Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Anthony Etzel
/ Categories: Infor LX & BPCS Tips

BPCS/LX Tip of the Week: Purchase Order “In Use” Reset Feature 8.3.5

 

This new feature provides the ability to resolve or reset a purchase order or requisition that is no longer being processed, but the system still indicates it is ‘in use’. We all remember those situations where we could never figure out how the order got hung up.

What we previously had to do was run a behind the scenes script to reset the flag so the order was again accessible. This enhancement provides the ability to resolve the issue and resume processes quickly.

This option is now on the PUR menu, and the user can select the Purchase Order/Requisition in Use Maintenance, PUR940D. The user then enters an order or requisition to remove the “In Use” status.

 

Optimize Your Manufacturing Today!

Previous Article Baan/LN Tip of the Week: Advantages / Disadvantages of Virtualization
Next Article 4 Trends Driving High Tech Manufacturers to Collaborate With Non-High Tech Companies
Print
23220 Rate this article:
No rating
Anthony Etzel

Anthony EtzelAnthony Etzel

Other posts by Anthony Etzel

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Happy New Year! January is always a great time to reflect on the prior year – what went well, and what didn’t. It is also the obvious time to plan for the coming year – what do I want to accomplish and how can I best achieve my goals?

As the saying goes, “you can’t improve what you can’t measure”, so if you haven’t already, it is time to start putting processes, procedures and programs in place within your company to measure how well each department is doing against their objectives. Start to analyze your numbers and publish them internally. Where are you at currently? Where do you want to be? Seeing both sets of numbers pushes employees to hit those targets. Do this now, and you’ll be seeing positive results before you know it!  

Optimize Your Manufacturing Today!

First104105106107109111112113Last

Theme picker

Categories