(...) bled (in report view)? For many years, users have found it confusing that items are still shown as assigned to the “original” user even when a substitute is active. While I understand the current log ic, adding a small visual marker next to the name would make it much easier to quickly see when a substitution is set. Hope you find it useful.
(...) Hi, we are considering changing the domain for users in AD in our company, which will consequently result in changing log ins in BPS and losing permissions. Are there any scripts available that would allow us to update the tables so that we can preserve the existing permissions and access rights for users? What about licenses? Will they be revoked for the old log ins and assigned to the new ones, or (...)
(...) We also cannot use the format functions on the server as we don't know the time zone of the user. This is only known by the browser. Therefore it would be great, if the data table configuration dialog could be configured to: - Define the type of a column: Text, integer/decimal, date time, choose field - Provide a configuration dialog similar to the advanced configuration. This would: - Move (...)
(...) n add) at System.Linq.Enumerable.ToDictionary[TSource,TKey,TElement](IEnumerable`1 source, Func`2 keySelector, Func`2 elementSelector, IEqualityComparer`1 comparer) at WebCon.WorkFlow.Businesslog ic.ImportExport.LinkedElementsChanger.Exclude() at WebCon.WorkFlow.Businesslog ic.ImportExport.Import.ImportManager.CreateUnusedRowDeleter(MappingList destMappingList, ImportVerificationResult impo (...)
(...) Hello, I am attempting to launch the ABBY OCR service on a dedicated server. In the configuration, I have set the OCR AI function for the dedicated service. Unfortunately, in the log s I have a stopped document described as: Unassigned (screen). Do you have any idea where the configuration is missing? I would like to add that the Abby licences are activated on the new server.
(...) ty. Despite the security measures applied by WEBCON, every user should follow the principles of security. In order to prevent the account from being used by unauthorized persons, any user should log out when he does not use the website and shouldkeep the log in and password confidential and do not disclose them to any third parties. 1.1. Registrati (...)
(...) r short description (if the vulnerability occurred in a specific part of the system), severity rating, status indicator, and the version where the issue was resolved. Vulnerabilities are listed chronolog ically, with the newest at the top of the list. The 5 most recent vulnerabilities: CVE / CWE Detection date Severity Status Version containing fix C (...)