• 2

    Immediate reflection/addition of Microsoft Entra group member in group team

    Suggested by Mansi Pednekar New  0 Comments

    Actual Behavior: As per the current product design, Microsoft Entra group membership maintenance done on the team member in Microsoft Entra ID will not be reflected until the next time the team member logs in or when the system refreshes the cache (after 8 hours of continuous log-in).


    Expected behavior:  Microsoft Entra group membership maintenance done on the team member in Microsoft Entra ID should be reflected immediately without the need for the team member to log in to environment or wait for the system to refresh the cache.


  • 1

    Dynamics 365 Guides BOM creation version options for Linnworks Amazon Integration

    Suggested by Linn Da New  2 Comments

    Wish there is an option to easily transfer and create BOM versions (e.g. clothing manufacturing and designs) Not featuring BOM production creation versions, user may potentially create multiple versions models conventionally.


    Offers seamless, streamlining inventory and order management for sellers on the platform. This integration allows businesses to automatically sync their Amazon orders, inventory levels, and product listings with Linnworks, ensuring accurate and up-to-date information across all channels. With Linnworks, sellers can manage their Amazon storefronts more efficiently by automating tasks such as order processing, stock updates, and shipping, reducing the risk of overselling and stockouts. Additionally, the integration provides robust reporting and analytics tools, helping sellers to gain insights into their sales performance and make data-driven decisions to optimize their operations. This comprehensive integration empowers Amazon sellers to focus on growth and customer satisfaction while Linnworks handles the complexities of inventory and order management.


  • 1

    DigestSync (Celebrity Opinion) Why Celebrities So Much Obsessed With DigestSync?

    Suggested by DigestSync Official New  0 Comments

    DigestSync (Celebrity Opinion) Why Celebrities So Much Obsessed With DigestSync?



  • 1

    Protecting Yourself from Info-Stealing Malware in Facebook Ads

    Suggested by Zem Boet New  0 Comments

    Protecting Yourself from Info-Stealing Malware in Facebook Ads


    Introduction:

    In recent news, it has come to light that certain Facebook ads promoting Windows desktop themes have been found to contain info-stealing malware. This malicious software is designed to infiltrate users' computers and steal sensitive information, posing a significant risk to online security. It is crucial for users to be aware of this threat and take necessary precautions to protect their devices and personal data.

    Understanding the Threat:

    The Facebook ads that are being used to distribute this malware appear to be harmless at first glance. They often feature attractive Windows desktop themes that users may find appealing and click on. However, once clicked, the malware is silently downloaded onto the user's computer without their knowledge.

    The malware is specifically designed to steal sensitive information from the infected device. This can include personal information such as usernames, passwords, credit card details, and more. It then sends this stolen information to the hackers, who can use it for various illicit purposes, such as identity theft or financial fraud.

    Protecting Yourself:

    Given the potential risks associated with these malicious Facebook ads, it is essential to take proactive steps to protect yourself and your devices. Here are some measures you can take:

    1. Exercise Caution: Be vigilant when browsing Facebook and other online platforms. Avoid clicking on suspicious ads or links, especially those promoting desktop themes or other software downloads.

    2. Keep Software Updated: Ensure that your operating system, antivirus software, and other applications are regularly updated with the latest security patches. This helps to protect against known vulnerabilities that malware can exploit.

    3. Use Trusted Sources: Only download and install software, including Windows desktop themes, from reputable and trusted sources. Avoid downloading from unfamiliar websites or clicking on ads that seem untrustworthy.

    4. Install a Reliable Antivirus Program: Invest in a reputable antivirus program that offers real-time protection against malware and regularly scan your computer for potential threats. This can help detect and remove any malicious software that may have already infected your device.

    5. Enable Firewall: Activate the firewall on your computer to add an additional layer of security. A firewall helps monitor and control incoming and outgoing network traffic, blocking any suspicious activity.

    6. Educate Yourself: Stay informed about the latest cybersecurity threats and best practices. Regularly educate yourself about common phishing techniques, malware distribution methods, and other online security risks.

    Conclusion:

    The emergence of info-stealing malware distributed through Facebook ads promoting Windows desktop themes is a concerning development in the realm of online security. By staying vigilant, keeping software updated, and using trusted sources, users can significantly reduce their risk of falling victim to such threats. Additionally, investing in reliable antivirus software and enabling firewalls can offer an added layer of protection. By taking these proactive measures, users can enjoy a safer online experience and protect their personal information from falling into the wrong hands.


    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%84%ef%bd%85%ef%bd%81%ef%bd%84%ef%bd%90%ef%bd%8f%ef%bd%8f%ef%bd%8c-%ef%bc%93-%ef%bd%81%ef%bd%8e%ef%bd%84-%ef%bd%97%ef%bd%8f%ef%bd%8c/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%84%ef%bd%85%ef%bd%93%ef%bd%90%ef%bd%89%ef%bd%83%ef%bd%81%ef%bd%82%ef%bd%8c%ef%bd%85-%ef%bd%8d%ef%bd%85-%ef%bc%94-%ef%bc%88%ef%bc%92/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%89%ef%bd%8e%ef%bd%93%ef%bd%89%ef%bd%84%ef%bd%85-%ef%bd%8f%ef%bd%95%ef%bd%94-%ef%bc%92-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94/

    https://bcdemocrat.com/events/%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88%ef%bc%a0-%ef%bd%8c%ef%bd%8f%ef%bd%8e%ef%bd%87%ef%bd%8c%ef%bd%85%ef%bd%87%ef%bd%93-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94%ef%bc%89-%ef%bc%88/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%81-%ef%bd%91%ef%bd%95%ef%bd%89%ef%bd%85%ef%bd%94-%ef%bd%90%ef%bd%8c%ef%bd%81%ef%bd%83%ef%bd%85-%ef%bd%84%ef%bd%81%ef%bd%99-%ef%bd%8f/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%82%ef%bd%81%ef%bd%84-%ef%bd%82%ef%bd%8f%ef%bd%99%ef%bd%93-%ef%bc%94-%ef%bd%92%ef%bd%89%ef%bd%84%ef%bd%85-%ef%bd%8f%ef%bd%92-%ef%bd%84/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%86%ef%bd%8c%ef%bd%99-%ef%bd%8d%ef%bd%85-%ef%bd%94%ef%bd%8f-%ef%bd%94%ef%bd%88%ef%bd%85-%ef%bd%8d%ef%bd%8f%ef%bd%8f%ef%bd%8e-%ef%bc%88/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%8d%ef%bd%81%ef%bd%98%ef%bd%98%ef%bd%98%ef%bd%89%ef%bd%8e%ef%bd%85-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94-%ef%bd%86%ef%bd%95/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%94%ef%bd%97%ef%bd%89%ef%bd%93%ef%bd%94%ef%bd%85%ef%bd%92-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94-%ef%bd%86%ef%bd%95%ef%bd%8c/

    https://bcdemocrat.com/events/protecting-yourself-from-info-stealing-malware-in-facebook-ads/

    https://cohesiondata.ec.europa.eu/2014-2020-Finances/Verified/ab5u-pkzj/about_data

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/89030c3b-f1d6-4052-b8c4-1463b307bdb4

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/9ec15542-1bc1-400c-993a-ae23e0f889b9

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/31f38c7f-a05a-494d-931a-811d3fa920b8

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/d11659de-7d43-4e59-bea5-97fd79be0017

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/0e0b86d0-e683-44b0-af45-c0f04d78a962

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/faea3c00-2334-4ff8-a578-0ede5131e0fe

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/3643a6ab-fa22-46eb-acf3-064fcbd75f12

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/b7befd44-e098-4686-9bba-a815c4b4e8db

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/c5361138-1f0a-4cd3-904d-11bcf5afe24e

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/5e2e2811-2717-4640-9545-e0dc84ee6be0

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a0f379d0-ce2a-46b4-9566-21b785bfc138

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/4d0aafaa-d2e2-4494-96bf-3598e6a4e101

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/dde57f89-c6e0-479c-b525-eb8666115502

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/ea418983-da1a-4f27-8093-8636b5e81867

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/e82b9eb9-6aad-490d-9b82-1dfae1367722

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a7aaba76-d541-4ff9-abec-5a936c88bd90

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/81401f9b-2132-4d4b-a9b8-21c3f88b48c4

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/9e29b0e8-f2aa-46ca-a447-5617d79dafab

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/8773a520-a5f3-4c04-8a01-938869dcea5a

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/bed1d66d-95ff-435a-9e92-987b81cdaf02

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/cc67bedd-0773-4d78-bde2-efbb2acf7b46

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/6c4dd55a-2337-43da-a11c-6dc64f8ab98c

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a1033014-d6d3-4ff3-891e-e03106d07511

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/d00671a0-7275-4ee5-963a-1af6abcab970

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/f8777204-0ec2-49ce-a8c7-4948fc182c29

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/0ec86b21-1999-4aef-b1f0-6616da9ec7d1

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/567bac6f-032a-4c4d-b4e4-5bc4947a9241

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/0efde01c-60aa-4257-93b6-ab0ddf85bdbc

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/fbf0b7db-58fc-4e6d-9cdb-f8de76966b44

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a44a0b97-c78f-4bc6-bfb5-beac2496e122

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/36295a56-9680-44d1-a997-8f138f7ae524

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/ca643d96-ba0e-4f5b-bbbc-7d9a5e2ff35e

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/2fcc95a5-7f04-464e-a011-cb9f553b6fc4

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/6bfdcfb7-bfd2-4e8b-803b-05a11aed07c0

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/c496204d-c88f-409c-99fc-ea9a82285eda

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/cb01b032-3fed-4deb-bb8e-32d0263e49b5

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/3f089938-b50b-4feb-a0ce-2a74aa8ae02a

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/371204b4-6913-44ee-aa4a-726a592df164

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/320c3be8-79b6-4cac-87a8-5f2c08d614b7

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/25af7485-f042-45e6-8e86-40b8e6850c1a

    https://www.linkedin.com/pulse/protecting-yourself-from-info-stealing-malware-facebook-asrul-fauzi-8rtmc

    https://ko-fi.com/post/Protecting-Yourself-from-Info-Stealing-Malware-in-P5P410KD1I


  • 1

    Embed a Guide in another Guide to allow the back button

    Suggested by Ahmed Dalhi New  0 Comments

    Let's say we have a workflow and in a given step we allow users to go to another Guide (action link) for more details, well today once the user clicks that link and is forwarded to that new Guide, the previous workflow is cut and not completed, as there is not back button to allow the user to comeback to the original workflow.

    On the other hand, allowing the author to specify if the anchor is the same for the action link Guide would be great, as in most cases it's the same anchor, and it interupts the user's by asking him to scan the achor again.


  • 1

    Activate the download option in sharepoint documents in model driven app

    Suggested by Shweta Sidana New  0 Comments

    Activate the download option for SharePoint documents in the model-driven app. This option used to exist but has been deactivated.



  • 1

    Vendor Bank account setup

    Suggested by Carolyn Ross New  0 Comments

    Hello,


    I want to ensure our vendor banking information is set up properly. Is there a list that is regularly updated by Microsoft of the following:

    • When is routing number needed
    • What Routing Number Type is needed if it is not listed (ex. India)
    • What if a vendor does not have a SWIFT code, the field is mandatory - what to use
    • Is CC Routing Number Type used within Canada for both EFTs (Canadian ACHs) and Wires?
    • When is Correspondent Bank needed and why isn't it mandatory when it is required?

    Thanks,

    Carolyn



  • 1

    Simplified Migration of Guides Material

    Suggested by Edward Davis Jr New  0 Comments

    Can a tool be created that would support the movement of Guides from one Environment/Tenant to another Environment/Tenant. This could allow for the creation of a Guide with one customer and then replicate or migrate the data for another client.


  • 1

    Question Step - increase length of field

    Suggested by Mark Dobson New  0 Comments

    Please improve the user experience:


    Question steps have up to 3 choices.

    The fields for writing in responses should be longer. There is space on the Steps screen for the response to be twice the length it is currently.

    Most responses are short, however in compliance/safety instructions the descriptions sometimes need to be longer than the 20 characters allowed.


    Please consider. It should be a very easy fix?


    Regards - Mark



  • 3

    X++ sample code for customize Financial tag

    Suggested by M Nuris Hidayat New  0 Comments

    We need x++ guide or code sample to customize Financial Tag functionality especially for automatic process.

    We have several automatic processes that will use this function.

    Thank You.