mrc's Cup of Joe Blog

Join us in exploring the world of modern development, evolving technologies, and the art of future-proof software

Education

Webinar Replay: Create a shopping basket app in 10 minutes

EducationSummary: Would you like to add online ordering capabilities to your current systems? Would you like to learn how to create custom shopping carts that integrate with your existing ERP system, and work across any device (PC/tablet/smartphone)? If so, check out this webinar replay, and see how easily you can create shopping cart applications.

5 steps to protect your business data in a mobile world

EducationSummary: While mobility offers many advantages to the modern business, it brings new security challenges. How can your business protect your sensitive data in a mobile world? How can you maintain security, when you can’t control every device in your organization? In this article, we explore 5 steps you must take to protect your business data in a mobile world.

How to augment your ERP to fit your needs (without expensive customization)

EducationSummary: Enterprise systems pose something of a “Catch-22.” If you don’t customize the system, it won’t perfectly fit your needs. If you do customize it, you’re locked into that system. In this article, you’ll learn how to avoid these problems and customize your enterprise system without locking your company down.

5 important facts about digital transformation

EducationSummary: Digital transformation is a hot topic these days. But, while it’s a growing trend, it’s still surrounded by a lot of confusion. Not every business leader fully understands the benefits, risks, challenges, and realities about digital transformation. In this article, we’ve rounded up some important facts that every business leader should understand about the topic.

6 facts you must understand about Shadow IT

EducationSummary: A growing trend, “Shadow IT” is a term used to describe IT solutions and systems created and applied inside companies without their authorization. But, while it impacts nearly every organization, not every business leader fully understands the topic. In this article, we uncover the important facts that every business leader should understand about Shadow IT.

6 ways to maximize the value of Business Intelligence

EducationSummary: The Business Intelligence playing field has leveled over the past few years. With the advancement of BI software, small businesses now have the same BI options as their larger counterparts. But, while everyone now has the same options, not everyone uses BI to its fullest potential. In this article, we explore a few reasons why this happens, and how to maximize BI’s value in your business.

5 mobility challenges facing CIOs and IT leaders

EducationSummary: For the modern IT leader, the rise of mobility offers advantages and disadvantages. On one hand, it opens the door to near limitless possibilities. On the other hand, it brings some significant challenges that must be addressed in order to capitalize on the advantages of mobility. In this article, we outline some of the biggest challenges, and offer some tips to address each one.

Webinar Replay: Automate your business processes without coding

EducationSummary: Every day, employees at businesses across the globe waste precious time completing tasks that could (and should) be automated. The problem is, automating these business processes requires custom business rule logic–a task that requires manual coding. Business users often wait weeks or months for IT to produce the custom business logic they require to automate their manual processes. If you face this problem, check out this webinar replay to learn how you can create these business rules in hours or days–without coding!

5 important web application security trends of the near future

EducationSummary: As security breaches rise, enterprise web application security is an increasingly important topic. You must stay ahead of evolving security trends in order to keep your data and applications safe. How will web application security evolve in the coming year? What web application security threats can we expect in the near future? In this article, we explore web application security trends of the near future and explain why they’re important.