WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for database

(...) dquo; option to select the application context connector. Use the wizard to specify which process and which data you wish to load into Power BI. You will need to provide the Portal address, content database ID, as well as Client ID, and Client secret from the API application above. Enjoy!   Application context walkthrough We will now go through a step-by-step guide on how to set up the (...)

(...) ll visible in the “On path” transition. This is due to its nature as this type of transition involves a number of operations that can potentially change the state of data available in the database . Depending on the moment of triggering an action or automation they can refer to different data values. What is equally important, the on-path transaction can involve three different automations, (...)

(...) ombined with shrinking disk space and decreased performance pose a challenge to every IT system. WEBCON BPS faces it with an extensive archiving mechanism that automatically removes data from process database s. The resulting better arrangement of disk space translates into enhanced performance and reliability of the whole system. This article describes the aforementioned archiving mechanism in WEBCON B (...)

(...) article describes the roles the services can perform in the WEBCON BPS system, and indicates modules linked with particular roles and presented in the “Running modules” report. Process database s Process database s are content database s that store instances of the processes created in the WEBCON BPS system. The majority of the service roles operate within the framework of such database s. W (...)

(...) pared business case.   Definition and creation of a data source The Domain users data source allows you to retrieve current user profile data from the hierarchical AD (Active Directory) database . The data retrieval is performed dynamically and directly, i.e. it bypasses internal resources (cache) and takes place independently of data synchronization. As a result, it is also possible to retri (...)

(...) screenshot – the rule’s parameters include the “ColumnValue” parameter (taking the value of a defined field) and the “ColumnName” (taking the name of a column in a database ). An SQL query used in the rule   By using the above-mentioned rule it is possible to verify e.g. occurrence of instances with the same invoice number. The “HasDuplicat (...)

(...) nd period Note: if necessary due to country-specific legal restrictions, filtering by users can be disabled by setting “0” for the TopUsersEnabled global parameter in the configuration database (the default value is “1”). By moving the slider on the legend (scale), user can change the range of values presented on workflow steps and paths. Additionally, proper setting of the S (...)

(...) with editing rights with a new one that has read-only rights.   Archiving When a shared instance is archived or deleted, the sharing is ended and a record is created in the content database containing historical data. The relevant entry is also deleted from the table which contains information about shared instances.   General remarks When the received link is opened, the (...)

(...) “ActiveTasks”. While this modification generally does not bring changes relevant to end users, it does improve the overall system performance and speed, particularly in the case of large database s.   Summary The new approach to assigning tasks to groups of users responds to the needs of dynamically evolving labor market. It helps companies to easily manage staff workflows both (...)

(...) display this value until it finishes calculating. There are additional variables in the editor to aid in this rule calculation: Indicator start date – date and time (according to the database time) of the Start performance indicator action execution. Start value – value of the indicator at the beginning of the calculation. This value can be different than 0 and depends on the Star (...)

(...) in containers on any other containerization platform (e.g. Azure Container Instances or Azure Kubernates Service).   Installation plan When installing WEBCON BPS in containers, only the database is created using the installer. Other components of the system must be downloaded as Docker images and run in containers using relevant scripts. For this reason, it is good practice to plan the e (...)

(...) sp; Enterprise (Standalone) installation prerequisites, diagrams, and scaling SharePoint-hosted installation prerequisites, diagrams, and scaling Planning for High Availability WEBCON BPS database s overview and size estimation Disaster recovery for Enterprise and SharePoint Good practices for system upkeep WEBCON BPS Farm communication diagram List of Portal, SharePoint, Service, and o (...)

(...) Applies to version: 2022.3.x and above; authors: Jacek Język, Krystyna Gawryał   Introduction WEBCON BPS version 2022 R3 comes with a dedicated database read account. During each new installation, a database account named bps_user is automatically created in all Content database s, which is used by BPS to read data from the database . In contrast, when upgrading the system that is alrea (...)

(...) ten unaware of the mechanisms and rules used by the service. To fill this gap, this article describes the elements affecting the sequence in which the service executes its tasks.   Content database s The database s that store information on tasks to be executed are defined in the “Associated process database s” field (“System settings” → the „Service configura (...)

(...) code from the left menu, place it at the desired location on the label. In the window that appears, configure barcode data as {DBCODE}{WFD_ID} (it is important to include the variable referencing the database acronym  {DBCODE}):   Define the barcode type by selecting Data Matrix in the Barcode tab. As with the previous code, define its size by specifying the X dimension value: (...)

(...) rt we will focus on the instance’s journey through the various paths of the workflow: Register a request – input basic data Personal data search - methods of searching through the database and saving the results on the form Select person – specifying which users returned by the search will be processed further Remove data – the final step in which the data anonymization (...)

(...) Applies to version: 2023 R1 and above; author: Łukasz Maciaszkiewicz   Introduction Efficient database searching often plays a crucial role in determining the effective operation of the system, as well as the applications created within it. The problem becomes especially evident over time. Growing database s, when managed incorrectly, can considerably slow down system operation and negativel (...)

(...) nt form field types. This solution streamlines the process of filtering data sources and creating rules to automate work with large, complex and dynamically changing values and to manage multi-record database s more efficiently.

(...) en the configuration is saved and on the form, where a user who enters an optional answer that is too long will receive a warning message. Also, given the way configuration data are stored in the database , the following (sequences of) characters are not allowed in answers and their translations: "#", "$$", "|;".   Rating scale In the case of this form field, (...)

(...) ecting the camera towards the code, the scanner automatically recognizes the code and processes the encoded value appropriately. Searching by QR codes Users of the mobile application can search database s in two ways: using the standard method, i.e., by manually entering a query in the search box, or by inputting the QR code value into the search box and initiating the search.  To use the latte (...)

Privacy overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.


To see a full list of the cookies we use and learn more about their purposes, visit our Privacy Policy.