How the Boltrics WMS Inbound Process Works: Scanner Receiving and Directed Putaways

For 3PL warehouses and distribution operations, inbound efficiency sets the tone for everything that follows. If receiving is inaccurate or delayed, inventory visibility suffers, putaways stall, and downstream fulfillment is impacted. Boltrics WMS for Microsoft Dynamics 365 Business Central streamlines the entire inbound process using scanner-based workflows, structured status controls, and system-generated warehouse activities. In… Continue reading How the Boltrics WMS Inbound Process Works: Scanner Receiving and Directed Putaways

How to Receive Goods Through the Scanner in Boltrics 3PL Software

Warehouse receiving sets the tone for everything that follows—inventory accuracy, billing, putaway efficiency, and customer satisfaction. When done correctly, it creates a clean, traceable inbound process. When done manually or inconsistently, it creates downstream issues that are hard to untangle. In this walkthrough, Daniel Feltham-Lauzon demonstrates how to receive goods using a scanner in Boltrics… Continue reading How to Receive Goods Through the Scanner in Boltrics 3PL Software

The Art of Prompting – Basic Communication with AI

AI Over 40 Series – Week 3 Many of us have treated AI like a fickle search engine—demanding perfect queries, agonizing over keywords, and double-checking every answer for “hallucinations.” That approach quickly becomes exhausting and unscalable. In this week’s installment of our “AI for the Over 40” series, we’ll flip the script: instead of engineering… Continue reading The Art of Prompting – Basic Communication with AI

Setting Up Your AI Workspace – Tools and Access

AI Over 40 Series – Week 2 Why having multiple AI platforms is like having specialized consultants on retainer (and how I learned this the hard way) As a Microsoft Business Central Partner, my instinct is to start with Microsoft solutions. It’s not just loyalty—my clients trust me to help them maximize their Microsoft investments.… Continue reading Setting Up Your AI Workspace – Tools and Access

Understanding What AI Actually Is – and How to Work with It

AI Over 40 Series – Week 1 I’ve been chasing the promise of AI for years. Long before ChatGPT became a household name, I was installing aftermarket tech in my SUV to make it self-driving—much to my wife’s dismay. (Ironically, she now prefers driving that car thanks to the AI features.) Despite my enthusiasm—and even… Continue reading Understanding What AI Actually Is – and How to Work with It

4 Techniques to Optimize Jet Reports for Faster Run Times

Oh, if only there were a set of steps that, if followed, would guarantee a fast Jet Report. Given the nuances and intricacies in the design of many reports, combined with other factors, like the more complex database structure of BC compared to NAV, the size of your data, and your network or internet speed,… Continue reading 4 Techniques to Optimize Jet Reports for Faster Run Times

Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls

Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Password Security and Protection Has Never Been More Important

How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important

Remaining Vigilant: External threat detection with OSINT

For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT