Dynamics GP Year-End Close Webinar

Join Tridea for our annual Dynamics GP year-end close webinar! We will share best practices related to year-end processes for your Microsoft Dynamics GP system. We will cover the top three modules General Ledger, Accounts Payable and Accounts Receivable.

register here

Event Details: Wednesday: December 14, 2016 at 11:00 AM – 12:00 PM (PST)

Presenter: Kaydee Baker – Tridea Partners

This is one of our most popular webinar. Don’t miss it!

Microsoft Dynamics GP 2016 R2 Feature of the Day – Batch Error Message Includes User ID

Enjoy your Microsoft Dynamics GP 2016 R2 Feature of the Day!

Batch Error Message Includes User ID

Microsoft Dynamics GP 2016 R2 Feature of the Day

Are you a Tridea client interested in installing Microsoft Dynamics GP 2016 R2?

Contact us first!  Tridea Partners 858.755.3700 or info@trideapartners.com

By Tridea Partners, Microsoft Dynamics Partner www.trideapartners.com

Read original post at: http://community.dynamics.com/gp/b/gpteamblog/default.aspx

Dynamics AX Year-End Close Webinar

Join Tridea for our annual Dynamics AX year-end close webinar! We will share best practices related to year-end processes for your Microsoft Dynamics AX system. We will go through the general steps of the year end close process and discuss key items that will be required to setup the next fiscal year.register here

Event Details: Wednesday: December 14, 2016 at 9:30 AM – 10:30 AM (PST)
Presenters: Matthew Caffrey & Robin Ellsworth  – Tridea Partners

Microsoft Dynamics 365 – Intelligent Customer Service

Intelligent customer service empowers us to deliver effortless experiences. See how Microsoft Dynamics 365 can help:

Contact us for more information on Dynamics 365. Tridea Partners 858.755.3700 or info@trideapartners.com

Internet of Things

The Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as “the infrastructure of the information society.”

The IoT is a giant network of connected things (ecosystem).

iot

The vision for IoT is that millions (and potentially billions) of devices will be connected to each other and the Internet allowing people to communicate with machines, and machines to communicate with other machines.

“Things,” in the IoT sense, can refer to a wide variety of IP-enabled devices and various devices such as cellphones, heart monitoring implants, biochip transponders, automobiles with built-in sensors, home monitoring devices, coffee machines, lamps, Amazon Eco, etc.

Analysts estimate that 20+ Billion devices will get connected to the Internet by 2020

IoT creates a large digital presence connecting organizations, cities and countries. Security decision makers must embrace fundamental principles of risk and resilience to drive change. With billions of devices connecting together in today’s digital environment, what can people and organizations do to make sure that their information’s stays secure. Will someone be able to hack into your toaster and thereby gain access to your entire network. The first step is to educate ourselves about what the IoT is and the impact on how we work and live with these devices. Second step include changing the default password on such devices if possible. Third, apply security and firmware updates.

 

The October 21, 2016 attack on online infrastructure provider Dyn was launched at least in part by Mirai, an open-source malware strain that scans the Internet for routers, cameras, digital video recorders and other Internet of Things “IoT” devices protected only by the factory-default passwords. Once infected with Mirai, the IoT systems can be used to flood a target with so much junk Web traffic that the target site can no longer accommodate legitimate users or visitors traffic, which resulted in a series of distributed denial-of-service (DDoS) attacks.

The Mirai botnet attack took down parts of Twitter’s network, as well as hundreds of other sites—including GitHub, Box, The Verge, PlayStation Network, and personal webpage provider Wix. Level 3 Threat Research Labs has been continuously tracking these botnets as they wreak havoc on victims across the internet.

 

This article was written by Osei Owusu, Technical Consultant for  Tridea Partners. Tridea is a leading Microsoft Dynamics provider. www.trideapartners.com