Confidence with cloud-based warehouse management

Issue 6 2021 Logistics (Industry), Integrated Solutions, Infrastructure

When companies rely on a dated warehouse management system (WMS) to run distribution centres, it’s not uncommon for the IT staff familiar with the system to move on. Unfortunately, this leaves the company without an in-house expert to manage issues as they arise. Added to this, if the original vendor is no longer supporting that version of the system, it can be incredibly difficult to get the system back up and running.


Phil Lewis.

“Over time, each organisation builds the distribution ecosystem that uniquely addresses its needs. The challenge emerges when only a handful of people understand how to manage and maintain that system successfully and perhaps only one individual truly understands the complete picture,” says Phil Lewis, Infor’s VP of Solution Consulting EMEA. “With a mission critical WMS and corresponding data at the very core of the business, any scenario that puts it at risk can be detrimental to getting products out the door.”

For many organisations, the realisation that the ‘go-to’ people who fully understand all the nuances in the business’ operations – and the systems that support them – are no longer there, comes too late. Whether this loss comes through resignation, retirement, health issues, or merger and acquisition, finding replacements when running a legacy on-premises WMS can become an exceedingly difficult task. How can organisations ensure the continuity of day-to-day operations with the potential loss of technical expertise?

One of the ways to mitigate this risk is to accelerate cloud migration. By shifting the WMS to the cloud, organisations are supported by a comprehensive solution that is continuously updated. This guards against new trends forcing upgrades to the system down the road. “A trusted cloud partner should have a substantial investment in IT personnel that would be difficult for some of the largest organisations to match. A small army is dedicated to monitoring the organisation’s WMS and its data to ensure both optimisation and protection,” adds Lewis.

A recent CIO tech priorities survey by IDG showed that “despite increased budgets and interest in new technologies that can positively impact business in the future, organisations still face familiar challenges to adoption. The top challenges that IT leaders encounter are lack of sufficient budget (48%), lack of staff (46%) and lack of skill sets (42%).” It’s time to shift the responsibility of managing and maintaining the organisation’s WMS over to a cloud provider with modern capabilities. “With this approach, organisations will not only create an opportunity to reset expectations and priorities for their IT staff, but also ensure their WMS always has the support it needs to stay up and running so that customers receive their orders on-time and in-full,” concludes Lewis.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.