Infor recently announced that Sanford Health, the largest rural health care system in the US, will implement a suite of Infor cloud-based applications designed for healthcare to streamline and modernize functions across its network. Partnering with Infor allows Sanford Health to better leverage data to break down silos across departments, streamline workflows, and gain real-time insights, freeing up caregivers to prioritize care. Per the press release, Sanford Health decided to partner with Infor because of its modern, cloud-based architecture, and ability to offer health care-specific finance and supply chain solutions that meet the organization’s requirements without extensive manual customization. Further, Infor’s solutions integrate seamlessly into Sanford’s current business needs and processes, providing leadership with real-time data. Thus, Infor was able to clearly demonstrate its commitment to health care, extensive product roadmap, and forward-thinking approach. Steve Fanning, senior vice president, Infor, says of the partnership, “We look forward to supporting Sanford Health in achieving greater operational efficiency and delivering exceptional health care services to the communities they serve.”

 

For Full Article, Click Here

Problem:           

You need the command for an Infor Process Automation (IPA) to automatically recover or kill jobs waiting queue.

 

Resolution:     

There is a simple solution for this. You will need to first create a Process Flow that checks Jobs and Recovers and Kills them (Note that Invalid Parameters Status jobs aren’t going to recover).

Next, add the jqaction token to a security class, as it’s not defaulted.

Next, try SysCmd Nodes using the jqstatus -wr to get the Job List, and then jqaction -r to recover a job and jqaction -k to kill a Job.

Now you are able to recover or kill jobs waiting in the queue.

These days cyberattacks and ransomware attaches are becoming more frequent, prompting businesses to really focus on their data security. While many businesses will primarily focus on backup solutions, that simple isn’t enough. CSP GmbH & Co. KG, Germany based innovative software solutions company, shares an article on Open PR of the importance of data security practices that go beyond just backing up your data. Backups are typically designed for short-term data and recovery options. If you want to protect your company’s data long term, there is the option of archiving data. The article states that modern archiving systems offer effective solutions such as enabling data to be stored for several years or even decades and offer advantages such as the ability to search in time periods, reduce the load on the database and take partial database sections into account. Businesses should look for products that not only back up but protect your archived data and allow an easy way to access these storage systems. With these comprehensive functions, the article concludes, companies can not only archive their data securely, but also manage it efficiently and access it quickly when required.

 

For Full Article, Click Here

You need to update your license file if you exceed the maximum number of application users. All application users are also Infor Lawson Environment users.

The license and applications information is stored in the %LAWDIR%\system directory.

Note:  To update your license, you must first have received a new license file via e-mail from Infor.

Shut down the WebSphere application server. Use the instructions provided with your application server to stop the server you configured to run Infor Lawson. The person who shuts down the application server must be a member of the group for Infor.

Stop the Infor Lawson system.

At the command line, specify this information:

stoplaw

Optional. If you want to keep a copy of your existing license, make a backup copy.

Copy the license content you received in email to %LAWDIR%\system. At the prompt to overwrite the existing file, select yes.

Start the Infor Lawson system.

To start the Infor Lawson servers, at the command line, specify this information:

startlaw

Restart the application server. Use the instructions provided with your application server to start the server you configured to run Infor Lawson. The person who starts the application server must be a member of the group for Infor.

Note: The web server must be running in order for the Infor Lawson system to run, but you do not need to start it before you start the Infor Lawson system.

Today, Infor announces the selection of Amazon Bedrock, a service for building and scaling generative applications, to deploy GenAI solutions embedded within Infor CloudSuite designed to accelerate customer value. This further deepens Infor’s 11-year relationship with Amazon Web Services (AWS) and the close collaboration and success the companies share after years of extending Infor solutions through AWS services. Per the press release, Infor has built industry-specific use cases on AWS technology that allows their customers to complete daily tasks faster with pre-trained models built on Amazon Bedrock. Infor CTO comments, “Infor is on a mission to democratize AI by making it accessible to all our customers, regardless of the size of their organization or the technical resources they employ. Our goal is to build products that deliver transformative technologies directly to those who benefit most – the front-line people using Infor solutions. At Infor, we believe that merely giving customers the tools to apply GenAI isn’t enough. Our Industry AI approach combines both the tools and deep industry capability and expertise to collaboratively work with customers to build and offer solutions that drive real value.” Furthermore, Infor has released hundreds of proven predictive and prescriptive AI solutions through its Augmented Intelligence Service, helping customers to drive operational efficiencies, grow revenue, enhance customer satisfaction and predict future demand, all built using AWS services such as Amazon SageMaker. With Amazon Bedrock at the core of its generative AI innovations, customers will now have access to 60 additional use cases by year end.

 

For Full Article, Click Here

Effective data management is a high priority necessity for any business. The type of vigilance needed for data management include continuous monitoring, strict access control and security protocols and unwavering data quality itself. Pragyansmita Nayak, chief data scientist for Hitachi Vantara Federal, shares an article on Federal News Network highlighting four key ways that agencies can enhance their data governance practices.

Strategic data collection and continuous monitoring. “Federal agencies should clearly define their data objectives to ensure purpose-driven gathering, while preventing the challenges of aimless accumulation. They should prioritize the development of comprehensive data strategies that define collection goals, establish priorities, and implement efficient data management systems. This ensures that only relevant and high-quality data is collected and processed. Implementing continuous monitoring is crucial in this context, acting as a vigilant supervisor that promptly identifies and addresses any anomalies or inefficiencies in data management.”

Prioritize data quality for effective governance. “Federal agencies must prioritize data quality as a core element of their data management strategies. Assigning data stewards to oversee specific datasets further strengthens data integrity. High standards for data accuracy and reliability, along with enforcement measures, are essential. This commitment to excellence in data management ensures that governance remains a top priority.”

Promoting a culture of vigilance. “It’s critical for agency leadership to set a clear tone, emphasizing the importance of data security and integrity throughout every level of the agency. Fostering a continuous improvement mindset cultivates a proactive approach to data governance.”

Safeguarding data for effective management. “The importance of effective data management transcends seasonal boundaries. As we embrace the digital future, let our commitment to data stewardship be as enduring as the changing seasons, ensuring a secure and prosperous tomorrow for all.”

 

For Full Article, Click Here

Certain passwords in install.cfg are encrypted, and if those passwords change, you will want to update install.cfg before running patches.

To edit the file, first open a command line window with the environment set.  Then run the command

Java -cp %GENDIR%/java/thirdParty/installer.jar com.lawson.delivery.secure.PasswordAdministrator -s %LAWDIR%/system/install.cfg

First, you will be prompted to enter the password that was used to secure the Lawson system configuration.  If you don’t know this password, or if you need to change it, this is your opportunity.  Leave it blank and you will be prompted to enter a new password.  Then, you will need to rerun the command with the new password.

Once you enter the configuration passkey, you will be presented with a screen that contains all the encrypted passwords.  You can select the clear text radio button to show the passwords if desired.  Here, you can update ore view any of the passwords.

Click Finish and you’re done!

 

Modern enterprise resource planning (ERP) systems these days are highly customizable, and many companies pain them with additional technologies to get the best from their systems. Two such technologies that can strengthen your ERP are artificial intelligence (AI) and Machine Learning. Vikram Bhandari, Chief Technology and Innovation Officer at Riveron, shares an article on Dataquest highlighting the benefits of AI and machine learning when paired with your enterprise’s ERP systems. Bhandari explains that AI evaluates the data processed by ERP systems to forecast and automate tasks. Meanwhile, Machine Learning establishes an automated machine interaction with ERP systems to ensure simultaneous targeted adjustments. ERP systems equipped with AI chatbots can offer personalized customer management service through Natural Language Processing (NLP) technology, enabling businesses to foster customer popularity, boosting conversion rate and customer satisfaction. In addition, Machine Learning algorithms help innovative systems to empower businesses to prepare for market fluctuations by anticipating them beforehand. Bhandari states that the useful data generated by AI and Machine Learning integrated systems help business executives to make informed decisions, reducing the reliance on improvising and bolstering profitability. It is important to note that while AI and machine learning bring a competitive advantage to enterprises, there are some challenges that come with it. Mainly, implementing and training your employees with this new technology.

 

For Full Article, Click Here

Issue: Using RAD > Dock Logging on the handheld, users noticed that in the upper right corner, the selection changed from ‘Print’ to ‘Send’

 

Resolution:

To change the value on the Dock Logging screen from ‘Print’ to ‘Send’ follow these steps:

In MSCM portal, go to Receiving and Delivery > Receiving > Configuration > on Misc Receipts tab

Scroll to the bottom and there is value for Dock Logging Configuration

If the Auto Print is on, the device will say ‘Print’ in the upper corner.

If the Auto Print is off, then it will just say ‘Send’

Turning off the printing is a Global setting and affects all users who use Dock Logging.

Turning the Auto Print on will show  the ‘Print’ selection on the device.

In today’s digital landscape, it is more important than ever to back up your data. Whether personal or business, everything needs to be backed up – from laptops to cell phone to servers, While the concept of “backing up data” seems fairly simple, there are still ways for skilled hackers to attack and compromise your data. Brent Torre, GM of Backup Suite and Kaseya, shares an article on Security Magazine of the importance of disaster recovery and how to properly back up your data. “Threat actors know good backups are the cheat code to not paying the ransomware,” Torre says, “giving victims the ability to rewind the clock to before the attack. With that in mind, the bad guys have begun to actively target backups first.”

Here are a few things, Torre offers, that IT leaders should keep in mind to ensure their data is protected, and their business keeps on running — no matter what.

All businesses are at risk. “Every business needs to assume they’re at risk and design their security posture accordingly. This doesn’t just involve ensuring there are tools to detect and mitigate an attack but writing a plan for how to recover quickly and efficiently.”

Basic backup isn’t enough. “To mitigate potential damages and eliminate downtime in the event of an IT disaster, organizations need to have a proactive plan rather than a reactive one. However, most SMBs cannot afford to spend the money, time and resources required to research, implement and test disaster recovery plans. That is why Disaster-Recovery-as-a-Service (DRaaS) is swiftly gaining prominence. It allows an organization to back up its data (along with IT infrastructure configurations and disaster recovery runbook) in a third-party cloud computing environment.”

Cloud isn’t immune to cyberattacks. “In today’s rapidly expanding threat landscape, it is thus critical for organizations to secure their data with a powerful third-party backup solution. It will help them comprehensively protect their cloud data while eliminating the single-cloud vulnerabilities and other potential pitfalls associated with leveraging cloud-native services for data backup. When looking for a cloud data protection solution, be sure it includes the same robust features previously required on-prem.”

 

For Full Article, Click Here