Infor recently announced that Palais des Thés, the French house known for its exceptional teas, has opted to move its enterprise resource planning (ERP) system to the Cloud with a pair of Infor suites. The first suite Palais des Thés chose was Infor CloudSuite Distribution Enterprise, a cloud-based ERP platform with features designed and developed for the food retail sector. Second, they chose the Infor Factory Track module, a solution for automating and simplifying stock and production operations that manages automation in factories and warehouses, from receipt of raw materials to processing and packing to dispatch of finished products, while integrating inventory, operations planning, and the associated work and attendance times. Per the press release, this project, which launched in the beginning of 2022, aims to provide Palais des Thés with the management system needed to support its strong growth, while moving it towards greater standardization, and addressing major challenges of warehouse and logistics management. With a decade old ERP that wasn’t adaptable to their new company size and scale, Palais des Thés needed to upgrade their system, and Infor was the one they wanted. Moreover, Philippe Maillet, Infor’s sales director for SMB & channel in France, says of the project, “We are happy to count among our customers a reference like Palais des Thés, a fine brand that respects the values of this new world and has been able to withstand the difficulties of the past two years. Deployed in a multi-tenant cloud environment hosted by Amazon Web Services (AWS), our CloudSuite should enable their young and dynamic teams to focus on their core business and on higher value-added tasks.”

 

For Full Article, Click Here

To debug batch programs through command-line entry, use the following steps:

To debug batch programs through command-line entry

  1. If LAWENV is not called as part of your user profile’s sign-on program, you must call the LAWENV program to set the environment variables correctly.
    1. At the IBM i command line, type
      CALL LAWENV
    2. Type the name of an Environment and press Enter.
  1. Compile the program you want to debug. At the Qshell command line, type
    qcompile -D productline systemcode programcode

Note: If you need to include modules in the compile, use qcompile -Dm productline systemcode programcode .

  1. Submit the program to a job queue that is on hold or is not tied to a subsystem (so that the batch job does not execute).
  2. Start a service job for the program.
    1. Get the job information by typing at the IBM i command line,
      WRKJOBQ QueueName
      where QueueName is the job queue to which you submitted the batch program.Select option 5 (Work with) for the job queue and then write down the job, user, and job number information for the appropriate job.Note: You can also use the WRKUSRJOB command to find the job information, but this may yield a much longer list of jobs to view in order to find the one you need.
    2. At the IBM i command line, type:
      STRSRVJOB JobNumber/UserName/JobName
  1. Start debug. At the command line, type STRDBGand prompt it (F4). Make sure the library is the one where you compiled the source and that UPDPROD(*YES) is set. If the information is correct, press Enter.
  2. When source listing appears, press F12to resume.
  3. Start the batch program by changing the job to run in an active queue. On the “Work with Job Queue” screen, enter 2(Change) to change the job queue for the job. After typing in the job queue name, press Enter.The ILE debugger will display the “Start Serviced Job” screen with the following message: “The serviced job has been released from the job queue. Press Enter to start the job or F10 to enter debug commands for that job.”
  4. Press F10and then at the IBM i command line, type:DSPMODSRC
  1. Set break points (F6), then press F12, and then press F3 to return to the “Start Serviced Job” screen.
  2. Press Enterto run the program.
  3. After finished with debugging, end debug and the service job. At the IBM i command line, type:
    ENDDBG
    thenENDSRVJOB

Healthcare and technology have been a welcome partnership and while technology has established a presence in the healthcare sector, it wasn’t until the COVID-19 pandemic that patients started relying more on the option of healthcare technology. While the economy in general is trying to settle back to “pre-covid” times, certain new “norms” are here to stay. Digital health and public policy writer Rebecca Pifer shares an article on Healthcare Dive explaining how healthcare technology will continue to be in demand in 2023. Pifer shares despite the return to the traditional healthcare resources or recent privacy and cybersecurity threats, digital health will still provide medical experts better insight to patient data. Here are a few predictions Pifer sees in healthcare technology this year:

Digital health goes back to basics. “After a volatile few years of record digital health funding followed by a painful market correction, health tech is going back to basics this year as investors prioritize safety over risk, experts predicted. Digital health funding may still experience a slight drop compared to past years, but funding levels should stabilize in 2023, according to Credit Suisse analyst Jonathan Yong.”

