Sugarcrm for Dummies®
This guide helps you choose the flavor of Sugar you need, acquire and deploy it, set up accounts and contacts, and organize your day. You’ll first learn how to install SugarCRM, customize user preferences, create databases, and import contacts from other software. Next, you’ll discover how to extend SugarCRM’s capabilities to meet needs unique to your business. You’ll also find out how to:
- Schedule appointments, link them to records and notes, and organize your sales opportunities
- Build campaigns, track their success, and grow your contact list with Web-to-lead forms
- Manage customer issues and forums to exterminate software bugs
- Send e-newsletters and automate customer e-mail communication with templates
- Take advantage of a complete recipe book for SugarCRM administrators
- Improve sales performance with SugarCRM
- Provide great service to your customers
- Develop searchable libraries and FAQs
- Create and share documents
SugarCRM For Dummies will get you quickly up to speed on this customer relationship management software so you can enhance your business.
Table of Contents
Part I: Adding Sugar to Your Life.
Chapter 1: Adding Sugar to Your Life.
Chapter 2: Acquiring a Sweet Tooth.
Chapter 3: Finding Your Way Around Sugar.
Chapter 4: Working with Accounts, Contacts, and Leads.
Part II: Cooking with Sugar.
Chapter 5: Keeping Track of the Sweet Things in Life.
Chapter 6: Creating a Project Isn’t a Major Project.
Chapter 7: Working with Opportunities.
Chapter 8: Working with Documents.
Chapter 9: Watching Your Sugar Content.
Part III: A Spoonful of Sugar Keeps Your Customers Happy.
Chapter 10: Adding a Bit of Case Management.
Chapter 11: Keeping Bugs Out of the Sugar Bowl.
Part IV: Sharing the Sugar Bowl.
Chapter 12: Adding Sugar to Your E-mail.
Chapter 13: Campaigning Doesn’t Just Occur in an Election Year.
Part V: Working with Extra-Strength Sugar.
Chapter 14: Sweetening the Deal.
Chapter 15: Adding an Extra Lump of Sugar.
Chapter 16: The Administrator’s Recipe Book.
Part VI: The Part of Tens.
Chapter 17: Ten Reasons to Upgrade to the Professional or Enterprise Version.
Chapter 18: Ten Ways to Make Your Life Even Sweeter.
Chapter 19: Ten Ways to Become a Master Sugar Chef.
Sign up now »
Virtualised datacentres, desktops, and cloud computing should be secured by the same strong protection technologies as physical machines. However, traditional agent-based solutions that are not architected for virtualisation can result ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes