In the prime time of artificial intelligence (AI), consumer trust is more valuable than ever. Greg Brunk Forbes Council Member and Co-founder of MetaRouter, shares an article that highlights how crucial consumer trust is for businesses, particularly as AI technologies become more integrated into everyday life. Transparency is emphasized as a key component in building and retaining consumer confidence. Companies are encouraged to clearly communicate how AI systems work and how consumer data is utilized. Ethical AI practices are also addressed, with the call for fairness and accountability in AI algorithms to prevent discrimination and bias. Brunk suggests that brands should actively engage in discussions about AI-related concerns with their customers. Regular audits of AI systems can help ensure compliance with ethical standards and boost consumer trust. Organizations are advised to prioritize data privacy and security measures to safeguard consumer information. By adopting a consumer-centric approach, businesses can create more reliable AI solutions. Collaboration with stakeholders, including regulators and consumer groups, is recommended to establish trusted AI guidelines. The role of user feedback in improving AI systems is acknowledged as essential for maintaining trust. Companies are advised to be honest about the limitations of AI technology, avoiding overpromising results. The article concludes that by prioritizing transparency, ethics, and engagement, businesses can foster a trustful relationship with consumers in the AI era. Emphasizing the need for a robust ethical framework, the piece argues that these practices can lead to sustained growth and customer loyalty. Ultimately, building consumer trust in AI is both a challenge and an opportunity for businesses looking to innovate responsibly.

 

For Full Article, Click Here

IPA Service definitions can be used to cause or trigger a process to run.

If your site has an event for which work units are delayed or not running for any reason, you can trigger a process to run using the Service Definition in Process Server Administrator.

A process, which is created using Infor Process Designer, routes and tracks the sign-offs that need to occur. In this case, a service, which is delivered with Lawson applications, triggers the launching of the process. It is also possible to create your own service.

  1. Access the Process Server Administrator and select Scheduling > By Service Definition.
  2. From the displayed list of services, double-click the name of the service that you want to trigger the process.
  3. Specify this information:

Work Title

Specify a name for the work item.

Filter Key

If filters have been enabled for users and tasks associated with this service, select an option.

Filter Value

If you are using a filter key, specify a filter value.

For example, if you selected City for a Filter Key, then Chicago might be a valid value.

Apps Key

Specify an application key.

Apps Value

Specify a value for the selected apps key.

  1. Optionally, on the Criteria tab, specify up to three levels of criteria.
  2. If variables are enabled for the service, the Variables tab is active.
  3. If links to documents or other information is available for use with this service, the Related Links tab is active.
  4. When you are finished defining the circumstances, click Actions > Save.

Jody Brazil, tech expert and CEO/Cofounder of FireMon, shares an article on Forbes that discusses the multifaceted nature of network security and the challenges that come with safeguarding digital environments in today’s technologically advanced landscape. It highlights that network security is not just about deploying the latest technologies but also involves understanding the complexities of human behavior and organizational processes. As cyber threats continue to evolve, companies must remain vigilant and adaptable. The article emphasizes that a robust security posture requires a comprehensive strategy that includes risk assessment, incident response, and continuous monitoring. It points out that lack of awareness among employees can often lead to vulnerabilities, making training and education essential components of any security program. Additionally, the increasing sophistication of cyberattacks necessitates a proactive approach to identify potential threats before they materialize. The significance of collaboration between various departments within an organization is also discussed, as security should not solely fall under the IT department’s purview. Organizations are encouraged to foster a culture of security awareness among all employees to mitigate risks effectively. Furthermore, the article notes that compliance with regulations is important, yet it should not serve as the only benchmark for security standards. External partnerships and information sharing are identified as crucial for enhancing security measures, allowing companies to stay informed about emerging threats. The need for investment in advanced security technologies, such as artificial intelligence and machine learning, is highlighted to better analyze and respond to incidents.

 

For Full Article, Click Here

Oleksandr Sheremeta, Forbes council member and Managing Partner and Co-Founder at Dataforest, shares an article discussing the concerns enterprises have regarding artificial intelligence (AI) in 2024. Many businesses are increasingly leveraging AI for efficiency and innovation, but they are equally apprehensive about its potential downsides. One of the primary fears is the risk of data breaches and privacy violations, as AI systems often require large amounts of sensitive information to function effectively. Additionally, there are worries about the ethical use of AI, particularly in decision-making processes that could perpetuate biases. The reliability of AI technologies is another significant concern, as businesses fear errors in AI predictions could lead to substantial financial losses or reputational damage. Companies are also facing challenges in compliance with rapidly evolving regulations surrounding AI technologies, adding to their operational burdens. The complexity of managing AI systems is highlighted, as businesses often struggle with integrating AI into existing workflows and technologies. Job displacement due to automation is a lingering fear, with concerns about the impact on employment rates and worker morale. There is also anxiety regarding the control over AI systems, especially if they begin to operate independently or develop unexpected behaviors. The potential for AI to be misused for malicious purposes, such as cyberattacks or misinformation campaigns, poses significant security threats. Furthermore, enterprises worry about the long-term sustainability of AI technologies, considering the environmental impact of massive data centers. The article emphasizes the need for transparency in AI algorithms to build trust among users and stakeholders. Continuous education and training are necessary to bridge the skills gap and prepare the workforce for an AI-driven future. Companies are encouraged to adopt a cautious approach towards AI implementation, balancing innovation with risk management. It is essential for organizations to establish ethical guidelines and robust frameworks to govern AI use. Collaboration between industry leaders, policymakers, and technologists is vital to address these fears and promote responsible AI practices. Overall, while AI holds immense potential, the challenges and fears associated with its adoption remain pressing concerns for enterprises in 2024.

 

For Full Article, Click Here

To trigger a work unit to process, follow these simple steps below:

 

First, you will need to access the Process Server Administrator screen and then select Scheduling > By Process Definition.

 

Next, select the process name and double click on it.

 

Then Select Actions > Start. You should now be able to trigger a work unit to process!

 

 

The evolving role of the chief information security officer (CISO) is a response to the changing landscape of cybersecurity. Mary K. Pratt, contributing writer for CSO Online, shares an article about how this traditional role, which focused on technical issues and compliance, has since expanded to include strategic, executive responsibilities. As cyber threats become more sophisticated, it’s crucial for CISOs to communicate effectively with other executives and the board. Many organizations are now recognizing the need for a CISO who can bridge the gap between IT and business objectives. This emphasis on business acumen requires CISOs to develop a strong understanding of the organization’s goals and risk tolerance. The article highlights the growing importance of risk management, where CISOs must clearly articulate cybersecurity risks in business terms. CISOs are increasingly being involved in decision-making processes, ensuring that security is considered in all aspects of business operations. As businesses digitize and adopt new technologies, the role of the CISO will continue to evolve, with more focus on proactive measures rather than reactive responses. The challenge of recruiting and retaining skilled cybersecurity professionals remains a significant obstacle for organizations. Pratt notes that the CISO role is often facing high turnover due to the pressure and expectations associated with it. Another trend is the integration of artificial intelligence and automation in cybersecurity strategies, which can help CISOs reduce workloads and improve threat detection. Additionally, it emphasizes the need for continuous education and training for CISOs to keep pace with rapidly changing technologies and threats. CISOs must also focus on fostering a culture of security within the organization, promoting awareness and responsibility among all employees. Collaboration with external partners, such as law enforcement and cybersecurity firms, is essential for enhancing an organization’s security posture. The article concludes by suggesting that the future CISO will need to be a strategic leader, adept at navigating both technological and business challenges while ensuring robust cybersecurity measures are in place. Overall, the CISO’s role is expected to become more prominent and influential in shaping organizational strategy and resilience against cyber threats.

 

For Full Article, Click Here

End of mainstream maintenance for SAP Crystal Server 2016 and support plan for SAP Crystal Server 2020

We are on Crystal Server/Reports 2016. Do we need to upgrade to Crystal 2020? I only see the 2016 version on the download site.

 

Infor BI 10.6.30 for Lawson S3/M3 now supports SAP Crystal Reports Server 2020 as a report’s server. As such, this should be reflected accordingly on the LBI installer. Changes were made on the installer to include CRAS 2020.

 

CRAS 2020 is backwards compatible with reports created in 32-bit. Users just needs to recreate the data source connections in ODBC to ODBC 64-bit using the same Datasource Name. This also means that users will need to install the 64-bit drivers and configure the settings from 32-bit to 64-bit. For MSSQL, the 64-bit drivers are already available once you already have it installed. For other data source type, download the respective 64-bit driver. Same with Lawson OLEDB, Infor has released a 64-bit version, uninstall OLE DB 32-bit and install the 64-bit version.

 

Since CRAS2020 is a 64-bit application, the JVMMaxHeap value can now be set more than the 3GB limit in D:\BusinessObjects\SAP BusinessObjects Enterprise XI 4.0\java\CRConfig.xml

Open the CRConfig.xml file. Look for the following lines:

 

<JVMMaxHeap>64000000</JVMMaxHeap>

<JVMMinHeap>32000000</JVMMinHeap>

 

Change the JVMMaxHeap value more than the 3GB limit. Save and Restart RAS.

 

Please note that Crystal Designer 2020 will no longer work when installed in the same server as CRAS 2020. In CRAS 4.3 (CR server 2020), it is not supported to install both server side and client side in the same machine. Registry keys may get corrupted.

 

If you’re interested in moving forward updating your Crystal software, Nogalis offers MSP support to assist with upgrades and migrations.

Enterprise resource planning (ERP) systems can be a huge investment for your business: you can become more efficient, your employees more productive and your customers happier. But, if you implement this valuable system wrong, it can cause even more headaches than before. Raihan Islam, Principal Advisor and Startup Coach, shares an article on Computer Weekly of the many reasons why ERP projects go wrong, and how to avoid them when implementing your own. The article discusses the common challenges faced during Enterprise Resource Planning (ERP) implementations and how organizations can recover from these setbacks. Many companies experience ERP horror stories due to poorly planned projects, lack of employee engagement, or inadequate training. The initial promise of streamlined operations can quickly turn into frustration and budget overruns. A key reason for failure is often the neglect of change management, as organizations struggle to adapt to new systems. Resistance from employees can lead to low adoption rates, further complicating the implementation process. The article emphasizes the importance of addressing employee concerns and fostering a culture of openness. Another issue highlighted is the selection of the wrong ERP system, leading to misalignment with business needs. Organizations are urged to conduct thorough assessments of their processes before choosing a solution. This assessment should include input from all stakeholders to ensure the system supports the company’s unique requirements. Islam also stresses the significance of proper training and ongoing support for users. Without comprehensive training, employees may not fully utilize the ERP system, leading to missed opportunities and inefficiencies. Regular feedback sessions can help organizations make necessary adjustments to improve user experience and system performance. To get back on track, the article suggests re-evaluating the ERP strategy and learning from previous mistakes. Engaging in continuous improvement and adopting an agile mindset can foster better adaptability to change. Establishing clear communication channels is also essential for addressing issues as they arise. Moreover, Islam provides insights into overcoming ERP challenges by focusing on employee involvement, proper system selection, training, and continuous improvement. By taking these steps, organizations can transform their ERP initiatives from horror stories into success stories.

 

For Full Article, Click Here

Asaf Kochan, Forbes Council Member and President & Co-Founder of Sentra, shares an article exploring the evolution of data security.  Kochan focuses on the transition from Data Security Posture Management (DSPM) to more comprehensive security platforms. It begins by defining DSPM as a method used to assess and enhance an organization’s data security stance. Traditional data security focused primarily on perimeter defenses, but the increasing complexity of data environments has necessitated a more robust approach. The rise in data breaches and regulatory requirements has pushed organizations to adopt more integrated solutions. In response, many are adopting comprehensive data security platforms that offer not just monitoring but also advanced protection and remediation capabilities. These platforms often utilize machine learning and automation to improve response times and efficiency. Kochan emphasizes the importance of a holistic approach to data security that encompasses all stages of data handling—from storage to sharing and disposal. He suggests that organizations need to align data security with their overall business strategy for effective risk management. The article also highlights the benefits of adopting a unified security framework, which can streamline processes and improve compliance with regulatory mandates. The need for continuous monitoring and adaptive security measures is stressed as essential in today’s evolving threat landscape. Kochan concludes that as organizations continue to evolve their data security strategies, the focus should remain on creating resilient, comprehensive platforms that can adapt to future challenges in cybersecurity.

 

For Full Article, Click Here

If you are having issues loading your externally facing Lawson Portal, one way to troubleshoot is to set the logs to debug mode so that you can hopefully get more information about the errors.

 

In WebSphere Application Server admin on your internal server, click into the web server under Servers > Server Types > Web servers.

Click the web server name then Click “Plug-in properties”.

Change the “Plug-in logging” to Log Level “Debug”

Click “Apply” or “OK”.  Go back to the web server list, and select your web server using the checkbox.  Select “Generate Plug-in”.  Since your web server is external, there is no need to Propagate the plug-ins (this is a manual process).

When you generate the plug-in, the location will be displayed at the top of the screen.  Navigate to that location and copy the plugin-cfg.xml file.

Navigate to your external server and paste the plug-in file at <WebSphere Install Directory>/Plugins/config/<webserver name>

Perform an iisreset on the external web server.

Now your web server will be in debug mode, and you will get more detailed information in the plugin logs.