Although Dexterity requires the user an extensive knowledge in software development (primarily in C/C++ or Pascal) and experience in scripting languages (VBScript, or Dexterity’s own script – SanScript), this proprietary programming language that Great Plains was developed in allows access to all of Great Plains resources such as tables, reports and scripts. With this access, you can manipulate and define triggers such as opening a form or leaving a field. Moreover, it can be used to call up procedures and functions and create new applications without interfering with other customizations already in place and integrate them into Great Plains user interface easily.
Dexterity can be installed using CD #2 that comes with the Great Plains 7.5 package.
Modifier with VBA
Modifier with VBA is one of the simplest tools to have for end-users and developers alike. It uses common graphic drawing techniques which can be used to alter the appearance of a Great Plains application. It can be used to move, alter or delete menus within a window so that you can manipulate the importance of each field. It also allows for addition of new windows or controls or simply rearranging those that
Multiple times in our consulting practice we saw the need to integrate General Ledger transactions from one text file and here we give you this and even more complex case, when credit and debit amounts are present on the same line with their own account numbers. Let’s assume that we have tab delimited text file, GLSOURCE.txt. Here is how the line looks:
“11242004” (date) “11020016000” (debit account) 212446.68 (debit amount) “15260005400” (credit account) 212446.68 (credit amount)
Pretty challenging, isn’t it?
First of all and this is probably easy – you need ODBC DSN, use Microsoft Text Driver, change default directory, select the file and switch to tab delimited type.
Next, open Microsoft Great Plains Integration Manager and create two new queries – one will be for the Header and the second for distribution lines in GL transaction. In both cases use Advanced ODBC type of text queries.
GL Header should aggregate by date, so in its SQL window enter this:
select F1 from GLSOURCE.txt group by F1
Now the lines – here we need unionizing and checking if amount is not zero:
select F1, F2, F3, 0
Printing has been a part of human civilization since many years. What the world today knows is web-to-print. Web to print is a technological advancement where World Wide Web is in use for printing purposes. Technology has given this opportunity where customization is possible in every sphere of life. Demand is of customized products and online web-to-print software solutions a medium, which supplies that demand.
If you are in the printing business and if you are looking for cross-city, cross-country or even cross continent selling, you need an online store. A web to print storefront is a tailor made digital print shop. This shop stations all the features and tools which you need for printing purposes. Right from the tiny little things like pens, pen drives, t-shirts, mugs, and many more products can undergo customization. Let us now check out the importance of a web-to-print storefront.
The print commerce has been through a severe change. Web-to-print software solution gives an opportunity to you, to your store, and to your print e commerce. It is a technology driven innovation using which makes printing possible using online websites.
An online web-to-print solution is a medium,
Types of Software:
There are three basic types of software, although these do have their own subsections, as will be discussed later:
1. Commercial software, purchased with a licence for one or more computers. This generally is coupled with some form of support and regular updates to patch errors etc. Sometimes a new version of the software is offered at a reduced rate as “update”. This type of software is generally relatively expensive and is often designed to cover specific industrial purposes. The big exception is the various sets of “office” software, which are designed for use in the commercial environment, but can naturally be equally used for various tasks at home. The most common application in this category is, of course, text editing. Most of the other classic “office” applications, such as calculations and data bases are only of limited use in the domestic environment, although they will be used in some cases, particularly now that the more computer-literate generation is growing.
2. Simplified or “lite” versions of the commercial software. These are intended principally for small businesses and enterprises that do not need the complete capabilities of, say, a 3-D modelling system, but must be
Great Plains Dexterity is proprietary programming language/environment, which was created in early 1990-th to provide platform / database / graphical interface independence for Mac and Windows based Great Plains Dynamics. Today it is legacy and Microsoft Business Solutions is phasing Dexterity out.
However Great Plains 7.5 and even 8.0 is Dexterity based application, so you have to deal with it and it’s customization.
Good news. Prior to version 7.0 Great Plains had plans on expanding GP functionality and so was changing tables structure – forcing Dexterity customization to be analyzed and partially rewritten with each upgrade. Not any more – GP structure stays the same – Microsoft is doing new modules acquisition and unifying it’s graphical interface to move all it’s ERP packages: Great Plains, Solomon, Navision and Axapta to web-based Microsoft Business Portal.
Still pain. Dexterity has possibility to customize existing Great Plains screens, so called Alternative Great Plains forms. This was upgrade problem in the past and it stays now – there is no way to do it in house (until you are willing to pay for full-time internal developer – who is usually in the learning curve). You got to bring in
Spyware infiltrate computer systems along with file sharing downloads. Personal information about us circulates the globe via the World Wide Web, and a web it truly is! This information finds its way to different entities or companies that are keen on knowing our surfing habits and the sites we visit. They also want to know about our file sharing interests. These observations by spyware intrudes on our privacy and security.
We can benefit greatly from “File Sharing” but must constantly be aware of the risks and safeguard ourselves from its many dangers. We must do all we can to protect our surfing habits from the prying eyes of internet snoops.
We can have our password stolen, identity stolen, our personal information abused as well as the loss of privacy we hold so dear.
We must find and remove “Spyware” to protect us from the many dangers of internet spying. One of the ways is to eliminate file sharing that enable spyware to piggyback with the “File Sharing Files” and take up residence in our computer.
Spyware and adware infiltrate and infest computers in very subtle ways when we download our favorite music or movie
The Processes tab displays a comprehensive list of all the processes currently running on your computer. This can be very useful for monitoring your system. The process tab displays information about the processor usage and memory usage of each process. The problem is, how to identify a process. Below is a list of some processes you may see in Task Managers Processes list.
“System Idle Process” “System” The Windows System Process “SMSS.EXE” Session Manager Subsystem “CSRSS.EXE” Client Server Runtime Subsystem “WinLOGON.EXE” The Windows Logon process “SERVICES.EXE” Services Control Manager “LSASS.EXE” Local Security Authentication Server Service “svchost.exe” Service Host “spoolsv.exe” The print spooler service “explorer.exe” Windows Explorer “TASKMGR.EXE” The Task Manager “regsvc.exe” Remote Registry Service
“System Idle Process” is basically another name for the time when Windows is doing nothing. There are hundreds of thousands of processes that run on a computer, so you will definitely find names of many other processess that are not listed above. For a list of well known processes, visit www.answersthatwork.com/Tasklist_pages/tasklist.htm You can also learn about almost any task by using it’s name as a search term in google.
Task Manager can also be used to tweak your system if it’s running slow.
Step 1: Lowering Training Costs Using Custom e-Learning Content
The first step to any well laid-out cost-reduction plan is to decrease the costs the organization currently incurs in order to get a better handle on profit potential from sheer cost savings. Previously we outlined what our target cost categories are…now we’re going to lower the costs associated with those categories by leveraging custom e-Learning content.
Take this scenario: A mid-sized software digital signature company that develops intranet portal systems currently employs 3 trainers that are onsite with clients for end-user training 3 days per engagement and they each average approximately 50 engagements per year for a grand total of 150 days on the road per trainer or 450 days on the road collectively.
For these trainers, the onsite training program for the end-user customer may look something like the following:
Day 1: Software Introduction and Primary Functions
Day 2: Functional Use and Administrative Actions
Day 3: Real-World Functions and Labs
Lowering the costs: By leveraging custom e-Learning digital signature online content, the company used in the above scenario can effectively reduce the onsite time required