BLOG

Can old ERPs be funny? Find out here

Twitter Feed

Securing Your Data, Securing Your ERP: New White Paper

Security is a grave issue in today’s increasingly networked world. The best defense against an attack is to protect both your ERP and your data. In this brand new white paper, prepared by David Lagacé, security expert and Syntax’s Senior Network Analyst, we’ve outlined the...
Read More »

ERP In the Cloud vs. On-Premise

Enterprise resource planning (ERP) software runs businesses large and small and consists of integrated applications tasked with storing, managing and interpreting data. ERPs can be used to provide an integrated view of your core business processes that generate data regardless of the type of activity involved with each process....
Read More »

4 Proven Reasons to Implement ERP
Implement ERP

Companies at the forefront of innovation have to continually look for new ways to reduce internal costs, improve processes and increase efficiency across the organization.
Read More »

What is JDE? An Intro Guide to JD Edwards EnterpriseOne Software
Unlock the Full Potential of JD Edwards with EnterpriseOne 9.1

If you are in the market for enterprise resource planning software (ERP) and you are looking to get more details on exactly what the JD Edwards EnterpriseOne Software solution can provide, you have come to the right place. A Brief History of JD Edwards JD...
Read More »

Moving from JD Edwards World to EnterpriseOne: Essential Planning and Execution

1. Moving from World to EnterpriseOne JD Edwards EnterpriseOne was originally called JD Edwards OneWorld and was originally designed to be the successor product to JD Edwards World. However, both product lines are part of Oracle’s Applications Unlimited strategy and receive ongoing investment and...
Read More »

Enhanced Auditing for JD Edwards EnterpriseOne

Every company is accountable for the data it stores. Any modification that is done to the data impacting the company financially or legally should be traceable to its source. The standard EnterpriseOne Audit Trail records the user, program, workstation, date, and time for only...
Read More »

Vulnerability Assessment
10 Data Security Questions a Good Managed Services Provider Should be able to Answer

Finding Security Holes Before Hackers Do Security is no longer something that businesses can consider as an ‘option’. What was once regarded as a low-priority part of IT, Information Security, is now a high priority. When security is put aside, it can be devastating...
Read More »

Realizing the Value of EnterpriseOne Pages

EnterpriseOne Pages (E1 Pages) within JD Edwards provide a framework to display and arrange content and information in such a way that end users can transform their EnterpriseOne user interface and end user experience. End users have the ability to personalize their own experience...
Read More »

5 Quick-Win Tactics for Migrating your ERP to the JD Edwards Cloud
5 Quick Win Tactics for Migrating your ERP to the JD Edwards Cloud

Migrating ERP solutions to the JD Edwards Cloud allows for reduced costs, increased productivity, and mitigation of risk. In today’s marketplace, the number of companies turning to cloud services is growing rapidly. If your company is currently considering a cloud hosted solution and you...
Read More »

Business Vulnerability and the Need for the Best Possible IT Security

Business Vulnerability and the Need for Best Possible IT Security Security holes can be deadly. Identifying and correcting security holes in IT infrastructure is critical. Even then most businesses fail to understand the importance of proactive vulnerability assessment. What’s more shocking is that some...
Read More »