Integrating Information and Knowledge with Software Agents

Total Page:16

File Type:pdf, Size:1020Kb

Integrating Information and Knowledge with Software Agents UDC 519.681:681.3.068 Integrating Information and Knowledge with Software Agents VHironobu Kitajima VRyusuke Masuoka VFumihiro Maruyama (Manuscript received June 9, 2000) This paper describes research and development activities for integrating distributed information and knowledge with software agent technology. First, we give an over- view of our software agent architecture. Then, we describe the application of our software agent technology in a system that integrates distributed databases and in a document-oriented information integration system which integrates search engines. Our agent-based approach is suitable for dynamic information sources. 1. Introduction for users to retrieve information and knowledge The advent of the Internet has brought about simultaneously from distributed sources and to what is called an “information flood.” There is an make consecutive retrievals of associated infor- enormous amount of information and knowledge mation and knowledge. digitally available through networks. Although Distributed and disparate information sourc- such information and knowledge can be accessed es need to be integrated. This is where software on an individual basis, it is not an easy task for agent technology comes into play. In this paper, a users to acquire appropriate information and “software agent” is a computer system that is sit- knowledge. uated in an environment and is capable of The sources of information and knowledge autonomous action in this environment to meet have platform-level, system-level, and represen- its design objectives.1) A system of software agents tation-level differences. Platform-level differences hides platform-level, system-level, and represen- include the differences between hardware and tation-level differences and realizes a virtual operating systems, for example, differences be- integration. The areas where virtual integration tween Solaris, Windows NT, and mainframe can be applied include Supply Chain Management computers. System-level differences include the (SCM), Enterprise Application Integration (EAI), differences between database management sys- Enterprise Information Portals (EIPs), and Knowl- tems such as Oracle, SQL Server, DB2 and edge Management (KM). proprietary applications on mainframe comput- This paper describes our activities in this ers. Representation-level differences come from area under the Smart AGent Environment (SAGE) the different database structures and different project at Fujitsu Laboratories. Chapter 2 gives vocabularies used in databases, which include dif- a general overview of our software agent archi- ferent field names for corresponding fields and tecture and introduces its application to the different field values with the same meaning. integration of distributed databases for SCM. These three types of differences make it difficult Chapter 3 describes a system for document- 162 FUJITSU Sci. Tech. J.,36,2,pp.162-174(December 2000) H. Kitajima et al.: Integrating Information and Knowledge with Software Agents oriented information integration which has been realize virtual catalogs. SAGE: Anthony, details in practical use by Fujitsu’s systems engineers of which are given in Chapter 3, is an application since October 1998. Chapter 4 describes the stan- of the agent system to a virtual integration of doc- dardization efforts and future directions of our ument search engines. In both applications, the project. Chapter 5 concludes the paper. agent system enables the system integrators to give end users a virtually integrated view of dis- 2. Integrating distributed databases tributed and disparate information sources In this chapter, we first introduce the Smart without changing the way in which information AGent Environment (SAGE) project and its intel- sources are operated. ligent agent systems, which enable users to This chapter mainly describes SAGE: Fran- virtually integrate distributed information sourc- cis. (SAGE: Francis lead to the development of an es. In the rest of this chapter, we mainly discuss agent system software product called AGENT- SAGE: Francis, which is an Electronic Commerce PRO.4),5) Fujitsu released AGENTPRO in August (EC) application of the SAGE project in which dis- 1999.) tributed and disparate Relational Databases (RDBs) are virtually integrated. Section 2.2 de- 2.2 Architecture scribes the architecture of SAGE: Francis, Section Figure 1 shows the architecture of SAGE: 2.3 describes its main features, and Section 2.4 Francis. It consists of user agents (UAs), facilita- describes our mediator agents called “facilitators.” tors (FAs), and database agents (DBAs).note 1) All Then, in Section 2.5, we explain how SAGE: Francis agents communicate with each other via Agent works by describing an example application in a Communication Language (ACL) messages, the Supply Chain Management (SCM) prototype sys- syntax of which is defined by the Knowledge Que- tem. Finally, in Section 2.6, we discuss ry and Manipulation Language (KQML)6) and centralized-type and decentralized-type solutions Knowledge Interchange Format (KIF).7), note 2) for the integration of distributed information sources. Browser Browser Browser Browser 2.1 SAGE HTML, etc. We are conducting research on intelligent User User User User agent agent agent agent agent systems under the SAGE project. Under Facilitator Facilitator this project, we have developed our agent system ACL and several agent system applications, which in- clude SAGE: Francis2),3) and SAGE: Anthony. In Database Database Database Database agent agent agent agent both SAGE: Francis and SAGE: Anthony, the agent SQL, etc. system is used for virtual integration of distrib- uted databases and other disparate information Database Database Database Database sources. SAGE: Francis is an application of our agent system to Electronic Commerce (EC) set- Figure 1 tings where RDBs are virtually integrated to Architecture of SAGE. note 1) There are also application agents (AAs) in AGENTPRO, which are created as wrappers for general appli- cations. AAs are very close to DBAs. Essentially, they are DBAs in which database information sources are replaced with general applications. note 2) KQML and KIF are often called DARPA ACL since they are outcomes of Knowledge Sharing Efforts (KSE), which is a DARPA project. Future versions of AGENTPRO will be FIPA-compliant.8) FUJITSU Sci. Tech. J.,36, 2,(December 2000) 163 H. Kitajima et al.: Integrating Information and Knowledge with Software Agents Every ACL message in SAGE is sent and re- and which ontology they use. There are also “un- ceived asynchronously. Agents can automatically advertise” messages, which enable DBAs to deny match ACL messages such as a query message partially or entirely the knowledge sent by previ- and its resultant message. This is important be- ous advertise messages.note 3) cause agents can send the messages when Based on such knowledge, FAs can route and appropriate and operate freely. translate ACL messages appropriately. Hence, the The two main functions of UAs are to pro- system configuration is changed according to the cess conversions between ACL messages and advertise messages from DBAs. These advertise expressions on user interfaces such as Web pages messages enable a decentralized method of sys- and to offer a support service for users. One of tem configuration, which allows DBAs to have the main functions of DBAs is to process conver- autonomy over their operations. This advertise- sions between ACL messages and SQL queries: ment mechanism insulates UAs, and therefore the SQL is the query language of database manage- users, from the locations and other details of in- ment systems (DBMSs) such as Oracle and formation sources. The transparency provided by Microsoft Access. Two other key functions include this mechanism is essential for virtual informa- converting DB data into virtual knowledge to be tion integration. used in ACL messages from DBAs and informing 3) Ontology and ontology translation FAs of the capabilities of DBAs (a function called SAGE is based on ontologies. An ontology is “advertising”). The main functions of FAs, which a set of definitions of terms and the relationships act as mediators between UAs and DBAs, are for- between those terms. An ontology can be roughly warding messages to suitable DBAs, merging and defined as a vocabulary used by communicating sorting (if specified) results from multiple DBAs, agents. replying accordingly if there are no suitable Since distributed and disparate information agents, and translating terms in ACL messages sources are developed independently, they usual- as necessary. ly use different sets of terms. Even though agents use the same syntax for ACL messages, for exam- 2.3 Main features ple, KQML and KIF, ontologies used in ACL As a complete agent system, SAGE: Francis messages can be different. Therefore, FAs pro- has the following main features: vide an ontology translation service. With this 1) Agentification of legacy information sources service, the agent system hides vocabulary-level SAGE: Francis provides DBAs to agentify leg- difference from users. This is another essential acy information sources such as databases. After element for virtual information integration. the agentification, these information sources are FAs also provide flexible routing of ACL mes- made into agents which communicate via ACL sages based on the messages’ ontology, which uses messages using CORBA Object Request Broker its own category information. This is one of the (ORB). This hides platform-level
Recommended publications
  • Surviving the Petabyte Age: a Practitioner's Guide
    • Cognizant 20-20 Insights Surviving the Petabyte Age: A Practitioner’s Guide Executive Summary The amount of time it takes for news to become common knowledge has shrunk, thanks to: The concept of “big data1” is gaining attention across industries and the globe. Among the drivers • An emerging network of social media and blogs are the growth in social media (Twitter, Facebook, that potentially makes everyone a publisher of blogs, etc.) and the explosion of rich content from good and bad news. other information sources (activity logs from the A rapid increase in the number of people who Web, proximity and wireless sources, etc.). The • are untethered from traditional information desire to create actionable insights from ever- receptacles and now have a highly mobile increasing volumes of unstructured and struc- means of collecting and ingesting information. tured data sets is forcing enterprises to rethink their approach to big data, particularly as tradi- • The meteoric rise of desktop tools housing a tional approaches have proved difficult, if even significant portion of information. Organiza- possible, to apply to structured data sets. tions need to understand the information and processes involved in the dispensation of desk- One challenge that many, if not most, enter- top-managed information (mostly Microsoft prises are attempting to address is the increas- Access and Excel). This information is most ing number of data sources made available for likely to be found in the form of: analysis and reporting. Those who have taken an Copies of operational data (including both early adopter stance and integrated non-tabular > sources and targets).
