Tag: JD Edwards EnterpriseOne Tools

105530 Security Options for the Output Generated by JD Edwards EnterpriseOne Reports Presented by Srini Deme, Oracle Corp. at INFOCUS 2018 EnterpriseOne can produce very important documents such as customer invoices, W2s, and Checks. It is very important to securely deliver them to the proper destination just as it equally important to secure the output…

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 9/06/18

104580 Securing EnterpriseOne against Things That Go Bump in the Night:  A Threat Vector Analysis. Presented by Julie Morrison, Velocity Technology Solutions, Inc. at INFOCUS 2018 15 years ago most cyber threats originated from solo hackers living in their mom's basement.  About 8 years ago organized crime got into the game.  Today, you need to…

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 9/06/18

The use of technology on the shop floor is still important since its beginning in the industrial history. In the 60s and 70s the computer-aided shop floor and production requirements with concepts like MRP and Just-in-Time. Allied with other innovative technologies, shop floor management has been always reliant on automation while it's success is connected…

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 8/07/18

JD Edwards UDOs (User Defined Objects) are the cornerstone of Personalization & Extensibility Frameworks, providing single pane of glass for managing the lifecycle of all the UDOs. JD Edwards continues to add more and more UDOs into their catalog, enabling you to adopt technological innovations with ease and simplicity. It is important to learn key…

  • Quest Customer Learning Team
  • Recordings & Presentations
  • 8/02/18

JD Edwards has always been known as the #1 ERP of choice for Engineering and Construction customers, due to its overall natural integration across all modules in order to provide key information in a real-time format.

Most of us in the ERP implementation / consulting world have already taken our first steps into the Cloud world. However, for those in the industry, especially for IT organizations who have invested heavily and recently into legacy ERP systems, “Cloud” is a hard sell.

The current approach to software is costing us valuable time and resources. Software is not nimble nor inexpensive.

Jul 6 @  2:00pm

Presented by Ilan Zachar, Carr Properties Carr Properties is a privately held real estate investment trust known for its portfolio of trophy-quality properties in the Washington D.C. area. To support its ambitious growth plans–and meet its commitment to shareholders–the company needed to shift from a highly manual reporting environment to a more automated, timely process…

Every day a Data-As-A-Service (DaaS) Vendor shares a specification catalog for over 900,000 restaurant equipments to Trimark as physical files.

As organizations worldwide increasingly rely on software controls to protect their computing environments and data on premises and on the cloud, the topic of software security grows in importance. The potential costs associated with security incidents, the emergence of increasingly complex regulations, and the continued operational costs associated with staying up to date with security patches all require that organizations give careful consideration to how they approach software security and assess the security practices.