Microsoft Great Plains Implementation for Midsize & Large Corporation: Lockbox Processing

Microsoft Great Plains is now targeting large and midsize businesses and being matured ERP has advanced, but still very simple in use modules and features: Lockbox Processing for Accounts Receivables, Customer/Vendor Consolidation, Multicurrency etc. We'll try to cover these features in the series of small articles to help decision maker and end user understand the feature and how does it work to make a decision to purchase additional nice modules. In our opinion large corporation, which had to use ERP with rich functionality in the past, doesn't have to do it in our new time. There are few reasons to switch to cheaper ERP, the most important are: database platform reliability improvement ? nowadays MS SQL Server does excellent job and has most of the former instability and maintenance issues resolved. The second reason ? MS Windows server is now close to be considered as a solid rock and you do not have to reboot it on the regular basis to fix all the types of "memory leaks", etc. OK, lets review Lockbox processing:

? Customer Matching. This is rather the question about generic lockbox application ? which basically imports text file, received from your bank and matches them with customer invoices, debit memos and miscellaneous charges. The question typically sounds like this ? in our Great Plains CustomerID is different from bank customer ID. This is right, but each check has Bank Account Number and Bank Routine Number, identifying the customer, all you need to do is ? carefully review first processing and enter this customer info, or open it here: Cards>>Sales>>Lockbox Bank Details ? and next time you get check from this customer ? lockbox will catch and identify it. This is true even in the case of hand written check.

? Invoice Number Matching. This is a bit tricky question, and you can't catch invoice number from hand written check. However when we are talking about large businesses ? these checks have invoices printed. If you bank has so-called Automatic Clearinghouse (ACH) lockbox file format ? it can provide invoice number line if the check is issued by corporate or midsize established business. In the case of ACH header will have prefix 6 and line prefix 4.

? No Invoice Number Matching. This is still OK if you have a lot of small customers with one or few outstanding invoices. In this case ? use autoapply method. You can have variety of apply criteria: None, Document Number (when you have ACH), Due Date/Oldest Document, Due Date/Oldest Invoice (other than invoices you apply manually), Document Date, Specific Invoices (and you specify them in the list)

? Additional Considerations. Virtually if you have corporate account in any bank ? lockbox processing module does the job ? because you map lockbox file at your will in Lockbox Maintenance screen: Cards>>Sales>>Lockbox

? Customization Options. Lockbox is Dexterity piece, so it is in the hand of Dexterity Developer, if you need to improve it for your corporation. VBA Modifier and Continuum are also available. Also feel free to use new tools, such as Extender or eConnect.

Good luck and you can always seek our help in customization, implementation, integration and support. Call us: 1-866-528-0577 or 1-630-961-5918, help@albaspectrum.com

Andrew Karasev is Chief Technology Officer in Alba Spectrum Technologies ? USA nationwide Great Plains, Microsoft CRM customization company, serving Chicago, California, Arizona, Texas, Florida, Georgia, New York, Australia, UK, Canada, Continental Europe, Russia and having locations in multiple states and internationally ( http://www.albaspectrum.com ), he is Dexterity, SQL, C#.Net, Crystal Reports and Microsoft CRM SDK developer

bmw rental chicago Bath .. Lockport Chicago limo O’Hare
In The News:

Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.

Benefits of Shareware

Shareware has been fighting the stigma of being misunderstood for... Read More

Microsoft Great Plains Payroll Module Customization Scenarios

It is now common thing when large corporation selects mid-market... Read More

Did You Ever Want to Completely Erase Everything on Your Computer?

Did you ever want to erase everything on your computer?... Read More

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

Software Automation Helps Increase your Bottom Line

When you own a small business, time is money. And... Read More

Microsoft Great Plains customization ? Freight Forwarding/Transportation industry example

Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More

Recent Studies Show that 9 out of 10 PCs Are Infected with Spyware

Spyware and malware are large problems for Internet users today... Read More

Microsoft Great Plains Oil & Gas ? Implementation & Customization Highlights

Microsoft Great Plains serves the wide spectrum of horizontal markets.... Read More

How a Bug Challenges to a Software Professional

It is really interesting that a bug can create problem... Read More

Unofficial Windows 98 SE Service Pack 2.0 RC2

Microsoft has never released a service pack for Windows98 SE,... Read More

Performance Tuning of a Daffodil DB / One$DB -JDBC Application

This article illustrates the best practices to improve the performance... Read More

Microsoft Great Plains Customization Recovery & Upgrade for Large Corporation

At the end of XX century, in the late 1990th... Read More

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

Microsoft Great Plains Subcontracting ? Overview for Microsoft Business Solutions Partner

Microsoft Business Solutions Great Plains is very popular ERP/MRP applications... Read More

Unwanted Files

A LOT OF UNWANTED FILES.When you uninstall an item of... Read More

Theres Gold in Your Websites Server Log

Many Webmasters have never bothered to view their website's server... Read More

IT Strategy for Midsize Business: Microsoft vs. Java, Great Plains & CRM

Midsize business or non-profit organization should decide if one-vendor solution... Read More

Why Stick With Email Clients Like Outlook?

Trying to figure out a stream in banning one email... Read More

Healthcare Preventive Maintenance Software

Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More

Microsoft Great Plains POP: Purchase Order Processing ? Overview For Consultants

Great Plains Purchase Order Processing (POP) module makes up one-third... Read More

Internet Security Threats: Who Can Read Your Email?

Before being able to choose a secure Internet communication system,... Read More

Cisco Certification: Five Things To Do DURING Your CCNA Exam

There are plenty of articles out there about how to... Read More

Brief Notes About Mainframe Software Pricing

We don't think about mainframe software pricing anymore, we just... Read More

Microsoft CRM Development

Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More

Database Guru James F. Koopmann Reviews DBxtra Reporting and Query Tool

DBxtra is a powerful query and reporting tool that hides... Read More

limousine service Ava ..