Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Did you know that when you move to LX 8.4, the 100 series maintenance programs will be performed using ...

Anthony Etzel 0 15296 Article rating: 5.0

Did you know that when you move to LX 8.4, 100 series maintenance will be performed using the IDF maintenance programs, and the green screens go away? However, if you have the IDF integrator with 8.3.4 or 8.3.5, you have the ability to create business objects over your own data files along with creating maintenance programs. This would be a great way modernize any old green screen file maintenance that you currently have.

OTTO: How to get started? It’s easy!

Anthony Etzel 0 23462 Article rating: 5.0

The evaluation process for business operations improvements and related software is normally fairly long because it takes time to first understand the software and then to analyze how it will be used. However, how the software works won't truly be understood until it is actually functioning in either a live environment or a simulation of that environment using a reasonably complete test database. 

In order to overcome this challenge we use the following process:

  • Telephone meeting to discuss needs.
  • Webinar to determine common understanding.
  • Load data into OTTO for a live demo.
  • No-obligation trial of the software.

Your only obligation is to supply resources to evaluate OTTO's capabilities. This approach allows you to see exactly how OTTO operates in your specific environment and what benefits you can gain. Several of our customers have actually realized sufficient benefits during the trial-period to justify their purchase of OTTO. Best of all, this evaluation approach offers you extremely low cost and low risk with the potential for high payback in a short period of time.

BPCS/LX Tip of the Week: Purchase Order Receive All Processing

Anthony Etzel 0 26362 Article rating: 5.0

With this enhancement the Purchase Receipts screens are optionally shown with the quantity and weight fields populated with the open value on the purchase order. The screens are now populated with the open value and if the open value is the same as the value received, the user can simply accept the line. The Receive All field on the PUR550D1-01 screen determines whether the receipt lines are populated with the open value. A system parameter controls the Receive All default value but the default value can be overridden.  

If this option is selected, the user does not have to enter the open quantity or weight. If the purchase order receipt has many lines, this option saves time and prevents errors.

Data Collection: Are you able to perform a full cycle count of your inventory in one day?

Kathy Barthelt 0 32035 Article rating: 5.0

Cycle Counting Potential Benefits: 

  • Overall increased inventory accuracy
  • Increased accuracy of count
  • Ability to review and approve count before direct update of Baan / Infor LN tables
  • Elimination of unnecessary re-orders of items with current inventory Greater ability to satisfy customer orders due to greater visibility to (accurate) inventory levels
  • Direct labor cost savings – less staff required for count Increased productivity during count – with some of our customers, counts used to take weeks. They can now complete a count of their entire inventory in one day.
Contact us today to learn more

BPCS / LX Tip of the Week: Purchase Order Print Security Validation

Anthony Etzel 0 27340 Article rating: 5.0

This enhancement allows users to restrict access to purchase order print programs. The purchase order print programs were updated to provide security validation for the user who selects the purchase orders to print. The security validation is controlled by the PO Print Security Validation flag on the Purchasing System Parameters screen, PUR820D-04. This enhancement gives users the option to restrict access to purchase order print programs, providing additional security at the company and warehouse levels.

Infor LN & Baan: Need Accurate Inventory?

Kathy Barthelt 0 29252 Article rating: 5.0

Automate & Streamline Your Current Processes

We know that efficiency is the name of the game and Crossroads RMC has helped manufacturers achieve real results:

  • Better inventory management
  • Increased visibility
  • Reduced operational costs
  • Increased accuracy and much more

Crossroads RMC has solutions to automate and streamline your current processes from receiving all the way through shipping. Work with Crossroads RMC and realize greater benefits from your CURRENT ERP version.

Get Started
RSS
First5758596062646566Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

Crossroads RMC Tip of the Week: How to Prevent Your Company From Being a Victim of Ransomware

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.
Previous Article Infor LN & Baan Tip of the Week: Customer Requested Delivery Date – 10.7
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
59380 Rate this article:
3.5
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories