Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

IDF: Defining the Attributes for a New Object

Anthony Etzel 0 17622 Article rating: 5.0

Attributes are the fields you define in your System i file.

You can begin by building your attribute list in Integrator by synchronizing the object with the host. This process reads the file definition from the System i and builds your list of attributes. The synchronize process will automatically run and read the definitions for the first occurrence of this file name within the library list. You can repeat this process manually multiple times if you change the file definition on the host by using the ‘Synchronize with Host’ option. However, the synchronization process will not recognize changed field names.

Non on key field attributes: The integrator requires a unique key for each object. If the host file already has a key, the synchronization process will automatically identify fields as part of the key as well as add a sequence number to multiple key parts. If the file does not have a unique key, you must either create a keyed logical file or identify the key manually. Key fields are the default sort order for all list views for an object.

Why do you need OTTO? Let’s let our customers tell you…

George Moroses 0 15303 Article rating: 5.0

“Our priorities change daily. It’s important to manage the priorities instead of having someone here in the office constantly expediting. We don’t want to run MRP every day, that would just introduce nervousness, all plans and priorities are likely to change and the flood of recommendations would be unmanageable. We run MRP once a week and rely on OTTO to track the constantly shifting priorities day-to-day.”  
Production & Inventory Control Manager, Top U.S. Crane Manufacturer

Learn More About OTTO

Crossroads RMC is proud to announce the release of the following dashboard views that come STANDARD with the LX Analytics Dashboard

George Moroses 0 17175 Article rating: 5.0

Standard Analytics Dashboard Views: 

  • Sales Bookings (ECH)
  • Accounts Receivable (RAR)
  • Accounts Payable (APH)
  • Planned Orders (KFP)
  • Purchasing (HPH)
  • Shop Order Material (FMA)
  • Shop Order Operations (FOD)
  • CEA
  • Order Booking (ECS)
  • Labor History (FLT)
  • Sales History (SIH)
  • Material Status (IIM/ILI)

Click Here to Learn More

If you can't see everything that happens on your shop floor, you are at a competitive disadvantage

Anthony Etzel 0 17910 Article rating: 5.0

If you’re not able to see everything that happens on your shop floor in real-time, you’re at a HUGE competitive disadvantage! Your competitors are running MES. 

Crossroads MES software provides:

  • A user-friendly interface and an easy exchange of information between the shop floor users and your ERP database. 
  • Planners the ability to schedule work to a specific machine or work area. In addition, it allows for work to be re-sequenced and split for better flexibility in scheduling shop floor activities.
  • Factory workers with the ability to receive the work schedule electronically as well as interacting with it by reporting transactional activity.
  • The ability to electronically display Drawing, Process Instructions, and Quality Instructions so you can eliminate, or minimize, the need for some of the paper on the shop floor.
  • The ability to pass shop floor transactional activity to dashboard displays as well as the ERP system. 

Click here to learn more about Crossroads MES 

or Contact Anthony Etzel today to learn more.

The Security Model in IDF

Anthony Etzel 0 20180 Article rating: 5.0

By applying security to an object, you can control which users can view the object and which users can create, change, delete or copy the object.

Basic object security allows you to control who can display or maintain an object. Advanced object security allows you to control selectively who can create, change, delete, or copy an object.

In the basic model, all of the maintenance activities are permitted to those users who are authorized to maintain the object. Use the basic security model if you want a user who can change an object to also be able to create or delete the object. Use the advanced security model if you need to restrict some users to changing the object but not creating or deleting the object.

Explore your IDF programs

Anthony Etzel 0 19468 Article rating: 5.0

If you haven't already, you may want to start to explore your IDF programs. Currently they provide the replacement for the 300 series inquiry programs. In addition, navigation drill downs are far superior to any green screen presentation of the data.

Conversion of SiM Tasks for WFi Workflows

Anthony Etzel 0 33043 Article rating: 5.0

This enhancement simplifies access to LX programs that are available through System i Manager (SiM), as well as Workflow for System I (WFi). This provides an easy way to promote common WFi business processes from one LX environment (for example, test or environment) to another LX environment (for example, production). 

LX also provides a set of four-character task codes that can be used within SiM, System i Workspace (SiW), and WFi, for default programs in LX. These predefined LX task codes begin with 0,1,2,3, or 4. Users can specify task codes for their custom programs that are flagged as valid menu options in LX, but these task codes cannot begin with 0,1,2,3, or 4. Users can specify the task codes in Infor LX Object Master Maintenance, SYS625D. This enhancement provides simplified access to LX programs that are flagged as valid menu options in System i Manager and Workflow for System i environments. In SYS625D, The user can also specify task codes in SYS625D for customized programs that are flagged as valid menu options.

RSS
First4567891012

Theme picker

Tips:  LX | BPCS | M3

Advanced Remittance Processing, ARP, provides an automated approach to your cash application process. ARP works together with Accounts Receivable to save valuable time and resources by automatically applying incoming payments to open receivables during daily batch processing. You can easily and efficiently resolve unapplied remittances online.

Advanced Remittance Processing (ARP) is an automatic cash application process that allows you to perform the following functions:

In the ever-evolving landscape of manufacturing, cyber threats have become a formidable challenge, with a notable spike in ransomware attacks catching many off guard. These sophisticated attacks deploy tactics that are often new and bewildering to manufacturers, pushing the boundaries of what we thought we knew about cybersecurity in the industry. Let's dive into how these advanced threats are reshaping our approach to digital defense in manufacturing.

https://www.industryweek.com/technology-and-iiot/cybersecurity/article/21284176/a-new-wave-of-cyber-attacks-five-actions-to-take-now

12345678910Last

Theme picker

Tips: LN | Baan

Many transactions in all kinds of modules use order numbers or serial numbers. These order numbers are most often automatically generated. In the Number Groups (tcmcs0151m000) session you can define groups of order numbers used for dedicated areas. A Number Group is a group of the first free number series that you can assign to a specific use. All the numbers that Infor LN generates in the number groups that are dedicated to the same purpose are unique.

All the first free numbers are stored in the table tcmcs050.

As many different processes can request a free number from the number groups, we often see delays in the performance, due to locking on the first free number records. This locking issue can have a severe impact on the performance of huge batch-type transactions, but also on the performance perceived by individual users in many areas in LN.

For example:

In the ever-evolving landscape of manufacturing, cyber threats have become a formidable challenge, with a notable spike in ransomware attacks catching many off guard. These sophisticated attacks deploy tactics that are often new and bewildering to manufacturers, pushing the boundaries of what we thought we knew about cybersecurity in the industry. Let's dive into how these advanced threats are reshaping our approach to digital defense in manufacturing.

https://www.industryweek.com/technology-and-iiot/cybersecurity/article/21284176/a-new-wave-of-cyber-attacks-five-actions-to-take-now

12345678910Last

Theme picker

Categories