Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Infor LN & Baan Tip of the Week: Limitations of Customer Defined Fields (CDFs)

Kathy Barthelt 0 25936 Article rating: 5.0

Customer Defined fields are fields that can be added to tables, screens, reports, and BODs. Validation and calculation logic can be defined around those fields. This gives you great added capability and flexibility… however, are you aware of the limitations of using CDFs?

  • You cannot define customer-defined fields for tables within Tools (the tl and tt packages).
  • External integrations.....

Infor LX & BPCS Tip of the Week: Credit Card Processing Within LX

George Moroses 0 18318 Article rating: 5.0

The Credit Card Data Area program, SYS045D, enables you to create and maintain a configuration file that provides a gateway to a third-party payment application. The information you set up with this program is required to allow Infor LX to communicate with the credit card processing application that passes credit card payment information between Infor LX and the credit card providers.

Access: SYS menu

  • Use the Credit Card Data Area screen, SYS045D-01, to...

Infor LX & BPCS Manufacturing Tip of the Week: Backward Scheduling

George Moroses 0 18776 Article rating: 5.0

Operations are automatically backward scheduled at shop order release time. The backward scheduling algorithm starts with the shop order due date and schedules each operation based upon the standard move and queue times in the routings and the number of days the job is expected to run at standard. The system calculates and stores the operation scheduled start date. The dates may be modified by the shop order maintenance program. The number of days that a job is expected to run an operation is dependent upon the available capacity for that work center and the total hours scheduled for that operation.

The backward scheduling algorithm also considers...

Infor LN & Baan Finance Tip: How to clear balances on invoices that will be moved to a new company

Kathy Barthelt 0 24186 Article rating: 5.0

To clear out the balances of outstanding invoices that will be added into new companies or moved into new companies, credit notes could be created for them and have them linked to all the invoices of one customer/supplier. 

Another option is to...

Crossroads RMC's support team is friendly, well trained, experienced, and committed to resolving your support & technical issues as quickly & effectively as possible.

Crossroads RMC 0 20960 Article rating: 5.0

How good would you feel if you knew that 30+ years of ERP manufacturing experience was on the other end of the phone when you placed a support call?

That’s what our customers get when they call Crossroads RMC for help.

Crossroads RMC offers a number of services to help you make the most of your Infor ERP investment, regardless of the version of Infor LX, BPCS, Infor LN, Baan, or Infor M3, you are running. Our support team is friendly, well trained, experienced, and committed to resolving your support and technical issues as quickly and effectively as possible. To ensure all your support needs are met, we offer several different methods:

  • TELEPHONE SUPPORT:
    Our phones are answered by live representatives to ensure that you receive prompt, personal, and efficient assistance. These services are available Monday through Friday 8:30 am to 5:00 pm ET. We also offer standby support and after-hour support when requested.
  • ONLINE SUPPORT:
    Online support is available by logging onto your system using a remote connection. With a live connection, our consultants are able to view your system and troubleshoot issues in real-time.
  • REMOTE & ON-SITE CONSULTING:
    Consulting is an excellent option if more in-depth service, training, or troubleshooting is needed. End-User training or group custom training on new features and solutions is also handled effectively using this method of support.
  • BUSINESS ASSESSMENTS:
    Experienced Crossroads RMC Consultants will compare your existing business processes with your existing software and put together a detailed report of their findings. This includes recommendations for improving the day-to-day running of your business while getting the maximum benefit from your software. This also ensures that you are up to date with any features and technologies without adding disruption to your business.

Learn more about our support services>

RSS
First2526272830323334Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

Crossroads RMC Tip of the Week: How to Prevent Your Company From Being a Victim of Ransomware

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.
Previous Article Infor LN & Baan Tip of the Week: Customer Requested Delivery Date – 10.7
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
58838 Rate this article:
3.5
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories