It’s no surprise that we are in the middle of the digital age. Our digital footprints are bigger as we do almost everything online – shopping, banking, streaming, working, etc. This means, however, that we need to be aware of the dangers of our digital worlds. Strategic business & technology advisor Bernard Marr shares an article on Forbes about the subtle threats that are part of online life – and what you can do to protect yourself and your loved ones.

  1. Digital addiction. “This can span any type of addiction related to digital pastimes, including social media addiction, internet addiction, phone addiction and gaming addiction. Much of the time spent on smartphones likely revolves around social media, but there’s no doubt that phones themselves have become something we automatically reach for when we want to feel validated or absorbed. We’re losing the ability to be idle and alone with our thoughts, even for a few moments.”What to do about it: set time limits for specific apps, set a bedtime or do not disturb mode, turn off app notification to reduce temptation, or even delete the most distracting apps from your phone.
  2. Cyberbullying. “According to the leading UK bullying charity, Bullying UK, 56 percent of young people have seen others be bullied online. We must all learn to recognize cyberbullying, teach our children what cyberbullying looks like, and take appropriate action when it occurs.”What to do about it: Educate yourself and your kids about cyberbullying and what you can do to avoid or not participate in it, learn to spot signs that you or your child or friends are being bullied online, know your rights (i.e. how to report and the guidelines for reporting cyber bullies and who to report it to), block those users on social media or online forums. Cyber bullying can also just be a post or inappropriate targeted content that you can also report for removal.
  3. Digital impersonation. “As more of our lives go online (including images, videos, and recordings of us), digital identity theft is becoming more of a threat. Fraudsters create social media accounts that use someone else’s (or even an organization’s) name, image, and other identifying features to create fake accounts. Even if your identity isn’t used by fraudsters, there’s still a risk that you could be interacting with fake accounts online.What to do about it: be on the lookout for fake social media accounts, adjust your privacy settings to avoid being targeted, be vigilant when accepting request or talking to people online, do a regular search of your name and look for any false posts or identities, think carefully about the content you share online – it might be used by fraudsters to create authentic looking accounts in your name to trick people you know.

The digital world is unavoidable and while it will never be 100% secure, you can take small measures to keep yourself safe from the threats online.

 

For Full Article, Click Here

John Edwards, expert business technology journalist, shares an article on CIO of the latest trends in enterprise IT software and services. These trends, if taken full advantage, can help IT leaders make the most of today’s emerging technology to further their businesses.

AI takes aim at the enterprise. “From front-office transformation to new go-to-market strategies and business models, artificial intelligence is poised to reshape the enterprise, says Michael Shehab, innovation leader at PwC US. He advises IT leaders to examine their current operations to identify issues that can be resolved with AI. Doing so will require building new skill levels across the organization to ensure that teams are able to successfully deploy AI systems and design software and data environments that are fully compatible with the new strategies.”

ChatGPT captures enterprise imagination. “Given the incredible virality ChatGPT has experienced since its launch, generative AI is currently at the forefront of many people’s minds, observes Brandon Jung, vice president of ecosystems at Tabnine, which is developing an AI-code writing technology. ‘There’s a lot of chatter around its future applications, its potential, and what this means for the future of AI, some of which is accurate and some of which is false.'”

Edge computing arrives. “The edge economy is one of the most important trends this year in the enterprise services market, says Ken Englund, technology, media, and telecommunications leader at EY. Englund advises CIOs to consider investing in edge ecosystems, given their ability to streamline processes and improve customer experiences.”

Private wireless picks up steam. “Private wireless adoption is accelerating, providing enterprises with an increasingly attractive and viable communication option, observes Roy Chua, founder and principal at research and analysis firm AvidThink. Private wireless networks deliver both low latency and high throughput. The technology also allows enterprises to add new services quickly while responding to data traffic growth.”

Digital transformation enters 2.0 phase. “The way CIOs approach digital transformation programs is changing dramatically, says Shafqat Azim, a partner with global technology research and advisory firm ISG. He predicts that enterprises will continue moving away from transactional-SLA-focused service projects that don’t include any transformative elements. Azim advises CIOs to begin viewing digital modernization investments through a value realization and cyber risk management lens, along with a traditional cost optimization focus.”

Passwordless authentication goes prime time. “The world has moved beyond the point where a simple password can provide sufficient protection, states David Burden, CIO with open-source identity and access management technology firm ForgeRock. Passwordless authentication promises to significantly enhance customer experience.”

Cloud-native as platform of choice. “Rajesh Kumar, CIO at digital transformation company LTIMindtree, predicts a bright future for cloud-native platforms, a way of building and running applications that takes advantage of distributed computing capabilities supplied by the cloud delivery model. Cloud-native apps are designed and built to exploit the scale, elasticity, resiliency, and flexibility of the cloud, an approach that allows adopters to go live via platform configuration without the need for significant custom development. Serverless applications running on cloud-hosted platforms differ from traditional enterprise software deployments, in which software is deployed on server infrastructure hosted either on-cloud or on-prem, Kumar says.”

 

For Full Article, Click Here

When starting a program compile, sometimes you may encounter an error message such as the following: “rebldlrt.c – InProgress open: Permission denied”. You cannot proceed until you resolve the issue.

 

What this means is a file or record of the name is the culprit. You will need to address this file error in order to do a program compile. To resolve this error, you simply need to navigate to the LAWDIR/system and delete the file rebldtlrt.lkf.  Then you can retry the program compile. You shouldn’t come across the error again and your compile should run smoothly.

Jacuzzi Brands Inc. recently selected Infor CloudSuite Industrial Enterprise to help improve inventory accuracy and supply chain efficiency, enhance customer experience and standardize business processes. Jacuzzi has been an Infor customer since 195, and was running Infor ERP on-premises in many worldwide facilities. Per the press release, a few years ago Jacuzzi management realized that the current situation would not support the company’s growth. Specifically, they wanted to better manage its inventory and reduce inventory levels and to improve supply chain effectiveness and raise the customer experience. After a review involving multiple vendors, the company chose Infor CloudSuite Industrial Enterprise. Brian Pierson, Jacuzzi Brands global chief operating officer, says of the decision, “One of Infor’s advantages is that they are easy to do business with. They brought together the right people at the right time and were able to show us that they had the right solution for our organization. We know they have got our backs throughout this journey.”

 

For Full Article, Click Here

Is your organization planning a move from Infor Lawson to Infor Cloud Suite (FSM, HRT, and HRP)?

If so, make sure you take advantage of Infor’s Data Migration Factory (DMF).

The DMF till will be used to perform data mapping; pre-and post-migration steps; data verification, rationalization, and validation; and data testing.  There are 5 Data Migration Passes as part of this process: 3 test passes, 1 mock go-live pass, and 1 production pass.

Lawson S3 data will be migrated for current FY detail, and 2 prior FY summary or detail for Financial Data.  HR Talent will migrate 0-3 years of employee work assignment and service record history.  Payroll will migrate current calendar year history if the go-live if after January 1.

NOTE: if you need access to ALL of your historical data, Nogalis offers a cost-effective and comprehensive solution.  Check it out here!

You can find more detail about the DMF on Infor’s KB article 2213690.  Make sure you ask your Customer Success manager to include the DMF in your migration plan.  It is FREE for Infor customers migrating from S3 to Cloud Suite!!

 

The benefits of Artificial Intelligence (AI) are without a doubt an advantage to have, but only if you know how to utilize it properly. Bernard Marr, strategic business & technology advisor, shares an article on Forbes of the 12 biggest mistakes organizations make regarding AI and learn simple ways to avoid these common missteps – mostly in the beginning stages –  so you can effectively harness the power of AI.

  1. Not Going “All In” on AI. “To fully realize the potential of AI, though, organizations must commit to its implementation and integration. It’s crucial to invest in the right infrastructure, personnel, and training to ensure successful AI adoption and avoid half-hearted attempts that can lead to wasted resources and suboptimal results.”
  2. Lack of Clear Business Goals. “If you’re going to launch AI initiatives in your business, make sure to establish specific, measurable objectives before you begin. By aligning AI projects with clear business goals, you can evaluate their impact and ROI, ensuring your efforts drive meaningful value for your organization.”
  3. Insufficient Expertise. “Invest in hiring skilled professionals with expertise in machine learning, data science, and engineering, or focus on upskilling existing employees through training and education. Partnering with experienced consultants or vendors can also help you bridge knowledge gaps.”
  4. Ignoring Change Management. “Neglecting the human aspect of AI adoption can lead to internal resistance, confusion, and reduced productivity. Develop a robust change management strategy that includes clear communication, employee training, and support systems to help workers adapt to the new technology. By addressing the cultural and behavioral aspects of AI adoption, you can facilitate a smoother transition and ensure your workforce is well-equipped to leverage the potential of AI with minimal disruption.”
  5. Poor Data Quality. “AI models are only as good as the data they’re trained on. If the data used to train an AI model is incomplete, inconsistent, or biased, the model’s predictions may be inaccurate or unreliable. In your organization, prioritize data quality by collecting, cleaning, and maintaining accurate, up-to-date datasets. Invest in proper data management practices to help you avoid skewed or biased AI models.”
  6. Neglecting to Involve the Right Stakeholders. “Successful AI implementation requires collaboration across different teams, including IT, data science, business strategy, and legal. If a company neglects to involve the right stakeholders, they risk siloed decision-making, suboptimal results, and missed opportunities. Make sure you’re engaging with all relevant parties early in the process, so you can identify requirements, manage expectations, and encourage collaboration, ensuring smoother AI adoption.”
  7. Over-Reliance on Black Box Models. “Companies that rely too heavily on “black box” models — complex machine learning algorithms and systems that don’t offer clear explanations for how they produce results — can run into problems with accountability and transparency. Prioritize transparency in your organization’s AI models. This reduces the risks of unforeseen biases and errors and fosters trust. Consider providing clear explanations of how your AI systems work.”
  8. Inadequate Testing and Validation. “Thorough testing and validation are essential for ensuring the reliability and accuracy of AI models. Plan to invest time and resources into rigorous testing processes, and be prepared to iteratively refine your models so you’re not making decisions based on faulty data.”
  9. Lack of Long-Term Planning. “When planning your AI initiatives, establish a comprehensive roadmap and allocate resources for the future, so your projects remain effective and aligned with evolving business needs.”
  10. Ignoring Ethical and Legal Considerations. “AI models can raise a host of ethical and legal considerations, from data privacy and bias to accountability and transparency. Companies that don’t take these considerations seriously risk damaging their reputation, alienating customers, and even facing legal action. Be proactive in addressing these types of issues, so your organization can build trust and avoid potential legal and reputational risks.”
  11. Misaligned Expectations. “When making plans for artificial intelligence adoption, be realistic about AI’s capabilities and limitations. Manage stakeholder expectations throughout the implementation process, so you can avoid disappointment and ensure realistic assessments of potential project outcomes.”
  12. Failing to Monitor and Maintain AI Models. “AI models require ongoing monitoring and maintenance to remain effective. Organizations must be prepared to regularly assess the performance of their AI systems. This will include updating and retraining models as necessary to account for changes in data or shifting business needs. Neglecting this aspect of AI management can lead to outdated models that produce inaccurate or biased results. Establishing a robust monitoring and maintenance plan is essential for ensuring the long-term success of your AI projects.”

 

For Full Article, Click Here

Infor recently announced that nVent, a global leader in electrical connection and protection solutions, has successfully completed the first phase of its Infor M3 CloudSuite deployment in Europe, led by Infor and its partner Columbus, a global IT cloud consultancy. Per the press release, this multi-year digital transformation project has nVent focusing on four strategic pillars in its digital transformation: digitizing go-to-market, digitizing operations, data platform and analytics capabilities, and innovating through connected solutions and software-enabled products. The goal of the project was to consolidate its ERP systems into one single core solution. Further, after a successful implementation for nVent’s sites in France and The Netherlands, nVent and Columbus have rolled out Infor M3 CloudSuite at nVent’s Asia Pacific sites. They plan to bring the system to several of its North America sites in 2023, including additional Infor modules and new integrations.

 

For Full Article, Click Here

Problem:

We noticed our jobs are failing after refreshing our productline. The job log is showing a bad file status error.

This particular error was caused by windows permissions not being inherited.  Even though the owner of the applications directory was correct, it was not the owner of the files and folders underneath it.

 

Resolution:

This was resolved by setting the owner in the advanced security settings of the folder properties and running icacls to reset permissions on the files.

——————————————————————————–

User: domain\lawson                     Job: PR140           Queue: **********

——————————————————————————–

BEGIN:  Job Submitted:  Wed Feb 14 09:22:06 2018

Step  1:  PR140 Started. . . . . .:  Wed Feb 14 09:22:06 2018

Token Command. . . . . .:  C:\LSFDEV\law\dev\obj\PR140.gnt

Executable Command . . .:  C:\COBOL\bin64\run.exe C:\LSFDEV\law\dev\obj\PR140.gnt dev NT00000004 PR140 1

Process ID . . . . . . .:  4008

Running as Account . . .:  domain\lawson

Program Messages:

** Creating .prt and .dtl files

Bad File Status 3 7 On File PRPAYRPTEN-FILE

Elapsed Time . . . . . .:  00:00:00

ERROR:    Stopped On Exit 1.

Elapsed Time:  00:00:01

END:    Job Ended:  Wed Feb 14 09:22:07 2018

Infor recently announced that Scandi Standard has chosen Infor CloudSuite Food & Beverage, multi-tenant cloud solution powered by Amazon Web Services (AWS) in order to consolidate and standardize its core processes. With operations in five countries and sales in over 40 through subsidiaries, Scandi Standard’s existing business systems lacked the industry adaptation needed to ensure that the ERP (enterprise resource planning) solution could support all core processes in a harmonized way within the group. Per the press the press release, Infor’s standardized platform allows Scandi Standard an opportunity to more quickly introduce new technologies into the group and future-proof its development. Additionally, the group chose Infor CloudSuite Food & Beverage, ensuring the business can benefit from continuous updates with minimal administrative burden on the internal IT team.

 

For Full Article, Click Here

Problem

When I try to add a record in Cash Ledger (CB), I get the error message User XXXX does not have access rights, even though I have security to run CB jobs. How do I resolve this error?

Solution

To resolve this error, follow the steps outlined below.

  1. Inquire on your cash code in CB00.2 (Cash Code).
  2. Click on the Security button on CB00.2. You will automatically be transferred to CB01.3

(Cash Code Security).

  1. Make sure your user ID has been added to the User Class associated with your cash code
  2. Inquire on CB04.2 and add your id to the security group.