Enterprise resource planning (ERP) systems have proven to be valuable assets to any company. And while not every company is the same, so are ERPs. This is why customizable ERP systems provide the competitive edge to companies who utilize them to their advantage. An article on openpr.com shares how studies in customizable ERP systems can increase productivity and efficiency. A study by Glorium Technologies highlights that customized ERP solutions save time and resources by automating repetitive tasks and increasing accuracy [ERP Software Development: A Full Guide]. Another study by Syslab Technologies shows that custom ERP systems optimize workflow by addressing and improving specific business processes [Best Custom ERP Software Development: Ultimate Guide 101]. These systems allow employees to work more efficiently because they are tailored to the exact needs and workflows of the organization.

Clear Competitive Advantages. The article states that a customized ERP system provides companies with a significant competitive advantage by allowing them to respond more quickly and accurately to market changes. Such advantages like cost savings, integration and adaptability, and data management and decision making come with customized ERP systems. The article concludes that customizable ERP systems offer numerous advantages that can go far beyond the possibilities of standardized solutions.  Companies that invest in customized ERP solutions can optimize their business processes and compete successfully in a dynamic market.

 

For Full Article, Click Here

Sometimes compiling for trace, or adding display statements to a 4GL program, just doesn’t quite get you far enough with debugging.  Lawson is installed on a MicroFocus COBOL for Visual Studio, which can be debugged using Visual Studio.  Here are the steps to set up the debugger for a Lawson form:

  1. First, compile your program for debug (i.e. lawcmp -D <pdl> <system> <program>)
  2. Create a new Windows Application project for COBOL.
  3. Configure the application for Output Type INT/GNT, and open the “Environment…” to set a Path variable. This variable should contain <GENDIR>\bin;<JAVA_HOME>\jre\bin\server;<LAWDIR>\<pdl>\obj;<LUU_DIR>

  4. Under Debug, set the project to launch an executable. The executable should be <MF_HOME>/bin64/run.exe, and the Application Arguments should be <LAWDIR>/<pdl>/obj/<debug program>.int <pdl>
  5. On the COBOL tab, set the configuration to Active (Debug) and the platform and platform target to your current server platform. Set the COBOL dialect to Micro Focus.  Set the output path to .\bin\x64\Debug
  6. Add the “.cbl” file to the Visual Studio project that was generated from your compile in debug mode (step 1).
  7. You can set break points in that cbl file
  8. Now, it’s time to debug your form. Open the application using LID (lapm <pdl> <program code>)
  9. In a separate LID session, run the command tmmon and make note of the pid for your Lacobrts process.
  10. Now, in Visual Studio, select Debug > Attach to Process
  11. Select the process you identified in tmmon (it should be a run.exe). Now you can perform the process that you were trying to debug, and Visual Studio will stop at the break point you set.

 

It is no secret that enterprise resource planning (ERP) systems are likened as the nucleus of an organization – touching every aspect of business from logistics to accounting. It goes without saying that one of the most important projects within your business is implementing an ERP system. Kevin Beasley, CIO at VAI and Forbes Council Member, has had many experience in helping companies with their ERP systems. In this article he shares four keys to a successful ERP implementation.

Critical Success Factors

  • Build in time for planning and information gathering. “Every business is different, even in the same industry. The early information-gathering process is crucial and should be painstakingly meticulous to avoid costly mistakes and delays down the road. Aspects of the planning process include whether the go-live date will occur on a rolling basis based on location or involve the entire organization or application-based implementations.”
  • Get the culture and people questions right. “ERP implementations have big impacts on employees’ jobs. For some, it’s a time of opportunity because they see mastery of the system as a source of job enhancement. For others, a new ERP means changes in long-standing roles and responsibilities. Managers and executive teams need to get the requirements and questions right to facilitate an implementation plan that leads to employee buy-in and long-term success.”
  • Test, test and test again. “The changeover from one system to another isn’t like turning a key. Implementation involves a series of data conversion tests. Organizations should couple this testing with documentation to help explain any anomalies.”
  • Set a goal and stick to it. “It happens—organizations begin the process of installing a new ERP and then run into a challenge. Sometimes, a seemingly innocuous detail, overlooked during the planning phase, complicates implementation. Sometimes, the organization decides to change course, adding new features or realigning certain aspects of the business.”

 

The Need For Project Managers

A successful ERP implementation should have an implementation team and a reliable project manager to oversee the project from beginning to end. Beasley notes that the right project managers have unique insight into the processes and problem-solving skills that are invaluable when navigating the many intricacies of ERP implementation projects. “Having or bringing in such specialized expertise can turn what could be a daunting task of ERP implementation into a strategic advantage that positions a company for future success,” he says, “allowing it to harness the full potential of its new system now and into the foreseeable future, as well as enabling a competitive advantage.”

 

For Full Article, Click Here

Your company’s data is one of, if not THE most important asset. Protecting this information should be a top priority and should ensure compliance with all relevant regulations, whether that’s safeguarding data associated with your commercial partners, customers, or the data a business holds about its workers. Business and technology write David Howell shares an article on ITPro explaining that for this reason, all organizations must have a formal set of data protection policies and to guarantee compliance. “Until recently, the Data Protection Act (DPA) 1998 was the primary legislation for holding and processing data in the UK. It was replaced in 2018 by the EU’s General Data Protection Regulation (GDPR), alongside the Data Protection Act 2018,” explains Howell. “These were introduced to strengthen safeguards for citizens in the era of mass data processing and social media. Maintaining compliance with both GDPR and the DPA 2018 protects your business from penalties and improves your organization’s data hygiene. Adopting robust data protection policies offers a range of benefits that extend far beyond simply ticking a regulatory box.” Below, Howell explains why every business needs a proper data protection policy in place to fully secure and protect their company’s business operations and customer information.

 

Why does a company need data protection policies?

Howell reminds us that it is essential to maintain robust policy documentation to ensure your business understands and meets all of its data processing responsibilities governed by GDPR and DPA. Having the documentation always available allows you to clearly communicate these policies your workforce, customers, and commercial partners. These policies remove uncertainty and enable your company to build and maintain more robust data security systems.

 

What should a data protection policy contain?

No two companies are alike, therefore no two data security policies are the same. While every policy has an overall objective to secure and protect their data, certain things will be unique to the company only. For example, Howell explains that if a company doesn’t collect customer data, then a security policy governing this data could be less strict or optional altogether. Additionally, he states, “GDPR and DPA will drive the core of the policies you create for your business. In essence, your policies must address critical components of data security. Your policy should clearly state how your workforce will comply with all the relevant data security regulations.”

 

Best practices for creating a data protection policy.

Howell notes the following practices below to commit to a sturdy data protection policy:

  • Apply the principles of GDPR and DPA to your business
  • Conduct a Data Protection Impact Assessment (DPIA)
  • Build data access authorization into your data protection policy
  • Only collect the information that is needed
  • Train your workforce in best practices
  • Regularly review your data protection policy

Ultimately, Howell concludes, a data protection policy isn’t only about compliance; it’s about building trust, safeguarding sensitive information, and fostering a responsible approach to data within your organization.

 

For Full Article, Click Here

When trying to install a CTP you encountered the below error:

“Error – failed to uncompress “patch.tar.Z” file.” or “patch.tar already exists; not overwritten”

 

There’s a possibility of encountering this error due to the presence of an extra patch.tar file stemming from a prior or simultaneous CTP installation.

 

Upon executing the tar command, ensure that within the <versionfiledir> directory, where you’ve unpacked the CTP, only three files pertain to this CTP. Verify that you have obtained the following trio of files:

– x.x.x_patch_CTPnumber.readme.html

– Versions

– patch.tar.Z

 

Clear out any past CTP files from this location, particularly any patch.tar files, and proceed to rerun the lawappinstall.

 

For UNIX systems:

It’s possible that the lawson user lacks write permissions to a directory higher up in the hierarchy. The entire directory where the decompression is taking place should have permissions set to 777.

 

For Windows:

If you encounter this error on a Windows server, it may be due to spaces in the folder names along the path to the versions directory. If this is the case, you’ll receive a “failed to uncompress” message.

 

To resolve this, replace spaces with underscores (_) or use folders without spaces in their names, then proceed to rerun the lawappinstall command.

 

Typically when installing CTPs it is recommended to have a new directory for each CTP install.

In just the first half of 2024 more than a billion people saw their information leaked online as a result of high profile data breaches such as those from AT&T and Ticketmaster. Ryan Ermey, senior money reporter at CNBC Make It, shares an article with information on how to go about handling a data breach by cybersecurity expert and Experian’s health of global data breach resolution Michael Bruemmer. “Following a breach, depending on which information was compromised, you may find yourself on the receiving end of targeted scams or picking up the pieces after identity thieves open lines of credit in your name. Here’s how to protect yourself, and what to do if you’re part of a breach.”

 

Practice good online hygiene

Rare are the days that someone would be completely off the grid. Odds are even a small chunk of your information is floating around the web and is vulnerable to cyber attacks.  “I operate under the assumption that pretty much all my information is out there. And that’s a pretty reasonable assumption,” says Ed Skoudis, president at SANS Technology Institute.Nevertheless, Ermey statesthat the more information that fraudsters can piece together about you, the higher risk you run of falling victim to scams and identity theft. To keep your information as private as possible, practice these online hygiene tips from cybersecurity experts.

  1. Use a password manager
  2. Avoid links from strangers
  3. Skip QR codes when possible
  4. Always use credit online

 

What to do in case of a breach

Even if you’re careful, there is still a chance for hackers to breach your information. Here’s what to do if and when that happens.

  1. Don’t bury your head in the sand. “‘It’s important to know what information of yours is out there.’ says Bruemmer.”
  2. Change your passwords. “If you don’t have a password manager yet, be sure to change your password for the site where the breach occurred and for any other where you might use the same password.”
  3. Be vigilant. “‘Following a breach, monitor your credit card statements for any fishy charges, even if the process seems tedious,’ says Skoudis.”
  4. Act quickly. “‘If you do see something alarming on your credit history, like a new credit line in your name, time is of the essence,’ says Bruemmer.”

 

For Full Article, Click Here

Problem:

Error receiving a Purchase Order on MSCM handheld. The error message reads: “PO not Available. PO contains no open PO lines.”

However, the PO has open lines in PO20.1.

 

Resolution:           

This error occurs when a PO’s Ship To location is not designated as a “Receiving, Ship To” location in MSCM.

To resolve this error, follow the steps outlined below:

From the MSCM web application, do the following:

  1. select Location Management.
  2. Select Modify from the Locations drop-down menu.
  3. Enter the Ship To location in the Location Id field.
  4. Click on the Search button.
  5. Check the Receiving, Ship To box.
  6. Click on the Modify button.
  7. Click on the Done button.

Many reasons why companies are adamant in transitioning to the latest advancements is the mere fact that the risks outweigh the benefits. But, more often than not, they aren’t as fully informed of the benefits to truly see the advantage. Take cloud migration for example. While there are still a number of businesses operating their business applications like enterprise resource planning (ERP) on premise, many more businesses have found the advantage in migrating to the cloud. Anise Madh is GM of Global Infor Practice at Wipro, a global leader in e-commerce and mobile solutions for Infor CloudSuite ERP M3 and LN, shares an article on Forbes about how many reasons businesses have yet to migrate is the board’s concerns outweighing the benefits but failing to see it’s true potential. The shift to cloud ERP has been a significant technology trend and the most effective way to prepare for market changes. “For any business executive,” Madh states, “ensuring board satisfaction and cooperation is a daily imperative. To secure board member buy-in on innovative technology implementations, especially large overhauls like moving from on-premise tools to the cloud, business leaders would be wise to anticipate and address common objections.” Below are Madh’s tips for educating and reasoning with them to make the on-premise to cloud ERP transition a reality.

Objection 1: The transition will cause unnecessary downtime. “Cloud migration requires monetary and time investments, both of which are often significant. A common disagreement from the board is that stirring up a tech transformation isn’t necessary; the current technology is working, and there’s no need to cause any unneeded downtime to transition to new systems.

Counterargument: “Rather than causing unnecessary downtime, it’s important to help others understand that a cloud ERP transition can be a step to mitigate downtime in the long run. Avoiding cloud migration can lead to a slew of challenges, including keeping up to date with compliance issues in global operations, greater risk for cyberattacks and data leakage or, worse, complete shutdown. In short, you can let your board know that proactively planning and initiating your cloud migration now ensures you have control over the process and can avoid being forced into a rushed and potentially disruptive transition later. This can actually avoid downtime and streamline data cleaning, sharing and analysis.”

 

Objection 2: The business is already operating with slim teams. Why exacerbate this? “Because of ongoing labor challenges, as well as an aging workforce, boards are hyperaware of where teams are being deployed. They’re focused on having each employee work on business-furthering tasks to keep productivity up. The idea of losing a handful of teammates to focus on a tech migration can cause heartburn.”

Counterargument: “Without transitioning to the cloud, your business may not effectively be using its current headcount and may be wasting time that could be better used on other business-advancing activities. It’s true that training will be required when new technology is implemented. But overall, adequate training—coupled with cloud-enabled software updates and service—can lead to reduced downtime and greater efficiency and productivity levels. Like with the counter to unnecessary downtime, this is about looking at the long-term independence and efficiency of your employees.”

