Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Infor LX and Crossroads MES Selected by Blonder Tongue

Crossroads RMC 0 29386 Article rating: No rating

Blonder Tongue, a global communication equipment supplier for TV broadcasters, cable system operator, lodging video, Internet system, and institutional systems, has selected Crossroads RMC to assist them with a BPCS 6.0.04 upgrade to Infor LX. Crossroads RMC will be providing all applications and technical consulting for this project. Also included as part of the project will be the implementation of the Crossroads MES solution. Go live for both solutions is expected in January of 2018.

BPCS/LX Tip of the Week: LX 8.3.5 Facility Period Close

Anthony Etzel 0 21635 Article rating: 5.0

The Facility Period Close process was introduced in Infor LX 8.3.4 and has been enhanced in 8.3.5. This feature allows continuous or 24-hour worldwide operations in multiple facilities to submit Period End Close jobs for each facility as daily operations cease, or shifts end.

This enhancement provides a batch mode for the Facility Period Close (INV930) process and allows the Update IIM Inventory from IWI (INV931) process to be submitted from the INV930B program. The enhancement also provides a batch mode for the INV931 process.

Optimize Your Manufacturing Today!

Baan/LN Tip of the Week: Order Series Full – Switching to a Different Series

Kathy Barthelt 0 46866 Article rating: 5.0

In general, you can enter a different series in the order field if you have an available series.

To add a new series, find the appropriate group in the First Free Number session, and add a new series and first free number (usually 1).

In Baan IV, go to the Maintain First Free Numbers Session (under Common, Tables, Maintain Logistics Tables, Maintenance 1).
Groups are easily identified (e.g., Purchase Order, Sales Order, etc.).

In Baan V, go to the First Free Number Session (under Common Data, Tables, Logistics). There are number groups (e.g., 570 may be for Purchase Orders, 650 may be for Sales Orders, etc.).

In LN, go to the First Free Number Session (tcmcs0150m000 – it is in different places in the menu under different Feature Packs). There are number groups (e.g., 210 may be for Purchase Orders, 310 may be for Sales Orders, etc.).

BPCS/LX Tip of the Week: Revisit The Last Brilliant Idea

Anthony Etzel 0 19407 Article rating: No rating

Sometimes the best ideas have to be tabled due to competing priorities. That doesn’t mean that the idea was bad. Revisit previously suggested cost savings ideas, or ideas to make a manual process more efficient. Now could be the right time to do something great!

Optimize Your Manufacturing Today!

Baan/LN Tip of the Week: Difference Between a Serialized Item and Unit Effective Item

Kathy Barthelt 0 32444 Article rating: No rating

A serialized item is not the same as a unit effective item. A serialized item has a serial number that is used to identify and track individual items, whereas a unit effectivity item has an effectivity unit that provides some information about the item's configuration. However, an item can be both serialized and unit effective.

Optimize Your Manufacturing Today!
 
RSS
First9091929395979899Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Crossroads RMC

Crossroads RMC Tip of the Week: How to Prevent Your Company From Being a Victim of Ransomware

This is unfortunately becoming a common occurrence in today’s digital society and we are hearing about these sort of attacks quite frequently.

There are a few dos and don’ts when it comes to ransomware as recommended by Norton 360:   

  1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there is no guarantee that you will be able to regain access to your files.
  2. Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
  3. Do not provide personal information when answering an email, unsolicited phone call, text message or instant message. Phishers will try to trick employees into installing malware, or gain intelligence for attacks by claiming to be from IT. Be sure to contact your IT department if you or your coworkers receive suspicious calls.
  4. Use reputable antivirus software and a firewall. Maintaining a strong firewall and keeping your security software up to date are critical. It’s important to use antivirus software from a reputable company because of all the fake software out there.
  5. Do employ content scanning and filtering on your mail servers. Inbound e-mails should be scanned for known threats and should block any attachment types that could pose a threat.
  6. Do make sure that all systems and software are up-to-date with relevant patches. Exploit kits hosted on compromised websites are commonly used to spread malware. Regular patching of vulnerable software is necessary to help prevent infection.
  7. If traveling, alert your IT department beforehand, especially if you’re going to be using public wireless Internet. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi like Norton Secure VPN.
Previous Article Infor LN & Baan Tip of the Week: Customer Requested Delivery Date – 10.7
Next Article Infor LN & Baan Tip of the Week: Types of Extensibility for Infor LN
Print
59399 Rate this article:
3.5
Crossroads RMC

Crossroads RMCCrossroads RMC

Other posts by Crossroads RMC

Theme picker

Contact author

x

Categories