    [Show full text]
  • Annual Report 2016
    4 AUDIT +1.0 % 202.0 CHF million Net revenues 2016 Lukas Marty Head of Audit Transformation as a source of strength This past year the audit business was driven more than usual by transactions, restructuring and relocations. KPMG’s technologically innovative, interdisciplinary services were extremely successful on the market. The faster the transformation, the more important the peace of mind offered by auditors. The more companies change, the greater the potential for auditors to make a vital contribution. And this is something KPMG has been quite successful at over the past year. Digitization raises demand for advisory services On the other hand, technological transformation There are multiple factors at play here. On the has intensified even further. Many clients one hand, Swiss businesses and companies are restructuring their IT systems, often with located in Switzerland have been involved far-reaching consequences: Companies are in numerous deals which need to be assessed being reorganized and their age-old structures by auditors, even if they take place outside radically dismantled. Standardized IT solutions Switzerland. The bustling acquisition schedule now make it possible for tasks previously is partly attributable to the strong franc, which performed across a large number of subsidiaries has boosted the purchasing power of Swiss to be assigned to just a few global shared corporations enormously. Yet the strong franc service centers. Not only that, but standardized has also prompted both foreign and Swiss firms IT solutions also allow global guidelines to be to take a more critical look at which activities established within corporations, industries and they want to keep in high-priced Switzerland and even beyond.
    [Show full text]
  • DLT RIDER to MANUFACTURER END USER TERMS (For Public Sector End Users)
    DLT RIDER TO MANUFACTURER END USER TERMS (For Public Sector End Users) 1. Scope. This DLT Rider to Infor, Inc. (“Manufacturer”) End User Terms (“DLT Rider”) establishes the terms and conditions enabling DLT Solutions, LLC (“DLT”) to provide Manufacturer’s Offerings to Public Sector Government Agencies to include the Federal, State and Local entities (the “Licensee” or “Customer”). 2. Applicability. The terms and conditions in the attached Manufacturer Terms are hereby incorporated by reference to the extent that they are consistent with Public Sector Laws (e.g., the Anti-Deficiency Act, the Contracts Disputes Act, the Prompt Payment Act, the Anti-Assignment statutes). To the extent the terms and conditions in the Manufacturer's Terms or any resulting Customer Order are inconsistent with the following clauses, they shall be deemed deleted and the following shall take precedence: a. Advertisements and Endorsements. Unless specifically authorized by Customer in writing, use of the name or logo of Customer is prohibited. b. Assignment. All clauses regarding Assignment are subject to Assignment of Claims and Novation and Change-of-Name Agreements. All clauses governing Assignment in the Manufacturer Terms are hereby deemed to be deleted. c. Audit. During the term of a Customer order subject to this Rider: (a) If Customer's security requirements included in the Order are met, Manufacturer or its designated agent may audit Customer's facilities and records to verify Customer's compliance with this Agreement. Any such audit will take place only during Customer's normal business hours contingent upon prior written notice and adherence to any security measures the Customer deems appropriate, including any requirements for personnel to be cleared prior to accessing sensitive facilities.
    [Show full text]
  • UNITED STATES DISTRICT COURT SOUTHERN DISTRICT of NEW YORK ------X : : : : in the MATTER of a WARRANT to : SEARCH a CERTAIN EMAIL ACCOUNT : No
    UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x : : : : IN THE MATTER OF A WARRANT TO : SEARCH A CERTAIN EMAIL ACCOUNT : No. 13 Mag. 2814 CONTROLLED AND MAINTAINED BY : MICROSOFT CORPORATION : : : : - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - x MEMORANDUM OF LAW OF AMICUS CURIAE INFOR IN SUPPORT OF MICROSOFT CORPORATION’S MOTION TO VACATE THE SEARCH WARRANT GIBSON, DUNN & CRUTCHER LLP Orin Snyder Alexander H. Southwell Jane Kim 200 Park Avenue New York, NY 10166 Telephone: (212) 351-4000 Fax: (212) 351-4035 Thomas G. Hungar (pro hac vice pending) [email protected] 1050 Connecticut Avenue, NW Washington, DC 20036 Telephone: (202) 955-8500 Fax: (202) 467-0539 Attorneys for Amicus Curiae Infor TABLE OF CONTENTS Page INTEREST OF AMICUS CURIAE ................................................................................................. 1 INTRODUCTION .......................................................................................................................... 2 ARGUMENT .................................................................................................................................. 4 I. Infor Joins The Arguments Set Forth In The Amicus Curiae Briefs Of Verizon Communications, Inc., Apple Inc., And Cisco Systems, Inc. ............................................. 4 II. U.S. Technology Companies Will Be Substantially Harmed Should ECPA Warrants Apply Extraterritorially. .....................................................................................
    [Show full text]
  • A Day in the Life of Your Data
    A Day in the Life of Your Data A Father-Daughter Day at the Playground April, 2021 “I believe people are smart and some people want to share more data than other people do. Ask them. Ask them every time. Make them tell you to stop asking them if they get tired of your asking them. Let them know precisely what you’re going to do with their data.” Steve Jobs All Things Digital Conference, 2010 Over the past decade, a large and opaque industry has been amassing increasing amounts of personal data.1,2 A complex ecosystem of websites, apps, social media companies, data brokers, and ad tech firms track users online and offline, harvesting their personal data. This data is pieced together, shared, aggregated, and used in real-time auctions, fueling a $227 billion-a-year industry.1 This occurs every day, as people go about their daily lives, often without their knowledge or permission.3,4 Let’s take a look at what this industry is able to learn about a father and daughter during an otherwise pleasant day at the park. Did you know? Trackers are embedded in Trackers are often embedded Data brokers collect and sell, apps you use every day: the in third-party code that helps license, or otherwise disclose average app has 6 trackers.3 developers build their apps. to third parties the personal The majority of popular Android By including trackers, developers information of particular individ- and iOS apps have embedded also allow third parties to collect uals with whom they do not have trackers.5,6,7 and link data you have shared a direct relationship.3 with them across different apps and with other data that has been collected about you.
    [Show full text]
  • Driving High Performance in Government: Maximizing the Value of Public-Sector Shared Services High Performance in Government
    The Government Executive Series Driving High Performance in Government: Maximizing the Value of Public-Sector Shared Services High performance in government What characterizes high performance in government? Through our extensive research and experience in the public sector, Accenture has found that true high-performance govern- ments bear unmistakable hallmarks. High-performance governments generate maximum public value. They are relentlessly citizen centered and outcome focused. Their capabilities and operational activities all support the delivery of outcomes defined by their mission, and they measure their performance based on those outcomes—not just inputs and outputs. At the same time, high-performance governments are committed to cost-effectiveness. They hold themselves accountable; they actively accept their role as stewards of the public trust; and they make their operations and results transparent to all. They are innovative and flexible, continually striving to improve value delivery, and are able to respond creatively to new challenges and opportunities. They work in open and collaborative ways, understanding that their organization is part of a larger system, and cultivate working relationships with other agencies, organizations and stakeholders. Finally, high-performance governments reflect their enthusiasm for delivering public value. This evident passion engages both internal staff and external stakeholders in active support of their organizations’ missions. Shared services enables high performance. It allows governments
    [Show full text]
  • Code Rules: a Playbook for Managing at the Crossroads
    Code Rules A Playbook for Managing at the Crossroads By Malcolm Frank, Paul Roehrig and Ben Pring | FUTURE OF WORKTM © Cognizant Technology Solutions U.S. Corporation 2013, all rights reserved. Preface Today’s high-flying companies — the outliers in revenue growth and value creation — are winning with a new set of rules. They are dominating their sectors by managing the information that surrounds people, organizations, processes and products — what we call Code HalosTM— to build new business and operating models. 1 Code Halos contain a richness of business meaning that forms the new basis of competition. When Code Halos scale, they spark new commercial models in a predictable five-step model that can take entire industries to “the Crossroads,” a compressed period of time in which market dominance can dramatically flip from industry stalwarts to challengers. In this white paper, we define the new rules of success by decoding the business of meaning and the pattern of success that has emerged. 2 FUTURE OF WORK June 2013 CODE RULES: A PLAYBOOK FOR MANAGING AT THE CROSSROADS 3 Executive Summary What separates today’s high-flying outliers — such as Apple, Google, Amazon, Netflix and Pandora — from fast-followers and wannabes? It’s the ability to disrupt markets by capturing customer insight and market meaning from the flood of data swirling around us all. The data — or the Code Halo™ that accom- panies people, organizations and devices — contains a richness of potential business meaning that far outstrips the value of bricks, mortar and other physical assets that have historically powered market leadership.
