Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Infor LN & Baan Tip: Did you know? PBOM – Effective Dates
Kathy Barthelt

Infor LN & Baan Tip: Did you know? PBOM – Effective Dates

Materials and Manufacturing

Did you know? PBOM – Effective Dates

Some customers have noticed that when a PBOM is pushed from Engineering to Production, the effective date of the PBOM component lines does not match the effective date of the revision of the PBOM component.

Here is how it works:

1. The effective date on a PBOM line is the date the item became effective in PBOM. This means that if the parent item is revision controlled, the effective date on the line relates to one of the revision dates of the parent item.
2. The effective date in a PBOM can be changed. This will lead to a disconnect between engineering and PBOM dates.
3. The a PBOM line can have a revision. However, the effective date on the PBOM line is not the effect of the revision of this component.

Previous Article Crossroads RMC's support team is friendly, well trained, experienced, and committed to resolving your support & technical issues as quickly & effectively as possible.
Next Article Infor LN & Baan Finance Tip: How to clear balances on invoices that will be moved to a new company
Print
18651 Rate this article:
5.0
Kathy Barthelt

Kathy BartheltKathy Barthelt

Other posts by Kathy Barthelt

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Get ahead of the curve with a seamless, comprehensive integration strategy that surpasses other competitive solutions. In part two of this webinar, join our discussion of best practice integration tricks and solutions from a fellow customer’s office of finance. Understand what makes their integration approach effective and review best practices in integrating your IBM i solution to other office of finance solutions (F9/EPM/Birst/GRC).

Hosted by Peg Tuttle from the IBM i podcast, “The Incredible i Show”. 

  • How version upgrades have tightened internal control loopholes.
  • Structural IBM i advancements designed to safeguard your organization.
  • IBM i ecosystem solutions that strengthen both data and access vulnerabilities.

Don't miss this fourth fireside chat, Eight Ways to Modernize your IBM i product – Topic #3 of 8: Best practices in integration for the office of finance (Part 2). Register today!

Register today!

Did you know that you can set up one-time vendors in LX? One Time Vendor (1,A): Specify Y to indicate that this vendor is a one-time vendor. Otherwise, could you specify N. The system removes a one-time vendor's information from the Vendor Master file after all transactions are reconciled. If this vendor already exists as a one-time vendor, you can specify N to change the vendor to a regular vendor.

135678910Last

Theme picker

Tips: LN | Baan

Many transactions in all kinds of modules use order numbers or serial numbers. These order numbers are most often automatically generated. In the Number Groups (tcmcs0151m000) session you can define groups of order numbers used for dedicated areas. A Number Group is a group of the first free number series that you can assign to a specific use. All the numbers that Infor LN generates in the number groups that are dedicated to the same purpose are unique.

All the first free numbers are stored in the table tcmcs050.

As many different processes can request a free number from the number groups, we often see delays in the performance, due to locking on the first free number records. This locking issue can have a severe impact on the performance of huge batch-type transactions, but also on the performance perceived by individual users in many areas in LN.

For example:

In the ever-evolving landscape of manufacturing, cyber threats have become a formidable challenge, with a notable spike in ransomware attacks catching many off guard. These sophisticated attacks deploy tactics that are often new and bewildering to manufacturers, pushing the boundaries of what we thought we knew about cybersecurity in the industry. Let's dive into how these advanced threats are reshaping our approach to digital defense in manufacturing.

https://www.industryweek.com/technology-and-iiot/cybersecurity/article/21284176/a-new-wave-of-cyber-attacks-five-actions-to-take-now

135678910Last

Theme picker

Categories