Posted On: June 4, 2020

Moving SAP to the Managed Cloud? 7 Questions You Should Ask

A managed cloud services provider can minimize your risks when you migrate your mission-critical SAP applications to the cloud. Here’s what you should know to ensure a successful partnership. More companies are moving their SAP environments to the cloud. According to a study by Americas’ SAP Users’ Group (ASUG) and Syntax, 64% of SAP customers have […]

Posted On: June 2, 2020

How To Increase The Number Of Rows Allowed Using Grid Import

For many, Grid Imports are a vital feature of J.D. Edwards EnterpriseOne. The time (money) it can save your business users is invaluable. There are many business processes that can benefit from using grid imports, including: Journal Entries, Time Entry, Budgeting, Inventory Adjustments, etc. The default maximum number of rows that can be imported is […]

Posted On: May 27, 2020

How to Overcome the Talent Costs of Maintaining ERP Applications

Find out how companies can conquer the challenges and costs of finding talented and skilled IT professionals to manage mission-critical SAP and Oracle applications. One of the most business-critical applications at your company is your enterprise resource planning (ERP) applications of SAP and Oracle. These software programs or suite of related software programs must function […]

Posted On: May 20, 2020

Is Your IDPS Set Up Properly? 10 Questions to Ask Your Team

New regulations, such as general data protection regulation (GDPR), have prompted organizations to make intrusion detection and prevention systems (IDPS) a staple of their security strategies. Here’s what you need to know to protect your data. It takes an average of 191 days for a company to detect a breach. If you don’t catch intrusions […]

Posted On: May 14, 2020

Monitoring Moment: Fraud Protection in JD Edwards – Find and Eliminate Hidden Threats

Risk. Security. Fraud. Segregation of duties. Most companies place these concerns at or near the top of their management lists. From security consultants to external audits, companies spend time, effort, and money to manage their risk. Training is mandatory, access is reviewed, and security is controlled and approved. However, when it comes to JD Edwards, […]

Posted On: May 12, 2020

UDO Management – Object Tokens

One of the biggest differences between traditional OMW on the fat client and promotion of UDOs on the web is that there are two new applications that run on the web that must be utilized to manage UDO’s: P98220W – Web Object Management Workbench P98220U – Work with User Defined Objects P98220W can be used […]

Posted On: May 5, 2020

5 Steps to a Successful SAP S/4HANA Migration

Companies are migrating to SAP S/4HANA to gain greater efficiencies and become more agile. Here is what you should know to achieve a successful migration. If you use SAP’s enterprise resource planning (ERP) software and you are not yet using SAP S/4HANA, you will have maintenance support for core applications of SAP Business Suite 7 […]

Posted On: April 29, 2020

AWS Lambda: What Is It? How Does It Work? Why Is It Important?

AWS Lambda is an event-driven, serverless computing platform launched by Amazon Web Services (AWS) in 2014 that runs code in response to events and automatically manages the computing power needed by that code. According to AWS: “AWS Lambda is a compute service that runs your code in response to events and automatically manages the compute […]

Posted On: April 22, 2020

BSSV Package Build Verification – OutOfMemory Errors even with the creation of an ear file

We have been seeing issues with BSSV package builds where we get an ear file, but the BSSV’s deployed with that ear file have not all worked. In other words, some BSSV’s work fine and others do not work at all. The ear file in the build is a good file size, it is the […]

Posted On: April 16, 2020

3 Ways to Protect Your Enterprise from Phishing Attacks

Phishing emails don’t always look like spam, so it’s not surprising that employees get duped into clicking malicious links. Here’s how to prevent scams from landing in your inboxes, so you can stop cybercriminals in their tracks. Phishing is on the rise. The costs of being compromised by an attack are high. Phishing attacks account […]

Copy link
Powered by Social Snap