    [Show full text]
  • INFOR, INC. (Exact Name of Registrant As Specified in Its Charter) DELAWARE 333-183494-06 01-0924667 (State Or Other Jurisdiction (Commission (I.R.S
    UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of Report (Date of earliest event reported): April 6, 2020 (March 31, 2020) INFOR, INC. (Exact name of registrant as specified in its charter) DELAWARE 333-183494-06 01-0924667 (State or other jurisdiction (Commission (I.R.S. Employer of incorporation or organization) File Number) Identification Number) 641 AVENUE OF THE AMERICAS NEW YORK, NEW YORK 10011 (Address of principal executive offices) (Zip Code) (646) 336-1700 (Registrant’s telephone number, including area code) Not Applicable (Former name or former address, if changed since last report) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligations of the registrant under any of the following provisions: ☐ Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) ☐ Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) ☐ Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) ☐ Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Securities registered pursuant to section 12(b) of the act: None Trading Name of exchange Title of each class Symbol on which registered N/A N/A N/A Indicate by check mark whether the registrant is an emerging growth company as defined in Rule 405 of the Securities Act of 1933 (§230.405 of this chapter) or Rule 12b-2 of the Securities Exchange Act of 1934 (§240.12b-2 of this chapter).
    [Show full text]
  • Detecting and Preventing Duplicate Invoice Payments
    White Paper Detecting and preventing duplicate invoice payments Executive summary Duplicate invoice payments occur far more frequently than most organizations realize. On average, approximately 0.1% to 0.05% of invoices paid are typically duplicate payments—which for a medium- size organization with annual costs of $100 million over a three year period, could represent a loss of $300,000. Within the public sector, this amount is far higher due to the typical size and volume of payments as can be seen from the results posted by the US Government Accountability Office (GAO) in their 2012 annual report, which indicates that the GAO helped to reduce “improper payments by about $1.4 billion for 22 federal programs.” 1 Table of Contents 1 Executive summary How control violations are performed 2 What are the main causes of duplication? 4 How to detect duplicate payments 16% Manual processing 4 Basic steps to reduce duplicate payments Data warehouse 20% processing 5 The Infor answer 64% Automated processing Figure 1. 64% of organizations rely on manual processing to detect duplicate invoice payments.2 While many duplicate invoice payments are recognized after high- integrity suppliers notice the mistake, many other duplicate payments require expensive recovery audits and/or intensive manual processes. Many are never identified or resolved. According to a 2012 KPMG poll, “64% of organizations still rely primarily on manual control testing to detect control violations such as duplicate invoice payments.”3 1 US Government Accountability Office, Summary of GAO’s Performance and Accountability Report Fiscal Year 2012; p. 8 2 Based on data published in: KPMG; Low Tech Approach to High Risk Challenges, KPMG Pulse Survey results from the 2012 RSA Archer GRC Summit; June 2012; p.1 3 KPMG, p.
