Do You Want Your Own Fully Programmable ERP? - Part 2

In the first article we mentioned the main characteristics that should have a software to be used as a Front-End with some functions of an Enterprise Resources Planning ERP:

  • ODBC,

  • Replication,

  • Computed Views,

  • Integrated e-Mail,

and we used the Lotus Notes example, but in principle will be possible to use other softwares with similar functions.

Now we will see a practical case, a system to detect and control - marketing, sales, new purchase orders - your aground products. As we know, the salesman prefer to sold new products only, and your aground products will be less and less sold.

We assume that your company already have an online managerial/accounting system, with evidently its own database.

1. We will use a method to transfer your managerial/accounting data to the Notes relational database, and although this last one has tools for that - ODBC for example - we recommended the purchase of a specific software for that purpose in order to be more flexible and with more powerful features, that must allow the following transfers:

  • From Notes to your relational database

  • From your relational database to Notes

  • From a Notes database to another Notes database

  • From ASCII files to Notes database

  • From Notes database to ASCII files

  • Synchronization of both databases

  • Scheduled type transfers - in a defined time, or hour or minute or day, etc.

Normally this kind of software works with the following databases - and this probably include the database type used by your company:

ALLBASE/SQL, Btrieve, Clipper, DB2, dBASE, Excel, Gupta SQLBase, IMAGE/SQL, INFORMIX, INGRES, InterBase, Microsoft SQL Server, Microsoft Access, Microsoft FoxPro, Netware SQL, Oracle, Paradox, Progress 6, SQL/400, SQL/DS, Sybase, Teradata, Files text, XDB, and also the databases types ODBC, client/server and desktop, etc.

2. We will decide what fields from your managerial/accounting system - here so called of dbCompany - you need in your new ERP. We can, for example

  • To establish the relationship of one-to-one, field x in Notes field y in the dBcompany,

  • Or we need a non-existent information, what fields we have to bring from the dBcompany to compute - in Notes - in order to obtain the desired information. We are speaking about "information", not of data.

3. We will decide if we need data transcriptions and/or data conditionally computed. A simple example would be the need - in Notes - to generate the resulting information x of the data y,k,z from the dBcompany.

4. Summarizing the above functions Second and Third - about each different product we need from your dBcompany:

  • All the P.Os, products received, code, description, during the period t, with dates, quantities, costs, vendors, etc

  • The whole sales, during the period t, with dates, quantities, sales prices, responsible salesman, etc.

5. We acquire - extract - those data, to be placed in specific Notes fields, and creating the Notes "Views".

We will continue in the next article.

--

Publishing Guidelines: You may publish my article in your newsletter, on your website or in your print publication provided you include the resource box at the end. Notification would be appreciated but is not required.

About The Author

J.C.Melo is a 73-years old IT professional with 54 years of experience in computer & technology entrepreneurship. He was the owner of the first minicomputer factory in South America and Consultant for the U.S. Government in several contracts. Now is the CEO of http://mba-open-university.net and http://mba-open-university.net.

http://mba-open-university.net

tidy up service Glenview ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Small Business and Over Regulation

Over regulation of small business is so intense it is... Read More

Shopping For a Franchise

Shopping for a franchise is easy if you know what... Read More

Bringing Home the Bacon

In general, all of us know how to accomplish the... Read More

Beating the Small Business Cash Flow Blues

Small business owners can relieve a lot of their own... Read More

Passion Is Key To A Successful Business

Passion. Passion alone can make your business successful. As an... Read More

7 Tips to Improving Your Cash Flow

Cash is King... That is what everyone tells us and... Read More

Small Business Marketing Series ? Choosing a Niche Market

Many smaller businesses choose niche markets for various reasons and... Read More

Making Your Product Desirable For Alliance Partners

How do you make sure you have the business solutions... Read More

Why Small Business Must Turn to PR

If small business had no important outside audiences, it wouldn't... Read More

Accepting Checks in Your Business Virtually Risk Free

Most businesses accept checks as form of payment for goods... Read More

Loose Lips Sink Ships - The Fastest Way to Put Yourself Out of Business

I agree that knowledge should be free, but the next... Read More

How to Write a Credit Policy for Your Business

The book, "Become the Squeaky Wheel," by New Hampshire author... Read More

Setting Prices - Pricing Your Consulting Services

THE PSYCHOLOGY OF PRICINGIn case you hadn't noticed, people can... Read More

The Misconceptions of the Value Of Disclosures in Franchising

Disclosure laws in franchising are suppose to help the consumer.... Read More

Collection Agency Selection

Frankly, given the legal and regulatory requirements involved in attempting... Read More

Small Business - Big Business...Whats the Diff?

Small Business, Big Business ? What's the Diff?Well a lot... Read More

Janitorial Cleaning Service: Getting Started

A janitorial cleaning service is one of the best businesses... Read More

7 Essentinal Resources for Small Business

So you want to start a business but you don't... Read More

Small Business Marketing Secrets: Look Like Sizzle, Be The Steak

You've heard marketing and advertising gurus quip, "Sell the sizzle,... Read More

Facts About Starting Elderly Group Home Businesses

There's been a recent rise in the number of elderly... Read More

Site Selection - Slice of Life, A Car Wash and Detail Center DownTown

There is a continual trend we are seeing which I... Read More

Wichita Kansas is a Great Place to Run a Business

We love Wichita because it has great all round weather... Read More

Small Business Security No Passing Fad

How careful are you with the data you collect from... Read More

11 Things Small Business Owners Can Learn From Rudy Giuliani

1. Leadership Is Learned ? While many people appear to... Read More

Employee Relations Manual Sample Outline

Most smart entrepreneurs and all large corporations have Employee Relations... Read More

maid service near Winnetka ..