This document discusses advanced features of Rulemanager including custom notification methods, user-defined business rule events, adding new object types to business rules, adding event creation times, adding custom calendars, and troubleshooting common issues with rules not firing properly. It provides instructions on how to configure these features and links to external wiki pages with more detailed information.
The document discusses implementing business rules in Alfresco to automate various document management tasks. It provides examples of defining rules to automatically organize documents into spaces during bulk uploads, run time-consuming rules asynchronously, dynamically add metadata to documents based on location, enable automatic versioning for certain document types, and send notifications when documents are updated. The document demonstrates how to chain multiple business rules together to perform a sequence of operations on a document.
This document discusses using events to control SAP workflow. It provides examples of how to:
- Trigger a new workflow instance using an event
- Terminate a workitem using an event
- Wait for an external event to complete part of a workflow
- Configure different types of events such as HR, status management, and change documents
- Best practices for connecting workflows to SAP systems and processes using events
This document discusses rule engines and the Drools rule engine. It provides an overview of rule engine concepts like facts, rules, and actions. It explains the different types of rules and why rule engines are useful. It then focuses on specifics of Drools, including how it represents facts as objects, supports different rule patterns and operators, and handles performance and conflict resolution. It also provides an example of how rules could be used for a data mining use case.
This document provides an overview and instructions for implementing approval processes in Salesforce, including:
- Creating parallel approval processes with different criteria to route records to different approvers
- Using Apex triggers to dynamically submit and approve approval requests based on record field values
- Tracking record field history and setup changes for auditing approval processes
- Creating outbound messages as part of approval processes to integrate with external systems
- Leveraging cross-object formulas to reference related record fields in approval criteria
Process Builder allows administrators to automate business processes and workflows visually without code. It provides many advantages over traditional workflow rules, including the ability to create records, update related records, launch flows, submit records for approval, and post to Chatter. Process Builder can be used to automate tasks like populating fields, assigning ownership, and updating statuses. While powerful, it also has some limitations around editing processes, troubleshooting, and setting field values with formulas.
Process Builder allows administrators to automate business processes and workflows visually without code. It provides many advantages over traditional workflow rules, including the ability to create records, update related records, launch flows, submit records for approval, and post to Chatter. Process Builder can be used to automate tasks like populating fields, assigning ownership, and updating statuses. While powerful, it also has some limitations around editing processes, troubleshooting, and setting field values with formulas.
This document provides an overview of implementing approval processes in Salesforce, including:
- Using parallel approval processes to route records to multiple approvers simultaneously.
- Creating dynamic approval processes using Apex triggers to route records based on lookup fields.
- Tracking field history and setup audit trails to monitor changes to approval process configurations.
- Configuring outbound messages to notify external systems when approval processes are triggered.
- Creating multi-step approval processes with escalations to automate complex approval workflows.
The document describes the process of event storming for modeling domains. Event storming starts with identifying domain events and placing them on sticky notes in a timeline. The group then adds commands or triggers that cause the events. Sources of commands like users, external systems, or time are identified. Aggregates that accept commands and produce events are identified and grouped into bounded contexts. Key scenarios, users, and goals are incorporated into the model to help explore the domain from different perspectives.
The document discusses implementing business rules in Alfresco to automate various document management tasks. It provides examples of defining rules to automatically organize documents into spaces during bulk uploads, run time-consuming rules asynchronously, dynamically add metadata to documents based on location, enable automatic versioning for certain document types, and send notifications when documents are updated. The document demonstrates how to chain multiple business rules together to perform a sequence of operations on a document.
This document discusses using events to control SAP workflow. It provides examples of how to:
- Trigger a new workflow instance using an event
- Terminate a workitem using an event
- Wait for an external event to complete part of a workflow
- Configure different types of events such as HR, status management, and change documents
- Best practices for connecting workflows to SAP systems and processes using events
This document discusses rule engines and the Drools rule engine. It provides an overview of rule engine concepts like facts, rules, and actions. It explains the different types of rules and why rule engines are useful. It then focuses on specifics of Drools, including how it represents facts as objects, supports different rule patterns and operators, and handles performance and conflict resolution. It also provides an example of how rules could be used for a data mining use case.
This document provides an overview and instructions for implementing approval processes in Salesforce, including:
- Creating parallel approval processes with different criteria to route records to different approvers
- Using Apex triggers to dynamically submit and approve approval requests based on record field values
- Tracking record field history and setup changes for auditing approval processes
- Creating outbound messages as part of approval processes to integrate with external systems
- Leveraging cross-object formulas to reference related record fields in approval criteria
Process Builder allows administrators to automate business processes and workflows visually without code. It provides many advantages over traditional workflow rules, including the ability to create records, update related records, launch flows, submit records for approval, and post to Chatter. Process Builder can be used to automate tasks like populating fields, assigning ownership, and updating statuses. While powerful, it also has some limitations around editing processes, troubleshooting, and setting field values with formulas.
Process Builder allows administrators to automate business processes and workflows visually without code. It provides many advantages over traditional workflow rules, including the ability to create records, update related records, launch flows, submit records for approval, and post to Chatter. Process Builder can be used to automate tasks like populating fields, assigning ownership, and updating statuses. While powerful, it also has some limitations around editing processes, troubleshooting, and setting field values with formulas.
This document provides an overview of implementing approval processes in Salesforce, including:
- Using parallel approval processes to route records to multiple approvers simultaneously.
- Creating dynamic approval processes using Apex triggers to route records based on lookup fields.
- Tracking field history and setup audit trails to monitor changes to approval process configurations.
- Configuring outbound messages to notify external systems when approval processes are triggered.
- Creating multi-step approval processes with escalations to automate complex approval workflows.
The document describes the process of event storming for modeling domains. Event storming starts with identifying domain events and placing them on sticky notes in a timeline. The group then adds commands or triggers that cause the events. Sources of commands like users, external systems, or time are identified. Aggregates that accept commands and produce events are identified and grouped into bounded contexts. Key scenarios, users, and goals are incorporated into the model to help explore the domain from different perspectives.
The document provides information on performance testing processes and tools. It outlines 8 key steps: 1) create scripts, 2) create test scenarios, 3) execute load testing, 4) analyze results, 5) test reporting, 6) performance tuning, 7) communication planning, and 8) troubleshooting. It also discusses tools like LoadRunner, Controller, and Analysis for executing and analyzing tests. The document emphasizes having a thorough test process and communication plan to ensure performance testing is done correctly.
William Bartholomew presented at the QLD VSTS Users Group meeting on customizing work item types in Visual Studio Team System. The presentation covered adding and modifying fields, customizing forms and workflows, defining business rules, and creating new work item types. It provided examples of customizations done by TechnologyOne and Conchango and discussed customizing the work item web page.
ServiceNow Knowledge11 Advanced Scripting & Debugging LabJohn Roberts
In this advanced hands-on workshop you will work with a variety of debugging tools to troubleshoot client and server scripting. You'll learn how to add error handling and debugging assistance to your scripts. We will review some advanced scripting techniques including server-side script includes extending base classes and AJAX client requests. As we will not be covering basic scripting concepts in this session participants will require some understanding of JavaScript and scripting within ServiceNow.
This module is about start using jBPM5 and the things that you need to know in order to understand the basic concepts about how it works. During this module you can download and play with a sample project that define a simple business process with some business rules. This module provides different tests that shows how to interact with our processes in different ways and how to test the behavior unit testing them. For more information check out: http://salaboy.wordpress.com/
High Velocity DevOps: Four Ways to Leverage CloudFront in Faster DevOps Workf...Amazon Web Services
Increase your organization’s agility by diving deep and discovering how Amazon CloudFront integrates with other services to accelerate your DevOps workflows. In this session, which is jointly presented with Realtor.com, we cover four main areas of DevOps with customer success stories. Build: Programmatically launch and configure your CloudFront distributions by using AWS CloudFormation or Terraform templates as infrastructure as code (IaC). Test: Confirm that your updates deliver the intended result with A/B testing before moving all your traffic by using CloudFront and Lambda@Edge. Release: Continuously manage and deploy your application to the Amazon CloudFront Global Edge Network with AWS CodeStar. Monitor: Uncover actionable insights hiding in your CloudFront logs by leveraging Amazon CloudWatch, Amazon Athena, or AWS Marketplace partners for intelligent monitoring and alerting.
The Windows Logging Cheat Sheet is the definitive guide on learning where to start with Windows Logging. How to Enable, Configure, Gather and Harvest events so you can catch a hacker in the act.
AWS RoadShow Manchester Part 3 - Getting Started with AWSIan Massingham
In part 3 of the materials from the July 8 AWS RoadShow in Manchester we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
AWS RoadShow Bristol - Part 2 Getting Started with AWSIan Massingham
In part 2 of the materials from the July 10 AWS RoadShow in Bristol we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
AWS RoadShow Dublin - Part 3 Getting Started with AWSIan Massingham
In part 3 of the materials from today's AWS RoadShow in Dublin we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
AWS RoadShow Cambridge Part 4 - Getting Started with AWSIan Massingham
In part 4 of the materials from the June 25 AWS RoadShow in Cambridge we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
Have you ever been involved in developing a strategy for loading, extracting, and managing large amounts of data in salesforce.com? Join us to learn multiple solutions you can put in place to help alleviate large data volume concerns. Our architects will walk you through scenarios, solutions, and patterns you can implement to address large data volume issues.
AWS RoadShow Edinburgh Part 3 - Getting Started with AWSIan Massingham
In part 3 of the materials from the June 17 AWS RoadShow in Edinburgh we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
Process Builder is an #AwesomeAdmin's Swiss Army Knife by Jennifer LeeSalesforce Admins
Process Builder is an automation tool in Salesforce that can be used to simplify business processes using if/then logic. It supports actions like creating records, sending emails, posting to Chatter, updating records, and calling Apex code. The document provides examples of using Process Builder in Salesforce's Sales and Service Clouds to automate processes like closing opportunities, updating related records, and assigning follow-up tasks.
The document discusses business rules processing and rule engines, explaining what they are, how they work, and providing examples of using rules engines for client-side processing in Flex applications. It covers the basic and Rete algorithms for processing rules, describing how Rete is more efficient by storing rule patterns in a network structure and reusing computations. Real-world examples are provided of using a rules engine for a form builder and Herff Jones' order management system.
This document discusses using rules engines for business logic and provides examples of real-world use cases. It begins with an overview of what rules engines are and how they work, explaining concepts like facts, conditions, actions, and rules. It then discusses different types of rules engines and rule processing algorithms like the basic and Rete algorithms. The document provides code snippets and XML examples from real client-side rules engines developed for applications in domains like forms building, order management, and government benefits applications. It demonstrates how rules engines can externalize and manage complex business rules and workflows.
Customer Automation Masterclass - Workshop 1: Data Enrichment using ClearbitJanBogaert8
In this first masterclass workshop, you'll learn how to write a custom-coded workflow action aimed at enriching your HubSpot CRM data with company information sourced from Clearbit. This is ideal for sales teams who want to adopt an account-based selling approach or for marketing teams interested in account-based marketing.
Easily Transform Compliance to Code using AWS Config, Config Rules, and the R...Amazon Web Services
Topic: Easily transform compliance to code using AWS Config, Config Rules, and the Rules Development Kit
Synopsis:
Enterprises find that they have specific requirements imposed by their business, internal policies, or their particular auditors. As an organisation's cloud environments continue to scale and grow, how do you ensure that the number of growing resources are adhering to your security standards and compliance requirements? In this webinar, we'll learn about how to use cloud native services such as AWS config and custom config rules, to automate audits in a rapidly changing environment and ensure we achieve continuous detection of existing and newly launched AWS resources along with their levels of compliance to enterprise security requirements.
Security policies and standards can be difficult to decipher by developers or the business. Using a behaviour driven development approach, we can define our security requirements to scenario based tests in Gherkin, making it easy for developers and the business to understand the requirement. Security Operations teams or developers can then build scenario based tests as well as develop the associated lambda function for their custom Config Rule. The Rules Development Kit (RDK) for Config Rules is an open-source command-line utility designed to help you shorten the development time of custom Config Rules by up to 5 times. In this session, we'll cover how to use the RDK to write unit tests and build the lambda functions for the custom Config Rule in python, and ensure it behaves as per our requirements defined in Gherkin.
What to expect:
-Learn AWS Config and Config Rules Concepts
-Understand best practice and concepts on behaviour driven development for config rules
-Learn to develop lambda functions for config rules in python using the Rules Development Kit (RDK)
-Discover how to securely set up your environment for deployments
This workshop is a Level 200 session and is best suited for:
-Developers
-DevOps
-Security Architects
-Engineers
-Security Operations
-Technical Managers
The document describes refactoring a Python web application that manages user accounts and budgets. It outlines several steps to refactor the code to follow best practices like single responsibility principle, anemic domain model, controllers as adapters, tell don't ask, and domain events. The refactor is done through a series of code changes and tests to incrementally improve the structure. The goal is to separate concerns, make the domain models more meaningful, use use cases and commands, and communicate actions through domain events.
The webinar covers SQL views, many-to-many (MTM) tables, role tables, pseudo relations, and exclusive relations in Clarify and Dovetail schemas. SQL views allow defining SQL for views instead of dynamically building SQL. MTM tables implement relationships between objects that can have multiple instances associated with each other. Role tables are like MTM tables but have attributes. Pseudo relations use two fields to implement a relationship instead of an actual relation. Exclusive relations are an improvement on pseudo relations and can be used in traversals.
This document summarizes a webinar about Clarify and Dovetail schema concepts, viewing schemas, editing schemas, and tips. The webinar covered database structures like tables, fields, relations, and views. It discussed metadata and the ADP layer. It demonstrated how to view schemas using tools like the Clarify Data Dictionary, ERD diagrams, schema files, and Dovetail BOLT. The webinar compared different schema editing tools and showed how to customize schemas using Dovetail SchemaEditor and schema scripts. It provided tips on customizing schemas, working with schema files, and using SchemaEditor reports.
The document provides information on performance testing processes and tools. It outlines 8 key steps: 1) create scripts, 2) create test scenarios, 3) execute load testing, 4) analyze results, 5) test reporting, 6) performance tuning, 7) communication planning, and 8) troubleshooting. It also discusses tools like LoadRunner, Controller, and Analysis for executing and analyzing tests. The document emphasizes having a thorough test process and communication plan to ensure performance testing is done correctly.
William Bartholomew presented at the QLD VSTS Users Group meeting on customizing work item types in Visual Studio Team System. The presentation covered adding and modifying fields, customizing forms and workflows, defining business rules, and creating new work item types. It provided examples of customizations done by TechnologyOne and Conchango and discussed customizing the work item web page.
ServiceNow Knowledge11 Advanced Scripting & Debugging LabJohn Roberts
In this advanced hands-on workshop you will work with a variety of debugging tools to troubleshoot client and server scripting. You'll learn how to add error handling and debugging assistance to your scripts. We will review some advanced scripting techniques including server-side script includes extending base classes and AJAX client requests. As we will not be covering basic scripting concepts in this session participants will require some understanding of JavaScript and scripting within ServiceNow.
This module is about start using jBPM5 and the things that you need to know in order to understand the basic concepts about how it works. During this module you can download and play with a sample project that define a simple business process with some business rules. This module provides different tests that shows how to interact with our processes in different ways and how to test the behavior unit testing them. For more information check out: http://salaboy.wordpress.com/
High Velocity DevOps: Four Ways to Leverage CloudFront in Faster DevOps Workf...Amazon Web Services
Increase your organization’s agility by diving deep and discovering how Amazon CloudFront integrates with other services to accelerate your DevOps workflows. In this session, which is jointly presented with Realtor.com, we cover four main areas of DevOps with customer success stories. Build: Programmatically launch and configure your CloudFront distributions by using AWS CloudFormation or Terraform templates as infrastructure as code (IaC). Test: Confirm that your updates deliver the intended result with A/B testing before moving all your traffic by using CloudFront and Lambda@Edge. Release: Continuously manage and deploy your application to the Amazon CloudFront Global Edge Network with AWS CodeStar. Monitor: Uncover actionable insights hiding in your CloudFront logs by leveraging Amazon CloudWatch, Amazon Athena, or AWS Marketplace partners for intelligent monitoring and alerting.
The Windows Logging Cheat Sheet is the definitive guide on learning where to start with Windows Logging. How to Enable, Configure, Gather and Harvest events so you can catch a hacker in the act.
AWS RoadShow Manchester Part 3 - Getting Started with AWSIan Massingham
In part 3 of the materials from the July 8 AWS RoadShow in Manchester we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
AWS RoadShow Bristol - Part 2 Getting Started with AWSIan Massingham
In part 2 of the materials from the July 10 AWS RoadShow in Bristol we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
AWS RoadShow Dublin - Part 3 Getting Started with AWSIan Massingham
In part 3 of the materials from today's AWS RoadShow in Dublin we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
AWS RoadShow Cambridge Part 4 - Getting Started with AWSIan Massingham
In part 4 of the materials from the June 25 AWS RoadShow in Cambridge we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
Have you ever been involved in developing a strategy for loading, extracting, and managing large amounts of data in salesforce.com? Join us to learn multiple solutions you can put in place to help alleviate large data volume concerns. Our architects will walk you through scenarios, solutions, and patterns you can implement to address large data volume issues.
AWS RoadShow Edinburgh Part 3 - Getting Started with AWSIan Massingham
In part 3 of the materials from the June 17 AWS RoadShow in Edinburgh we discuss best practices for getting started with AWS and the next steps you can take to learn more about AWS and begin to use it to run your applications and other IT workloads.
Process Builder is an #AwesomeAdmin's Swiss Army Knife by Jennifer LeeSalesforce Admins
Process Builder is an automation tool in Salesforce that can be used to simplify business processes using if/then logic. It supports actions like creating records, sending emails, posting to Chatter, updating records, and calling Apex code. The document provides examples of using Process Builder in Salesforce's Sales and Service Clouds to automate processes like closing opportunities, updating related records, and assigning follow-up tasks.
The document discusses business rules processing and rule engines, explaining what they are, how they work, and providing examples of using rules engines for client-side processing in Flex applications. It covers the basic and Rete algorithms for processing rules, describing how Rete is more efficient by storing rule patterns in a network structure and reusing computations. Real-world examples are provided of using a rules engine for a form builder and Herff Jones' order management system.
This document discusses using rules engines for business logic and provides examples of real-world use cases. It begins with an overview of what rules engines are and how they work, explaining concepts like facts, conditions, actions, and rules. It then discusses different types of rules engines and rule processing algorithms like the basic and Rete algorithms. The document provides code snippets and XML examples from real client-side rules engines developed for applications in domains like forms building, order management, and government benefits applications. It demonstrates how rules engines can externalize and manage complex business rules and workflows.
Customer Automation Masterclass - Workshop 1: Data Enrichment using ClearbitJanBogaert8
In this first masterclass workshop, you'll learn how to write a custom-coded workflow action aimed at enriching your HubSpot CRM data with company information sourced from Clearbit. This is ideal for sales teams who want to adopt an account-based selling approach or for marketing teams interested in account-based marketing.
Easily Transform Compliance to Code using AWS Config, Config Rules, and the R...Amazon Web Services
Topic: Easily transform compliance to code using AWS Config, Config Rules, and the Rules Development Kit
Synopsis:
Enterprises find that they have specific requirements imposed by their business, internal policies, or their particular auditors. As an organisation's cloud environments continue to scale and grow, how do you ensure that the number of growing resources are adhering to your security standards and compliance requirements? In this webinar, we'll learn about how to use cloud native services such as AWS config and custom config rules, to automate audits in a rapidly changing environment and ensure we achieve continuous detection of existing and newly launched AWS resources along with their levels of compliance to enterprise security requirements.
Security policies and standards can be difficult to decipher by developers or the business. Using a behaviour driven development approach, we can define our security requirements to scenario based tests in Gherkin, making it easy for developers and the business to understand the requirement. Security Operations teams or developers can then build scenario based tests as well as develop the associated lambda function for their custom Config Rule. The Rules Development Kit (RDK) for Config Rules is an open-source command-line utility designed to help you shorten the development time of custom Config Rules by up to 5 times. In this session, we'll cover how to use the RDK to write unit tests and build the lambda functions for the custom Config Rule in python, and ensure it behaves as per our requirements defined in Gherkin.
What to expect:
-Learn AWS Config and Config Rules Concepts
-Understand best practice and concepts on behaviour driven development for config rules
-Learn to develop lambda functions for config rules in python using the Rules Development Kit (RDK)
-Discover how to securely set up your environment for deployments
This workshop is a Level 200 session and is best suited for:
-Developers
-DevOps
-Security Architects
-Engineers
-Security Operations
-Technical Managers
The document describes refactoring a Python web application that manages user accounts and budgets. It outlines several steps to refactor the code to follow best practices like single responsibility principle, anemic domain model, controllers as adapters, tell don't ask, and domain events. The refactor is done through a series of code changes and tests to incrementally improve the structure. The goal is to separate concerns, make the domain models more meaningful, use use cases and commands, and communicate actions through domain events.
