[U2] RE: U2 Users Digest V1 #573

2005-03-17 Thread Christopher Edwards
Sometime this afternoon.

Hey... 112.8 Kilos today..


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
Sent:
To: [EMAIL PROTECTED]
Subject: U2 Users Digest V1 #573



U2 Users DigestThursday, March 17 2005Volume 01 : Number
573



In this issue:

RE: [U2]: Epicor
RE: [U2]: Epicor
RE: [U2]: Epicor
Re: [U2]: Epicor
RE: [U2] UD: ODBC/OleDB access to selected records in a file
Re: [U2] UniObjects and LDAP user authentication.
Re: [U2]: Epicor
RE: [U2]: Epicor
RE: [U2]: Epicor

--

Date: Wed, 16 Mar 2005 19:11:17 +
From: [EMAIL PROTECTED]
Subject: RE: [U2]: Epicor

Now who ever said you were allowed to export, massage, and then reimport
with no validation?

H...sounds like something I would like to have DONE to me..
- --
Debster

- -- Original message --

 Now here's something that I can give an opinion on without obvious
 bias.
 I fail to see the benefit of a feature that allows you to easily
 circumvent you ERP systems data input process. To easily allow users
to
 export ERP data to a spreadsheet...massage the data...then re-import
 that data back into the database has at least two obvious problems to
 me. First, data integrity becomes marginal at best. Second, what is
 wrong with the ERP input process that requires the data to be changed
by
 another outside process?

 Epicor does have apps that integrate back to the ERP database, but the
 data is run through the input processes as part of that integration.
 Users are advised that doing updates outside of these processes are
done
 so at their own peril. I don't know about ISO compliance, but easy
 outside input to the database is frowned upon by the FDA, SEC, and SOX

 auditors.

 David Litzau
 Epicor Technical Support J

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Bill H.
 Sent: Tuesday, March 15, 2005 2:59 PM
 To: u2-users@listserver.u2ug.org
 Subject: RE: [U2]: Epicor


 Marc:

 It is possible that this sort of data movement is precisely the reason
 financial information, at numerous companies, is difficult to attest
to,
 let
 alone use for analysis. :-)

 When I see this benefit (capability), red flags go up all over the
 place.
 It's like giving a gun to children...most will be ok but someone
 __WILL__
 get hurt.

 Bill

  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Marc
Harbeson
  Sent: Tuesday, March 15, 2005 8:41 AM
  To: u2-users@listserver.u2ug.org
  Subject: RE: [U2]: Epicor
 
  Being a Manage-2000 client, and having been an Oracle client
  in the past
  (10.x) and having seen a JD demo I must say of the t1
  suppliers, they did put on a nice show. (They could export
  directly to excel, change data, and re import the data back
  into the erp)
 
  :-)
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Lettau,
Jeff
  Sent: Tuesday, March 15, 2005 10:55 AM
  To: u2-users@listserver.u2ug.org
  Subject: RE: [U2]: Epicor
 
  So maybe Advante, Dataflo, infoflo, M2K and the like are not
  tier 1 multi-million dollar installs. But for ease of use
  and the ability to tweak the system to meet your needs. I'll
  take the tier 2 any day.
 
  Not intending to start an argument, but what can SAP or JD
  Edwards do that the smaller Epicor products can't do? What
  makes them worth the added cost? I don't' buy into that they
  can handle more users. That is mostly a matter of database
  management, hardware and infrastructure.
  You also have to consider who is buying what system and what
  their intensions are. What do you really get out of a
  standard SAP or JD Edwards install that you can't get from
  any system provided by Epicor or similar smaller priced
  package? I'm not being rhetorical.(again spell checker saves
  the day, I didn't know a word could start with rh.)
 
  P.s. you can get the Monitor Series at a Circuit city store
  or other high end audio stores near you! You can't seriously
  expect me to send you something for free! I can't get stuff
  for free.
 
