Learning how to use an ERP system is not always that easy but it can be significantly simplified with an understanding of the needs of the learner. Just like we do when developing new solutions in our ERP, when developing learning material, a critical question to ask is “Does the learning meet the target audience’s learning style and preferences?” Read more…
It’s springtime again and my favourite time of year, Christmas is now a distant memory and seeing the parks and road sides awash with vibrant colour is both up-lifting and motivating. It reminds me that it’s time to review the art of the possible and strive to keep my eyes open to the opportunities that the season brings.
In my current and relatively new position, I’ve had to get to grips with a number of new systems – not only the ‘ins and outs’ of SYSPRO and K3 SYSPRO products, such as DataSwitch, but also with the internal systems required to manage my day-to-day workload. In this blog I’ll share with you some of the tools, sources, and insights I have gained during my first six months within the SYSPRO community.
With the festive season just past, it got me thinking about a friend and colleague who in my opinion encapsulates the very essence of a human firecracker! I’m referring to Trudy Deuchar, Group Business Operations & Information Manager for the Jasco group of companies, who over the last two years has played a pivotal role in completely modernizing, and indeed revolutionizing Jasco’s information systems.
People often assume that ERP systems are only for larger companies. But, consider this – if you run a small or medium sized business, do you lie awake at night worrying about the following things:
- Is there a way to improve our inefficient processes?
- Can we grow without growing pains?
- Will the business remain viable or successful in the long term?
In a recent conversation we were discussing how secure our ERP system was, considering all the wonderful levels we had in place such as Role-based, Operator and Group Security; including restricted access at company, programs, feature and field level, not to mention electronic signatures, encrypted passwords and workflow controls.