 

Objection 3: If it’s not broken, don’t fix it. “Like with the first objection, the board may feel replacing technology that seemingly runs perfectly fine is a misuse of time and cost investments.”

Counterargument: “Without priming an organization’s tech stack to stay in lockstep with the latest innovations, you’re risking your business falling significantly behind. You can point out how your on-premise ERP systems are filled with numerous legacy applications, adding to unnecessary complexity due to the steady stream of updates and customizations needed for these apps. Point out how moving to the cloud can support the adoption of the latest innovations in AI and ML solutions. Cloud ERP solutions can help enrich visibility across departments, enabling users to access it from any mobile device, whether iPad, mobile phone or other device. Lastly, with older on-premise ERP solutions, leveraging mobile is more complex and more expensive. Plus, it leaves the door wide open for cybersecurity attacks and other risks.”

 

You need to set your organization up for success by getting ahead of your board’s main concerns around migrating away from-prem systems. Madh concludes that achieving the full support and buy-in from your board is a major step in facilitating the transition to a successful cloud ERP solution.

 

For Full Article, Click Here

The landscape of digital threats has undergone a profound transformation over the past few decades, driven by technological advancements and the digital interconnectedness of our world. As our society increasingly relies on digital technology for communication, commerce, and critical infrastructure, the threat landscape has evolved in complexity and sophistication.

 

Businesses of all sizes, industries, corporate entities and so on are victim to digital threats. Thus, ensuring your company’s digital footprint is secure and invulnerable is a top priority.  As we rely on technology for communication, automation, and business tasks, we must also put the effort in ensuring our cybersecurity is up to date. An article on SimpliLearn.com shares the evolving landscape of digital threats and a list of cybersecurity trends we are seeing across industries to combat this.

  1. The Emergence of Automotive Cybersecurity Threats
  2. Harnessing the Power of Artificial Intelligence in Cybersecurity
  3. Mobile Devices: A Growing Target for Cyber Attacks
  4. Cloud Security Challenges and Solutions
  5. Data Breaches: A Persistent Concern
  6. IoT Security in the Era of 5G
  7. Embracing Automation for Enhanced Cybersecurity
  8. Targeted Ransomware Attacks
  9. Escalating State-Sponsored Cyber Warfare
  10. Mitigating Insider Threats Through Awareness
  11. Addressing Cybersecurity Challenges in Remote Work Environments
  12. Combating Social Engineering Attacks
  13. Enhancing Security with Multi-Factor Authentication
  14. Defending Against International State-Sponsored Attacks
  15. Strengthening Identity and Access Management
  16. Real-Time Data Monitoring for Early Threat Detection
  17. Securing Connected Vehicles Against Cyber Threats
  18. Leveraging AI for Enhanced Security
  19. Ensuring Security for IoT Devices
  20. Strengthening Cloud Security Measures

 

Next Up With Cyber Security Trends

Below are trends that, according to SimpliLearn, are emerging and could become the next important factors in cybersecurity:

  • AI and ML in Cybersecurity
  • Zero Trust Security Models
  • Quantum Computing Resistant Cryptography
  • Cloud Security Evolution
  • 5G Network Security
  • IoT Security
  • Supply Chain Security
  • Biometric and Behavioral Authentication
  • Privacy Regulations and Data Protection
  • Cybersecurity Workforce Development
  • Human-Centric Security
  • Automated Threat Hunting
  • International Cybersecurity Collaboration
  • Regulatory and Legal Challenges
  • Cyber Insurance
  • AI-Driven Security Testing
  • Incident Response and Recovery Planning
  • Smart Cities and Critical Infrastructure Security
  • AI-Powered Cybercriminals
  • Ethical Hacking and Bug Bounty Programs

 

For Full Article, Click Here

Problem: Users are not able to log into MSCM on handheld devices. They are able to access the MSCM console through browser, but not directly on the handhelds.

Before we get to the solution, consider the handheld timeout settings. The Timeout setting is the amount of time the handheld will attempt to connect when sending/receiving information. It can be set by selecting the number of seconds in the counter. Note that the maximum timeout setting is 3600 seconds while the minimum is 60 seconds.

The resolution for users who are not able to log into MSCM on their handheld devices is to truncate the LAWSON_USER table and stop & restart MSCM server to force re-syncing users. You shouldn’t have any more problems logging in on handheld devices.