Shareables

IT news & insights written by Calance's industry experts.

Recent Posts

Topics

see all

Procore + MRI Software Integration by Calance

 

Our MRI Software Integration ensures that jobs and job costs are in sync between the two systems. At the foundation, we sync Jobs, Phases, Cost Codes, and Vendors. At the project level we tie together all project dollars for accurate forecasting in Procore. This includes budgets, commitments, and actual costs. Dimension can easily be configured to move data in the way that best fits your needs.

 

With your Procore + PeopleSoft Integration you can:

  • Ensure data quality while reducing cost
  • Insulate from Impacts of Application Upgrades
  • Increase Flexibility and Scalability

 

 

 

 

 

Request a Demo

 
Read more

Procore + JD Edwards Integration by Calance

 

Our JDE integration ensures that jobs and job costs are in sync between the two systems. At the foundational level, we sync Jobs and Projects, Suppliers and Vendors, Accounts and Cost Codes. At the project level we tie together all project dollars for accurate forecasting in Procore. This includes all budgeted, committed, and actual dollars. We know that when it comes to JDE, one size does not fit all. Dimension is easily configured and customized to meet your specific business processes.

The custom integration produced will enable your field teams with untethered access to important financial data, eliminate double-entry and give project managers accurate job costing information on the construction site. Leveraging Procore Connect you can have confidence in your financial data to make the best in-the-field decisions while giving accounting peace of mind as they retain full control over data pushed into their ERP system.

 

With your Procore + JDE Integration you can:

  • Ensure data quality while reducing cost
  • Insulate from Impacts of Application Upgrades
  • Increase Flexibility and Scalability
 
 
 

Calance has been a leader in JDE integration since 2001, tying JDE data to project control using our Dimension integration platform. We deliver a straightforward yet complete job cost integration between Procore and JDE, ensuring accurate forecasting. Dimension’s scalability and flexibility allow it to handle the largest volumes and even the most complex business processes.

 

Request a Demo

 
Read more

How to Build Enterprise Workflow for IT Service Request Using K2

 

A large automotive client presented Calance with a challenge that needed a quick solution. They received a mandate from executives that all IT requests for service are fully documented, receive proper approvals from business and from finance, and make sure all testing and QA is completed and approved before deploying into production. This was mainly as a response to new compliance directives, but with the added benefit of streamlining the process and increasing efficiency.

Additional requirements included detailed documentation for each IT service request with proper oversight and approvals from the business, finance and IT stakeholders. As each request progressed through workflow, the solution would also enforce and require documentation for testing, QA, implementation and post-implementation verification. From a technical strategy standpoint, Calance was tasked to extend the basic design to connect to the client’s Mainframe legacy data, legacy MS Access applications and a web-based time tracking application.

Following a solutions assessment process, Calance recommended a Business Process Automation platform offered by K2. The K2 platform enabled Calance to implement an architecture that integrated existing tracking systems and connected them to reviewers and approvers involved in the workflow lifecycle. The K2 platform enabled Calance to quickly build and deploy a complete enterprise workflow solution with no or minimal coding, with flexibility to extend and modify workflows with custom development.

For the automotive client, we needed to extend the basic design to connect to Mainframe legacy data, legacy MS Access applications and a web-based time tracking application. The K2 platform also provides reporting and analytics out of the box. Clients are able to track progress of requests, get statistics on performance and detect potential bottlenecks in the business process. Using the platform, we were also able to develop our own web-based search and reporting.

 

Below is the workflow Calance developed for Requests for IT Services:

 

 

The resulting solution implemented by Calance greatly streamlined our client’s workflow process, introducing efficiency through automation of notifications to each participant, increased governance and process control, administrative/audit reporting, and a robust system for storing and accessing all workflow artifacts.

 

Need help developing workflows?  

Contact Us

 
Read more
May 28, 2018 k2 by Bill Zain

The House Example- A Simple Explanation of SOCaaS

 

When discussing security risks with clients we tend to use The House Example. Think about your security systems like a house. When you leave your house you might take basic security precautions like locking the doors and closing the windows. Maybe an unseasoned criminal would jiggle a door handle, notice it's locked and leave. A more seasoned criminal, however, may come along jiggle the handle, and then smash in a window. This is precisely why people set up cameras and invest in additional home security.  

Systems security works in the same way. Your house is your systems and your basic securities (your 'locks') are your firewall and antivirus. Most companies stop here. Unlike the house example, cyber criminals are more seasoned and more savvy at slipping in undetected. Once a cyber attack happens, there is likely significant long term damage that could have been avoided. Calance works to detect and respond to these threats around the clock.

 

 

See 'Your Guide to Security as a Service (SOCaaS)'

 

Common Misconceptions

If you've found that your company is at risk, take immediate action before a breach occurs. 

Take a recent case from the news. On March 18, 2017, The North Carolina State Government suffered from two large data breaches. These breaches leaked sensitive information including personal information and the URL of the state's cloud storage provider on the public internet. There was also a ransomware attack that slowed the government to a crawl until they paid a $23,000 ransom to a group of hackers. Instead of giving into demands, the government refused to pay and decided to start from scratch. 

Read more

Why Calance's Service Desk Outperforms Traditional Service Desks

 

Read more

Transform Data in Talend Open Studio Without Writing ANY Code

With only a few steps and without writing any code, flat file data can be easily transformed and uploaded into BI reporting systems like Roambi using Talend Open Studio (Free).

Read more

5 Ways To Make Your SharePoint Not Look Like SharePoint



So you've invested in SharePoint but you hate the look and functionality? This is a common concern with users that has long made the program underutilized

Read more

Considering a Cloud IAM Solution? Here’s our recommendation

 Prior to the adoption of the Cloud, business IT was primarily designed for consumption behind firewalls. Often, IT infrastructure was sold to individual business units and inter-organization sharing of IT resources was far and few. 

Read more