 

For Full Article, Click Here

With many people working remotely and many business operations moving online as well as databases stored in the cloud, cyber security has become a key need for companies. Thus, the Chief Information Security Officer (CISO) role has become more important than ever. Andrew Hay, cyber security expert and COO at Lares, LLC., shares an article on Forbes explaining how the role of CISO has evolved and the importance of this position in today’s business environment. One of the primary roles of the CISO, Hay shares, is to “develop and implement a comprehensive security strategy for their organization. This involves conducting risk assessments, identifying vulnerabilities, and implementing controls to mitigate potential threats.” The CISO plays a key role in learning and communicating security risks to their employees and their stakeholders. This role works closely with essentially every department to ensure security is integrated in all aspects of the business. Hay makes note of the biggest challenge for this position – cybercriminals. It is the CISO’s job to anticipate and prepare for new threats as they emerge. Another challenge to overcome is data privacy, Hay explains that with the implementation of regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), companies must be more transparent about how they collect, use, and protect personal data. Therefore, the CISO must work to ensure that the organization is compliant with these regulations, while also balancing the needs of the business. Hay concludes that the role of the CISO, although faced with high level challenges, is crucial in today’s digital landscape. With more and more companies joining the digital workspace, more and more cybersecurity is needed. As we look to the future of work, the CISO will play an essential role for your business and employees.

 

For Full Article, Click Here

Users are receiving the following error when running a query or upload in Microsoft Office Add-ins:

FATAL ERROR: ITEM_SECURED

File FILERELFLD is secured.

 

Resolution:

This is a security setup/configuration issue.

First, you need to decide where the security rule needs to be added.  The steps below are very specific to doing this change to the ADDINS security class which Infor Lawson delivers out of the box. This ADDINS security class is assigned to the LawsonQueryToolsRole security role.  In general, end users that need to use MOA should have the LawsonQueryToolsRole assigned to them since it’s an out of the box deliverable allowing all necessary access to the items need for use with MOA.  If you are using a different configuration, then in the steps below, instead of ADDINS, you’d add the rule to the appropriate security class.  That security class would need to be assigned to a ROLE that the user already has assigned to them.

  1. Log into Lawson Security Administrator (LSA)
  2. Click on “Profile Management” tab
  3. Click on “Profiles”
  4. Double-click on the “GEN” Profile id
  5. Double-click on the “ADDINS” security class name
  6. Click on the “Add Rule” button
  7. Change the “Securable Types” to “Files”
  8. Expand (Click on +) “CS”
  9. Locate the table that is showing in the error in the list under “CS” (Example: FILERELFLD) and put a check mark in the box next to it
  10. Click on “Apply” and have the user test.

Your error should go away.

Infor recently announced that Johnson Matthey, a global leader in sustainable technologies, has selected Infor MES manufacturing execution system with the goal to digitize manufacturing operations, boost efficiency and traceability, and underpin ambitious growth plans for its hydrogen technologies business unit. Johnson Matthey will deploy Infor MES at its hydrogen fuel cell manufacturing facility in Swindon, UK. Per the press release, following a thorough assessment of the market and a competitive bid process, Johnson Matthey ultimately chose Infor MES to scale up its production of hydrogen fuel cells. Infor MES will work to integrate machines and plant equipment with business systems to deliver real-time control over operations, supporting operators with every task they have to perform.

 

For Full Article, Click Here

After a Java update in Landmark, there are typical steps to follow to reset the java location.  Firstly, change the JAVA_HOME and LAW_JAVA_HOME environment variables.  Verify that the new path is also stored in the Path environment variable.

 

Next, run the change-jdk.jar command in the grid home/tools folder.

Finally, validate the LAW_JAVA_HOME setting in the config.bat file.

After those steps are completed, reboot the server and make sure the application starts.  If it doesn’t, it’s time to get into the nitty gritty.

Open up the Grid Manager.  Click on Configuration > Grid Configuration.

Select Grid Properties.

Under Node Properties, select Java Executable.

It is most likely pointing to the old location for Java.  Fix that, then reboot and you should be good to go.

