There is a known issue after some Java updates where lase won’t start, and attempting to run the bcinstall.jar throws the exception “JCE cannot authenticate the provider BC” in the lase_server logs.  When the LASE fails to start after a Java update, this issue can only be resolved by installing a compatible Lawson CU.

When this happens, you will either need to revert to the previous version of Java, or update LSFCT to the minimally compatible CU (or later).

For Lawson version 10.0.9, the minimum CU is 4.

For Lawson version 10.0.10, the minimum CU is 5.

For Lawson version 10.0.11, the minimum CU is 6.

 

CES 2023 has arrived and the newest technology reveals are something to be very excited about. Karisa Langlo and Daniel Van Boom of CNET share the newest gadgets and innovations that you should look out for in the coming months. 

Folding and sliding mobile device – Samsung’s Flex Hybrid features a mobile device with the left side that folds, like the Galaxy Fold, while the right side can slide out to extend itself.

A glasses-free 3D laptop – This ASUS laptop’s OLED screen produces a 3D experience without glasses, similar to competitor Acer’s IPS screen laptop. The OLED screen is the difference makers because the technology promises a visibly crisper 3D rendering.

Advancements to health monitoring in Smartwatches – Smartwatches already track your health by offering heart rate, sleep quality, and blood-oxygen levels. Japanese watchmaker Citizen takes it a step further, introducing the CZ Smart watch which can measure fatigue and alertness levels to keep the wearer informed of their overall wellbeing.

The thinnest gaming laptop in the world – Alienware’s lineup of new laptops included the Alienware x14 – which according to the company is the thinnest 14-inch gaming laptop in the world. It features a 2,560×1,600-pixel display with a 165Hz refresh rate. Starting price is $1,799 and the company plans to ship it out this winter.

Invisible laptop touchpads – LG introduced its new Gram Style laptop, featuring a hidden or disappearing touchpad that presents itself only when you touch the palm rest. The stealthy haptic touchpad lights up under your fingers when touched, showing you where to tap and drag to navigate the screen.

A gaming controller for PC gamers who also use consoles – Dell’s Concept Nyx gaming controller plans to bridge the gap between a gamepad and a keyboard for PC gamers who are also console gamers. This controller allows PC gamers to use hotkey setups and have dozens of inputs, similar to a gamepad with more features/options, but to the set up and functionality of a console controller.

Roku TVs – Already a popular smart TV platform, Roku has decided to expand their line and start producing TVs of their own. Roku TVs will feature the same Smart TV platform and Voice Remotes.

Introducing a truly Wireless TV (you read that right) – LG already introduces us to the world’s largest OLED TV last year – their 97-inch model. This year, they announced that this machine has now gone wireless. Gone are the days of cluttered cords behind the screen. The wireless TV will communicate with a top box where you can plug in your HDMI and other inputs. This TV, Langlo and Van Boom comments, is the way of the future, putting all others to shame.

Upgrades coming to your laptop’s brains – Intel unveiled new 13th-generation processors which will power a huge range of products and improve performance on a wide range of laptops.

Cloud gaming in your car – Nvidia’s GeForce 4080 GPU is coming to the cloud, and your cars. If your car has a screen on its dash, you can play games while the car is in park. If there are screens behind the driver or passenger seats, those sitting in the back can game on the go as well.

 

What tech are most excited about this year?

 

For Full Article, Click Here

Infor recently announced that Louisiana State University Shreveport (LSUS) has partnered with Infor Hospitality to create better experiences for students and faculty on its campus.  Through mobile ordering with Infor OrderNow and traditional point-of-sale (POS) terminals, this goal can be achieved throughout their over 200-acre campus. With students frequenting the dining areas every day, Infor Hospitality will deliver the tools needed to create the best possible platform to serve guests with efficiency, accuracy, and timeliness. Per the press release, LSUS was looking for a reputable technology partner with a solution that could easily integrate with LSUS’s current campus card management system to enable accessibility, continuity and visibility. Through seamless integrations, student and faculty will be able to easily view and track their balances or even split payments. Infor OrderNow has the ability to integrate with kitchen display solutions to enable a more efficient ordering process, as well as multiple payment options to make frictionless and secure payments. In addition, as part of the Infor Hospitality CloudSuite, Infor POS will help LSUS control incoming data from multiple revenue centers as transactions will securely integrate to leading payment platforms and loyalty applications, making for an easy-to-use, operationally versatile solution. The centralized management structure allows users to analyze performance at a single location in real time, allowing for greater efficiency and more informed decision making. Further, Infor OrderNow will provide LSUS with mobile ordering functionality, providing an alternative to counter-based ordering. And, because an app download is not required, it can be quickly and easily adopted by students and faculty for immediate uptake via QR code with campus management credentials.

 

For Full Article, Click Here

To debug online programs through command-line entry, follow these steps:

  1. If LAWENV is not called as part of your user profile’s sign-on program, you must call the LAWENV program to set the environment variables correctly.
      1. At the IBM i command line, type
        CALL LAWENV
      2. Type the name of an Environment and press Enter.
  1. Compile the program you want to debug. At the Qshell command line, typeqcompile -D productline systemcode programcode

Note: If you need to include modules in the compile, use qcompile -Dm productline systemcode programcode .

  1. End any jobs using the previously compiled version of the program. At the IBM i command line, type:CALL TMCONTROL PARM(’-rp’ Productline Program)

Example (IBM i command line):

CALL TMCONTROL PARM(’-rp’ LAWAPP9 PR14)

  1. Access the online form either through Lawson Interface Desktop (LID) or Lawson for Infor Ming.le, and perform a transaction.
  2. Start a service job for the program.
    1. Get the job information by typing at the IBM i command line:WRKACTJOB SBS(Subsystem)

      Find the appropriate LATMProgramName job in the appropriate subsystem, and then select option 5 (Work with). Select option 1 to confirm that it is the correct job. If it is correct, return to the previous screen and note the job number, user name, and job name (which will be LATMProgramName).

      Note: You can also use the WRKSBS command to find the appropriate subsystem and then LATMProgramName job.

    2. At the IBM i command line, type:

      STRSRVJOB JobNumber/UserName/JobName
  1. Start debug. At the IBM i command line, type STRDBGand prompt it (F4). Make sure the library is the one where you compiled the source. If the information is correct, press Enter.
  2. When source listing appears, set break points (F6), then press F12.
  3. Perform another transaction with the online program.
  4. After finished with debugging, end debug and the service job. At the IBM i command line, type

ENDDBG

then

ENDSRVJOB

There exists a scenario in IPA where variable values are lost after a wait node, if the variable is set using javascript as opposed to the straight assignment feature.  This article will describe the workaround for this scenario.

In this sample, the first assign node uses javascript to set the variable apples.  The 2nd assign node (after the wait node) sets the debug string variable to the value of the apples variable.

This excerpt from the work unit log shows that the variable debug is set to a blank value.  This is because the value of the variable apples is lost after the wait.

To ensure that the variable value is not lost after a wait node, simply set the value of the variable to itself using the traditional variable assignment.  This can be done any time after the javascript setting, and before the wait node.

As you can see, the debug variable is now successfully set to the value of the apples variable.

As artificial intelligence (AI) continues to establish itself in the technology space, its subset – machine learning (ML) is making strides to help set a pace for greater success. From major corporations to startups, ML teams are continuously working to deploy products that improve the way we work and live. Aparna Dhinakaran CPO at Arize AI, shares an article on Forbes predicting key AI trends we’ll see in 2023.

  1. Generative AI Will Go Mainstream (and So Will Its Growing Pains). “With powerful applications like Github Copilot and ChatGPT already proving valuable, many companies are eager to embrace the technology more broadly. However, generative AI remains a wild west. There is a lot to unpack over the course of the next year around bias, copyright, scalability, security, and how to monitor this new technology. In short, generative AI will take a village – and we need to build that village.”
  2. Economic Uncertainty Will Be a Crucible for the ML Infrastructure Market. “AI is likely to take on elevated importance as inflation and economic turbulence put pressure on companies to deliver greater efficiency and productivity. Given shifting priorities, the days of central ML teams taking months or years to build and maintain proprietary feature stores or monitoring tools in-house are likely numbered. Buying over building will likely become more common, particularly as teams need to prioritize projects that move the needle on revenue in the near term.”
  3. Best-of-Breed Platforms Will Chip Away At Legacy Players. “It happened in DevOps and now it’s happening in MLOps: in technical fields, best-of-breed platforms tend to win the day. Given the complexity of modern machine learning, ML teams are demanding more depth from tools at each stage of the model lifecycle. As a result, end-to-end platforms that emerged a decade ago to empower both citizen data scientists and ML teams are losing developer-share and undergoing layoffs.”
  4. Working With Unstructured Data Will No Longer Be Optional. “Over the past few years, some of the most powerful modern applications of machine learning – from large language models like ChatGPT to computer vision models that can detect cancer or rare medical disorders – leverage unstructured data. Any ML platform that is not built to handle unstructured use cases risks irrelevance or limited growth prospects. At the same time, ML teams that find ways to harness computer vision or NLP models – even if only applying a pre-trained model to a narrow business use case – may find new competitive advantages.”

