technology

Who Survives to Fight Another Day? And Who Survives to Thrive in a New Way?

Photo credit: Olgierd Rudak. The ability for your business to pivot, be flexible and adaptable with your business model, and embrace technology will be keys not only to surviving the current crisis, but for thriving in the future and crisis-proofing your business. Brick-and-mortar companies whose model is showing-up-to-shop, showing-up-to-eat, or…
READ

Forrester’s Clear Case for Microsoft Dynamics 365 and the Cloud: 60% ROI

This blog was written by Robert Ruppert, Regional Sales Manager for Enavate, and reprinted with permission. Leading technology research firm Forrester recently interviewed seven Microsoft Dynamics 365 customers that implemented the cloud-based ERP to replace aging, siloed ERP systems that offered bad user experiences. As in most cases, the decision to…
READ

Pajama Day AKA Working from Home

Photo appears courtesy of Marco Verch. Do I really wear pajamas when I work from home?  A bathrobe and slippers?  Not really, but since I go to the gym daily after my workday, I do wear workout clothes and sneakers.  That is a huge savings on not having to have…
READ

Electronic Trading Profiles for Profit and Fun

Photo appears courtesy of Opensource.com. You have a website, perhaps a line card, business cards, other collateral for your business, yes? And you have or soon will have the capability to exchange business documents with customers, suppliers or other trading partners via EDI or other ways that significantly reduce the…
READ

5 Data Trends That Will Dominate 2017

Blog and photo reposted with permission from Liaison Technologies.   2016 has been an exciting year for the enterprise cloud sector. Data has become a business currency, and the world’s leading organizations continue to propel data collection and usage with their use of specialized apps in the professional realm. A…
READ

SHA-1 vs. SHA-2 Digital Certificates – What’s All the Fuss About?

Photo appears courtesy of F Delventhal. Many of you probably know about the new requirements coming regarding SHA2 digital certificates.  Before we discuss that, let’s first look at SHA-1.  What is SHA-1?  According to Wikipedia, in cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security…
READ

Logs Killed MySQL

Picture appears courtesy of John Mueller. This guest blog was written by Nathan Camp of LogicMonitor. Death by “Doh!Nuts!” is when a seemingly harmless, completely obvious, and avoidable issue goes unnoticed, swarms, and then crushes your software applications and the servers on which they reside. When you figure out why the…
READ

RFID in Football – What Does This Have to do with EDI?

  Photo appears courtesy of Jonathan Holmes. RFID (radio frequency ID), a cousin to the EDI 856 ASN document, which is used to track shipment cartons along the supply chain all the way to the distribution center has a new, wider adoption in NFL football. What?!  With the Super Bowl and entertaining (and…
READ

Looking at 3PLs? Nine Questions to Ask

Photo appears courtesy of www.GlynLowe.com. Many companies are moving in the direction of having 3PL warehouses manage their inventory and order fulfillment processes as well as provide value-added services if they aren’t already. This is enabling these companies to reduce their space requirements and become more streamlined. Another result of…
READ

Tech Savvy Generation Z Entering the Workforce

Photo appears courtesy of Derek Σωκράτης Finch. There have been a lot of articles complaining about the Millennial Generation in the workplace.  We have a different opinion about this new generation that is now in college and will soon be entering the workforce.  Many refer to this new crop of young…
READ

The Need for Speed: Software, Hardware and Everything In Between

Picture appears courtesy of Fritz van Eerd – Hockenheim. A consultant we work with started his software company in 1976 and bought a computer for development.  It had 48K of RAM (that’s ‘K’, not ‘MB’) and 12MB of disk space (that’s ‘MB’, not ‘GB’).   It cost about $70,000.00 (that’s 1976…
READ

Who Wins the Popularity Contest? XML or JSON?

Photo appears courtesy of the Auburn Alumni Association. One of our ERP partners asked an interesting question the other day.  He asked if he should start developing his maps to be sent in JSON instead of XML.  He felt that JSON was more popular than XML.  That started us thinking…
READ

Five Common Mistakes When Setting Up an AS2 Connection

Having been deemed the “AS2 Queen” in EDI circles, I thought it would be nice to summarize five of the most common mistakes that I have encountered in working with AS2 connections and support. The AS2 communication protocol for EDI can be a very cost-efficient solution for companies wanting to exchange…
READ

My Cyber Monday Woes

Photo appears courtesy of Liz West.  Guest blogging for the Aurora EDI Alliance is Nathan Camp of Liaison Technologies.  I was intent on making this last holiday season a time of reflection and peace. I would not succumb to witty advertising campaigns inducing me to spend money on needless gifts. But then those brilliant…
READ

Part 2: The “How To” Use Cases for JSON

It’s Christmas in July!  For the second time this week, Nathan Camp of Liaison Technologies is guest blogging for the Aurora EDI Alliance. Monday’s blog, I discussed the general basics of what JSON is and how it is being used to replace XML in a growing number of cases. JSON’s simplified, smaller scale structure is…
READ