For 3PL warehouses and distribution operations, inbound efficiency sets the tone for everything that follows. If receiving is inaccurate or delayed, inventory visibility suffers, putaways stall, and downstream fulfillment is impacted. Boltrics WMS for Microsoft Dynamics 365 Business Central streamlines the entire inbound process using scanner-based workflows, structured status controls, and system-generated warehouse activities. In… Continue reading How the Boltrics WMS Inbound Process Works: Scanner Receiving and Directed Putaways
Category: How To General
How to Receive Goods Through the Scanner in Boltrics 3PL Software
Warehouse receiving sets the tone for everything that follows—inventory accuracy, billing, putaway efficiency, and customer satisfaction. When done correctly, it creates a clean, traceable inbound process. When done manually or inconsistently, it creates downstream issues that are hard to untangle. In this walkthrough, Daniel Feltham-Lauzon demonstrates how to receive goods using a scanner in Boltrics… Continue reading How to Receive Goods Through the Scanner in Boltrics 3PL Software
The Art of Prompting – Basic Communication with AI
AI Over 40 Series – Week 3 Many of us have treated AI like a fickle search engine—demanding perfect queries, agonizing over keywords, and double-checking every answer for “hallucinations.” That approach quickly becomes exhausting and unscalable. In this week’s installment of our “AI for the Over 40” series, we’ll flip the script: instead of engineering… Continue reading The Art of Prompting – Basic Communication with AI
Setting Up Your AI Workspace – Tools and Access
AI Over 40 Series – Week 2 Why having multiple AI platforms is like having specialized consultants on retainer (and how I learned this the hard way) As a Microsoft Business Central Partner, my instinct is to start with Microsoft solutions. It’s not just loyalty—my clients trust me to help them maximize their Microsoft investments.… Continue reading Setting Up Your AI Workspace – Tools and Access
Understanding What AI Actually Is – and How to Work with It
AI Over 40 Series – Week 1 I’ve been chasing the promise of AI for years. Long before ChatGPT became a household name, I was installing aftermarket tech in my SUV to make it self-driving—much to my wife’s dismay. (Ironically, she now prefers driving that car thanks to the AI features.) Despite my enthusiasm—and even… Continue reading Understanding What AI Actually Is – and How to Work with It
4 Techniques to Optimize Jet Reports for Faster Run Times
Oh, if only there were a set of steps that, if followed, would guarantee a fast Jet Report. Given the nuances and intricacies in the design of many reports, combined with other factors, like the more complex database structure of BC compared to NAV, the size of your data, and your network or internet speed,… Continue reading 4 Techniques to Optimize Jet Reports for Faster Run Times
Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
As AI adoption accelerates, so do the risks. From prompt injection attacks to unauthorized model access, enterprises must adapt their security strategy to address the unique threats introduced by AI systems. Informed by the SANS Critical AI Security Guidelines v1.1, this post explores how to implement risk-based AI security using Microsoft Azure and Azure OpenAI… Continue reading Securing AI in Microsoft Azure: A Risk-Based Approach to AI Governance and Controls
Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud
Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud
Password Security and Protection Has Never Been More Important
How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important
Remaining Vigilant: External threat detection with OSINT
For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT