Skip to main content

Technical

Sitecore Upgrades: A Mini-Series Part 5 Dependency Injection Changes

The final post in my mini-series on Sitecore upgrades centers around dependency injection. Your solution may be using a popular third party tool like Castle Windsor or Simple Injector to handle DI (dependency injection). During the upgrade process, I recommend removing your dependency on these third party tools and implementing DI using .NET’s dependency injector. […]

agile backlog groom

Sitecore Upgrades: A Mini-Series Part 4 ORM and Other Dependency Updates

For those of you upgrading a Sitecore instance for the first time, welcome to the hardest part of the upgrade. Upgrading your code base to continue functioning the exact same as it did prior to the upgrade can prove to be quite difficult. The newer versions of your dependencies could remove classes and functions that […]

A man using a computer while 2 people observe

How to Customize and Validate the Json Message for GrantType Access Token in Apigee

Overview This use case describes how to customize and validates JSON message for GrantType client credential – AccessToken. What is GrantType client credential? Client POST’s an API call to Apigee with client ID and client secret to fetch the access token from the registered developer application. In addition, query parameter grant_type=client_credentials must be passed in […]

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Welcome back! Last time we talked about controlling file downloads of sensitive content by using a session policy in MCAS. This time we’ll take things a step further and show you how to restrict specific activities like cut/copy, paste, and printing! If you are joining us for the first time, I encourage you to check […]

Accelerate business innovation with application modernization.

EBS Batch Processing Slowing You Down? – How to “Spread the Load”

Oracle EBS Applications utilize a sophisticated batch scheduling and processing mechanism known as the Concurrent Managers. This batch processing system performs many vital functions within the EBS Applications system environment including reporting, managing data processing and Workflow activity plus several other critical business and system tasks. Many of these processes have a voracious appetite for […]

Istock 636932704 (3)

How to control sensitive data on unmanaged devices with MCAS (Part 1 of 2)

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. Where remote work has become the new norm, you will likely see many end-users using their own unmanaged devices to access corporate information. With this comes the risk of unmanaged devices sending/sharing sensitive information without the ability to control […]

Agile Community Event

Perficient’s Agile Community Serves Colleagues of All Backgrounds

When you work at Perficient, you’re never “in it alone.” We pride ourselves on having a collaborative, supportive environment dedicated to fostering both career and personal growth. Perficient’s Agile Community is one of the latest ways colleagues can connect with each other, breaking down walls and collaborating globally in a whole new way. “It makes […]

Information Architecture

Byte 11 – Do you have Architecture for the product development?

Do you define the architecture before you begin the product development and iterate them over while developing the product ?. If the answer is yes, you are on the right track to building the product right. The art of building architecture does not just refer to how the system connects. It’s also about ‘Why’ we […]

Inventory Cycle Counting Concept

Cycle Counts: How to inspire and make it work for growing businesses

Cycle Counting is an organized division of a warehouse into manageable chunks. Regular counts are required for each “chunk.”  These “chunks” can be a range of items and/or warehouse locations. To inspire an optimal use of Cycle Counts, you must employ several strategies. We will explore opportunistic and scheduled counts. We will also go into […]

Why Commerce Should be the Key to Your Digital Transformation

The customer is your business’ number one priority because they are your main source of revenue and drive you to the next step in your success. Customer expectations are frequently changing and more customers are relying on digital processes for their commerce efforts due to their fluidity. Businesses must digitally transform to keep up with […]

Forrester Nowtech

Perficient Listed in Forrester Now Tech: Application Modernization and Migration Services Report

Enterprises have been modernizing and migrating applications from on-premise, legacy systems to the cloud for years. But it’s not always easy. Legacy technologies usually mean legacy knowledge and custom-built processes, databases, and solutions that easily break and lead to unnecessary downtime. Moving these legacy applications to the cloud requires adequate planning and a service provider […]

Istock 871840512

Byte 10 – Are you building the big data solutions right?.

Big data solutions are a field to process data from disparate sources, store the data, and perform analysis to get a meaningful and measurable action from the data. The benefits from big data processing provide a variety of insights, bring values to the organization.  Understand your data.  Determine intelligent actions.  Valuable decision-making.  Identification of New […]

Load More