Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

George Moroses
/ Categories: ERP News, Event / News, IDF

IDF News: IDF Maintenance

The Infor Development Framework (IDF) provides two options that you can use to review information about jobs that are in the job queue or underway at the workstations and change the status of unattached jobs or review detailed information for specific unattached jobs.

                Option 5 – Job Status Maintenance: Use this option to review information about jobs that are in the job queue or underway at the workstations. You can also delete records of jobs in the Job Activity (JOBACT) file.

                Option 6 – Unattached Job Status Maintenance: Use this option to change the status of an unattached job. You can also review detail information for a selected unattached job.

Previous Article About 65% of the world’s population are visual learners. This extends into the ERP software realm, too.
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
31302 Rate this article:
5.0
George Moroses

George MorosesGeorge Moroses

Other posts by George Moroses

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Happy New Year! January is always a great time to reflect on the prior year – what went well, and what didn’t. It is also the obvious time to plan for the coming year – what do I want to accomplish and how can I best achieve my goals?

As the saying goes, “you can’t improve what you can’t measure”, so if you haven’t already, it is time to start putting processes, procedures and programs in place within your company to measure how well each department is doing against their objectives. Start to analyze your numbers and publish them internally. Where are you at currently? Where do you want to be? Seeing both sets of numbers pushes employees to hit those targets. Do this now, and you’ll be seeing positive results before you know it!  

Optimize Your Manufacturing Today!

First104105106107109111112113Last

Theme picker

Categories