Reporting for Microsoft Great Plains/Dynamics/eEnterprise: RW – ReportWriter – tips for developer

Written by Andrew Karasev

Microsoft Business Solutions Great Plains is written in Great Plains Software programming tool: Great Plains Dexterity. Dexterity in turn was built with conception of graphical cross-platform transferability (in time – 1992 – mostly Mac and MS Windows). Plus Dexterity had database abstraction level (through C programming language). The result of such a shrewd future-looking architecture – Great Plains ReportWriter has multiple restrictions and drawbacks. Let’s first look atrepparttar advantages of using ReportWriter: •Seamless integration with Great Plains forms –repparttar 138543 most typical scenario – you modify SOP_Long_Invoice_Form or SOP_Blank_Invoice_From and then print your invoices with modified form – usually with your logo and changed formats and positions ofrepparttar 138544 fields •Parameters Entry Forms. Each existing report (Reports section) has associated parameters entry form. Restrictions: •No Cross-Modules links. You can not associate report withrepparttar 138545 tables from non-related modules. For example you can not have Sales Order Processing (SOP) and Purchase Order Processing data onrepparttar 138546 same report (you actually can – but you need Dexterity programmer help) •Custom Reports. You do not have parameters entry interface for your custom reports, but you could use restrictions to restrictrepparttar 138547 selection. Custom reports could be used to export data from Great Plains in text (and then Excel format)

How To Give Away Your Personal Information

Written by Erich Heintz

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is apparentlyrepparttar “in thing” these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Inrepparttar 138495 past few months, one company after another is being forced to admit customer data has been lost or stolen.

In many cases, they have then come forth repeatedly overrepparttar 138496 next few weeks, or even months revisingrepparttar 138497 estimated number of impacted customers. To date, I don’t think any have ever lowered those numbers.

Identity Theft and Respected Companies -------------------------------------- Generally speaking, these aren’t fly-by-night organizations. These are respected companies who we’ve come to trust. In many instances,repparttar 138498 loss wasn’t evenrepparttar 138499 work of a “malicious hacker” or other mystical force beyond their control; it was simple carelessness. The frequency of such reports of identity theft is making it difficult for consumers to feel confident in those with whom we do business. Customers are outraged that companies are not doing more to protect their information fromrepparttar 138500 forces of evil.

You and Your Personal Information --------------------------------- What about you? How are you at keeping you personal information under wraps? Some of these high profile incidents wererepparttar 138501 result of a trivial mistake that could have happened to anyone, including you.

Let’s consider two events that didn’t makerepparttar 138502 front page of C|Net or CNN.

The Keys To The Castle ---------------------- I consult for a client who doesn’t trust me. It’s nothing personal, they don’t trust anyone. Whenever I visit this site, I am forced to contactrepparttar 138503 client throughoutrepparttar 138504 visit to have them type a credential, or password, to grant access to a server or router. It’s really annoying.

I really respect this client.

They don’t really know me; I’m “the consultant”. They’re takingrepparttar 138505 proper steps when dealing with a consultant, providingrepparttar 138506 absolute minimum amount of information required. They would never give me unsupervised access to repparttar 138507 network, and certainly wouldn’t consider giving me passwords to their servers or routers. Not on purpose anyway.

Then there wasrepparttar 138508 day I was working alongsiderepparttar 138509 client and needed to reconfigure a router to complete a task. It’s a long walk torepparttar 138510 client’s office to getrepparttar 138511 password for that particular router. Yes, this is a client who apparently has a unique password for every piece of equipment they own. Convenientlyrepparttar 138512 client does keep a password protected file on a USB key that containedrepparttar 138513 needed information. The client was completely appropriate and even asked permission before using my laptop to fetchrepparttar 138514 file. I consented, and even maderepparttar 138515 gesture of turning away while he unlockedrepparttar 138516 file and retrievedrepparttar 138517 required password.

Have you ever used Google Desktop Search? It’s a very cool, and aptly named, program that is a Google for your PC. It will index your files and make them searchable through a fast, flexible, and easy to use interface. It’ll even cache repparttar 138518 contents of files so if you move it off your hard drive, you’ll still be able to seerepparttar 138519 contents of what was once there. Normally it does all this inrepparttar 138520 background when you computer is sitting idle. It also does it anytime you open a file.

Your Personal Information Is The Prize -------------------------------------- You guessed it. Logins, passwords, public and private IP addresses. You name it, I had it. The client who would never give me a single password had turned over all of them at once.

What kind of wondrous data was now available? Personnel records, salary data, trade secrets? Maybe, if this was a corporate client. What about an academic, a University even? Student records, financial aid forms, and grant information. The possibilities were endless.

Cont'd on page 2 ==> © 2005
Terms of Use