    [Show full text]
  • June 12, 2013 Item No. 9
    June 12, 2013 Item No. 9 AUTHORIZATION TO ENTER INTO TWO (2) YEAR SERVICE AND SUPPORT AGREEMENTS WITH YARDI, INFOR, ORACLE AND SALESFORCE.COM FOR MAINTENANCE AND SUPPORT SERVICES FOR THEIR RESPECTIVE SOFTWARE AND SYSTEMS To the Honorable Board of Commissioners: RECOMMENDATION It is recommended that the Board of Commissioners authorizes the Chief Executive Officer (“CEO”) or his designee to enter into two (2) year agreements: (1) with Yardi in an amount not‐to‐exceed $540,000 for support and maintenance; (2) with Infor in an amount not‐to‐exceed $500,000 for support and maintenance; (3) with Oracle in an amount not‐to‐exceed $480,000 for support and maintenance; and (4) with Salesforce.com in an amount not‐to‐exceed $800,000 for subscription maintenance and support for fiscal years 2013 through 2015. The Executive Vice President (“EVP”) of Finance, the Office of the General Counsel and the Department of Procurement and Contracts have completed all necessary due diligence to support the submission of this initiative and recommend the approval of this item accordingly. CORPORATE GOAL The proposed program supports CHA’s corporate goals of ensuring that the CHA’s housing portfolio is safe, decent and sustainable. FUNDING: CHA General Fund SOLICITATION SUMMARY Vendor: Yardi Systems, Inc. 430 South Fairview Ave. Goletta, CA 93117 Contract Type: Professional Services Contract Amount: $540,000 Contract Period: July 1, 2013 through June 30, 2015 M/W/DBE Participation: 100% MBE Section 3: Hiring Not Applicable XX Vendor: Infor (US), Inc. 13560 Morris Road Alpharetta, GA 30004 Contract Type: Professional Services Contract Amount: $500,000 Contract Period: January 1, 2014 through December 31, 2015 M/W/DBE Participation: Waiver XX Section 3: Hiring Not Applicable XX Vendor: Oracle Corporation 233 S.
    [Show full text]
  • Oracle HCM Leads with Platform Innovation Voice Assistants and Adaptive Mobile UX Elevate the Employee Experience
    September 23, 2019 OFFERING OVERVIEW Oracle HCM Leads with Platform Innovation Voice Assistants and Adaptive Mobile UX Elevate the Employee Experience Holger Mueller Vice President and Principal Analyst Copy Editor: Jim Donahue Layout Editor: Aubrey Coggins Produced exclusively for Constellation Research clients TABLE OF CONTENTS Executive Summary ......................................................................................3 About Oracle HCM ......................................................................................4 Functional Capabilities ..................................................................................9 Pricing ..................................................................................................21 Analysis and Observations .............................................................................22 Recommendations ......................................................................................26 Related Research .......................................................................................28 Endnotes ...............................................................................................30 Analyst Bio .............................................................................................32 About Constellation Research ..........................................................................33 © 2019 Constellation Research, Inc. All rights reserved. EXECUTIVE SUMMARY This report provides an overview of Oracle HCM and analyzes its capabilities to satisfy
    [Show full text]
  • Infor Fourth Shift RELEASE ROADMAP
    Infor Fourth Shift RELEASE ROADMAP APRIL 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 Disclaimer This presentation reflects the direction Infor may take with regard to the products or services described herein, all of which is subject to change without notice. This presentation is not a commitment to you in any way and you should not rely on any content herein in making any decision. Infor is not committing to develop or deliver any specified enhancement, upgrade, product, service or functionality, even if such is described herein. Many factors can affect Infor’s product development plans and the nature, content and timing of future product releases, all of which remain in the sole discretion of Infor. This presentation, in whole or in part, may not be incorporated into any agreement. Infor expressly disclaims any liability with respect to this presentation. INFOR FOURTH SHIFT- Roadmap Release | April 2021 2 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 2020 - Recap Infor Fourth Shift 8.00B Technical Utility Mobility Microsoft 2019 New and improved functions New VisiBar Web Client Support Infor Fourth Shift Release | April 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 HIGHLIGHT Microsoft Support Fourth Shift support for latest Microsoft platform. Benefits: Futureproof on latest versions Microsoft Windows Server 2019 Microsoft SQL Server 2019 Infor Fourth Shift Release | April 2021 Copyright © 2020. Infor. All Rights Reserved. Infor.com icgtechnology.com | (865) 321-8325 HIGHLIGHT Fourth Shift 8.00B Manufacturing, Finance, Technical and performance improvements.
    [Show full text]