#MobileCRM: Exploring the competition – part 6

In my last article I wrote that I was disappointed with the standard Dynamics Mobile CRM client. Frustrated by the lack of customization possibilities, I decided to take a look at the competition out there. I my last article I mentioned one of the competitors as well: Resco. In this article I’ll take a quick look at what […]

Enhanced Business Rules: Houston we have a problem!

Since January our company is building a new solution on Dynamics CRM 2015. A very complex application to solve complex problems for large enterprises, and that can be hosted on both CRM online and CRM 2015 on-premise. Within this solution we are relying on the enhanced business rules that were introduced in CRM 2015. In my […]

#MobileCRM: some first impressions – part 1

In the previous article I mentioned that I wanted to explore the mobile world of CRM. In order to get going, I dug into my drawers and found a couple of devices which I’ll be using while writing this series of articles: iPad Mini, running iOS 8.2 A cheap Lenovo 7” IdeaTab A1000 tablet, running Android 4.1.2 Microsoft Lumia […]

#MobileCRM: Living in a mobile world…

The world is becoming mobile more and more. We do everything using our mobile phones; social stuff, e-mail, banking, gathering information etc. If we follow this path, we would expect that our users are doing a lot of their CRM stuff on their mobile phones as well. In most cases exact the opposite is true. For some reason we keep on using our […]

The dark side of CRM: protection of intellectual property – final part 4

In this series I demonstrated how your compiled .NET code could be decompiled, using free to get decompilers. I showed an example of the SharePoint connector class which I decompiled, revealing all technical details. In this final article in this series, I demonstrate how you can apply obfuscation to make your code impossible to decompile. […]

The dark side of CRM: protection of intellectual property – part 3

In this series of articles, I want to show how you can protect your intellectual property. In the previous article I demonstrated that compiling your binary doesn’t protect your code from being read by outsiders. With the help of decompilers, we reverse engineered the binary into human readable code. In the next (part 4) and final article […]