With many people working remotely and many business operations moving online as well as databases stored in the cloud, cyber security has become a key need for companies. Thus, the Chief Information Security Officer (CISO) role has become more important than ever. Andrew Hay, cyber security expert and COO at Lares, LLC., shares an article on Forbes explaining how the role of CISO has evolved and the importance of this position in today’s business environment. One of the primary roles of the CISO, Hay shares, is to “develop and implement a comprehensive security strategy for their organization. This involves conducting risk assessments, identifying vulnerabilities, and implementing controls to mitigate potential threats.” The CISO plays a key role in learning and communicating security risks to their employees and their stakeholders. This role works closely with essentially every department to ensure security is integrated in all aspects of the business. Hay makes note of the biggest challenge for this position – cybercriminals. It is the CISO’s job to anticipate and prepare for new threats as they emerge. Another challenge to overcome is data privacy, Hay explains that with the implementation of regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), companies must be more transparent about how they collect, use, and protect personal data. Therefore, the CISO must work to ensure that the organization is compliant with these regulations, while also balancing the needs of the business. Hay concludes that the role of the CISO, although faced with high level challenges, is crucial in today’s digital landscape. With more and more companies joining the digital workspace, more and more cybersecurity is needed. As we look to the future of work, the CISO will play an essential role for your business and employees.

 

For Full Article, Click Here

Users are receiving the following error when running a query or upload in Microsoft Office Add-ins:

FATAL ERROR: ITEM_SECURED

File FILERELFLD is secured.

 

Resolution:

This is a security setup/configuration issue.

First, you need to decide where the security rule needs to be added.  The steps below are very specific to doing this change to the ADDINS security class which Infor Lawson delivers out of the box. This ADDINS security class is assigned to the LawsonQueryToolsRole security role.  In general, end users that need to use MOA should have the LawsonQueryToolsRole assigned to them since it’s an out of the box deliverable allowing all necessary access to the items need for use with MOA.  If you are using a different configuration, then in the steps below, instead of ADDINS, you’d add the rule to the appropriate security class.  That security class would need to be assigned to a ROLE that the user already has assigned to them.

  1. Log into Lawson Security Administrator (LSA)
  2. Click on “Profile Management” tab
  3. Click on “Profiles”
  4. Double-click on the “GEN” Profile id
  5. Double-click on the “ADDINS” security class name
  6. Click on the “Add Rule” button
  7. Change the “Securable Types” to “Files”
  8. Expand (Click on +) “CS”
  9. Locate the table that is showing in the error in the list under “CS” (Example: FILERELFLD) and put a check mark in the box next to it
  10. Click on “Apply” and have the user test.

Your error should go away.

Infor recently announced that Johnson Matthey, a global leader in sustainable technologies, has selected Infor MES manufacturing execution system with the goal to digitize manufacturing operations, boost efficiency and traceability, and underpin ambitious growth plans for its hydrogen technologies business unit. Johnson Matthey will deploy Infor MES at its hydrogen fuel cell manufacturing facility in Swindon, UK. Per the press release, following a thorough assessment of the market and a competitive bid process, Johnson Matthey ultimately chose Infor MES to scale up its production of hydrogen fuel cells. Infor MES will work to integrate machines and plant equipment with business systems to deliver real-time control over operations, supporting operators with every task they have to perform.

 

For Full Article, Click Here

After a Java update in Landmark, there are typical steps to follow to reset the java location.  Firstly, change the JAVA_HOME and LAW_JAVA_HOME environment variables.  Verify that the new path is also stored in the Path environment variable.

 

Next, run the change-jdk.jar command in the grid home/tools folder.

Finally, validate the LAW_JAVA_HOME setting in the config.bat file.

After those steps are completed, reboot the server and make sure the application starts.  If it doesn’t, it’s time to get into the nitty gritty.

Open up the Grid Manager.  Click on Configuration > Grid Configuration.

Select Grid Properties.

Under Node Properties, select Java Executable.

It is most likely pointing to the old location for Java.  Fix that, then reboot and you should be good to go.

It’s a brand new year and while it’s not yet the time for “spring cleaning”, you should still consider cleaning up your data. While we can easily brush this time-consuming task aside, understanding and cleaning up your data can save you cloud storage space. Simon Jelley, General Manager for SaaS Protection, Endpoint and Backup Exec at Veritas Technologies, shares an article on Forbes of the importance in managing and keeping necessary data in the cloud. At some point every bit of data was of importance to your company. But as years pass and data retention and compliance comes into play, a lot of that historical data is useless. Jelley coins the term “ROT”, an acronym to describe the three types of antiquated data you may still be storing – data that is redundant, obsolete, and trivial. “Just as rot often takes hold in organic things due to neglect, ROT data results from neglecting good data management practices. As much as a third of enterprise data can be considered ROT (and another 52% is dark data with unknown value, at least a portion of which is almost certainly more ROT),” says Jelley. ROT data can pose many risks to your business such as security, compliance, and liability. Not only that, having unnecessary data means you’re paying for high storage sizes. Below are four steps that Jelley outlines for rooting out your ROT data.

  1. Create a data taxonomy or classification system: “This is a set of definitions, labels and groups to organize your cloud-based data. This will help you identify ROT data.”
  2. Establish a single source of truth (SSOT) location for each category of your cloud data. “This is where the “right” version of each data asset is saved, reducing the chance that ROT versions exist elsewhere in the cloud.”
  3. Define policies for managing the ROT data you’ve identified. “These are rules and procedures you set for purging the ROT from the cloud.”
  4. Remember that this is an iterative process. “Continually update your data taxonomy, manage your SSOT location on an ongoing basis to ensure it’s being used properly, and regularly execute on your ROT data policies with the procedures you’ve established to get rid of it.”

While this process may be a huge project, Jelley concludes how necessary it is and it promotes good organizational management for your business.

 

For Full Article, Click Here

We are at a time in the digital age where new technologies are being developed daily and existing technologies are continuing to improve and evolve. In 2022, we had an overwhelming amount of apps and technology that stemmed from COVID issues. This year, we should see a lot more technology, whether it be pandemic related or a milestone in advancement. Micheal Chukwube, tech enthusiast and SEO Expert, shares an article on ReadWrite.com of 5 major technology trends we should observe in 2023 and beyond.

Metaverse – “The metaverse is a digital domain that connects other technologies together such as virtual reality and augmented reality where users exist in a digital universe. It is a chance for every part of our lives to really be expressed in a different way. GameFi and Play-To-Earn are examples of the metaverse models that now provide stable income streams to people worldwide. These are excellent examples of the future implementation of the metaverse, as they show that people are willing to spend their time living in virtual worlds and earning money.”

Artificial Intelligence (AI) – “AI technology is about intelligence that is as smart as the human brain and reacts like humans. ​​Today, AI makes many contributions to society. For example, in the form of virtual assistants such as Google Assistant, Siri, Cortana, and Alexa. AI has taken over our lives significantly and doesn’t seem to be leaving any time soon. In fact, with each passing day, AI is getting stronger and more innovative to perform more and more human tasks.”

DevOps – “Development and Operations (DevOps) is an organizational approach that enables faster application development and easier maintenance of existing applications. Companies like Netflix, Google, and Amazon are currently using DevOps to increase the productivity and efficiency of their teams. By fostering collaboration between development and operations teams, companies can offer their customers faster software upgrades and feature delivery. It also means companies will see fewer errors and improve product quality.”

Cybersecurity – “Cybersecurity is high on business agendas, as businesses continue to deal with cyber threats associated with the rise of remote working and e-commerce fueled by the COVID-19 pandemic. Therefore, in 2023, cybersecurity should be on everyone’s agenda.”

Quantum Computing – “Today’s supercomputers encode information in bits (0 and 1), while quantum computers are made up of quantum bits (qubits). Therefore, quantum computing can exist as 1s and 0s at the same time. This means that quantum computers are able to multi-task, allowing for significantly faster results, especially in research and development.”

 

For Full Article, Click Here

When we try to update some user records on the Infor Security Services (ISS) webpage, it gives an error stating: “loadResource(): returned identity [User:] already exists”

This error is due to missing extended attributes in LDAP. The extended attributes are what allow ISS to know that the user exists in LMK and are created when a user is added via ISS or the user is included in a sync.

To create the extended attributes for the user, you have two options (we recommend step 1):

  1. Run a list-based sync for the user who you are getting the error on.
  2. Run a full sync via the ISS webpage.

 

See LSSCG_11.0.0.0_UWA.pdf via Infor Concierge for example on list-based sync.

 

This is typically done by a Lawson technical resource. Organizations often hire a Lawson consultant team who offer managed services at a fixed monthly rate. These Lawson teams have a wider range of expertise and knowledge and are ideal for larger organizations but also are great for smaller ones that don’t need a dedicated Lawson employee on-site. Nogalis does offer this as a service so feel free to reach out to us via our contact page.

Infor recently announced that Rosen Hotels & Resorts, one of the most respected names in the hospitality industry, will partner with the tech giant to implement back-of-house hospitality solutions, including automating critical business functions like financials, human resources, talent, analytics and workforce management. Per the press release, as an existing Infor customer for budgeting and reporting, this expanded partnership allows Rosen to utilize Infor’s cloud-based applications specifically built for the hospitality industry to automate time-consuming processes. By automating critical business functions, Rosen will be able to share better data in real time, create processes that can scale and improve its workforce culture. Moreover, by connecting all locations into one common, accessible environment, Rosen Hotels & Resorts can easily track essential activities, trends, and outcomes, thereby increasing visibility, efficiency and profitability.

 

For Full Article, Click Here

There is a known issue after some Java updates where lase won’t start, and attempting to run the bcinstall.jar throws the exception “JCE cannot authenticate the provider BC” in the lase_server logs.  When the LASE fails to start after a Java update, this issue can only be resolved by installing a compatible Lawson CU.

When this happens, you will either need to revert to the previous version of Java, or update LSFCT to the minimally compatible CU (or later).

For Lawson version 10.0.9, the minimum CU is 4.

For Lawson version 10.0.10, the minimum CU is 5.

For Lawson version 10.0.11, the minimum CU is 6.

 

CES 2023 has arrived and the newest technology reveals are something to be very excited about. Karisa Langlo and Daniel Van Boom of CNET share the newest gadgets and innovations that you should look out for in the coming months. 

Folding and sliding mobile device – Samsung’s Flex Hybrid features a mobile device with the left side that folds, like the Galaxy Fold, while the right side can slide out to extend itself.

A glasses-free 3D laptop – This ASUS laptop’s OLED screen produces a 3D experience without glasses, similar to competitor Acer’s IPS screen laptop. The OLED screen is the difference makers because the technology promises a visibly crisper 3D rendering.

Advancements to health monitoring in Smartwatches – Smartwatches already track your health by offering heart rate, sleep quality, and blood-oxygen levels. Japanese watchmaker Citizen takes it a step further, introducing the CZ Smart watch which can measure fatigue and alertness levels to keep the wearer informed of their overall wellbeing.

The thinnest gaming laptop in the world – Alienware’s lineup of new laptops included the Alienware x14 – which according to the company is the thinnest 14-inch gaming laptop in the world. It features a 2,560×1,600-pixel display with a 165Hz refresh rate. Starting price is $1,799 and the company plans to ship it out this winter.

Invisible laptop touchpads – LG introduced its new Gram Style laptop, featuring a hidden or disappearing touchpad that presents itself only when you touch the palm rest. The stealthy haptic touchpad lights up under your fingers when touched, showing you where to tap and drag to navigate the screen.

A gaming controller for PC gamers who also use consoles – Dell’s Concept Nyx gaming controller plans to bridge the gap between a gamepad and a keyboard for PC gamers who are also console gamers. This controller allows PC gamers to use hotkey setups and have dozens of inputs, similar to a gamepad with more features/options, but to the set up and functionality of a console controller.

Roku TVs – Already a popular smart TV platform, Roku has decided to expand their line and start producing TVs of their own. Roku TVs will feature the same Smart TV platform and Voice Remotes.

Introducing a truly Wireless TV (you read that right) – LG already introduces us to the world’s largest OLED TV last year – their 97-inch model. This year, they announced that this machine has now gone wireless. Gone are the days of cluttered cords behind the screen. The wireless TV will communicate with a top box where you can plug in your HDMI and other inputs. This TV, Langlo and Van Boom comments, is the way of the future, putting all others to shame.

Upgrades coming to your laptop’s brains – Intel unveiled new 13th-generation processors which will power a huge range of products and improve performance on a wide range of laptops.

Cloud gaming in your car – Nvidia’s GeForce 4080 GPU is coming to the cloud, and your cars. If your car has a screen on its dash, you can play games while the car is in park. If there are screens behind the driver or passenger seats, those sitting in the back can game on the go as well.

 

What tech are most excited about this year?

 

For Full Article, Click Here