Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Beyond the Four Walls—Achieving Upstream and Downstream Inventory Visibility

Infor LX | BPCS | Infor LN | Baan | Infor M3

When an enterprise has many suppliers, dealers/distributors, and customers spread out across the globe, it becomes important that it gains better visibility into inventory outside of its direct ownership and control, on both the supply and demand side. On the supply side, the company has outstanding POs and needs reliable estimates of when those will ship, as well as early indications whenever there will be delays in shipment. Once shipped, updates on the estimated time of arrival (ETA) are important, particularly when there are delays.

This external visibility is even more important during times of disruption. Early visibility into disruptions in supply or rapid changes in demand is key to providing the intelligence to drive agility. By responding earlier, faster, and with more accurate intelligence, a company has more options, makes smarter decisions, and avoids catastrophes.

How do you get that visibility? Here are some options…

• EDI—EDI can provide POs (EDI 850) for orders, ASNs (EDI 856) to communicate what has been shipped, Inventory Inquiry/Advice (EDI 846) with updates to on-hand inventory at various holding locations, including status (on hand, committed, on order, etc.), forecasts (e.g. EDI 830 planning schedule with release), shipping schedules, and other useful information about inventory in transit or at rest. EDI can be challenging for a smaller company to implement, especially without the right partner and solution. For this reason, not all suppliers or customers will necessarily have EDI. In those cases, an alternate approach, such as a portal, is needed to serve the remaining non-EDI trading partners.

• Supplier and Customer Portals—Portals provide a way for suppliers or customers who do not have EDI capabilities to update inventory, production, and order status. This requires some training and communications so that the trading partners use the system consistently, properly, and in a timely manner. (Portals to ERP for Infor LN & Baan Only)

• External Inventory Locations/Accounts—Some ERP systems allow supplier or customer stocking locations to be set up within the solution, so those locations look like another distribution center or plant, but with the inventory in those locations not being owned by the company. Personnel at the supplier or customer can then be given an account within the ERP system to update their inventory information. The account may provide additional functionality to the supplier or customer as well. If the trading partner actively uses the system to run a part of their operations, the data are more likely to be timely and accurate.

• API Integration—Trading partners may provide inventory data via an API in the ERP system.

• Planning Solutions—provides the ability to proactively manage the entire customer order backlog from top to bottom. It begins monitoring orders as soon as they’re booked and identifies and prioritizes those critical events that must happen every day so they can be managed and get orders produced and shipped on time. (OTTO - On Time Orders for Infor LX, BPCS & M3 Only)

Now more than ever, good inventory management, with accurate inventory data, is a core element of success for manufacturers and wholesale distributors. Having the right products, in the right place, at the right time, in the right quantities—and doing so at a low cost—drives profitability, cash flow, customer loyalty, and success for a company. This can be a difficult balancing act, especially when demand is volatile and supply disruptions occur. It can be achieved with the right inventory strategy, process disciplines, risk management, and capable systems in place. Excellence in inventory management, with the right systems, is key to enabling businesses to survive in challenging times and thrive in the market during good times.

Not sure where to start? Crossroads RMC consultants have expertise with all of the options listed above and can help you realize optimal inventory management, regardless of the size of your organization. 800.762.2077, solutions@crossroadsrmc.com, or ask us to contact you.

Previous Article And Then There Were None - Short Staffed?
Next Article Manufacturing vs. Finance: Who wins?
Print
25218 Rate this article:
5.0
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

TECHNOLOGY: Facility Security Ranges

Previously, a user could complete the Cost Transfer (CST920) process for any range of facilities regardless of their security settings established in SYS600. This enhancement verifies the user security settings set up in SYS600 before processing cost transfers for a range of facilities in CST920. If the user has authority for a facility range, but there are facilities within that range that are not authorized, the program skips those facilities and completes the cost transfer process.

FINANCE: Expiration Date for Quotes and RMAs

A Cancel-by-Date has been added to the Quote Header and RMA Header panels. This optional field can limit how long a quote or authorization to return items for credit is valid.  

For quotes, this enhancement provides an optional end date for the quote. For RMAs, it provides an optional date by which the customer must return the items to receive the credit listed on the RMA.

The Cancel-By-Date prints on the Order Acknowledgement and RMA Acknowledgement to inform the customer of this important limitation to the quote or return authorization. 

An Order Entry user cannot copy the quote to create a new order if the Cancel By Date has caused the quote to expire.

OPERATIONS: Default Split Salesperson to Customer Orders

Sales commissions are based on combinations of the Primary, Split, and Line-Level salesperson and the commission codes defined for the customer and item. You can now define the Split Salesperson in the same master files as the Primary Salesperson. While the Primary Salesperson is mandatory, the Split Salesperson is optional. It defaults during Order Create using the identical hierarchy as Primary Salesperson. Using Split Salesperson provides more flexibility in the calculation of sales commissions. The ability to define a default Split Salesperson improves the accuracy of sales commission qualification and calculation and reduces maintenance and adjustments necessitated by corrections.

Previously, a user could complete the Cost Transfer (CST920) process for any range of facilities regardless of their security settings established in SYS600. This enhancement verifies the user security settings set up in SYS600 before processing cost transfers for a range of facilities in CST920. If the user has authority for a facility range, but there are facilities within that range that are not authorized, the program skips those facilities and completes the cost transfer process.

12345678910Last

Theme picker

Tips: LN | Baan

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.

The Use Customer Requested Delivery Date parameter has been introduced in the Sales Order Parameter (tdsls0100s400) session, which is used to track the customer’s requested delivery date.

If this parameter check box is selected, various additional date fields become available to track the customer Initial Requested Delivery Date and the Original Promised Planned Delivery Date.

First5859606163656667Last

Theme picker

Categories