SugarCon 2018 was held at The Cosmopolitan in Las Vegas. Justin Kuehlthau (Director of the Sugar Practice) and Megan Sheehan (Lead Business Analyst) from Technology Advisors were honored to be selected for the inaugural class of... Continue Reading
The main purpose of CRM upgrades is to keep your functionality and features current. The hope is that keeping the software up-to-date will maximize the agility and usefulness of your data. However, if your CRM is teeming with outdated information, duplicate accounts, and unnecessary... Continue Reading
The supercomputer is no longer a thing of fiction—it’s here. And odds are, you interact with one on a daily basis.
Last week, I overheard a conversation between my coworker and a frantic prospect. The prospect asked my coworker to help her implement a solution her company had pre-selected. Since we weren’t involved in her company’s requirements gathering, my coworker requested some details on how they... Continue Reading
Have you ever received this notification in SugarCRM: “Warning: User licenses exceeded by 1”? Knowing how many active users are in your system can avoid this roadblock in the future. So, how can you check the number of active users in SugarCRM? Do the following:
A frequent request from our customers is the ability to control security via a lookup. This type of security set up falls outside the typical object permission setup within bpm’online. This post teaches you how to use a business process and custom lookup object to implement this team based... Continue Reading
During a recent chat with one of our CRM consultants, he mentioned concerns about customer perceptions of CRM. “Sometimes I worry they don’t see the full picture,” he said. “CRM is an ongoing investment. As a business grows, the CRM must grow too. They assume once the CRM is purchased and the... Continue Reading
In Infor CRM, there is a database table called GROUPSTATS. It was added in version 8.1. This table tracks how often users select each group. It keeps a count of each time the owner uses the group, as well as each time anyone who has access to the group uses it.
Bpm’online has rich functionality to manage security access to users. The greater level of granular control however comes with complexity that can get very confusing to manage as your organization grows.
Setting up security for temporary workers is a common need and is often setup such... Continue Reading