Microsoft Great Plains Customization Recovery & Upgrade for Large Corporation

At the end of XX century, in the late 1990th Great Plains Software eEnterprise was recognized as one of the leader on the midsize to large corporate ERP market. Due to the nature of eEnterprise architecture - it is Great Plains Dexterity based application and Dexterity imposes some specific to the database access and table structure ? eEnterprise was subject to relatively inexpensive customization. During the recession time a lot of former Great Plains Software and then Microsoft Business Solutions partners either went out of business or merged with Auditing firms and their Great Plains clients saw this instability and simply stopped annual enhancement program payments and become so-called orphan clients. Today, in 2005 ? it is time to upgrade from eEnterprise 6.0 to Microsoft Great Plains Professional 8.0. If you have major customization for eEnterprise ? you need to understand your options before you find your new Microsoft Business Solutions VAR of record. In this small article we will describe you the main steps and options to upgrade Dexterity customization:

? DYNAMICS.DIC with the source code. This is where your customization script should be originated from. The nature of Dexterity makes the developer to produce so-called Dexterity chunk from this DYNAMICS.DIC with the source code, in the chunk itself the code is stripped off. You should have this dictionary, if you don't ? contact your old VAR and see if somebody could give it t you. If you can not find the source code, then customization should be understood and recoded ? yes ? how sad it might sound.

? VBA / Modifier code. Alternative to Dexterity customization could be light (or heavy) VBA scripting. Modifier allows you to place new button on the Great Plains screens and address new and existing fields in the VBA code. VBA scripts are located in DYNAMICS.VBA dictionary. This dictionary should be present on each workstation, using the modification. Usually this code is not encrypted and programmer could analyze and upgrade the code. Modified forms could be also upgraded. Sometimes we see heavy VBA coding, using element of Continuum, where it switched Dexterity dictionaries and then uses inline Dexterity sacscript scripting. These customizations, probably considered as very high-skills programming in the past should be redone.

? Stored Procedures. In eEnterprise, beginning with version 5.0 Dexterity cursors were recommended to rewrite in the form of stored procedures, and so offload Dexterity logic into MS SQL Server scripting. Usually you need Dexterity programmer to take a look at your Company or Dynamics databases and tell you which stored procedures are deployed by Dexterity customization. And you are lucky if they are not encrypted.

? Other custom elements. You may have ReportWriter reports: SOP Long Invoice Form, for example. These is a list of upgradeable and no-upgradeable, the last ones should be redone.

Good luck with customization upgrade and if you have issues or concerns ? we are here to help! If you want us to do the job - give us a call 866-528-0577 or 630-961-5918! help@albaspectrum.com

Andrew is Great Plains specialist in Alba Spectrum Technologies ( http://www.albaspectrum.com ) ? Microsoft Great Plains, Navision, Microsoft CRM Partner, serving clients in California, Minnesota, Illinois, Washington, Florida, Arizona, New York, New Jersey, Virginia, Georgia, Louisiana, Texas, Canada, UK, Australia, Brazil, Germany, Russia

Riverside Chicago charter limousine .. Lockport Chicago limo O’Hare
In The News:

NASA's Ingenuity helicopter, which flew on Mars in April 2021, became the first aircraft to achieve powered, controlled flight on a planet other than Earth.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Thieves who have iPhones can usually detect a hidden AirTag in vehicles they are attempting to steal, and an RFID wallet may not help you.
Genmoji, the latest addition to Apple's Apple Intelligence suite, uses artificial intelligence to generate customized emoji based on text descriptions.
It's easy to find yourself swamped in unread emails. Here are a few simple steps to archiving them and clearing out some of your digital clutter.
Keep your retirement plan safe from data brokers selling your personal information. Kurt the CyberGuy explains how to protect yourself and your retirement.
Turo faces scrutiny after tragic incidents involving rented vehicles, raising questions about security measures and regulatory frameworks.
A Chinese company has developed a spherical, 276-pound law enforcement robot that has been chasing down criminals at impressive speeds.
Here are some powerful online sleuthing tricks you can use to check the credibility of a website, see old pictures of places you've lived and even learn more about your neighbors.
Beware scam calls: Avoid unknown numbers and protect your personal information. Tech expert Kurt “CyberGuy" Knutsson talks about the increasingly common scam.
Tech expert Kurt “CyberGuy" Knutsson helps you crush your New Year's goals with these 12 apps to help you stay on track and succeed.
There are many untapped safeguards and tips you can learn to take your Wi-Fi knowledge to the next level, technology expert Kim Komando shares her tricks.
VPNs ensure privacy; antivirus stops malware. Tech expert Kurt “CyberGuy" Knutsson says both are essential for online security.
Tech expert Kurt “CyberGuy" Knutsson cites a new report that says many people still use weak passwords like "123456," risking their accounts.
Tech expert Kurt “CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software.
Tech expert Kurt “CyberGuy" Knutsson reveals ways to restore accidentally deleted text messages on your Android phone.
A new study says outdoor security camera apps are among the biggest collectors of user data, including phone numbers, payment details and precise location.
In iOS 18.2 and later, Apple's Mail app enhances email management by automatically sorting messages into distinct categories to help find emails faster.
A virtual private network (VPN) allows computer and smartphone users to mask an IP and create a secure, encrypted connection between a device and the internet.
Android 15's latest feature, Private Space, is like a private vault helping to keep your personal or sensitive apps away from prying eyes.
Cybercriminals have more ways than ever to target teenagers; here are some of the most widespread scams and tricks to watch in order to keep your loved ones safe.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A humanoid robot named CUE6 has got game. The basketball-playing robot, produced by Toyota, claimed a Guinness World Record for longest shot.
With electronic signatures becoming more common, Kurt the CyberGuy explains how to produce your digital John Hancock for online documents.
Kurt the CyberGuy walks through steps he recommends immediately taking after getting new electronics — like phones or TVs — as gifts this holiday season.

Who Is Minding Your Sensitive Data?

Stealing company information used to be the specialty of spies... Read More

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Algebra Help Software

Need help making sense of algebra? Have algebra lectures in... Read More

Vlans

In order to implement VLANs in a network environment, you'll... Read More

Reduce Pop-ups and Annoying Ads

There is many things more frustrating than surfing a website... Read More

A Case Study on Selecting Contract Management Software

Professional services firm cuts costs and improves productivity with integrated... Read More

Hubris - Definition: Microsofts Passport

Before September of 1995, Microsoft ignored the Internet because their... Read More

Make 2005 the Year You Save Time!

Today's business world is fast-paced. No matter what it is... Read More

Huddle Up; Groupware on Three

It could just be me, but my experiences with document... Read More

It?s Back!! WordPerfect?s Amazing Comeback

Have you noticed WordPerfect is gearing up for a comeback... Read More

What is Groupware?

Vince Lombardi once said that, "The achievements of an organization... Read More

Protect Your Computer...and Your Business!

We all take the computer for granted. I mean, all... Read More

Professional XP Style Icons in Software and Website Development

Using professional icons in your application or website can bring... Read More

Microsoft Great Plains: If You are Orphan Client ? What to Do and FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More

3 Reasons Why Medical Billing Software is Leading the Way

Since technology changes so quickly, it is hard to begin... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

Accessing XML Using Java Technologies

The most important benefit of XML is its simplicity. Though... Read More

Linux Vs. Windows

This article will not attempt to advocate the use of... Read More

Microsoft Great Plains Customization Tools Evolution ? Overview for Consultant

When Great Plains Software introduced the first graphical accounting application... Read More

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

Microsoft CRM Implementation - US Market Lessons

Microsoft CRM is CRM answer from Microsoft Business Solutions. If... Read More

COSMIC: A Small Improvement on the Symons Method

The COSMIC FP (function point) software quality metric, is no... Read More

Microsoft Great Plains Integration Manager ? Advanced Techniques

Great Plains Integration Manager scripting and translation - overview for... Read More

Microsoft CRM USA Nationwide Remote Support

Remember old good days when your company probably had Great... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

Lincoln Stretch rentals Lake Villa ..