Posted On: January 14, 2021

Data is the Foundation for Business Growth

Forward-thinking companies are overcoming the data conundrum and re-calibrating their data for growth and innovation. Can there be too much of a good thing? In the case of data, yes. We live in a data-driven world where companies are creating a stream of data that doesn’t end. Companies are under competitive pressure to make better-informed […]

Posted On: January 5, 2021

12 JD Edwards GRC Strategy Tips

In general, governance, risk and compliance, or GRC, is a set of integrated capabilities that ensure an organization’s ability to achieve objectives, address uncertainty, and act with integrity. What are the fundamental steps to a successful JD Edwards GRC policy? These might not be ALL applicable to ALL organizations but ALL organizations should be asking […]

Posted On: December 22, 2020

The Role of Redundancy for Oracle E-Business Deployments in the Cloud

Moving to the Cloud offers Oracle E-Business Suite (EBS) users a tremendous opportunity to simplify both the cost and complexity of ERP infrastructure management. To achieve these goals it is critical that you make the right choice between Public Cloud and Private Cloud. While Oracle EBS deployments can thrive on both the Public and Private […]

Posted On: December 15, 2020

10 Steps to Prevent a Data Breach and Keep Your Company Secure

Find out what you should do to protect your organization from hackers and how you can keep the bad actors from doing damage if they break into your network. There are only three things certain in life: death, taxes, and data breaches. With data breaches and ransomware attacks on the rise and the global pandemic […]

Posted On: December 10, 2020

Hiding JD Edwards UDOs from specific users or roles when view security is set to *PUBLIC

This article will outline how to hide UDOs from specific users and roles, allowing fine-tuning of UDO security. Step 1 Access the UDO View Security screen in Application P00950. Navigate to: Form > User Defined Object > View   Step 2 Enter the appropriate data in the QBE grid header.   Step 3 Select the […]

Posted On: December 8, 2020

Industrial IoT and the Cloud: Why Data is Only Half the Battle

A networked production line can reach its potential with cloud-based apps. Regardless of whether you are retrofitting or purchasing new IT systems to remain competitive in manfacturing, you should develop a digitized, data-driven production strategy based on Industrial Internet of Things (IIoT). It’s important to recognize the collection and storage of production-relevant data is only […]

Posted On: December 3, 2020

Who Rebooted Windows Server?

A simple step by step method to identify who rebooted Windows Server. It is common to be troubleshooting an issue and notice the server was rebooted or crashed and rebooted itself. Finding out the reason why can be important in certain issue investigations. This article describes an easy method to determine who initiated a system […]

Posted On: December 1, 2020

10 Steps to Take After Falling Victim to a Ransomware Attack

Find out what you should do when your company experiences a ransomware attack. With more people working remotely due to the global pandemic, ransomware attacks have increased 715% year over year. Additionally, the FBI says ransomware is one of the fastest growing threats. This rise of attacks is fueled by many factors, including the dramatic increase in ransomware payments […]

Posted On: November 19, 2020

JD Edwards 9.2.5 – Six New Orchestrator Enhancements

Tools Release 9.2.5 has been released.  Here is a quick, plain-English explanation of the enhancements to the “Swiss Army Knife” we call Orchestrator in our JD Edwards toolboxes. 1) Assertion Framework for Orchestrations We can now use orchestrations for test scripts and as a very simple automated testing tool.  Specially, this new feature allows an […]

Posted On: November 5, 2020

Decrypt your file using the WebLogic Scripting Tool (wlst) on your JD Edwards EnterpriseOne WebLogic Server

Description After setting up WebLogic and configuring your files, WebLogic encrypts both the username and password that is being used to start AdminServer or your JD Edwards EnterpriseOne instances.  Now, you need the WebLogic username and/or password.  Perhaps, it was configured by a previous administrator and they did not document the password, or perhaps […]

Copy link
Powered by Social Snap