Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

George Moroses
/ Categories: Infor LX & BPCS Tips

Infor LX/BPCS Tip What are the differences between INV810 and INV015 for Cycle Counting updates?

INV810 only deletes the sequence number from the ILI of the item so it is not selected again for counting and does not delete the ICY record.

The ICY Cycle Count sequential history file increases in size with each new cycle count session. Running INV015 will purge all the old ICY records up to the date entered on the set-up screen ‘Enter Cycle Count Ending Date’ field. Physically deleting the old ICY files.

In most cases, when you complete the cycle count posting and run the reports, you can reconcile the data as required. After you reconcile the data for a specific day (or group of days), you can run INV015 to purge the data for that day (or group of days).

Previous Article Infor LN & Baan Tip: When is backflushing disabled in LN?
Next Article Infor LN & Baan Year-End Processing Checklist for Period and Fiscal Year Closure
Print
5801 Rate this article:
5.0
George Moroses

George MorosesGeorge Moroses

Other posts by George Moroses

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Did you know that you can set up one-time vendors in LX? One Time Vendor (1,A): Specify Y to indicate that this vendor is a one-time vendor. Otherwise, could you specify N. The system removes a one-time vendor's information from the Vendor Master file after all transactions are reconciled. If this vendor already exists as a one-time vendor, you can specify N to change the vendor to a regular vendor.

Determining whether to use Master Production Schedule (MPS) planning or Material Requirements Planning (MRP) planning for items in Infor LX and BPCS involves understanding the nature of the items and their demand characteristics.

Master Scheduled Items typically encompass finished goods or service items. These items receive their requirements either from Independent demand, Dependent demand, or a combination of both...

135678910Last

Theme picker

Tips: LN | Baan

In the ever-evolving landscape of manufacturing, cyber threats have become a formidable challenge, with a notable spike in ransomware attacks catching many off guard. These sophisticated attacks deploy tactics that are often new and bewildering to manufacturers, pushing the boundaries of what we thought we knew about cybersecurity in the industry. Let's dive into how these advanced threats are reshaping our approach to digital defense in manufacturing.

https://www.industryweek.com/technology-and-iiot/cybersecurity/article/21284176/a-new-wave-of-cyber-attacks-five-actions-to-take-now

135678910Last

Theme picker

Categories