Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

BPCS/LX Tip of the Week: Shop Order Release Date

Anthony Etzel 0 33435 Article rating: No rating

The shop order release date is the date that the shop order is scheduled to be released for production.

If you want to use the backward schedule method, make sure the release date is blank and the due date is maintained.

If you maintain the quantity on the shop order and the due date is prior to the system date, the due date and the release date are the same.

Baan/LN Tip of the Week: Plan Codes

Kathy Barthelt 0 43555 Article rating: No rating

In Baan IV, plan items exist within the context of a plan code. A plan code includes only items of the MPS Item item type. Planned orders are independent of a plan code. Users can compare plan codes by means of the Plan Code Performance Comparison (cprmp4504m000) session.

The scenario concept in Infor LN replaces the plan code concept in Baan IV.

In Infor LN, the basic data for plan items is the same for all scenarios. However, users maintain not only the master plan within a scenario, but the planned orders as well.

For example, for each scenario, Users can specify:

  • Special demand for an item.
  • The availability of resources (in the Scenario – Availabilities (cprpd4160m000) session).
  • The sourcing strategies and supply strategies.

Users can compare scenarios by means of the Performance Indicators (cprao2201s000) session.

Filtec Selects Crossroads RMC for Baan Data Collection

Kathy Barthelt 0 22152 Article rating: No rating

Filtec, a leading provider of in-line inspection solutions for the food, beverage, and pharmaceutical industries, has selected the Web Collect, formerly RMC3 data collection solution from Crossroads RMC for their Baan IV system. Filtec plans to implement Labor Reporting and Report Operations Complete as part of this project with the goal of eliminating manual data entry and gaining better visibility to gap time. The project is scheduled to go live in early November 2015.

RSS
First134135136137139141142143Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

LN & Baan | LX & BPCS Tip: 9 Tips for Secure Manufacturing Business Systems Through OT Cybersecurity Vulnerability Management

Infor LX, BPCS, Infor M3, Infor LN & Baan

Always happy to share a good article on protecting your business from cybersecurity threats. 

9 OT Cybersecurity Strategies To Secure Manufacturing Industries

By Will Fastiggi - Technology for Learners - January 23, 2023

Let’s delve into the details of how to secure manufacturing industries through OT cybersecurity vulnerability management. Below are some tips and tricks.

1. Implement a Defense-in-depth Strategy 

This approach involves using multiple layers of security controls to protect against cyber threats. Manufacturing industries can use the following strategies:

  • Firewalls
  • Intrusion prevention systems
  • Network segmentation 

These listed security controls isolate OT cybersecurity systems from the rest of the network.

2. Perform Regular  Vulnerability Assessments 

As mentioned above....

Read full article: https://technologyforlearners.com/essential-tips-and-tricks-for-securing-manufacturing-industries-through-ot-cybersecurity-vulnerability-management/

Previous Article Infor LN & Baan Tip: What Data Can Be Archived or Deleted?
Next Article Infor LN & Baan Tip: 15 Reconciliation Steps for GRNI Transactions
Print
16196 Rate this article:
5.0
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories