Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Manufacturing Automation at a 'Crossroads' for IBM i Shops

IT Jungle by Alex Woodie

Crossroads RMC 0 30487 Article rating: No rating

Manufacturers across the country rely heavily on their MRP or ERP systems to automate the handling of resources. That's what the "R" stands for, after all. But it turns out that MRP and ERP systems leave a whole lot to be desired when it actually comes to managing resources--including raw materials and labor--on the shop floor. That's where companies like Crossroads RMC and its manufacturing execution system, Crossroads MES comes into play.

Read Full Article: https://www.itjungle.com/tfh/tfh071315-story01.html

Baan/LN Tip of the Day: Release Commissions/Rebates to Invoicing

Kathy Barthelt 0 3103 Article rating: No rating

In Baan IV, this session is called Release Commissions/Rebates to Invoicing (tdcms2201m000) and is used to set the status of the commissions/rebates to Reserved, or Closed. In Infor LN, this session is only used to set the status to  Closed. Users can reserve commissions/rebates in the Reservation and Approval of Reserved Commissions/Rebates (tdcms2202m000) session. In addition, the following fields are added to the Release Commissions/Rebates to Invoicing (tdcms2201m000) session:

▪ Commissions to Accounts Payable

▪ Rebates to Central Invoicing

BPCS/LX Tip of the Day: How Does LX Fit in With Just-In-Time?

Anthony Etzel 0 364 Article rating: No rating

For years, repetitive manufacturing industries have been applying many of the principles in Just-in-Time philosophy. They have established balanced production lines that depend on a steady flow of material to each work station. They schedule production in daily or weekly rates rather than in discrete shop order lots. They track finished inventory by work center rather than by job. They typically backflush stock balances (decrement stock balances upon completion of specific manufacturing steps rather than issued at the beginning of each production run).

 

Costing is typically based upon a daily rate or hourly rate rather than being associated with specific shop orders. 

 

Repetitive manufacturers use MRP II software adaptable to their environments

in the following key areas:


 Product definition

 Inventory tracking

 MRP/Master Scheduling

 Shop Floor Control

 Purchasing

 Costing

BPCS/LX Tip of the Day: What is Just-In-Time?

Anthony Etzel 0 313 Article rating: No rating

Just-in-Time (JIT) is a management philosophy that focuses on minimizing the resources necessary to add value to your products and to operate your factory in ways that eliminate waste. Resources are labor, materials, equipment, space, and time. Waste is anything that does not add value to your products. Moving work-in-process from place to place, stacking and sorting, investing capital in large work-in-process and raw material inventories, inspecting materials at your vendors' sites, and tying up warehouse space with finished goods are all activities that add cost, not value, to your products. 

JIT is a process that reduces lead time. JIT does not replace an MRP, an inventory program, a scheduling technique to bypass your Master Schedule, or a materials management project. JIT is the never-ending commitment of everyone, from top management to your workers on the floor, to maximize your effectiveness through continuous, incremental improvements.

RSS
First142143144145147149150151Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

Crossroads RMC Tip of the Week: How to Prevent Your Company From Being a Victim of Ransomware

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.
Previous Article Infor LN & Baan Tip of the Week: Customer Requested Delivery Date – 10.7
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
58838 Rate this article:
3.5
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories