Here are steps to follow if you receive the error message “Registration failed with exception when trying to register a new federated system.
If you receive the below message when trying to register a federated system, open the lsservice.properties file on both servers. Either add or update the line server.keystore.use.classic=false.
Tue Feb 21 19:26:45.573 EST 2023 – default-1240412896 – L(2) : Registration failed with exception. Details: registerServer() received Lawson Security Error: Please check log files for details
Error happened on server.com;40000;40001;LSS.
Unable to reach the specified server [server.com;9888;10888;LANDMARK]. It will not be registered.
Stack Trace :
com.lawson.security.interfaces.GeneralLawsonSecurityException: Unable to reach the specified server [server.com;9888;10888;LANDMARK]. It will not be registered.
at com.lawson.security.server.events.ServerServerFederationEvent.processRegisterServer(ServerServerFederationEvent.java:994)
at com.lawson.security.server.events.ServerServerFederationEvent.process(ServerServerFederationEvent.java:115)
at com.lawson.lawsec.server.SecurityEventHandler.processEvent(SecurityEventHandler.java:634)
at com.lawson.lawsec.server.SecurityEventHandler.run(SecurityEventHandler.java:377)
https://www.nogalis.com/wp-content/uploads/2023/08/Federation-Error-Registration-failed-with-exception.jpg470470Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-22 08:04:152023-08-16 17:05:50Federation Error “Registration failed with exception”
In recent news the University of Maine in Orono has decided to implement Infor Point of Sale (POS). This decision was due to University of Maine and UMaine Dining being committed to bringing excellence and value to campus and decided to streamline operations and enhance the overall guest experience with Infor’s modern POS technology. Per the press release, Infor Point of Sale (POS) is designed for full- and quick-service restaurants, and managed food services in higher education, healthcare, corporate, and more. The restaurant POS solution enables them to optimize operations, exceed guest expectations, and increase business insight, helping managed food service organizations to increase operational efficiency, create better experiences for faculty and students, and promote greater profitability. Joe Vargas, Infor Hospitality senior vice president, comments, “Infor’s new partnership with University of Maine will help provide the functionality, integration, and customer support needed to deliver more memorable services and events for today’s modern guest.”
https://www.nogalis.com/wp-content/uploads/2017/04/infor_sign.jpg578770Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-21 10:17:002023-08-16 16:19:10University of Maine Partners with Infor Hospitality
If the IBM HTTP Server for my Web Server logs become too large to open and take up too much disk space, configure the Web Server to roll the logs by day and size.
Steps to perform:
IBM HTTP Server has many logs in the Folder “<Installation_Directory>/IBM/HTTPServer/logs”. You can customize those log files such as the following logs in IBM HTTP Server:
Admin Log: admin_access.log
Admin Error Log: admin_error.log
Access Log: access_log
Error Log: error_log
Go to the location of your IBM HTTPServer installation ($IHS_HOME or <Installation_DIR>/IBMHTTPServer).
Change to the “conf” directory and open the httpd.conf file.
Locate the line: CustomLog log/access_log common.
Comment out that line, and after it add this line:
Change:
CustomLog “|/opt/IBM/HTTPServer/bin/rotatelog -l /opt/IBM/HTTPServer/log/access_log.%Y.%m.%d 5M” common
To:
#CustomLog log/access_log common
CustomLog “|/opt/IBM/HTTPServer/bin/rotatelog -l /opt/IBM/HTTPServer/log/access_log.%Y.%m.%d 5M” common
Locate the Line: ErrorLog log/error_log.
Comment out that line, and after it add this line:
Review the logs in the “<Installation_Directory>/IBM/HTTPServer/logs” directory to see the access log is logging by the Current date.
https://www.nogalis.com/wp-content/uploads/2023/08/Configure-IBM-HTTP-Server-logs-to-rotate-roll-daily.jpg470470Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-18 08:46:062023-08-16 16:16:16Configure IBM HTTP Server logs to rotate/roll daily
An ever evolving digital world is a double edged sword. While we embrace innovation, with it usually always comes the need to protect ourselves from digital threats. If you’re online no matter how little a footprint, you are vulnerable to data breaches and ransomware. Chuck Brooks, a global Thought Leader in Cybersecurity and Emerging Tech, shares an article on Forbes of the ever present cyber-threats that companies must prioritize to stay ahead and reduce risks. The focus needs to be on the cyber-attack surface and vectors for 2023 and beyond, says Brooks, so we can figure out what can be done to reduce threats and improve resiliency and recovery. There are 6 areas, he believes, with growing threats that should be prioritized for those protecting the expanding digital ecosystem. They include:
Machine learning and Artificial Intelligence. “New paradigms for automation in cybersecurity are emerging from artificial intelligence and machine learning. Computers using AI and ML are built for a variety of fundamental tasks, such as speech recognition, learning and planning, and problem-solving. They make it possible for predictive analytics to make statistical conclusions to reduce risks while consuming fewer resources. Data synthesis is undoubtedly helpful in cybersecurity for reducing threats. AI and ML in the context of cybersecurity can offer a quicker way to discover new attacks, make statistical inferences, and send that information to endpoint protection solutions. Due to the severe lack of experienced cybersecurity employees and expanding attack surface, this is extremely crucial. Cybercriminals are already attacking and investigating the networks of their victims using AI and ML capabilities. Healthcare institutions in particular, small businesses, and organizations, that cannot afford major investments in defensive developing cybersecurity are primary targets.”
Polymorphic Malware. “Malware that is polymorphic uses the idea of polymorphism to avoid detection rather than for efficiency. The concept behind polymorphic malware is that if a specific malware strain is recognized for having particular characteristics, future versions of that infection might avoid detection by making minor changes. Polymorphic malware is currently being shared more frequently by criminal hacking groups and might perhaps become a real issue in the future as it can circumvent two-factor authentication and other authentication security procedures.”
Advanced Botnets. “Artificial intelligence and machine learning advancements have made it possible for botnets to easily automate and quickly scale up cyberattacks. Cybercriminals are increasingly using Bot-as-a-Service to outsource attacks. Although there are several other kinds of botnets, Distributed Denial of Service (DDoS)-style attacks are still regarded as the most frequent danger.”
Ransomware. “Ransomware has increased because of new methods of malware delivery and the ability for criminal hackers to get paid via cryptocurrencies while remaining anonymous. Ransom demands, recovery times, payments, and breach lawsuits are all on the rise as the trend continues. Ransomware-based extortion by hackers who demand payment in cryptocurrency poses a potentially persistent and developing threat.”
Supply Chains. “The supply chain has historically been one of the areas where cyberattacks have been most vulnerable. Supply chain cyber-attacks can be perpetrated by nation state adversaries, espionage operators, criminals, or hacktivists. Their goals are to breach contractors, systems, companies, and suppliers via the weakest links in the chain. This is often done through taking advantage of poor security practices of suppliers, embedding compromised (or counterfeit) hardware and software, or from insider threats within networks.”
Quantum. “When full quantum computing comes online, public key algorithms will become vulnerable and perhaps obsolete – this is termed QDay. There is little doubt that quantum computers will be able to perform faster and more precise computations than classical computers and could pose geo-military threats if in the wrong hands. And that the same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. This is because current cybersecurity protocols typically use pseudo-random numbers to encrypt sensitive information such as passwords, personal data, and quantum computers can crack the methods traditional computers use to generate random numbers, posing a significant threat to any organization using standard encryption tools.”
https://www.nogalis.com/wp-content/uploads/2014/12/cyber.temp_.jpg11991600Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-17 10:37:532023-08-16 17:03:426 Cyber-Threat Areas for Companies and Organizations to Prioritize
Infor recently announced the success Bozeman Health has seen with its healthcare-specific artificial intelligence (AI), supply chain (SCM), and analytics solutions. Per the press release, in partnering with Infor, Bozeman has successfully integrated AI into key processes so that the organization has the tools to be more efficient and accurate to meet demands, and make smarter decisions for supply, vendor and warehouse management. Bozeman Health selected Infor for their deep expertise in the healthcare industry and its ability to provide a scalable, user-friendly, agile solution that could quickly help Bozeman boost efficiency and streamline processes. Additionally, many integrated AI capabilities deployed at Bozeman Health include Infor Coleman Digital Assistant (DA), which empowers employees to find information by simply asking a question via text or voice chat such as stock location, PO status, and more. Time saved means costs save, which can be used to scale and expand the organization. Further, since moving to the cloud with Infor, Bozeman Health has seen significant improvements in productivity and profitability, and the organization continues to find ways to improve processes and increase the reliability of information that gets entered into its systems with the help of Infor’s software.
https://www.nogalis.com/wp-content/uploads/2018/03/artificial-intelligence-ai-tech-medical-healthcare.jpg236500Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-16 10:41:312023-08-14 16:45:49Bozeman Health Partners with Infor to Embed New AI Capabilities
Adjust the JVM max memory size for ssoconfig in the GENDIR\java\command\ssoconfig.properties to 4096m
Before: ljx.vm.options=-Xmx512m
After: ljx.vm.options=-Xmx4096m
Next, save and close the file
This change is dynamic and does not require a restart, but you must exit ssoconfig for it to take effect.
After the change is completed and you’ve exited from the ssoconfig menu, you can now go back into ssoconfig -c to choose the rebuild the search index.
https://www.nogalis.com/wp-content/uploads/2023/08/ISS-Java-out-of-memory-error-when-rebuilding-the-search-index.jpg470470Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-15 09:41:412023-08-14 16:48:32ISS: Java out of memory error when rebuilding the search index
Infor and alliance partner RPI Consultants recently teamed up to successfully implement new business process software for the Town of Apex, North Carolina. Per the press release, in an effort to enhance the lives of its 70,000 residents, the Town of Apex, a municipality in Wake County, North Carolina, has elected to implement Infor’s cloud-based enterprise resource planning (ERP) system to be able to work through a single provider and operate with greater efficiency. Additionally, Apex being a part of Infor’s Government Essentials package will receive the latest version of Infor CloudSuite Public Sector applications, and implementation services by RPI. This program hosts financial, procurement, payroll, workforce management, and other HCM applications built for city, state, and government needs. Moreover, with streamlined solutions for helping growing communities modernize their staffing and constituent services, the package ensures a successful implementation foundation that Apex can build upon for years to come.
https://www.nogalis.com/wp-content/uploads/2021/01/cloud-digital-it.jpg301500Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-14 10:57:512023-08-10 16:59:15Town of Apex Looks to Enhance Community Services Through Digital Transformation
This article shows you a step by step guide on how to resolve the following Lawson error:
“loadResource(): returned identity [User:] already exists“
We need to run a list-based sync but first let’s explain what it is.
How list-based sync works:
Initially, an XML file containing all the records to be synchronized is required for executing the procedure. Later, the ssoconfig utility is employed to import the file. As a result of the sync command, all the relevant data related to actors/users, identities, and their associated roles (and services if required) is transferred from the “original system” (the one with updated data) to the “target system” (the one in need of an update).
Note: Please keep in mind that when synchronizing, if a service is present on the original system but not on the target system, it will be generated on the target system. It is important to note that syncing of services is a one-time process.
By default, during synchronization, Actor Roles are included with other user information and combined. For instance, if an Actor record in the LSF has one role “NormalUser,” and the same Actor is present in Landmark with two roles “NormalUser” and “BenefitsClerk,” then after synchronization, both systems would display “NormalUser” and “BenefitsClerk” for that actor. However, if you prefer to prevent the merging of Actor Role attributes, you can override the default setting in the input file. In this case, you will be asked to decide between Update Local or Update Remote action for each difference, similar to other attributes.
Create the XML input file (default behavior for Actor Roles)
Prepare an XML file in the suitable format for importing. The following example depicts the standard approach, where Actor Roles are combined during synchronization.
Example File:
XML input file in which you specify behavior of Actor Roles
This instance contains the “mergeActorRoles” attribute, which is present in the file and set to “false.” Consequently, the roles will not be merged, and the specified action in the XML file will be followed instead.
NOTE: If you require the merging of roles for some Actor records, you should adjust the “mergeActorRoles” attribute to “true.”
Example file:
Run the import command using the ssoconfig utility
Execute the import command using the ssoconfig utility. Open a command window and enter the following command:
ssoconfig -S PWD <full_path_and>InputFileName
In this command, replace PWD with the security administrative password and <full_path_and>InputFileName with the name of the input file that you created in the previous step.
Once entered, a notification will confirm that the synchronization process has begun.
To monitor the synchronization progress, navigate to the Check Background Sync Status option within the Manage Federation sub-menu.
The transportation industry has had an uplift in technological advances in recent years. From digital ticketing to app-based ride-sharing and food delivery, technology has made transportation widely available and easier to use use for our every day commute. Though it is easy to say that technology in the transportation industry is just getting started. Miroslav Katsarov, is the CEO of Modeshift and Forbes Technology council member, shares an article forecasting three trends in the transportation sector that will positively impact communities.
Adoption Of SaaS And MaaS-based Solutions. “Undoubtedly, the most impactful advancement shaping modern transport systems has been the transition from legacy systems—outdated computing software and/or hardware—to software-as-a-service (SaaS) and cloud-based solutions. Since legacy systems are expensive to operate and maintain and are susceptible to cybersecurity vulnerabilities, more and more municipalities are transitioning to SaaS-based solutions, which are generally more flexible, secure and reliable. SaaS solutions, such as contactless payments, also grew in popularity during the Covid-19 pandemic as consumers preferred safer in use transit technologies.
Even further, SaaS is only the first step to modernize legacy systems. Some cities have also embraced another digital trend, mobility as a service (MaaS), which uses tech solutions to find the most convenient, efficient and timely commuting routes. Instead of purchasing individual tickets for specific legs of the trip, MaaS solutions enable commuters to purchase one ticket that covers the entire trip.”
Powering Smart Cities With Integrated, Actionable Data. “Utilizing SaaS-based solutions offers another tremendous benefit to local transportation agencies: data collection and sharing. This access allows cities to leverage real-time data, like ridership demand and transportation patterns, to more efficiently plan bus or train routes.”
Achieving Equitable And Sustainable Public Transport. “MaaS solutions are a great first step toward an equitable and sustainable transit environment as they drive flexibility, accessibility and greater user experience. MaaS can make riders less dependent on cars and, by doing so, riders would have more affordable ridership options at their disposal. U.S. cities, such as Charlotte and Houston, have implemented strategic plans designed toward assessing how mobility solutions create a more even distribution of transportation services. By reducing the number of personal vehicles, MaaS can also help reduce carbon footprint.”
https://www.nogalis.com/wp-content/uploads/2021/06/transportation-rail-station.jpg370550Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-10 14:44:412023-08-10 17:01:23Three Transportation Tech Trends That Will Shape Cities And Countries
If there’s one thing the last few years have taught us is that we are relying on technology more than ever – both in our personal and professional lives. In the UK, for example, technology’s impact in their healthcare has proven beneficial to patients and healthcare workers alike. Convenience, real-time data collection, and accessibility are some benefits that technology did for healthcare. Gavin Bashar, UK & I managing director at Tunstall Healthcare, shares an article on Med-Tech Innovation News of certain technologies trends to consider in the healthcare sector and how we will continue to benefit with these digital advancements.
Hospitals at home will become more common. “Since the pandemic, we have continued to see the growth of virtual wards, and we’re expecting to see them become more of a focus in health and care delivery. Most of the population would rather receive care in the comfort of their own homes, and virtual wards will enable this.”
The growth of consumer engagement. “Consumers across our population are becoming increasingly technologically savvy and understanding of the benefits of digital devices and how to use them. This digital upskilling of the nation will encourage the integration of readily available consumer devices within clinical practices and care delivery, to engage with citizens and support improved health outcomes.”
Improved cohesion to support frontline workers. “Integrated Care Systems (ICSs) are moving to ensure our services can facilitate efficient data-led decision making in care delivery, which is a crucial step in becoming a global leader in population health management. Through this, we will see more cohesion and improved data gathering from technology providers and data companies.
https://www.nogalis.com/wp-content/uploads/2018/07/digital-technology.jpg370540Angeli Mentahttps://www.nogalis.com/wp-content/uploads/2013/04/logo-with-slogan-good.pngAngeli Menta2023-08-09 10:41:082023-08-10 17:02:06The digital transition: Trends to consider