As you may have heard, GraceBlood LLC acquired Aurora Technologies back in October of this year. We will now be revisiting our Biography Series to include GraceBlood's amazing team of consultants and today we are featuring Lisa Crosley. Lisa has been an EDI consultant with GraceBlood for 12 years. She initially worked with GraceBlood as a client EDI coordinator so when her company closed their US distribution operation, Karen and AMY wasted no time in bringing Lisa on board.
Picture appears courtesy of frankieleon. How many times have we gotten frustrated because the software on the computer or our phone changed with an update or upgrade, causing us to have to search for a function that once was so simple to find like changing the display characteristics on the computer? Seems like it never ends - just when we think we know what we are doing in our golden years, we have to learn something new….real golden!
Picture appears courtesy of Christian Witte. It’s getting hot out there…and I’m not talking about climate change. Our garden is not doing well, but that’s a topic for another day.
I get many calls each month from suppliers who have been told by their customer that they need to be EDI capable. And their first question is, "What is EDI capable?" Simply stated, being EDI capable is the capability to send and receive electronic business documents in a specific format based on established standards. There are essentially two ways to accomplish EDI capability: Outsource or buy your own software.
Photo appears courtesy of Phill Dolby. I spend a lot of time each summer trying to streamline and automate as many of our processes and procedures as I can. It saves time and, if done correctly, makes our data more accurate and timely. I feel taking the time to do this is well worth the effort and it makes us more profitable in the long run as it frees me up to do other things.
Photo appears courtesy of F Delventhal. This week's blog was written by Aurora Manager of EDI Hosting, Kim Zajehowski. Many of you probably know about the new requirements coming regarding SHA2 digital certificates. Before we discuss that, let's first look at SHA-1. What is SHA-1? According to Wikipedia, in cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal Information Processing Standard published by the United States NIST. SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. A SHA-1 hash value is typically rendered as a hexadecimal number, 40 digits long.
I’m reminded of the famous line from the 1967 movie Cool Hand Luke: ”What we have here is a failure to communicate.” I have found that many newly EDI compliant companies, as well some EDI veterans, are not aware that there are multiple methods of sending and receiving EDI documents.
This week's blog was written Aurora's Manager of EDI Hosting, Kim Zajehowski. Having been deemed the “AS2 Queen” in EDI circles, I thought it would be nice to summarize five of the most common mistakes that I have encountered in working with AS2 connections and support. The AS2 communication protocol for EDI can be a very cost efficient solution for companies wanting to exchange documents directly with their EDI trading partners to encrypt and secure their EDI data. This protocol can also be used to connect to VANs as well. It can be tricky though to set up especially when it is your first time doing an AS2 connection with a trading partner or VAN. Once the setup has been completed and your firewall supports it, it does get a bit easier each time you set up another AS2 connection.