  Jeffrey Lettau
  ERP Systems Manager
  polkaudio
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Debster
  Sent: Tuesday, March 15, 2005 12:50 AM
  To: u2-users@listserver.u2ug.org
  Subject: RE: [U2]: Epicor
 
  Yes...and I was privy to M2K back when it went through ADP
  doors and was sold back out again
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] Behalf Of Allen
  E. Elwood
  Sent: Monday, March 14, 2005 4:27 PM
  To: u2-users@listserver.u2ug.org
  Subject: RE: [U2]: Epicor
 
 
  I believe that Jeff was speaking about Manage-2000. Polk
  audio, in addition to making great speakers, is a Manage-2000
  user. Now if I could just get them to send a couple of
  studio monitors my 

SV: [U2] RE: U2 Users Digest V1 #573

2005-03-17 Thread Claus Derlien
THANKS FOR POSTING THE DIGEST TO ALL ON THE LIST :-)))

please try to reduce the postings when making a reply :-)

-Oprindelig meddelelse-
Fra: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] vegne af Christopher
Edwards
Sendt: 17. marts 2005 10:21
Til: u2-users@listserver.u2ug.org
Emne: [U2] RE: U2 Users Digest V1 #573


Sometime this afternoon.

Hey... 112.8 Kilos today..


snipping 112.8 kb junk out
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
Sent:
To: [EMAIL PROTECTED]
Subject: U2 Users Digest V1 #573



U2 Users DigestThursday, March 17 2005Volume 01 : Number
573

snipping 112.8 kb junk out

Frie Funktionfrer - faglig organisation og tvfrfaglig a-kasse - www.f-f.dk

***
Denne email og alle filer vedlagt som bilag kan indeholde fortroligt materiale, 
der kun er beregnet for adressaten,
og maa ikke udleveres eller kopieres til uvedkommende. Har De ved en 
fejltagelse modtaget denne email, bedes
De venligst omgaaende meddele os dette pr. telefon : 6313 8550. Paa forhaand 
tak.
***
This email and any files transmitted with it may contain confidential 
information intended for the addressee(s) only.
The information is not to be surrendered or copied to unauthorised persons. If 
you have received this
communication in error, please notify us immediately by telephone: +45 6313 
8550. Thank you.
***
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [OT] Financial fraud (was the thread: Epicor)

2005-03-17 Thread Susan Joslyn
Allen,
This is a fantastic story.  I am warning IT folks about just such a scenario
ALL THE TIME.  I've found that in these SOX audits the IT folk seem to think
along two (deadly) lines.  First, they tend to be just tell me what you
want / give me a list (e.g. don't make me think) and secondly yeah, yeah,
we'll make sure you can't use vi on the data wink, wink : good thing they
don't know about ed!

What folks don't realize about SOX is that now that an executive could be
held responsible even if he didn't know (not that I think anyone on the jury
believed Bernie Ebbers really didn't know (Worldcom)) those executives will
be frantic to SHOW they didn't know.  If they can point to a control that
demonstrates a reasonable expectation that certain controls are in place (a
signed off report that says data cannot be edited on live, for example) then
the person who withheld certain editors from the control will actually end
up being accountable.

And this whole thing about exporting and importing data (soapbox is fully
out and positioned center stage now):  SOX is not there to PREVENT
technology, flexibility, business realities!  Some folks are getting so
caught up that they are just lost in it.  Excel is a great tool for
presenting data.  Users should be able to download it and play with it all
day for internal decision making.  But if those excel reports need to be
used for consolidating multiple systems and actually reporting at an SEC
level then they need controls.  A control can be technological -- some
reports import into read-only directories, maybe.  Or a control can be human
-- this report is consolidated every day, but on Thursday Sam spot checks
the sales figures against the cash register reports and Sally signs off on
the proofs.  Or a combination ... the data is imported, the reports are
created and the figures that go to the report are re-summarized, re-hashed
in alternate reports that are stored on the system.

[Here's an idea that has been misunderstood, too -- one company I know has
an electronic report of certain activities e.mailed to an individual every
day.  This individual must check a box, digitally signing that he's reviewed
them. He laughs and thinks everyone is stupid because he just checks the box
and doesn't really review them.  But what I'm trying to get him to
understand is that whether or not he bothers to look, by signing off he has
ACCEPTED RESPONSIBILITY for them.  So if there were a problem, he'd get the
'do not pass GO, do not collect $200' card!  

SOX is really -- at its most bare-bones and fundamental level -- about
justifying finger pointing.  Think like Allen.

collapsing portable soapbox that I seem to carry everywhere these days
SJ


Date: Wed, 16 Mar 2005 11:47:56 -0800
From: Allen E. Elwood [EMAIL PROTECTED]
Subject: RE: [U2]: Epicor

The system that I had setup, allowed accountants to change any field on an
invoice.  Believe it or not, that was the request.  What they didn't know
was that I kept a simple before change/change request/after change snapshot
of the data along with date/time/logon as I had been warned about by a wise
professor back in my school days (daze?).

What I didn't know, was that they were changing the dates and invoice
numbers on the invoices to make them look as if they were only 30-60 days
old.  This was to make the receivables look current, and therefore the
company could leverage that to borrow money from Wells Fargo for purchase of
more product to sell.

The auditors from AA were very savvy and spotted the same invoice amount
with different dates and different invoice numbers on printed aging reports
kept for historical purposes.  When they asked me about how that could
happen, I produced the audit report.  The accountants were charged with
FRAUD at Wells Fargo's request and were tried and sent to jail!  This was in
the 80's.  Way way before SOX.

The first thing the accountants did was point the finger at me.  That's why
the auditors came to me along with the CEO with the intention of nailing me.
Had I not been a paranoid programmer, I might have ended up in jail.  The
accountants thought I was a patsy, and got lots of time to think about that
for 5 years.

At the time, I worked for the accounting department.  So I literally was
protecting my career from my boss who was a fool of the highest magnitude
and whom had drastically underestimated my abilities as a business analyst
and programmer.

Just because you're paranoid, doesn't mean they're NOT out to get you!
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2]: Epicor

2005-03-17 Thread Lettau, Jeff
What if I make a change to the code in the system according to what the
CFO wants and then I get implicated as being an accomplice to fraud.
Can I pull my college credits where I failed accounting as being my
defense?  
Is it getting to the point where every change to the system requires a
call to a lawyer to check to see if it is ok?  

Jeffrey Lettau
ERP Systems Manager
polkaudio

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David Jordan
Sent: Thursday, March 17, 2005 12:15 AM
To: u2-users@listserver.u2ug.org
Subject: RE: [U2]: Epicor

We have seen a couple of cases where the CFO has gone to jail for
carrying
out an illegal action.  The CFO gained no financial advantage, whilst
the
CEO who gained the financial advantage actually never went to jail.  In
the
UK a programmer got into serious trouble when programming who got
university
places.  After exhausting a variety of priority issues such as marks to
decide who would get a position, he then made a decision based on skin
colour.  

Programmers are regarded as professional/educated people by the courts
and
the courts view is that a programmer should no better when programming
improper code.  (Ignorance is no excuse) If a programmer modifies the
code
so the CFO does not pay the correct tax, then the court regards the
programmer as an accomplice to the crime.  The court's view is that a
threat
of sacking is not an excuse to commit a crime.

Bill is right some IT people will be in for a horrific shock as they
could
be caught up in fraud, privacy issues, spam and other areas and most
have
not considered their legal implications.

Regards 
David Jordan

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bill H.
Sent: Thursday, 17 March 2005 5:00 AM
To: u2-users@listserver.u2ug.org
Subject: RE: [U2]: Epicor

Don:

There are a number or current laws and regulations that attempt to rid
public corporations of this kind of mismanagement.  The result of these
new
regulations may not so much be the reduction of corporate financial and
IT
mismanagement, but the transfer of responsibility to lower level staff.
:-(

It may come to pass that you'll be held personally liable for someone
else's
indiscriminate business requirements.  For those of us who think it is
our
role to provide others with the ability to trash the integrity of the
organization's financial information; a rude awakening awaits!

Bill

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of Don Kibbey
 Sent: Wednesday, March 16, 2005 9:15 AM
 To: u2-users@listserver.u2ug.org
 Subject: Re: [U2]: Epicor
 
 Our resident Bean Counters have asked for and received 
 several tools from me that will allow them to do the same 
 thing to our system.  It's our job to provide the sharp 
 knives, the CPA types have to be carefull not to remove 
 appendages with said tools.
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] UniObjects and LDAP user authentication.

2005-03-17 Thread Shin.Tanaka
Gordon,

I didn't read your first posting.  So this email may not make a sense.
Sorry.

We just converted UNIX traditional authentication method to use Active
Directory.  As you may know, AD is Microsoft's LDAP solution. 

Our current production UNIX platforms are:

OS: HP-UX 11.11
64-bit UniData 5.2.8

We decided to purchase Vintella Authentication Service (VAS) to
integrate AD and UNIX user password synchronization.
  
In order to use VAS, PAM (Pluggable Authentication Modules) had to be
installed in all HP-UX boxes.  So applications that are aware of PAM
(using libpam.a), like sshd, worked fine without changing.  However,
UniData we are using is not built with libpam.a (ie. UniRpcD,
udapi_server, and udapi_slave.  How did I find it?  I used ldd command
against a binary file.).  That broke our UniObject for Java sessions;
connect() method stopped working.  Yicks!

Enough about Ferguson stuff...  Getting bored, eh?  Anyway, if I were
you, I would try this:


Option 1:  I think it's using LDAP, but maybe not...  Let's find out.

Create a tiny C or Perl program to find what password field returns when
calling getpwnam() function.  If password field contains *, then most
likely you are using a shadow password file.  Use getspnam() for that
and execute the little program being root.  If a crypted password string
returned, make sure that UniData (maybe Universe?) daemon processes
owned by root.  Shadow password can be read only by root or applications
with root juice.  :)  Then I would try your UniObject application.


Option 2: Oh, darn...Option 1 didn't work.  And we cannot ditch LDAP
authentication.

Create a local special UNIX user in your server side (meaning, the
user's password stored in traditional UNIX password file with crypted
password in password field) 

1. In your client application, authenticate connecting users using JNDI
if your application is written in JAVA or ADSI if your application is
written in Visual Basic (System.Directoryservices for .NET) before
calling UniObject routines.
2. Use that special UNIX user to open a UniObject session.

Bad (?) thing about the above implementation is that the special user
will be an owner of a file, not actual user, when writing a record.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Craig Bennett
Sent: Wednesday, March 16, 2005 6:25 PM
To: u2-users@listserver.u2ug.org
Subject: Re: [U2] UniObjects and LDAP user authentication.

Gordon,
 Our system admin department just changed our Sun servers from using
NIS 
 (Network Information Name Service) to LDAP Directory Service.  It was
said 
 that this user authentication is more secure than NIS.  Unfortunately,
our 
 UniObjects quit working.  When I try to open a session within a VBA 
 program or with the UniDebugger it fails due to Invalid User Name or 
 Password.

doesn't the UniDebugger login using telnet? (I haven't used it for a 
while). Maybe the username/password you are using is not in LDAP?

I would think that LDAP vs NIS should be transparent to the application 
(unless its SASL, maybe you need to associate a service tag with an 
authentication method in your SASL config?).



Craig
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] Financial Fraud

2005-03-17 Thread Susan Joslyn
Jeff,
That one is easy.
Requests for mods to the software must be documented and their justification
is part of the request.  Every SOX auditor I've come across has made this
mandate.

So in IT we have a methodology where we are responding to written requests
that have been through authorization channels before coming to us.

So -- without (necessarily) understanding the accounting or legal
implications of the task at hand, you can verify that the request came
through proper channels.

Everyone has their job definition -- you don't have to have knowledge or
expertise or fear outside of your realm of responsibility.  BUT BOY-GOLLY
make sure you are taking your own steps.

If it turns out you did something that you can't point to the audit of the
request and justification for WHY you did it -- well, then you may need your
lawyer.

Help put good procedures in place -- in the first place --  that make sense
and then don't let people bypass the rules (emergencies are part of the
rules, not an exception to them -- have established
emergency-justification-criteria and then established emergency procedures!)


whoosh-clap sound of collapsible soapbox folding up

Susan
Date: Thu, 17 Mar 2005 08:08:46 -0500
From: Lettau, Jeff [EMAIL PROTECTED]
Subject: RE: [U2]: Epicor

What if I make a change to the code in the system according to what the CFO
wants and then I get implicated as being an accomplice to fraud.
Can I pull my college credits where I failed accounting as being my defense?

Is it getting to the point where every change to the system requires a call
to a lawyer to check to see if it is ok?  

Jeffrey Lettau
ERP Systems Manager
polkaudio
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2]: Epicor

2005-03-17 Thread vforste
 Is it getting to the point where every change to the system requires a
 call to a lawyer to check to see if it is ok?


Yes ! or atleast it seems that way here.

We've gone from complete freedom to no changes without the appropriate
documentation and approval overnight.
All changes must be user requested. Even if I know there is a bug, I can't
just go quick fix it. I have to actually go out to a user and ask them to
request it to their boss who makes the entry in PRC. The helpdesk elevates
it to IT/Development director, then it can be fixed. In turn if it's a major
issue where the AR is getting botched up daily, it could take a while to get
to it, in turn making the problem worse. Then prove that the changes were
made and approved before making it into production. On top of it all
auditing every other month to make sure this protocal is followed to the
T.
And it's just starting here. It all comes down to placing the blame and
covering each ones bum from a law suit.
The whole process stinks, but is for our own good in the long run.
Especially in the world where people will cook the books and point there
finger at you.
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] UniObjects and LDAP user authentication.

2005-03-17 Thread Gordon J Glorfield
Craig,

You are correct, UniDebugger does use a telnet session.  But if it also 
utilizes UniObjects to read in the program you want to work on.  I can 
connect using my login and password for the telnet session but when I try 
to open a program to edit with UniObjects is when I get the error.

I can verify that it's the UniObjects not connecting by using a small VBA 
application in an Excel spreadsheet.

I'm not real sure what SASL is but I'll pass it on to the admin types.

Thanks for the response,
Gordon

Gordon J. Glorfield
Sr. Applications Developer
MAMSI (A UnitedHealth Company)
301-360-8839

[EMAIL PROTECTED] wrote on 03/16/2005 06:25:23 PM:

 Gordon,
  Our system admin department just changed our Sun servers from using 
NIS
  (Network Information Name Service) to LDAP Directory Service.  It was 
said
  that this user authentication is more secure than NIS.  Unfortunately, 
our
  UniObjects quit working.  When I try to open a session within a VBA
  program or with the UniDebugger it fails due to Invalid User Name or
  Password.

 doesn't the UniDebugger login using telnet? (I haven't used it for a
 while). Maybe the username/password you are using is not in LDAP?

 I would think that LDAP vs NIS should be transparent to the application
 (unless its SASL, maybe you need to associate a service tag with an
 authentication method in your SASL config?).

 
 Craig
 ---



This e-mail, including attachments, may include confidential and/or 
proprietary information, and may be used only by the person or entity to 
which it is addressed. If the reader of this e-mail is not the intended 
recipient or his or her authorized agent, the reader is hereby notified 
that any dissemination, distribution or copying of this e-mail is 
prohibited. If you have received this e-mail in error, please notify the 
sender by replying to this message and delete this e-mail immediately.
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] UD: ODBC/OleDB access to selected records in a file

2005-03-17 Thread Jim Bullock
Funny you should mention it.  We just started experimenting with XML yesterday. 
 CR comes with an
ODBC driver for XML files.  UD's LISTTOXML seems to work as advertised.  
Many details remain
to be investigated, but it looks promising so far.

Jim
--- John Jenkins [EMAIL PROTECTED] wrote:
 I seem to remember there is a link into ADO for CR ... maybe you could link
 into RBOs? 
 
 XML might be another possible methodology - but I don't have a copy of CR to
 play with...
 
 Anyone got any inside information on these features in CR?
 
 Regards
 
 JayJay
 
 
 We have racked our brains and have been unable to come up with a workaround
 for this gaping hole
 in the ODBC/OleDB interface to UniData.  Before we give up entirely and
 resign ourselves to
 putting out paper reports with UniQuery, I thought I would ask this group if
 anyone has solved
 this problem.  Anyone?
 
 Thanks in advance,
 
 Jim
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
 

...a livable wage is a moral value. Affordable health care is a moral value. A 
decent education is a moral value. A common sense foreign policy is a moral 
value. A healthy environment is a moral value. The feeling of community that 
comes from full participation in our democracy is a moral value. It is a moral 
value to make sure that we do not saddle our children and grandchildren with 
our debt.

-Howard Dean



__ 
Do you Yahoo!? 
Yahoo! Small Business - Try our new resources site!
http://smallbusiness.yahoo.com/resources/ 
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] [OT] Financial fraud (was the thread: Epicor)

2005-03-17 Thread Clifton Oliver
Comments embedded in the message below.
Susan Joslyn wrote:
Allen,
This is a fantastic story.  I am warning IT folks about just such a scenario
ALL THE TIME.  I've found that in these SOX audits the IT folk seem to think
along two (deadly) lines.  First, they tend to be just tell me what you
want / give me a list (e.g. don't make me think) and secondly yeah, yeah,
we'll make sure you can't use vi on the data wink, wink : good thing they
don't know about ed!
I occasionally run into a third scenario, what I call the 
passive-aggressive manager. Fine. We'll do EVERYTHING *exactly* the way 
they ask, and then more so. We'll pay so much attention to analyzing 
requests and going back for more and more details and authorizations, 
*nothing* will get done. When the company business grinds to a halt, 
THEN they'll be sorry they messed with the IT department!

(It amuses me that this type never seems to realize how obvious this 
will be and how likely it is to lead to terminatus abruptus.)


collapsing portable soapbox that I seem to carry everywhere these days
SJ
As IT governance becomes more and more mandated, you, me, and the other 
controls advocates won't need to carry soapboxes around with us anymore, 
Susan. There will be plenty of corpses of IT managers around to stand on.

--
Regards,
Clif
~~~
W. Clifton Oliver, CCP
CLIFTON OLIVER  ASSOCIATES
Tel: +1 619 460 5678Web: www.oliver.com
~~~
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2]: Epicor

2005-03-17 Thread Moderator
Let's move this to U2-Community.

You may subscribe to U2-Community, send an e-mail to 
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]. 
Place the following line by itself in the body of the mail:
subscribe u2-community

More info:
http://u2ug.org/index.php?module=ContentExpressfunc=displaybtitle=CEmid=ceid=12

- Charles Barouch, Moderator
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [OT] Financial fraud (was the thread: Epicor)

2005-03-17 Thread Allen E. Elwood
Hi Susan,

I see we are on the same page on this one!  :-)

Hey, I hope you're wearing green.  It's Saint Patrick's day!!!

http://www.st-patricks-day.com/index.asp

Allen (wearing his lucky green pants)



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Susan Joslyn
Sent: Thursday, March 17, 2005 04:17
To: u2-users@listserver.u2ug.org
Subject: RE: [U2] [OT] Financial fraud (was the thread: Epicor)


Allen,
This is a fantastic story.  I am warning IT folks about just such a scenario
ALL THE TIME.  I've found that in these SOX audits the IT folk seem to think
along two (deadly) lines.  First, they tend to be just tell me what you
want / give me a list (e.g. don't make me think) and secondly yeah, yeah,
we'll make sure you can't use vi on the data wink, wink : good thing they
don't know about ed!

What folks don't realize about SOX is that now that an executive could be
held responsible even if he didn't know (not that I think anyone on the jury
believed Bernie Ebbers really didn't know (Worldcom)) those executives will
be frantic to SHOW they didn't know.  If they can point to a control that
demonstrates a reasonable expectation that certain controls are in place (a
signed off report that says data cannot be edited on live, for example) then
the person who withheld certain editors from the control will actually end
up being accountable.

And this whole thing about exporting and importing data (soapbox is fully
out and positioned center stage now):  SOX is not there to PREVENT
technology, flexibility, business realities!  Some folks are getting so
caught up that they are just lost in it.  Excel is a great tool for
presenting data.  Users should be able to download it and play with it all
day for internal decision making.  But if those excel reports need to be
used for consolidating multiple systems and actually reporting at an SEC
level then they need controls.  A control can be technological -- some
reports import into read-only directories, maybe.  Or a control can be human
-- this report is consolidated every day, but on Thursday Sam spot checks
the sales figures against the cash register reports and Sally signs off on
the proofs.  Or a combination ... the data is imported, the reports are
created and the figures that go to the report are re-summarized, re-hashed
in alternate reports that are stored on the system.

[Here's an idea that has been misunderstood, too -- one company I know has
an electronic report of certain activities e.mailed to an individual every
day.  This individual must check a box, digitally signing that he's reviewed
them. He laughs and thinks everyone is stupid because he just checks the box
and doesn't really review them.  But what I'm trying to get him to
understand is that whether or not he bothers to look, by signing off he has
ACCEPTED RESPONSIBILITY for them.  So if there were a problem, he'd get the
'do not pass GO, do not collect $200' card!

SOX is really -- at its most bare-bones and fundamental level -- about
justifying finger pointing.  Think like Allen.

collapsing portable soapbox that I seem to carry everywhere these days
SJ


Date: Wed, 16 Mar 2005 11:47:56 -0800
From: Allen E. Elwood [EMAIL PROTECTED]
Subject: RE: [U2]: Epicor

The system that I had setup, allowed accountants to change any field on an
invoice.  Believe it or not, that was the request.  What they didn't know
was that I kept a simple before change/change request/after change snapshot
of the data along with date/time/logon as I had been warned about by a wise
professor back in my school days (daze?).

