Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News, Crossroads Connection

1st Infor LN 10.7 Implementation for Crossroads RMC!

Kathy Barthelt 0 33695 Article rating: 5.0

We are proud to announce our first Infor LN 10.7 implementation in partnership with Infor Consulting Services for LOOP, Inc. (Louisiana Offshore Oil Port Services). As part of this project, Crossroads RMC will be providing Finance and Data Migration as well as Infor OS / Ming.le consulting services.

Learn More about Crossroads RMC Consulting Services and our knowledgeable Consultants!

Infor LN & Baan Tip of the Week: Credit Checks for Business Partners

Kathy Barthelt 0 77912 Article rating: 5.0

Did you know that you have several options for credit checks for your business partners?

Action-several options are available:

  • Always Hold (Credit)—the order will always be held until released
  • Never Hold (Credit)-the order will never be held
  • Check Credit—a credit check is performed at time of sales order entry, release to invoicing or at confirm shipment.  When this status is used, the check can be performed at one or all three steps.  The steps are only visible with this status.
  • Always Hold (Overdue Invoices)—the order will be held for overdue invoices until released.

Link the credit rating to the invoice to a business partner in the credit control session. You may also enter a credit limit. A credit limit of zero means unlimited credit.

The Security Model in IDF

Anthony Etzel 0 34621 Article rating: 5.0

By applying security to an object, you can control which users can view the object and which users can create, change, delete or copy the object.

Basic object security allows you to control who can display or maintain an object. Advanced object security allows you to control selectively who can create, change, delete, or copy an object.

In the basic model, all of the maintenance activities are permitted to those users who are authorized to maintain the object. Use the basic security model if you want a user who can change an object to also be able to create or delete the object. Use the advanced security model if you need to restrict some users to changing the object but not creating or deleting the object.

Upgrading from BPCS 6.1 to LX 8.3

Anthony Etzel 0 41080 Article rating: 5.0

It's always great to hear nice words from our customers!

"Our upgrade from BPCS 6.1 to LX 8.3 was greatly aided by Crossroads RMC. Their extensive knowledge of the financial system was a saving grace for us since we had a system that was set up over 15 years ago by people no longer in the company. The patience and professionalism of Hugh Carty made the transition much less complicated and frustrating. There is no doubt in my mind that it would have taken a much longer period and a substantially more painful path if it was not for Crossroads RMC bending over backward to accommodate our processes and time constraints.

Crossroads RMC was also able to help us with AS400 technical training, MRP production system design, and pricing using Promotions and Deals. This large swath of knowledge was very helpful in management discussions. Thanks to the Crossroads RMC team and in particular Hugh Carty, Yupo was able to bring this implementation under budget and on time."

Tim Knight — IS Manager, Yupo Corporation, USA

Learn More: Crossroads RMC Consulting Services

RSS
First118119120121123125126127Last