Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

An ERP System Review is NOT a Report Card

It's a no-judgment-review - we promise!

Kathy Barthelt 0 21644 Article rating: 5.0

report card C minusWe all remember our school days and the nervousness that we felt when it came time to get our grades. Even if we were doing well, we were still nervous. Sometimes we experienced that same nervousness when it came time for a performance review in our job. Nervousness…sometimes dread…knowing that our performance maybe was not what we wanted it to be, or others expected it to be. 

Somehow I think the feelings that we felt in our past often find ways to creep into our present. I have seen this recently when I suggested an ERP system review to one of our customers. They immediately became flustered and thought about every possible problem that they knew existed within the software and how they were currently using it.

An ERP system review or more specifically a Utilization Review is NOT a personal report card, or performance review showing how well a particular individual does his/hers/their job, nor is it an attack on the team that implemented the software. 

An ERP Utilization Review will:

Infor LN & Baan Finance Tip: Unallocated Payment

Kathy Barthelt 0 24798 Article rating: 5.0

How do I assign an unallocated payment to a purchase invoice when the document dates are not the same?

When trying to assign an unallocated payment, it is possible that the purchase invoice is not displayed in session Assign Unallocated / Advance Payments to Invoices (tfcmg2106s000), even though it is showing in the open entries. This can happen when the document date of the unallocated payment lies before the document date of the purchase invoice you want to assign it to. There are 2 ways to handle this...

Infor LX & BPCS Tip: What items should be M-P-S planned vs. M-R-P planned?

George Moroses 0 23508 Article rating: 5.0

Master Scheduled Items are those items that are finished goods, or service items, that receive their requirements either specifically from Independent demand, or both Dependent and Independent demand.

  • Independent Demand is demand that cannot be calculated from higher-level demand in the product structure, and therefore must be either a forecast or an actual customer order (Finished Goods or Service parts sold to customers).
  • Dependent demand.....

Infor LN & Baan Tip: Separate item codes for incoming & outgoing subassemblies

Kathy Barthelt 0 13256 Article rating: 5.0

You may be wondering if it's necessary to have separate item codes for incoming and outgoing subassemblies.

No, it is not necessary to have separate item codes for incoming and outgoing subassemblies, but it is recommended. In theory, you could have only one item code with the description subassembly and use the same item code for the outgoing subassembly and for the incoming subassembly. However, when monitoring inventory movements and financial integration transactions, it will be difficult to understand the process. Also, the costing logic is much clearer when different item codes for the incoming and outgoing subassemblies are used. Because of this, it is advised to use a different item code for the outgoing subassembly and a different item code for the incoming subassembly.

Infor LX & BPCS Tip: Changing an item to non-inventory

George Moroses 0 10665 Article rating: 5.0

When an attempt is made to change an item’s type to a non-inventory item from any other value, a new validation is performed to determine if the item has any inventory on hand and, if so, prevents changing the item’s type.

This enhancement available in LX 8.4 prevents LX from showing an on-hand inventory balance for a non-inventory item.

The programs or areas impacted include:

  • Facility/Planning Data Maintenance, MRP140D2
  • IDF Enterprise Item

To get this enhancement, request and apply MR 80120.

Top 10 Things (you might not know) About Crossroads RMC

Crossroads RMC 0 10660 Article rating: 5.0


10.  Crossroads RMC has been in business since 1984 & has been an  partner since 1991
 

 9. Crossroads RMC offers functional & technical training on all versions of Infor LX, BPCS, Infor LN, and Baan and will completely tailor the training to your specific needs. 🤝🏽

 8.  Our consultants have over 1,000 years of combined experience working with manufacturers just like you! 🤓

 7.

 6.

 5.

 4.

 3.

 2.

 1.

RSS
First1011121315171819Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

Crossroads RMC Tip of the Week: How to Prevent Your Company From Being a Victim of Ransomware

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.
Previous Article Infor LN & Baan Tip of the Week: Customer Requested Delivery Date – 10.7
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
58838 Rate this article:
3.5
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories