To fast-track solving any unexpected issue, relevant information is essential. For our support team, it usually comes from a log file that you can send from both the Resco Mobile CRM app and the Woodford configurator.
But why send a log? Isn’t the error message enough? Well, log contains much more information than an error message. Continue reading
Ever since the Resco platform was incorporated as the default Microsoft Dynamics 365 for Field Service mobile client, we’ve received numerous inquiries about the licensing requirements and customization of the solution.
Today we’re bringing you an overview of the most frequently asked questions, so you can always find the answers easily organized in one place. Continue reading
So, you decided to go mobile with Salesforce for your sales, field service and further teams that work outside the office doors.
Now, you get two options to start off testing business mobility or mobile CRM with: Continue reading
Bill Malone is a person whose contact record is inactive in the CRM database because he doesn’t represent the partner company anymore. All fields on his contact form are visible but it is not possible to edit them or otherwise use them. However, Bill has recently returned to his position and the sales rep using Resco Mobile CRM would like to activate the contact record again. Continue reading
Make a QR code for quick logins
Creating your own login QR-code is a very useful, timesaving move. You can use any QR-code generator to create a QR-code text similar to this: Continue reading
These days, we constantly hear about usernames and accounts of various services getting hacked. However, multi-factor authentication (MFA) is a quick and effective way to protect sensitive data by requiring an additional piece of information (besides username and password) to verify the user’s identity. Continue reading
We’ve covered the basics of Consumer Apps based on Resco’s Mobile CRM app (useful not only for customers, but for smoother interactions with partners, volunteers, suppliers, fans and other allies as well) in an earlier post.
But how can you keep track of new records and modifications made by external users and ensure these users will access only the information related specifically to them? Continue reading