Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Is Your Infor ERP System the Elephant in the Room?

The Infor ERP Elephant in the Room That Must Be Addressed

In a recent survey of Infor ERP customers, we discovered that 50% of respondents said that they did not know whether or not their ERP system had the features and functionality required for their business.  50%....1 out of every 2……not good.

Why is this the case? Well, the causes can be traced back to one of the following reasons:

  • A key-person has retired or left the company and their knowledge left with them.
  • Systems were implemented based on how the previous system worked.
  • Upgrades and implementations were viewed as a “technical upgrade”, meaning that the upgrade was done to get off an old or outdated platform. All the new features and functionality weren't researched so they are unknown and no one could be trained on them.


You may say “So what? Who cares if our team doesn’t know what else is available, or how the rest of the ERP system functions? Does it really matter?” It matters more than you think.

If you rely on an Infor ERP system to get your job done, you need to not only know what sessions to run, what fields are required, and what reports provide results, you also need to understand how the transactions impact the rest of the system. Without that understanding, you are inadvertently creating a departmental silo which can have a negative impact on the performance of the ERP for the rest of the company. 

Not knowing the functionality of the ERP results in limited use of the system as a whole. In my 25 years working with ERP systems, I have seen many cases where a company becomes frustrated with the limitations of the system only to discover that they were only utilizing 10-20% of the ERP system's capabilities. The system didn’t impose the limitation…it was the use of the system, or shall I say the lack of it, that was the culprit.

To be competitive in today’s economy, an ERP system should be able to move in lockstep with a business as its needs change. In order for this to happen, the entire company needs to be willing to change too. Part of this change involves taking advantage of the best practices that are built into the Infor ERP system. If you're not sure how to do that - you are not alone! Fully understanding your Infor ERP requires a team of capable users in each key department of your organization to marry the capabilities of the ERP system with your business objectives. Sounds complicated? Well, it doesn't stop there. Your team of capable users needs to communicate between the key departments to make sure one department's procedures don't handicap any other department. Once this level of understanding and communication is established, decisions can be made to take advantage of the most effective way to minimize costs, increase efficiency, improve quality and deliver the highest level of customer service possible…everything you invested in the Infor ERP system for in the first place, is now unleashed.

Not sure where to start? Crossroads RMC's consultants have this exact expertise and the skills to get you through tough times. Our expertise comes from years of experience, and best practices to evaluate your business processes and identify areas where improvement is needed. Whether you need to increase the return on your ERP investment or have no idea what to do next, our comprehensive ROI business case, cost estimates, benefits, and a plan of action will supply you with the information you need to add value to your business.

Request a free phone consultation>  or contact us to learn how to get started> solutions@crossroadsrmc.com  |  800.762.2077

Previous Article Infor LN & Baan Tip of the Week: Year End for Finance
Next Article How well does your ERP Serve your MaterialsĀ team?
Print
29589 Rate this article:
5.0
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

TECHNOLOGY: Facility Security Ranges

Previously, a user could complete the Cost Transfer (CST920) process for any range of facilities regardless of their security settings established in SYS600. This enhancement verifies the user security settings set up in SYS600 before processing cost transfers for a range of facilities in CST920. If the user has authority for a facility range, but there are facilities within that range that are not authorized, the program skips those facilities and completes the cost transfer process.

FINANCE: Expiration Date for Quotes and RMAs

A Cancel-by-Date has been added to the Quote Header and RMA Header panels. This optional field can limit how long a quote or authorization to return items for credit is valid.  

For quotes, this enhancement provides an optional end date for the quote. For RMAs, it provides an optional date by which the customer must return the items to receive the credit listed on the RMA.

The Cancel-By-Date prints on the Order Acknowledgement and RMA Acknowledgement to inform the customer of this important limitation to the quote or return authorization. 

An Order Entry user cannot copy the quote to create a new order if the Cancel By Date has caused the quote to expire.

OPERATIONS: Default Split Salesperson to Customer Orders

Sales commissions are based on combinations of the Primary, Split, and Line-Level salesperson and the commission codes defined for the customer and item. You can now define the Split Salesperson in the same master files as the Primary Salesperson. While the Primary Salesperson is mandatory, the Split Salesperson is optional. It defaults during Order Create using the identical hierarchy as Primary Salesperson. Using Split Salesperson provides more flexibility in the calculation of sales commissions. The ability to define a default Split Salesperson improves the accuracy of sales commission qualification and calculation and reduces maintenance and adjustments necessitated by corrections.

Previously, a user could complete the Cost Transfer (CST920) process for any range of facilities regardless of their security settings established in SYS600. This enhancement verifies the user security settings set up in SYS600 before processing cost transfers for a range of facilities in CST920. If the user has authority for a facility range, but there are facilities within that range that are not authorized, the program skips those facilities and completes the cost transfer process.

12345678910Last

Theme picker

Tips: LN | Baan

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.

The Use Customer Requested Delivery Date parameter has been introduced in the Sales Order Parameter (tdsls0100s400) session, which is used to track the customer’s requested delivery date.

If this parameter check box is selected, various additional date fields become available to track the customer Initial Requested Delivery Date and the Original Promised Planned Delivery Date.

First5859606163656667Last

Theme picker

Categories