4 steps to an effective disaster recovery plan

Disaster recovery doesn’t come with a FEMA trailer in the business world, but the concept is similar. Mother nature. Mechanical failure. Malicious cyber activity. All pose threats to business operations. If they strike, a business can suffer serious injury to infrastructure. Disaster recovery is the process of restoring business systems to a functional state so corporations can get on with a productive life. Effective recovery takes four...

AWS Snowball — moving data to the cloud with ease

So, you’ve decided to make the move to AWS public cloud. Maybe you’re looking for a safe off-site location to keep business-critical system backups. The problem is you don’t exactly know how to get all of that business data there. Amazon offers several transfer methods, but most rely on extremely high-speed internet. How many of us have gigabit internet speeds? If you transferred 100TB of data to AWS on a 200Mbps internet link, it would take...

Spotting suspicious logins and other threats to JDE security

ERP Suites Clarity: Security Management

The next feature we want to highlight in our Clarity blog series is Security Management. A newer addition to the Clarity system monitoring tool, this feature uniquely presents all your JD Edwards (JDE) security management information in a single dashboard. Why is this a big deal? Imagine an auditor is accessing the security of your EnterpriseOne (E1) system. With Security Management, you can  provide...

6281 Tri Ridge Blvd., Loveland, OH 45140 | 877-884-6526