In the table view ("All products" view), you have the option to select which columns to display and in which order to display them. This is possible for a wide range of columns, but there are columns that the system cannot handle in table view. Please, note that all columns of the data model can be exported and imported with Excel.
For some fields, it is possible to filter by searching up to 200 different values. In these cases, you will see a chain icon to the right above the search field. This allows you to search for a range of specific values, e.g. identifiers, product names, etc. The chain icon must be highlighted in dark blue before it is activated. Note that this type of filtering will not necessarily work optimally on long text fields.
If you have applied filtering to multiple columns, you can always see the summary of these in a list by tapping Filter settings (the funnel), and here you can also modify your filtering by tapping the pencil next to each filtering field.
Yes. Before the final data import, you can perform a validation check on Excel, xChange, or BMEcat files. The system verifies fields against predefined value lists and specific format requirements. Following validation, a log file is generated highlighting any discrepancies and their exact location in the source file. If identified errors are not corrected before the final upload, the system will automatically skip the invalid values and import only the compliant data.
The system allows duplicates in GTIN fields because an incorrectly assigned GTIN number would prevent it from being correctly assigned to the right product. In addition, many suppliers intentionally use the same number for several products, so the system cannot prohibit this.
In Branchekataloget PIM, product relations are unidirectional by design. While you can manually define a relation in both directions, the system does not automate this process for several key reasons:
To maintain high data quality and avoid unwanted "clutter" the application leaves the decision to the user. If a two-way link is necessary for your specific use case, it should be defined manually in both product records.
Yes, dual authentication at login is a cost-free option that can be enabled by the administrator for any account. You should contact your administrator and ask to enable this option.
It is possible to have as many templates, but you can only use one at a time (for all products). The functionality of selecting a template for individual products (and independently for local and system product cards) can be developed on request.
The product limit is the maximum number of products that can be created in an account. If the product limit is reached, further products will not be created. For example, when importing new products, they will be created until the allowed limit is reached; products whose creation would exceed the limit will not be created.
Yes, you can create custom attributes that are not covered by the default ETIM, xChange, or BMEcat standards. These attributes can be of different data types and can be organized into groups. You can also create or import technical attributes and then map them to standard ETIM features. This ensures that even if your raw product data follows a proprietary format, it can be seamlessly aligned with international classification standards.
Yes, the application assists the classification process by providing suggestions and hints. These suggestions are generated by a dedicated engine that uses rule-based logic to match the provided technical descriptions with the most relevant ETIM features and values. Additionally, the system can provide hints based on previous product's classification (for ex. class with similar features). Hints and suggestions help speed up the classification process and ensures consistency across your data.
Full read and write access to all data is enabled by default. However, each user (including the API user) can have restrictions set, if required.
Yes, there is a limit on the number of API requests. It is intended to protect against DoS-type attacks. The daily request limits are set so that within the limits set, the entire database can be deleted and re-written many thousands of times a day, which should be enough for real needs.