Improved Import & Export major update - full Google Sheets & Drive integration. Fixed price Magento 1 > Magento 2 migration service! EXPLORE

"advanced Magento 2 admin"

OuterEdge UK Ltd  – Magento E-Commerce Experts

- E-Commerce, Magento 2

Let us introduce you to another UK based company that specializes in Magento development. OuterEdge UK Ltd is passionate about helping merchants achieve their long term e-commerce goals successfully. Specialists behind the agency build creative, strategic, and integrated websites based on our favorite platform. So if you want to engage consumers and transform your business, you know the reliable partner. Continue Reading

Amasty Extended Product Grid with Editor for Magento 2 and 1

Amasty Extended Product Grid with Editor Magento 2 Extension Review; Amasty Extended Product Grid with Editor Magento Module Overview

Are you looking into reducing the time necessary for product data processing? We are here to help you. The following post describes how to achieve your goal and edit all the required attributes right on the grid with the help of the Extended Product Grid with Editor extension by Amasty. The module lets you customize grid display according to your needs, expanding the default Magento product grid functionality with additional columns. Furthermore, it allows you to filter products by categories, as well as create custom grid view templates.
Continue Reading

Xtento Two-Factor Authentication for Magento 2 and 1

Xtento Two-Factor Authentication Magento 2 Extension Review; Xtento Two-Factor Authentication Magento Module Overview

If you are looking for the most efficient way to protect your Magento 2 or Magento 1 admin from unauthorized logins and fraudsters, then you’ve come to the right place: below, we describe how to achieve this goal with the help of the Two-Factor Authentication Magento 2 and 1 extension by Xtento. After installing the module, you will no longer have to fear that someone could log into your ecommerce store admin and steal order, customer, and other sensitive data. In the following post, we show how it is possible.  Continue Reading