It’s a brand new year and while it’s not yet the time for “spring cleaning”, you should still consider cleaning up your data. While we can easily brush this time-consuming task aside, understanding and cleaning up your data can save you cloud storage space. Simon Jelley, General Manager for SaaS Protection, Endpoint and Backup Exec at Veritas Technologies, shares an article on Forbes of the importance in managing and keeping necessary data in the cloud. At some point every bit of data was of importance to your company. But as years pass and data retention and compliance comes into play, a lot of that historical data is useless. Jelley coins the term “ROT”, an acronym to describe the three types of antiquated data you may still be storing – data that is redundant, obsolete, and trivial. “Just as rot often takes hold in organic things due to neglect, ROT data results from neglecting good data management practices. As much as a third of enterprise data can be considered ROT (and another 52% is dark data with unknown value, at least a portion of which is almost certainly more ROT),” says Jelley. ROT data can pose many risks to your business such as security, compliance, and liability. Not only that, having unnecessary data means you’re paying for high storage sizes. Below are four steps that Jelley outlines for rooting out your ROT data.

  1. Create a data taxonomy or classification system: “This is a set of definitions, labels and groups to organize your cloud-based data. This will help you identify ROT data.”
  2. Establish a single source of truth (SSOT) location for each category of your cloud data. “This is where the “right” version of each data asset is saved, reducing the chance that ROT versions exist elsewhere in the cloud.”
  3. Define policies for managing the ROT data you’ve identified. “These are rules and procedures you set for purging the ROT from the cloud.”
  4. Remember that this is an iterative process. “Continually update your data taxonomy, manage your SSOT location on an ongoing basis to ensure it’s being used properly, and regularly execute on your ROT data policies with the procedures you’ve established to get rid of it.”

While this process may be a huge project, Jelley concludes how necessary it is and it promotes good organizational management for your business.

 

For Full Article, Click Here

We are at a time in the digital age where new technologies are being developed daily and existing technologies are continuing to improve and evolve. In 2022, we had an overwhelming amount of apps and technology that stemmed from COVID issues. This year, we should see a lot more technology, whether it be pandemic related or a milestone in advancement. Micheal Chukwube, tech enthusiast and SEO Expert, shares an article on ReadWrite.com of 5 major technology trends we should observe in 2023 and beyond.

Metaverse – “The metaverse is a digital domain that connects other technologies together such as virtual reality and augmented reality where users exist in a digital universe. It is a chance for every part of our lives to really be expressed in a different way. GameFi and Play-To-Earn are examples of the metaverse models that now provide stable income streams to people worldwide. These are excellent examples of the future implementation of the metaverse, as they show that people are willing to spend their time living in virtual worlds and earning money.”

Artificial Intelligence (AI) – “AI technology is about intelligence that is as smart as the human brain and reacts like humans. ​​Today, AI makes many contributions to society. For example, in the form of virtual assistants such as Google Assistant, Siri, Cortana, and Alexa. AI has taken over our lives significantly and doesn’t seem to be leaving any time soon. In fact, with each passing day, AI is getting stronger and more innovative to perform more and more human tasks.”

DevOps – “Development and Operations (DevOps) is an organizational approach that enables faster application development and easier maintenance of existing applications. Companies like Netflix, Google, and Amazon are currently using DevOps to increase the productivity and efficiency of their teams. By fostering collaboration between development and operations teams, companies can offer their customers faster software upgrades and feature delivery. It also means companies will see fewer errors and improve product quality.”

Cybersecurity – “Cybersecurity is high on business agendas, as businesses continue to deal with cyber threats associated with the rise of remote working and e-commerce fueled by the COVID-19 pandemic. Therefore, in 2023, cybersecurity should be on everyone’s agenda.”

Quantum Computing – “Today’s supercomputers encode information in bits (0 and 1), while quantum computers are made up of quantum bits (qubits). Therefore, quantum computing can exist as 1s and 0s at the same time. This means that quantum computers are able to multi-task, allowing for significantly faster results, especially in research and development.”

 

For Full Article, Click Here

When we try to update some user records on the Infor Security Services (ISS) webpage, it gives an error stating: “loadResource(): returned identity [User:] already exists”

This error is due to missing extended attributes in LDAP. The extended attributes are what allow ISS to know that the user exists in LMK and are created when a user is added via ISS or the user is included in a sync.

To create the extended attributes for the user, you have two options (we recommend step 1):

  1. Run a list-based sync for the user who you are getting the error on.
  2. Run a full sync via the ISS webpage.

 

See LSSCG_11.0.0.0_UWA.pdf via Infor Concierge for example on list-based sync.

 

This is typically done by a Lawson technical resource. Organizations often hire a Lawson consultant team who offer managed services at a fixed monthly rate. These Lawson teams have a wider range of expertise and knowledge and are ideal for larger organizations but also are great for smaller ones that don’t need a dedicated Lawson employee on-site. Nogalis does offer this as a service so feel free to reach out to us via our contact page.