Infor recently announced of Q&L Industrial Services, a third-party logistics (3PL) provider headquartered in Slovakia, decision to migrating to the Infor WMS warehouse management cloud solution to improve performance of stock operations. The company expects the new system to provide additional benefits in speed and accuracy for its customers. Per the press release, the Infor cloud solution will provide a complete, functional system with faster implementation and time to value. Plans for the initial go-live of Infor WMS for Q&L is scheduled mid-summer. Additionally,  the next big warehouse deployment will follow in the autumn. Further, Infor WMS will cover all processes from receiving and put-away to picking, loading, and shipping. The company also is going to integrate Infor WMS with its AGV (automated guided vehicles) systems.

 

For Full Article, Click Here

Problem: A user in your organization is getting this error when selecting a Lawson chiclet through Okta or a Mingle URL but their Lawson and Mingle security is setup correctly along with their identity information. See below for the fix.

 

Example of the error below:

  1. Verify the user is setup correctly in Lawson with the correct identities and Mingle security roles required.
  2. Make sure your organizations Windows team filled in the correct Active Directory email address for the user.
  3. Have the user clear their browser cache and attempt to access the Mingle via URL or Lawson chiclet app (if using Okta etc.)

That’s it! This is a common issue when ticketing system workflows (like Service Now) are processed out of order and the user’s Lawson account gets created before the Windows team fully sets up their AD account.

Though it’s been around for decades, artificial intelligence (AI) has made itself known in today’s digital space. From marketing programs to laboratories, AI has made an impact in every industry. Whiles this technology could help your business run smoother, there is so much to learn and prepare for before even thinking of implementation. Machine learning (ML), the most common form of AI, is the process of training a machine to make future predictions based on historical data. What makes AI and ML so unique is the adaptability and learning. However, Machine learning doesn’t learn like a human. Stephanie Domas, Forbes Technology council member and Chief Security Technology Strategist at Intel, differentiates machine learning and human learning like this: We’re taught to identify holistically and with supporting context: A stop sign is red, hexagonal and has white letters on it. In contrast, AI is simply given large sets of labeled training data and told to figure out on its own how to differentiate; we don’t tell it how to learn. For the stop sign, the AI learned that black and white in certain areas meant different signs. The black and white perturbations on the stop sign lined up with patterns of black and white blocks on a “Speed Limit 45” sign. Thus, the AI learns that this is a speed limit sign. This technological advancement learns in a more complex process. There is so much to consider with the data input and analysis when it comes to machine learning and artificial intelligence. Domas shares an article in Forbes that emphasizes the security risks and know-hows when implementing an AI. She notes the importance of understanding the potential cybersecurity risks of AI so you can responsibly approach the adoption of AI.

  • Keep humans in the loop. “AI should augment human intelligence, not replace it. Human judgment is needed to ensure proper training, detect anomalies and make course corrections if something is wrong with the model.”
  • Understand the risks. “What happens if the AI is wrong—is it a funny story, or could people potentially be harmed? The risks involved with implementing AI ultimately depend on what the AI is meant to do and what kinds of data and systems it has access to.”
  • Plan for model testing and maintenance. “Just like other forms of software, AI algorithms need to be updated and patched. Algorithms should be continually tested and updated whenever new threats are detected or the model is not performing as expected.”
  • Ask the right questions. “If you are buying an off-the-shelf AI, make sure you keep cybersecurity in mind and ask the right questions when purchasing. How was the model trained? What is it meant to do? How was it tested? What is the company’s plan for ongoing testing and maintenance?”

There is a learning curve for both you and your AI. So before you use AI to solve your business problems, Domas reminds us to be deliberate, be intentional and be responsible.

 

For Full Article, Click Here

Paulig, an international food and beverage company, recently selected Infor CloudSuite Food & Beverage to support the Finnish-family owned business transformation to harmonize processes and streamline its operating model internationally. Per the press release, the solution consists of core ERP (Infor CloudSuite Food & Beverage), product life cycle management (Infor PLM for Process), production scheduling (Infor Supply Chain Planning), and warehouse mobility (Infor Factory Track). Additionally, the solution will be running on the Infor OS digital platform, residing on Amazon Web Services. Further, Juha Levo, Infor country manager for Finland, shares, “With strong roots in Northern Europe for both companies, Infor will serve Paulig with a wide local ecosystem for cooperation and support in all the Paulig operating countries.”

 

For Full Article, Click Here

At some point, you may need to view a list of your current directory, including all nested files and directories. Below is a quick guide to bring up the right screen for you to reference.

 

Home Directory

To get to your home directory, type wrklnk in the green screen command line

 

Root Directory

To get to the root directory type in wrklnk  obj(‘/’) in the green screen command line

 

Place a 5 on the OPT column to display the directories

 

 

Recently, plastic recycler and yarn manufacturer GAMA Recycle Sustainable Technologies chose to implement Infor CloudSuite Industrial Enterprise. The platform is expected to help accelerate value streams and reduce lead times, as well as help GAMA expand market share and increase transparency and productivity. Per the press release, following a market evaluation, GAMA selected Infor CloudSuite Industrial Enterprise powered by Amazon Web Services (AWS), based on its simplified and preconfigured business processes, developed in line with industry-specific experience and expertise. The multi-tenant cloud application will be deployed by Infor partner Enigma Business Solutions and is set to go live in October 2022. Zafer Kaplan, president of GAMA, says of the project, “Increased demand for customized goods produced in a sustainable way has created a need for enhanced transparency across the whole supply chain. In responding to the needs of a rapidly changing and dispersed market, it is important that we foster collaboration across the entire value chain, from suppliers to customers. Through leveraging the capabilities of Infor CloudSuite Industrial Enterprise, we are able to connect all of our processes digitally, which allows us to work more sustainably and effectively, optimize our organizational structure, and improve our product and service delivery model.”

 

For Full Article, Click Here

LBI does not use a web server, so replacing those certificates differs slightly from Lawson & Landmark.  Replacing the LBI certificates is done exclusively in WebSphere console manager.

First make sure that you have a pfx file stored locally on the server, and that you have the private key for that file.  Open the console manager and navigate to Security > SSL certificate and key management > Key stores and certificates.

 

Select the CellDefaultKeyStore

 

Select Personal Certificates

 

Import the new certificate first.

 

Set the path to where you have saved the file locally, and enter the password.  Click “Get Key File Aliases” to get the certificate information.  Enter a meaningful alias for the certificate.

Select the old certificate and click “Replace…”.

 

Select the new certificate as the replacement.  Check the boxes to Delete the old certificate and signers.

Validate that the Trust Store certs were updated by going into CellDefaultTrustStore > Signer certificates.  You can add the intermediate and root certificates (base64 cer files) if they aren’t there.

 

Bounce the application server, and your certificates will be updated!

Migrating to the cloud makes the most sense in this technological driven workplace. Though moving there takes a lot of planning and expert-level execution for the process to run smoothly. Firms will run into hiccups but if you prepare for them, these hiccups can easily be resolved. Accounting and managed services expert Michael Sellai of BPM LLP shares an article on accountingweb.com of certain factors that every company should be aware of and have a plan for when migrating to the cloud.

  1. Downtime. “Temporary loss of access to your data and systems during a migration, while common, can be costly and anxiety-inducing. Back up everything you have. Migrate during the lowest periods of usage. Try to work “locally” as everything is moved over.”
  2. Broken Apps. “Before your migration, do a thorough audit of every piece of software or application that you and your team use on a daily, weekly and monthly basis. It is critically important to implement security controls across the entire cloud platform to protect client information and mitigate staff errors. Ideally, clients will be able to upload their information to this platform via a secure portal since email opens the door for data privacy glitches and other costly mistakes.”
  3. Improper Bandwidth Expectations. “Take inventory of your daily speed-based headaches. Get the most out of this move. Instead of faltering by failing to prepare, you can improve the efficiency of your business from every angle.”
  4. Initial Costs. “Cloud computing often requires the purchase of software licenses, which are usually purchased on an annual basis. Smaller firms may find that moving their most important apps to the cloud will not achieve cost savings. For firms that successfully migrate to the cloud, you may rack up an IT tab that includes, for example, eight different platforms for your entire team for the entire year. But remember: your team will be more productive and profitable. You will save on hardware costs, repair costs, office space rentals and the daunting bill that will eventually come from accruing technical debt.”
  5. Lack of In-House Understanding. “One of the key of benefits to cloud computing is knowing that everything is working the way it should. If your firm does not have a dedicated IT guru or department on standby to manage these functions, there are professionals you can engage who are skilled managed IT service providers. They can also assist you in implementing the important security controls you need around your cloud platform to ensure client information is protected and your staff operates error-free.”

 

For Full Article, Click Here

Australia’s Sutton Tools recently deployed Infor M3 CloudSuite for manufacturing to achieve a timely and accurate understanding of its business to drive product and company expansion both domestically and abroad. The business has successfully implemented Infor OS cloud operating platform, which includes Infor Intelligent Open Network (ION) and Mongoose, to fine-tune internal processes and reduce total cost of ownership. Per the press release, migrating to the cloud from a Movex/Infor M3 on-premises environment has saved Sutton Tools hundreds of thousands of dollars on new computing systems, and improved system integration and supply chain visibility across three manufacturing sites and three distribution centers — under the guidance of Infor global partner Fortude. According to Sutton Tools, upgrading goals were to improve business IT uptime, reduce the effort required to upgrade an on-premises system, take advantage of modern, continually upgraded cloud service features. centralize its growing number of operational sites and existing third-party cloud-based services, and make it easier to integrate with third-party applications. Further, transitioning to the cloud has delivered company-wide benefits beyond cost savings.

 

For Full Article, Click Here

Here is a quick guide on how to deactivate a scheduled IPA.

 

First, you will need to find the IPA name in IPD

  1. Log into IP Designer
  2. Create a new process
  1. Upload the process to your server by clicking the up arrow icon , or by clicking:
    • Tools > Manage Processes > Select Open Process

 

Remove the Schedule for the Process

  1. Log into Rich Client
  2. From the Start menu, navigate to Applications > My Actions > My Scheduled Actions
  1. Select the Name of the schedule and on the bottom screen it should show all the triggers associated with the schedule.
  2. Drop down on Actions and choose Delete Finished Triggers
  3. Right-mouse click and Click open
  1. Select delete to remove this schedule.