Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Baan / LN Tip: Pro Forma

Kathy Barthelt 0 37355 Article rating: 5.0
Pro Forma invoices can be issued based on order or delivery. If you choose delivery, the pro forma can be linked to the final sales invoice through the sub-session “Related Invoices.”  However, this requires the sales order step “Release to Sales Order/Schedules to Invoicing” to be a manual step. If it is automated, the order will be sent to Invoicing 360 directly and the link to the final invoice will not be made.

Does your existing data collection equipment and barcode label printers need some love and attention?

BPCS & Infor LX

Anthony Etzel 0 26899 Article rating: 5.0

Crossroads RMC knows that new equipment is not something that everyone can or wants to include in their budget. Sometimes you need to make due with what you have. We are proud to partner with a local company that repairs existing data collection equipment, and sells refurbished devices as well.

Want to bring a little life back into your equipment and extend their use? Contact us today to see if your data collection equipment can be given new life! 

Anthony J Etzel – Solutions Executive
Crossroads RMC
Phone: 1.630.955.1310, x125 | Cell: 1.610.220.5089
aetzel@crossroadsrmc.com

Infor's Support Schedule for LX & BPCS

Anthony Etzel 0 36055 Article rating: 5.0

Infor recently announced their support schedule for all versions of BPCS/LX. Not sure what your company’s strategy should be moving forward?

Let us help you figure out the best path forward for YOUR company. Our goal is to put you on a path that ensures that you are supported and that your needs are met today and in the future without breaking the bank. Learn More>
 

Conversion of SiM Tasks for WFi Workflows

Anthony Etzel 0 40569 Article rating: 5.0

This enhancement simplifies access to LX programs that are available through System i Manager (SiM), as well as Workflow for System I (WFi). This provides an easy way to promote common WFi business processes from one LX environment (for example, test or environment) to another LX environment (for example, production). 

LX also provides a set of four-character task codes that can be used within SiM, System i Workspace (SiW), and WFi, for default programs in LX. These predefined LX task codes begin with 0,1,2,3, or 4. Users can specify task codes for their custom programs that are flagged as valid menu options in LX, but these task codes cannot begin with 0,1,2,3, or 4. Users can specify the task codes in Infor LX Object Master Maintenance, SYS625D. This enhancement provides simplified access to LX programs that are flagged as valid menu options in System i Manager and Workflow for System i environments. In SYS625D, The user can also specify task codes in SYS625D for customized programs that are flagged as valid menu options.

Does your existing data collection equipment and barcode label printers need some love and attention?

Kathy Barthelt 0 28762 Article rating: 5.0

Crossroads RMC knows that new equipment is not something that everyone can or wants to include in their budget. Sometimes you need to make due with what you have. We are proud to partner with a local company that repairs existing data collection equipment, and sells refurbished devices as well.

Want to bring a little life back into your equipment and extend their use? Contact us today to see if your data collection equipment can be given new life! 

Kathy Barthelt – VP Sales
Crossroads RMC
Phone: 1.630.955.1310, x113 | Cell: 1.630.408.7759
kbarthelt@crossroadsrmc.com

Do you have spreadsheets and separate databases that may or may not be tied to Baan/LN?

Kathy Barthelt 0 29486 Article rating: 5.0

Do you have spreadsheets and separate databases that you’re keeping on the side that may or may not be tied to Baan/LN?

-Do you wish they were integrated so that you didn’t have to manually go into each system to report on the data or look up information? 
-Are you running into problems because you don’t have exposure to all of the data that is critical to running your business?

Crossroads RMC has a team of integration experts who can create the integration you’ve been dreaming about… AND we have developed RMCconnector to allow for quick and easy translation data from your front end system into a format accepted by your back end ERP. 

Learn More

Baan/LN Tip: Saving Space in Your General Ledger

Kathy Barthelt 0 38893 Article rating: 5.0

Compressing Integration Transactions

One way to save space in your general ledger is to compress integration transactions. The transactions are combined into one ledger account number. However, the detail is still available in the integration transactions sessions.

The compression is seen after the transactions are finalized. 

Compression is established in the mapping scheme by checking the box under the columns “Compression of Debit/Credit Transactions". This can only be done in a mapping scheme that is not activated. 

BPCS/LX Tip: Backup and Save options

Anthony Etzel 0 30209 Article rating: No rating

Users are no longer limited to backing up or saving files to a tape or diskette.They can now use a Save File (SAVF) to save data and objects. LX programs that perform saves and/or backups were modernized to add a new SAVF option.  

There were numerous places in LX where users are prompted to save a file or library. These screens have options for tape or diskette. Diskette refers to the old 8” diskettes used on System/38. These devices are outdated and virtually obsolete. The current means of saving objects on the IBM i, is through the use of a Save File (SAVF). This compresses the data into a single object that can be saved and is easily transferred between systems.

These objects were modified and/or created for this enhancement:

  • Backup Simulation (FOR630C, FOR630D, FOR630FM, FOR640HT, and FOR630HT)
  • Month End Close (INV903D, INV903FM, INV901C, and INV903HT)
  • Purge YTH/Restore Archived Lots (INV912C, INV912D, INV912DHT, and INV912FM)
  • Purge and Save ITH records (INV932C, INV932D, INV932FM, and INV932HT)
  • Labor Ticket Save (SFC905D, SFC905FM, SFC901C, and SFC905HT)
  • Backup Infor LX Files (SYS700C, SYS700D, SYS700FM, and SYS700HT)
  • Backup Infor LX Programs (SYS710C, SYS710D, SYS710FM, and SYS710HT)
  • Backup Infor LX Source (SYS740C, SYS740D, SYS740FM, and SYS740HT)
  • Save File Name Selection (SYS912D, SYS912FM, and SYS912HT)


Benefit

Use the Backup Simulation to copy a simulation file to a SAVF or tape. Users may want to do this to transfer simulation data from one system to another, from site to site, or to save the data before permanently deleting it from the system.

RSS
First5960616264666768Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

Crossroads RMC Tip of the Week: How to Prevent Your Company From Being a Victim of Ransomware

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.
Previous Article Infor LN & Baan Tip of the Week: Customer Requested Delivery Date – 10.7
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
59380 Rate this article:
3.5
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories