Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Kathy Barthelt
/ Categories: Event / News

Crossroads RMC partnered with Electrolux Corporation to Connect Baan IVc4 to Vertex 8.0 (O Series)

Vertex Q to Vertex O… the ABC’s of tying this to Baan IV

Crossroads RMC partnered with Electrolux Corporation to Connect Baan IVc4 to Vertex 8.0 (O Series), and was able to successfully complete this project in under 3 months. This project was completed using Crossroads RMCconnector as a web service to read the Vertex tax data and pass the information back into Baan for further processing. Triggers were created to handle the following processes:

  • Sales Order Lines
  • Print/Reprint Order Acknowledgement
  • Print Sales Invoice (Both compose and final)
  • Purchase Order Lines
  • Purchase order Acknowledgement
  • Purchase Order invoice
  • Manual Finance Invoice (Compose, print and post)
  • Post Integration transactions
  • Finalize batch
Previous Article Nazdaq has released Version 3.0 of B2Win Suite
Next Article Flexfab Expands Their Use of Crossroads RMC Data Collection for All LN Installations Globally
Print
16714 Rate this article:
No rating
Kathy Barthelt

Kathy BartheltKathy Barthelt

Other posts by Kathy Barthelt

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Tax reporting is part of the financial accounting and is restricted to one country. Therefore, the LN tax handling in a multi-company structure is similar to the tax handling in a single company environment.

Tax handling in LN includes the following:

· Tax registration

For tax registration, you define the various tax details for each country in the Taxation module. In the General Ledger module of Financials, you specify the ledger accounts for the tax amounts separately for each financial company. LN can post the tax amounts calculated for a tax code to different ledger accounts in the individual financial companies, for example, in a single logistic, multi-financial company structure.

The advantages of virtualization include the following:
 

• You get more out of your existing resources. Pool common infrastructure resources and break the legacy “one application to one server” model with server consolidation.

• You can reduce datacenter costs by reducing your physical infrastructure and improving your server to admin ratio. Fewer servers and related IT hardware means reduced real estate and reduced power and cooling requirements. With better management tools, you can improve your server to admin ratio so personnel requirements are reduced.

• You can increase the availability of hardware and applications for improved business continuity.

• Securely back up and migrate entire virtual environments with no service interruptions. Eliminate planned downtime and recover immediately from unplanned issues.

• Gain operational flexibility. Respond to market changes with dynamic resource management, faster server provisioning, and improved application deployment.

 

The disadvantages of virtualization include the following:

 Virtualization adds overhead to the CPU, memory, IO, and network.

 Virtualization adds an additional layer to the hardware and software stack. Therefore, additional complexity is introduced in the following circumstances:

First138139140141143145146147Last

Theme picker

Categories