Oracle Security Rules

Security Overview Defining which records and information users can access is fundamental to HRMS security. As part of your implementation plan, you identify who will use Oracle HRMS, what information they require, and how they use it. You can control a user’s...

Project Accounting Notes

Expenditure Type Classes: Oracle Projects pre-defines all expenditure type classes. Indicates how Oracle Projects processes the expenditure types. Multiple Expenditure Type Classes Per Expenditure Type Expenditure Type     Module Where Expenditure...

AGIS Setups and Use

Key considerations and constraints: Intercompany transactions can be created in the same Ledger using JE’s.Intercompany transactions that will cross Ledgers must go through AGIS.Invoicing in AGIS can create Invoices in AR and AP that will show in aging...

iSupplier Key Setups

Key Setups for iSupplier and Sourcing for Negotiations(RFQs etc) Make sure the products are licensed (POS and PON) Setup the Notification Mailer So that Suppliers can login follow the following: To ensure that newly registered external users can register, login, and...

Let's set up a call?

Send over your name and email and we can coordinate to do call over coffee!

We'll get in touch

Let's set up a call

Send over your name and email and we can coordinate to do call over coffee!

We'll get in touch

Let's get on a call!

Send over your name and email and we can coordinate to do call over coffee!

We'll get in touch