Chichester Park Hotel recently deployed Infor Hospitality Management Solution (HMS) and Infor Sales & Catering (SCS), a fully integrated, event management software solution. The new cloud systems, according to the press release, have streamlined and amalgamated key processes, laying the foundations for continued business growth. The 86-room hotel in the heart of historic Chichester, England chose Infor’s two systems simply for the ease-of-use of the solutions and their ability to integrate seamlessly with each other, as well as other solutions and technologies. Since implementation, Infor HMS and SCS delivered numerous benefits for the business, securing valuable efficiency savings and providing more insightful and accessible data than with the previous solutions. “Infor HMS and SCS are built to meet the exacting demands of the hotel industry,” comments Paul Griffiths, Infor hospitality business development manager for UK and Ireland. “Our flexible and scalable solutions deliver quantifiable business benefits, automating core processes to deliver that all-important quality experience for guests and staff alike. The efficiencies and valuable insights that our solutions deliver make them the ideal choice for hotel businesses keen to pursue ambitious growth strategies, boosting customer satisfaction as well as profitability.”

 

For Full Article, Click Here

Login to portal an admin user.

Preferences >> User Options

Set Data Area to LOGAN and APPLY then OK

 

Go to form RD69.1 and click next to cycle through forms and if you see the one you’re looking for, look for the Isdefault flag. If it is set to 0, it means it’s not the default form when users search it.

If the Isdefault is set to 1, when users search PA17.1, they would be brought to the custom form above (but its set to 0 so it wouldn’t apply here).

 

Alternatively, users could still be using a custom form even if Isdefault is 0 if it was setup in a bookmark or favorites tab within portal.

 

Good luck!

It’s no surprise that the healthcare industry is thriving on the newest technological advancements. Technology is everywhere in the medical field – from artificial intelligence to telehealth to 3D printing and robotic surgical assistance. Jacob Kupietzky, president of HCT Healthcare Executive Interim Management & Consulting, shares an article on Newsweek of four major components in healthcare that have rapidly advanced thanks to technology.

Collecting Information. “The proliferation of smartphones and wearable trackers like Fitbits have made it possible to monitor and record patient activity and vital signs remotely, without the need for constant medical supervision. It also allows physicians to access objective, reliable data with which they can make informed medical decisions.”

Diagnosis. “A diagnosis is a professional judgment based on available data. That leaves lots of room for human error, be it from unreliable patient self-reports to misinterpreting data to insufficient measurement. Now, machine learning and artificial intelligence can identify trends within large data sets that lead to faster and more accurate diagnoses. This allows for more sensitive testing and more successful interventions.”

Treatment. “Traditionally, treatment would require in-person, doctor-to-patient interventions that risked human error and unforeseen complications. Now, while no medical intervention is truly foolproof, technological improvements have made treatments safer and more available, and in some cases can even preclude disease. Telemedicine has made certain low-risk interventions more convenient and broadly accessible by making them remote.”

Running And Building Your Practice.  “Making sure your practice remains up to date can not only keep it from feeling stale — it can also help ensure you’re providing the modern health services your community needs. That not only increases convenience — it creates better outcomes. Machine learning helps with analytics, and virtual appointments and electronic prescriptions help with telehealth patients.”

The digital age of advanced technology has greatly revolutionized the healthcare industry, and will continue to play a critical role for years to come.

 

For Full Article, Click Here

Infor recently announced that Cueros Velez, a Colombian leather goods company, implemented Infor WMS as part if its digital transformation to manage warehouse operations with successful results. The solution was sold and implemented by Cerca Technology, Infor´s channel partner. Per the press release, Cueros Velez’s strategy was to redesign its supply model, and one of the main activities was to implement a modern warehouse management solution. Since implementing, Cueros Vélez has had over 150% increase in productivity in height picking and classification process, better inventory visibility, service and customer satisfaction to name a few successes. Further, Cueros Vélez deployed the project in two stages. The first to implement and consolidate Infor WMS. Once it was live and indicators improved, the second stage was to integrate WMS with other existing solutions.

 

For Full Article, Click Here

PROBLEM

How do I suppress Back-Office PO Receiving (PO30) Receiving Delivery and Putaway (PO134) delivery tickets when the Mobile Supply Chain Management (MSCM) Delivery Documents are all that is needed.

 

RESOLUTION

One way to disable the Back-Office PO Receiving (PO30) Receiving Delivery and Putaway (PO134) delivery ticket is to remove* the printer from PO Receiving (PO30) or create a dummy printer to stop the back-office delivery ticket from printing.

*Removing the printer from PO Receiving (PO30) only works if the user does not have a default printer assigned to them. After being removed, the default printer will simply populate back in the field upon clicking change.

Additionally, an enhancement to PO Company Setup (PO01) was added which provides a flag called “Delivery and Putaway Ticket Print” which allows disabling the delivery ticket printing at the company level.

 

 

 

HAVI Group, a global company that innovates, optimizes and manages the supply chains of leading food service brands, recently deployed Infor WMS warehouse management system in the cloud. The company plans to implement Infor WMS at more than 50 of its distribution centers across Europe and Japan by the end of 2026 to contribute to continuous improvements in service, efficiency and operational resilience from these locations. Per the press release, HAVI selected Infor WMS for its cutting-edge technology architecture, ensuring the highest IT security standards, round-the-clock service availability, optimal operational efficiency, and the safety and traceability of food across the supply chain. Additionally, HAVI looks to leverage the solution’s advanced warehouse operations management and resource planning capabilities, which include 3D visualization and a more data-driven approach to execution..

 

For Full Article, Click Here

What forms are secured by CB04.1 (Cash Ledger Security) when a User Class is assigned to a Cash Code in CB00.2?

 

On CB04.1-CB04.2, you are restricting what a user is able to do with that specific Cash Code.

 

Some examples of forms that would give you an error are:

CB00.2, CB00.3, CB20, CB80, CB220, CB90.4, CB90.1, CB221, CB80, CB10, CB15, CB175, CB180, CB185, CB190, CB210, CB211, CB215, CB25, CB260, and CB30.

 

When the user tries to inquire on or use that Cash Code, he would get the error message that “user does not have access rights” if he is set to not have inquiry or maintenance access.

 

CB06 and CB99 do not give you an error when trying to use the cash code tied to that Security User Class.

 

CB04.1 security does not restrict the user from using the Cash Code in other modules (like AP and AR).

It’s no surprise that we are in the middle of the digital age. Our digital footprints are bigger as we do almost everything online – shopping, banking, streaming, working, etc. This means, however, that we need to be aware of the dangers of our digital worlds. Strategic business & technology advisor Bernard Marr shares an article on Forbes about the subtle threats that are part of online life – and what you can do to protect yourself and your loved ones.

  1. Digital addiction. “This can span any type of addiction related to digital pastimes, including social media addiction, internet addiction, phone addiction and gaming addiction. Much of the time spent on smartphones likely revolves around social media, but there’s no doubt that phones themselves have become something we automatically reach for when we want to feel validated or absorbed. We’re losing the ability to be idle and alone with our thoughts, even for a few moments.”What to do about it: set time limits for specific apps, set a bedtime or do not disturb mode, turn off app notification to reduce temptation, or even delete the most distracting apps from your phone.
  2. Cyberbullying. “According to the leading UK bullying charity, Bullying UK, 56 percent of young people have seen others be bullied online. We must all learn to recognize cyberbullying, teach our children what cyberbullying looks like, and take appropriate action when it occurs.”What to do about it: Educate yourself and your kids about cyberbullying and what you can do to avoid or not participate in it, learn to spot signs that you or your child or friends are being bullied online, know your rights (i.e. how to report and the guidelines for reporting cyber bullies and who to report it to), block those users on social media or online forums. Cyber bullying can also just be a post or inappropriate targeted content that you can also report for removal.
  3. Digital impersonation. “As more of our lives go online (including images, videos, and recordings of us), digital identity theft is becoming more of a threat. Fraudsters create social media accounts that use someone else’s (or even an organization’s) name, image, and other identifying features to create fake accounts. Even if your identity isn’t used by fraudsters, there’s still a risk that you could be interacting with fake accounts online.What to do about it: be on the lookout for fake social media accounts, adjust your privacy settings to avoid being targeted, be vigilant when accepting request or talking to people online, do a regular search of your name and look for any false posts or identities, think carefully about the content you share online – it might be used by fraudsters to create authentic looking accounts in your name to trick people you know.

The digital world is unavoidable and while it will never be 100% secure, you can take small measures to keep yourself safe from the threats online.

 

For Full Article, Click Here

John Edwards, expert business technology journalist, shares an article on CIO of the latest trends in enterprise IT software and services. These trends, if taken full advantage, can help IT leaders make the most of today’s emerging technology to further their businesses.

AI takes aim at the enterprise. “From front-office transformation to new go-to-market strategies and business models, artificial intelligence is poised to reshape the enterprise, says Michael Shehab, innovation leader at PwC US. He advises IT leaders to examine their current operations to identify issues that can be resolved with AI. Doing so will require building new skill levels across the organization to ensure that teams are able to successfully deploy AI systems and design software and data environments that are fully compatible with the new strategies.”

ChatGPT captures enterprise imagination. “Given the incredible virality ChatGPT has experienced since its launch, generative AI is currently at the forefront of many people’s minds, observes Brandon Jung, vice president of ecosystems at Tabnine, which is developing an AI-code writing technology. ‘There’s a lot of chatter around its future applications, its potential, and what this means for the future of AI, some of which is accurate and some of which is false.'”

Edge computing arrives. “The edge economy is one of the most important trends this year in the enterprise services market, says Ken Englund, technology, media, and telecommunications leader at EY. Englund advises CIOs to consider investing in edge ecosystems, given their ability to streamline processes and improve customer experiences.”

Private wireless picks up steam. “Private wireless adoption is accelerating, providing enterprises with an increasingly attractive and viable communication option, observes Roy Chua, founder and principal at research and analysis firm AvidThink. Private wireless networks deliver both low latency and high throughput. The technology also allows enterprises to add new services quickly while responding to data traffic growth.”

Digital transformation enters 2.0 phase. “The way CIOs approach digital transformation programs is changing dramatically, says Shafqat Azim, a partner with global technology research and advisory firm ISG. He predicts that enterprises will continue moving away from transactional-SLA-focused service projects that don’t include any transformative elements. Azim advises CIOs to begin viewing digital modernization investments through a value realization and cyber risk management lens, along with a traditional cost optimization focus.”

Passwordless authentication goes prime time. “The world has moved beyond the point where a simple password can provide sufficient protection, states David Burden, CIO with open-source identity and access management technology firm ForgeRock. Passwordless authentication promises to significantly enhance customer experience.”

Cloud-native as platform of choice. “Rajesh Kumar, CIO at digital transformation company LTIMindtree, predicts a bright future for cloud-native platforms, a way of building and running applications that takes advantage of distributed computing capabilities supplied by the cloud delivery model. Cloud-native apps are designed and built to exploit the scale, elasticity, resiliency, and flexibility of the cloud, an approach that allows adopters to go live via platform configuration without the need for significant custom development. Serverless applications running on cloud-hosted platforms differ from traditional enterprise software deployments, in which software is deployed on server infrastructure hosted either on-cloud or on-prem, Kumar says.”

 

For Full Article, Click Here

When starting a program compile, sometimes you may encounter an error message such as the following: “rebldlrt.c – InProgress open: Permission denied”. You cannot proceed until you resolve the issue.

 

What this means is a file or record of the name is the culprit. You will need to address this file error in order to do a program compile. To resolve this error, you simply need to navigate to the LAWDIR/system and delete the file rebldtlrt.lkf.  Then you can retry the program compile. You shouldn’t come across the error again and your compile should run smoothly.