What I didn't know, was that they were changing the dates and invoice
numbers on the invoices to make them look as if they were only 30-60 days
old.  This was to make the receivables look current, and therefore the
company could leverage that to borrow money from Wells Fargo for purchase of
more product to sell.

The auditors from AA were very savvy and spotted the same invoice amount
with different dates and different invoice numbers on printed aging reports
kept for historical purposes.  When they asked me about how that could
happen, I produced the audit report.  The accountants were charged with
FRAUD at Wells Fargo's request and were tried and sent to jail!  This was in
the 80's.  Way way before SOX.

The first thing the accountants did was point the finger at me.  That's why
the auditors came to me along with the CEO with the intention of nailing me.
Had I not been a paranoid programmer, I might have ended up in jail.  The
accountants thought I was a patsy, and got lots of time to think about that
for 5 years.

At the time, I worked for the accounting department.  So I literally was
protecting my career from my boss who was a fool of the highest magnitude
and whom had drastically underestimated my abilities as a business analyst
and programmer.

Just because you're paranoid, doesn't mean they're NOT out to get you!
---
u2-users mailing list

RE: [U2] UD: ODBC/OleDB access to selected records in a file

2005-03-17 Thread Wendy Smoak
Jim Bullock wrote:
 
 Funny you should mention it.  We just started experimenting 
 with XML yesterday.  CR comes with an
 ODBC driver for XML files.  UD's LISTTOXML seems to work 
 as advertised.  Many details remain
 to be investigated, but it looks promising so far.
 

If LIST...TOXML doesn't do exactly what you need, try Cedarville's
DOWNLOAD utility.

-- 
Wendy Smoak
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


[U2] Multiprocessor IBM server

2005-03-17 Thread Mike Pflugfelder
Universe 9.6.2.5
IBM H50 server with 4 CPU's
AIX 4.3.3

Does anyone know how I can tell that this server is running multiple
CPU's?  In addition, how does Universe handle multiple CPU's?  I know
that there's been discussion about multi-threading in universe, but at a
more basic level, shouldn't universe or AIX distribute processes among
the available processors?  How do I know that this is happening?

Thanks,

Michael Pflugfelder
Systems Integrator
Keystone Information Systems
1000 Lenola Rd, Maple Shade NJ 08052
email: [EMAIL PROTECTED]
tel: 856.722.0700 ext 238
fax: 856.234.5871
web: www.keyinfosys.com http://www.keyinfosys.com/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] UDT dynamic files

2005-03-17 Thread Roger Glenfield
If you're adding a lot of records to the archives at once and it was 
undersized, you're going to pay a hit while the system resizes on the 
fly.  If you're dramatically increasing the record count, it would be 
better to resize before copying.   Just as it's better to turn off 
indexing when copying records and rebuilding the index.

Roger
Chuck Mongiovi wrote:
Does anyone know what kind of a perfomance hit you take for using dynamic
files? .. I had thought that it was pretty minimal, since splitting
shouldn't occur too much, and merging almost never happens ..
Anyway, I was archiving data off of a dynamic file today and noticed that a
COPY command was taking a really long time .. I re-wrote the copy in BASIC
so I could put in display counters and got the same results .. I did some
testing and found that doing the same process (READ/COPY/DELETE) using a
STATIC file is faster by a factor of about 10 ..
Any ideas?
-Chuck
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [UV] make sure pgm exists before calling it.

2005-03-17 Thread Piers Angliss
!EXISTS (or similar) was definitely there in PI, I also thought it was
around in UV but I seem to remember looking for it a while back and also
drawing a blank

Piers
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2]: Epicor

2005-03-17 Thread fft2001
Again this message does not say *how* to move the discussion to u2-community.
Can not we have a standard message that describes how to do this?
I feel like a broken record.
Will 
 
-Original Message-
From: Moderator [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Thu, 17 Mar 2005 11:23:25 -0500
Subject: Re: [U2]: Epicor


Let's move this to U2-Community.

You may subscribe to U2-Community, send an e-mail to 
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]. 
Place the following line by itself in the body of the mail:
subscribe u2-community

More info:
http://u2ug.org/index.php?module=ContentExpressfunc=displaybtitle=CEmid=ceid=12

- Charles Barouch, Moderator
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] Financial Fraud

2005-03-17 Thread fft2001
In order to post TO the u2-community list, put  [EMAIL PROTECTED] in the To: 
field
Will
 
-Original Message-
From: Moderator [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Thu, 17 Mar 2005 11:24:24 -0500
Subject: Re: [U2] Financial Fraud


Let's move this to U2-Community.

You may subscribe to U2-Community, send an e-mail to 
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED]. 
Place the following line by itself in the body of the mail:
subscribe u2-community

More info:
http://u2ug.org/index.php?module=ContentExpressfunc=displaybtitle=CEmid=ceid=12

- Charles Barouch, Moderator
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [UV] make sure pgm exists before calling it. (Unclassified)

2005-03-17 Thread HENDERSON MIKE, MR
Nearly right!

I think it's  

ITS.THERE = @FALSE
CALL !EXIST(SUBRNAME, ITS.THERE)
IF ITS.THERE THEN
   CALL @SUBRNAME( arg1, arg2, . . . )
   etc.
END ELSE
   * It doesn't exist 
END


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Stevenson,
Charles
Sent: Friday, 18 March 2005 10:11
To: u2-users@listserver.u2ug.org
Subject: [U2] [UV] make sure pgm exists before calling it.

Maybe I'm thinking of some other MV player, but isn't there a UV-defined
function that can be called to see if a subroutine exists so one can
check instead of calling and getting a runtime error?  I don't see it in
the pdfs.   Something like:

SUBRNAME = something
IF !EXISTS( SUBRNAME, number of args and other stuff )
   THEN CALL @SUBRNAME( arg1, arg2, . . . )
   ELSE forget about it

I'd swear I've done this sort of thing in the past, but I'm drawing a
blank.
Maybe I rolled my own, or I' m thinking of PI or AP or or . . .

TIA,
cds
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
The information contained in this Internet Email message is intended
for the addressee only and may contain privileged information, but not
necessarily the official views or opinions of the New Zealand Defence Force.
If you are not the intended recipient you must not use, disclose, copy or 
distribute this message or the information in it.

If you have received this message in error, please Email or telephone
the sender immediately.
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [UV] make sure pgm exists before calling it.

2005-03-17 Thread Womack, Adrian
As others have pointed out the routine is !EXIST - look in APP.PROGS,
the code is there. All it does is open GLOBAL.CATDIR and attempts to
read a record keyed on the subroutine.name.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Stevenson,
Charles
Sent: Friday, 18 March 2005 5:11 AM
To: u2-users@listserver.u2ug.org
Subject: [U2] [UV] make sure pgm exists before calling it.

Maybe I'm thinking of some other MV player, but isn't there a UV-defined
function that can be called to see if a subroutine exists so one can
check instead of calling and getting a runtime error?  I don't see it in
the pdfs.   Something like:

SUBRNAME = something
IF !EXISTS( SUBRNAME, number of args and other stuff )
   THEN CALL @SUBRNAME( arg1, arg2, . . . )
   ELSE forget about it

I'd swear I've done this sort of thing in the past, but I'm drawing a
blank.
Maybe I rolled my own, or I' m thinking of PI or AP or or . . .

TIA,
cds
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


DISCLAIMER:
Disclaimer.  This e-mail is private and confidential. If you are not the 
intended recipient, please advise us by return e-mail immediately, and delete 
the e-mail and any attachments without using or disclosing the contents in any 
way. The views expressed in this e-mail are those of the author, and do not 
represent those of this company unless this is clearly indicated. You should 
scan this e-mail and any attachments for viruses. This company accepts no 
liability for any direct or indirect damage or loss resulting from the use of 
any attachments to this e-mail.
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [UV] make sure pgm exists before calling it. (Unclassified)

2005-03-17 Thread Stevenson, Charles
Thanks, Mike.

Now I remember why I forgot about it.  I'm in Pick-flavor and this thing
seems to just check to see if the routine is in uv/catdir.  We have
pick-style cataloguing.
I was thinking !EXIST() would resolve the question following the same
rules as CALL does for finding a subroutine: looking in catdir, or
looking in VOC; if not in VOC look in the bp.O that the calling routine
is in.   Nope.

I still don't see !EXIST() anywhere in the documentation, by the way.

Thanks again,
cds

-Original Message-
From: HENDERSON MIKE, MR

Nearly right!

I think it's  

ITS.THERE = @FALSE
CALL !EXIST(SUBRNAME, ITS.THERE)
IF ITS.THERE THEN
   CALL @SUBRNAME( arg1, arg2, . . . )
   etc.
END ELSE
   * It doesn't exist
END
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/