Infor Announces Coleman AI Platform

Infor just announced Coleman, an enterprise-grade, industry-specific Artifical Intelligence (AI)  platform for Infor CloudSuite applications to help maximise human work potential. Coleman mines data and uses powerful machine learning to…

7 Tips for Securely Moving Data to the Cloud

Cloud computing is on the rise and is expected to increase dramatically in the next few years. A few reasons for this is that these could based apps offer more connectivity and functionalities than legacy systems. Overall, the system is more…

Use Microsoft Management Console to connect to Lawson LDAP

,
Microsoft Windows Server provides a tool called ADSI Edit, which can be used to get a closer look at your LDAP configuration. Please be careful when you are moving around in LDAP, as mistakes here can destroy your Lawson Security configuration. Your…

The secret to cloud security: elasticity

With more and more healthcare organizations moving to the cloud, the inevitable question of security arises. With costly investments and time in building a robust infrastructure, healthcare organizations are still adamant in moving all their…

URL to Open Lawson from Ming.le

,
Sometimes users would like to go directly to Lawson through Ming.le, rather than clicking on the Lawson Icon (globe).  To help users with this requirement, you can generate a URL that opens Lawson when Ming.le is loaded. Open your Ming.le…

3 Steps To Embedding Artificial Intelligence In Enterprise Applications

In today’s modern tech world, all contemporary applications that exist use some form of a database, whether it be flat files, in-memory or NoSQL, small or large databases. In the next few months, Artificial Intelligence (A.I.) will be necessary…

Lawson System Foundation – launtdll.dll

,
When applying updates to Lawson System Foundation, you may see an error returned  in the log saying, "Error: Fatal Not all files were delivered."  While the red highlighted message does not indicate exactly what the problem is, the actual…

IP Designer Series – The Encrypt & Decrypt Nodes

,
These nodes can be used to encrypt/decrypt data or files for secure transmission.  Before you begin, you must have a PGP key pair generated by a network security administrator. Both nodes have the same properties: Configuration name…

How to tell which version of Ming.le you are using

,
Sometimes when you are troubleshooting issues with Ming.le, your support technician will ask which version of Ming.le you are using, Enterprise or Foundation.  There are a couple of ways to determine this. First, you can open your Ming.le…

How to Avoid the 7 Most Common Pitfalls of ERP Software Selection

It's not a simple decision to choose to invest your company in enterprise resource planning (ERP) software. Unfortunately, many companies try to get through this decision quickly and end-up making costly mistakes. Here are a few steps to follow…

Events