While any technology can be unpredictable, there is much to be optimistic about when it comes to the future of AI and ML.

 

For Full Article, Click Here

Even before the start of the pandemic, cyber crime threats have loomed over us. Now more than ever businesses must be prepared for ransomware and malware attacks to their databases. Security expert Mahima Jaiswal, shares an article on Security Boulevard forecasting the top 5 cybersecurity trends to look out for in 2023.

  1. Internet of Things & Cloud Security. “As more and more businesses continue to incorporate cloud computing and Internet of Things (IoT) technologies, the need for proper security measures is increasingly essential.
  2. Increased Popularity of SaaS security solutions. “SaaS (software as a service) security solutions offer the advantage of quickly scaling up or down, depending on demand, and cost savings compared to traditional on-premise solutions. These solutions are also well suited for tackling remote or distributed teams, where many business components might operate in different parts of the world.”
  3. More Security for Remote & Hybrid Workers. “Cyber security must evolve to meet these new demands as the world continues shifting towards remote and hybrid working models. With increased reliance on technology and access to sensitive data, organizations need to ensure that their systems are secure and their employees are equipped to protect against cyber threats.”
  4. Artificial Intelligence (AI) and Machine Learning (ML). “AI and ML allow for the automated detection of threats and improved security processes, making them a powerful tools in the fight against cyber-attacks. With the advances in these technologies, organizations can leverage AI and ML to detect and prevent threats proactively.”
  5. Building a Security-aware Culture. “Security can no longer be addressed as an afterthought or through a one-time project. It needs to be a core value of the organization and be embedded into every aspect of its operations. This means that everyone in the organization needs to be aware of and knowledgeable about cybersecurity trends and how to protect their data.”

Jaiswal concludes as technology continues to evolve, cybersecurity threats and trends will also change. Businesses must stay ahead of the curve by keeping track of these trends and being prepared for any and all threats.

 

For Full Article, Click Here

You might be wondering if it is possible in LSF to a give a person access to 2 different data areas (productlines) with 2 different roles at the same time.

 

So let’s say if user1 is in data area 1 and has the security access associated with the role that has access to data area (1) and then again user1 also is in data area 2 they have the security access associated with the role that has access data area (2).

More discreet way of putting it:

User1 >> DataArea1 >> ReadOnlyRole access in DataArea1.

User1 >> DataArea2 >> ChangeAccessRole access in DataArea2.

 

The best way to set this up is to separate the two DataSources so they each have their own Productline and their own separate security profiles. That’s it!

 

User1 >> DataArea1 >> ReadOnlyRole is in SecurityProfile1 which is set to DataArea1.

User1 >> DataArea2 >> ChangeAccessRole is in SecurityProfile2 which is set to DataArea 2.

 

Good luck!

Infor recently announced that Swedish ScandiNova Systems AB (ScandiNova) has selected Infor CloudSuite Industrial Enterprise to help unify and standardise its operational and manufacturing processes. The system will be deployed by local Infor partner Midport Scandinavia and will be on the multi-tenant cloud, powered by Amazon Web Services (AWS). Per the press release, ScandiNova’s rapid growth is what prompted the need to deepen the use of enterprise resource planning (ERP) and business intelligence. Additionally, the company was looking for a solution to bring a commonality to its processes across all business sites, planning to unify and standardize systems to create a platform from which to pursue further growth. ScandiNova selected Midport with the Infor CloudSuite industry-leading manufacturing ERP system based on Infor LN because of the solution’s ability to handle complex processes and its industry-specific functionality set it apart from the competition, representing a truly global solution that can deliver the level of business agility that ScandiNova seeks to achieve. Further, a multi-tenant cloud deployment was also a crucial factor in ScandiNova’s decision, ensuring the business can benefit from continuous updates with minimal administrative burden on the in-house IT team, as well as enabling the swift on-boarding of new entities.

