Tag: JD Edwards World

Learn how MHS streamlined its reporting needs, saying “Goodbye to Frustration & Hello to Efficiency" Presented by Canon Virginia, Inc. Session ID 100430, presented at COLLABORATE 14   When Mil

OUC E1 Pages and their Creation Presented by Orlando Utilities Commission Session ID 100420, presented at COLLABORATE 14   This presentation outlines how the use of HCM E1 Pages at OUC by division an

9.1 Upgrade - A Management and Technical Perspective Presented by Cardinal Glass Industries, Inc. Session ID 100410, presented at COLLABORATE 14   Cardinal Glass Industries, a glass manufacturing com

Lean Office and Lean systems mean savings Presented by Stoner, Inc. Session ID 100380, presented at COLLABORATE 14   What is Lean? What role do computer and software systems have, what are the benefi

Build Your Own JD Edwards Mobile Apps Presented by Magic Software Enterprises, Inc. Session ID 100270, presented at COLLABORATE 14   Learn how to build custom mobile apps with connections to JD Edwar

Caltrol’s goal is to have all activities, or rather everything, under one roof. OneSource, the organization’s ever-growing portal, is continuously increasing one site at a time-all occurring under the umbrella of its SharePoint® environment. View portions of their credit card encryption portal, including a dropship 3-way matching implementation, the conversion of a partner quote into a JD Edwards sales order, and a variety of other features in this presentation.

Lessons Learned from a Rapid JD Edwards 9.1 Implementation Presented by Tutor Perini Corporation Session ID 100080, presented at COLLABORATE 14   Tutor Perini Corporation, a $5 billion publically tra

A9.3 Advanced Menu Security Presented by Fike Corporation Session ID 100040, presented at COLLABORATE 14   Advanced Menu Security in A93 replaces the old way of securing menus and option from users (

A9.3 Fast Path Security Presented by Fike Corporation Session ID 100030, presented at COLLABORATE 14   Creating Fast Path commands for users to access frequently used functions, then secure users fro