Blog Posts

Spire

Leveraging Spire Using Automated Solutions

Leverage is used as a multiplying force to achieve more beyond physical limitations. In the digital world, software provides the ability to multiply influence, effort, and knowledge by using data and interconnectivity. With so much data generated and consumed by...

Spire

Using Spire Phases to Improve Workflow

If your business has unique needs when it comes to creating orders, you might benefit from using Phases in Spire to Improve your Workflow. Creating any type of order, whether it's a Sales Order, Production Order or Purchase Order, will look different for many...

GeneralSpire

Optimize Order Entry in Spire

If you are interested in optimizing your Order Entry settings in Spire, we can show you how! Spire offers 49 different User Settings for Sales Orders, with most related to accessing functions or editing fields, although some settings and order options can be taken...

Tips to Optimize Order Entry in Spire
General

Sage 300 Enhanced Security

Sage 300 Enhanced security doesn't need to be complicated! Data security has become even more important as technology advances and companies increasingly shift to remote access for their staff. With these new requirements, Sage has some cool features that will...

General

Edge IMS, What’s in a Name?

Back in 2010 when Denise Burke and I were brainstorming about a name for our fledgling company (now Edge IMS), we knew we wanted something catchy and easy to remember but we also wanted something that describes clearly what we do. We sat down with a glass of wine...

General

Margin and Markup Formulas

Here are some common formulas we use in our line of work, when writing custom reports , creating custom databases, and when discussing concepts in training. Depending on what values you start with, some formulas will be more useful to you than others. Remember,...

General

Be Prepared for Ransomware

It's been a difficult day for one of our clients that was hit with a ransomware virus. This type of virus encrypts your files (makes them unreadable) and installs instructions on your system for paying ransom to the criminals that encrypted your files. If you...