 

For Full Article, Click Here

Procedure to Copy Lawson Portal Bookmarks from/to Different Servers or Environments

 

Bookmark data is stored in three places:

-Database tables in the LOGAN product line (listed below)

-LAWDIR/persistdata/lawson/portal/data/users/<user>.xml files

-LAWDIR/persistdata/lawson/portal/data/roles/<role>.xml files

 

Reminder that the <user>.xml files in LAWDIR/persistdata/lawson/portal/data/users contain references (bookmark subscriptions and/or locks) to the bookmark IDs in the original bookmark data. You must EITHER delete the “to” environment or copy from the “from” environment to the “to” environment, before you begin. Skipping this step will lead to orphaned references within the .xml files, errors in the Preferences > Content screen.

 

Also, the Portal role files in the “Manage Roles” screen under Portal Administration in Portal/Ming.le must EITHER have all bookmark locks removed in the “to” environment, or the files should be copied from the “from” environment to the “to” environment, because they contain references to the bookmark IDs in the original bookmark data.

 

PROCEDURES

 

Update the <user>.xml files in the “to” environment:

 

Copy the <user>.xml files from LAWDIR/persistdata/lawson/portal/data/users directory to the “to” environment. Or you can remove all of the <user>.xml files in the “to” environment; they will be recreated when the user logs in and receives or assigns content. DO NOT DELETE THE default.xml file in LAWDIR/persistdata/lawson/portal/data/users.

 

Update the <portalrole>.xml files in the “to” environment:

 

Copy the <portalrole>.xml files from LAWDIR/persistdata/lawson/portal/data/roles directory to the “to” environment. Or you can remove all of the bookmark locks in the “to” environment’s <portalrole>.xml files and reapply the locks later.

 

Backup and delete existing data in the “to” environment:

 

Perform the following tasks in the “to” environment, where the bookmark data will be copied to.

 

Back up and delete the LOBKMARK records (in the LOGAN product line/data area).

Back up and delete the LOGRPBKMRK records (in the LOGAN product line/data area).

Back up and delete the LOUSRBKOPT records (in the LOGAN product line/data area).

Back up and delete the LOUSRBKMRK records (in the LOGAN product line/data area).

Back up and delete the LOBKCONFIG records (in the LOGAN product line/data area).

Back up and delete the SISETUP records (in the LOGAN product line/data area).

 

Create dump files of the existing data in the “from” environment:

 

Perform the following tasks in the “from” environment, where the bookmark data will be copied from.

 

dbdump -d logan lobkmark > lobkmark.dmp

dbdump -d logan lobkconfig > lobkconfig.dmp

dbdump -d logan sisetup > sisetup.dmp

dbdump -d logan logrpbkmrk > logrpbkmrk.dmp

dbdump -d logan lousrbkmrk > lousrbkmrk.dmp

dbdump -d logan lousrbkopt > lousrbkopt.dmp

 

If the “from” and “to” environments are on separate servers, copy the .dmp files to the “to” server.

 

Load the data from the dump files in the “to” environment:

 

Perform the following tasks in the “to” environment, where the bookmark data will be copied to.

 

dbload logan lobkmark lobkmark.dmp

dbload logan lobkconfig lobkconfig.dmp

dbload logan sisetup sisetup.dmp

dbload logan logrpbkmrk logrpbkmrk.dmp

dbload logan lousrbkmrk lousrbkmrk.dmp

dbload logan lousrbkopt lousrbkopt.dmp

 

Update the <portalrole>.xml files in the “to” environment:

 

Reapply bookmark locks if you removed them previously. If you copied the files over, you can skip this step.

 

Refresh the IOS cache:

 

Run IOSCacheRefresh (“Refresh IOS Cache” admin task).

 

Verify bookmark data is not corrupt:

 

Log into Portal and go to Bookmark Manager (“Manage Bookmarks” admin task). Add a new Top-Level bookmark. Then verify that you can see it at the top of the list of bookmarks in the Bookmark Manager. This is confirmation that the bookmarks are loaded properly and the data is not corrupted. If you don’t see it at all or it was added under another bookmark, then your bookmark data is corrupt and Support should be engaged.

 

Test the data from a user perspective:

 

Log into Portal as a user (or have a user test) and verify that the bookmarks in the “to” environment look the same as the “from” environment. If you copied the <user>.xml files over, the user shouldn’t notice any differences.