and consistent experience. This in turn improves guest experience while raising the productivity of hotel staff, who can re-allocate resources to more important tasks including enhancing customer service. Additionally, by using Infor Sales & Event Management, the hotel will streamline the way it manages events and catering as the software automates the entire booking process, from initial inquiry to final invoice, with customizations to support each stage in the lifecycle of events.

 

For Full Article, Click Here