Tag: JD Edwards EnterpriseOne

Wish you could simplify user experiences across desktops, tablets & smartphones to empower users to take action from their devices while on-the-go – all from one universal mobile app?

Learn how to rapidly design, build and deploy low-code/no-code own mobile apps that are automatically integrated with JDE & 3rd party applications.

Explore 50+ available out-of-box mobile apps to help you kickstart your mobile journey across purchase orders, sales orders, inventory, customer service, etc.

Hear real-life customer examples & case studies for Attended Automation across multiple business processes.

Nitin Lakhpat, Circular Edge 

How to leverage the new Form Request Orchestrator enhancement, via Tools Release 9.2.5.3, of selecting multiple rows to simplify and streamline otherwise advanced Orchestrations.

Nathan Ley, Terillium

You have implemented a great security solution and are now able to report on Sox compliance issues with ease.  But how can you easily track when new issues pop up? By utilizing ALLOut Security, you have great flexibility when it comes to compliance reporting.  Join GSI and ALLOut Security for an in-depth look at how you can take advantage of AOS and leverage the power of UDOs to create watchlists to monitor compliance.

During this session, you will learn:

How to automate your compliance reporting to limit the potential for issues to go weeks without being found.
See how to create watchlists and alerts over your Audit data to be alerted to compliance issues that need your attention.

• How to maximize the investment in your ALLOut Security tool to automatically identify critical issues that are unsolved.

Kyle Gray, GSI

Sagent Pharmaceuticals previously processed payments for Inbound and Outbound freight charges with a very manual and tedious process that could take up to 6 hours.  Through the continuous adoption of JD Edwards 9.2 technologies, Sagent Pharmaceuticals was able to automate this process. 

This automation was achieved by utilizing various tools available that include a combination of Orchestrator, UBE's, Scheduler, and low-code custom coding. 

In this session, you will learn how TruGreen partnered with Navisite to implement the Purchase Order approval process through Mobile apps for enhanced flexibility and efficiency. TruGreen worked on this solution with Navisite as the original out-of-box solution through Mobile App from Oracle was removed from the Apple and Andriod play store for versions IOS 14 and above. This was a huge impediment for TruGreen as they had invested on a new AIS server and were not able to use it. Navisite worked with TruGreen to custom develop a Mobility solution that is user friendly and flexible. The solution is designed to run on both platforms iOS and Android.

Gayatri Rajan, Navisite

A Syntax employee had a special vision.  She took action and connected with several other women in Syntax to develop the vision into reality.  This vision was to establish an organized platform to promote mentoring, idea-sharing, growth, and empowerment of the female Syntax workforce across all levels of the organization. Apart from supporting female tech thought leadership, WIT aims to gather insights into challenges that women face in our organization and the IT industry. WIT aims to identify solutions to overcome these barriers and become more successful together by empowering current and future female Syntax employees and leaving a positive impact on the organization.

JD Edwards; 9.2 Orchestrator and UDO functionality allows for IoT based integrations with best-in-class reporting/analytics solutions. In this session we will take a look at integrating Microsoft’s PowerBI with JD Edwards 9.2 using standard objects, and unleash the power of analytics using data models sourced from JDE table data.

Jordan Myers, Grant Thornton

The cyber threat business is no longer a solo gig. Industrious bad actors have even taken to offering ransomware-as-a-service solutions to advance the goals of lesser skilled buyers. Have your methods, skills, tools, and team doubled down in sync? How sure are you that your ERP data is well under wraps?
ERP Suites Executive Director, Paul Shearer, examines seven JD Edwards threat vectors you can't afford to overlook. Learn how to mitigate the exploits and secure your data against the swell of cybercriminal activity.

Paul Shearer, ERP Suites

Join us to learn about the simplification of batch management that we have introduced to ease UBE submissions, log tracking, default print queue setups, and job terminations.

John Holder, Oracle 

Security has always been a major concern for every organization while handling  data and its communication over the network. Learn how Oracle is continuing to secure your JD Edwards implementations with our latest security enhancements and best practices, and also get familiarized with our enhanced user security activities.

Pradip Pandey , Oracle