[Google]
Online Marketing
Add blog to our directory.

Form Control UI Actions [BSFN API]

FDA Form Control ID

Ever wondered, if we can enable/disable controls, change the font, hide/show grid columns, do subform actions from a BSFN? Well, all those FDA system functions have an equivalent JDE API and can be used in a wide array of scenarios, like creating a pivot table from data. The list of API’s are as as follows. (You [...] . . . → Read More: Form Control UI Actions [BSFN API]

Automated emailing of completed UBE PDF/CSV files

This entry deals with the issue of enabling E1 to email out completed jobs PDF or CSV files. This is currently capable via OSA or BI but requires a developers busy little fingers to get each object UBE to email the completed file out of E1. All UBEs in E1 write a record to F9861110, [...] . . . → Read More: Automated emailing of completed UBE PDF/CSV files

Simplifying the JDE debuglog

Simplifying the debuglog   The jdedebuglog can look a mess to start with but can be broken down. SQL statements etc are shown but one handy trait is the fact the BSFNS calls have levels. Much like nested Ifs. This helps us see what BSFNs were called in our code. Every BSFN is listed but [...] . . . → Read More: Simplifying the JDE debuglog

How to Upload XML info into BLOB field in table?

  Some time we need to upload XML info into table by using BLOB field. How can we achieve that, here are the steps Create or search for table that has BLOB field (example standard table : F70XMLZ1) Create BSFN or modify standard BSFN (depending on your requirement ) Add following code to update or [...] . . . → Read More: How to Upload XML info into BLOB field in table?

Information Security and Governance in ERP Implementation [Whitepaper]

Integrity-Availability-Confidentiality

Information is one of the most important assets of any organization. Hence it should be appropriately protected. Information needs to be available and accessible uninterruptedly for the smooth functioning of any organization. Information security describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or [...] . . . → Read More: Information Security and Governance in ERP Implementation [Whitepaper]

Page 1 of 2812345...1020...Last »