The webinar covers SQL views, many-to-many (MTM) tables, role tables, pseudo relations, and exclusive relations in Clarify and Dovetail schemas. SQL views allow defining SQL for views instead of dynamically building SQL. MTM tables implement relationships between objects that can have multiple instances associated with each other. Role tables are like MTM tables but have attributes. Pseudo relations use two fields to implement a relationship instead of an actual relation. Exclusive relations are an improvement on pseudo relations and can be used in traversals.
This document summarizes a webinar about Clarify and Dovetail schema concepts, viewing schemas, editing schemas, and tips. The webinar covered database structures like tables, fields, relations, and views. It discussed metadata and the ADP layer. It demonstrated how to view schemas using tools like the Clarify Data Dictionary, ERD diagrams, schema files, and Dovetail BOLT. The webinar compared different schema editing tools and showed how to customize schemas using Dovetail SchemaEditor and schema scripts. It provided tips on customizing schemas, working with schema files, and using SchemaEditor reports.
The document discusses how traditional search options in Clarify systems were not intuitive and challenging to administer. It introduces Dovetail Seeker as a contemporary search engine that provides an easy and intuitive search experience across database content, attachments, files and more. Seeker can power search capabilities for agents, customers and other applications. It indexes data from the Clarify database and allows for advanced search options. The document demonstrates how Seeker improves upon legacy search and enables new search uses and integrations.
Dovetail Software is a leading provider of Clarify products and services. They started in 1995 as First Choice Software and were renamed Dovetail Software in 2006. Their services include Clarify implementations, help desk support, health checks, training, custom development, and business process guidance. Their product suite includes the Dovetail SDK, Rulemanager, Carrier, server processes, tools, web applications, reporting, and integrations. They offer system modernization services to move customers away from outdated dependencies. The Dovetail Rulemanager is a plug-and-play replacement for Clarify Rulemanager, and Dovetail Carrier is a message handling platform.
Rule properties define variables, conditions, and recipients that can be used in business rules. They are stored in the prop_name table and can be viewed and managed through the Clarify client or Bolt tool. Common intrinsic properties include variables like current queue, date fields, and standard object fields, while custom properties provide flexibility. The next session will cover advanced topics like custom business rule events and notifications.
Rulemanager is a key part of the Clarify/Dovetail system that processes events and uses configurable business rules to respond. Business rules consist of events, conditions, and actions. Common actions include notifying users or executing commands. Notifications can be sent to individuals, groups, or based on notification preferences. Command line actions allow calling APIs, scripts, or taking other automated actions. Rulemanager provides flexibility to customize rules and properties to meet various business needs.
Rulemanager is a key part of the Clarify/Dovetail system that processes events and uses configurable business rules to respond. It responds to both hard-coded and configurable events using rules composed of events, conditions, and actions. Common actions include notifying users or executing commands. Notifications can be sent to individuals, groups, or based on notification preferences. Command line actions allow calling APIs, scripts, or taking other automated actions. The system is highly extensible and configurable through the user interface.
This document provides information on reusing knowledge through solutions in a knowledge management system. It discusses separating answers from cases to allow reuse of solutions, which can then be linked to cases. It describes different systems solutions can be accessed through and terms related to knowledge management. It also outlines example workflows for creating, reviewing, approving and retiring solutions over time. Finally, it discusses challenges with current solutions and provides ideas for improvements.
Delivering Cost Effective Clarify Access Beyond The Support CenterGary Sherman
This document discusses alternatives to the traditional Clarify user configuration in order to provide more cost-effective access to Clarify data for additional users. It presents Dovetail Software as a Clarify partner that provides thin-client applications and CRM software as alternatives to the standard Clarify thick-client. The webinar will demonstrate how a web-centric architecture using application profiles in Dovetail's software can extend Clarify access to more users without increasing infrastructure costs.
Dovetail Webinar Data Management & OptimizationGary Sherman
This document discusses Clarify data management challenges related to increasing data growth over time such as performance impacts, increased maintenance demands, and rising storage costs. It then presents Dovetail's Clarify data management solution of archiving selected older data components to reduce production storage costs and system performance impacts while still allowing quick search and retrieval of archived data when needed. The solution uses Dovetail Archive Manager software to purge old cases from the Clarify database into archive files, import those files into an archive database, and provide a browser-based viewer to access and restore archived cases if required.
Upgrade Your Database Without Upgrading ClarifyGary Sherman
This document discusses upgrading a database without upgrading the Clarify application. It notes that traditionally, upgrading requires multiple steps of upgrading Clarify, testing, upgrading the database, and more testing. However, using Dovetail products that have been validated on different database versions allows keeping the existing Clarify version while upgrading just the database. This provides benefits like using newer database technologies without the cost and complexity of a full application upgrade. The document provides examples of companies that have successfully taken this approach with Dovetail's help.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
4. Previously, on Days of Our Lives… Intro to Rulemanager and Business Rules Advanced Business Rules (Part 1) Both presentations are available on the Rulemanager wiki: http://rulemanager.wikispaces.com
7. 1990 called and wants their pagers back Email Notifier Tone Pager Digital Pager Text Pager None Forward to my Supervisor
8. 1990 called and wants their pagers back Rulemanager uses an external app to send pages This means we can take over that method And we can do whatever we want!
10. Paging Application {paging application} -p <pager_type> -t <employees pager number> -m <message to be sent> -e <employees email address> pager_clerk.exe -p SKY_WORD -t 512-123-4567 -m “This is a message” -e “gary@dovetailsoftware.com”
11. Paging Application {paging application} -p <pager_type> -t <employees pager number> -m <message to be sent> -e <employees email address> pager types:text pager: SKY_WORD digital pager: DIGITAL tone pager: SKY_PAGER
12. My Paging Application DOS batch file Powershell script UNIX shell script Java or .NET executable cbbatch script Javascript script Ruby script
13. My Paging Application Send an SMS message Send an email to a user’s mobile device (email to SMS gateway) Make a phone (voice) call Send a direct Twitter message Send an Instant Message Send a message to a beeper (in case you’re still stuck in 1990) Third party APIs and services make this easy
15. Which Message? Tip If sending to a text pager, then the full message is used. If sending to a tone or digital pager, then the abbreviated message is used.
16. Custom Notification Methods There are a couple of examples on the rulemanager wiki http://rulemanager.wikispaces.com
21. User-Defined Business Rule Events Steps Add your event to the business rule GUI Create a business rule for your event Optional: Create an act_entry for your event Create time bomb for your event
24. Create a business rule for your event Object: Case Event: Change Priority Condition: Action: Notify someone
25. Create time bomb (ClearBasic) dim TimeBombRecord as New Record dim TimeBombSave as New BulkSave TimeBombRecord.RecordType = "time_bomb" TimeBombRecord.SetField "focus_lowid", caseRecord.GetField("objid") TimeBombRecord.SetField "focus_type", 0 TimeBombRecord.SetField "escalate_time", "1/1/1753 " TimeBombRecord.SetField "end_time", App.CurrentDate TimeBombRecord.SetField "flags", 65601538 ‘Optional field TimeBombRecord.SetField "time_period", actRecord.GetField("objid") TimeBombSave.InsertRecordTimeBombRecord TimeBombSave.RelateRecordsToIdTimeBombRecord, "employee", _ App.EmployeeObjid, "cmit_creator2employee" TimeBombSave.Save
26. Time Bomb Flags flags = (n * 65536) + 2 for our example of event id 1001: (1001 * 65536) + 2 = 65601538
27. User-Defined Events The User-Defined Business Rule Events document on the rulemanager wiki has all the gory details that I just covered. http://rulemanager.wikispaces.com
32. Adding new object types to Biz Rules Customize the Business Rules form (472) Add a new entry to the Object Type List Add your custom events to the event List Add your custom rule properties Add your custom recipient aliases Create your business rule Create your custom time bomb
33. Adding new object types to Biz Rules Refer to the Adding new Object Types to Business Rules document on the rulemanager wiki: http://rulemanager.wikispaces.com
34. Adding Event Creation Times Examples: Fire an action -30 days fromcontract expiration date Fire an action -30 days fromlicense key expiration date Fire an action 180 days froma site’s last onsite visit date
36. Adding Event Creation Times Customize the Business Rule Action Form (474), adding a new entry to the List Add a Property Name Object for this new Event Creation (@USERTIME150)
37. Adding Event Creation Times The User-Defined Business Rule Event Creation Times document on the rulemanager wiki has all the details. http://rulemanager.wikispaces.com
40. Adding Custom Calendars Edit the Business Rule Actions form (474) Add your new business calendar to the List Create a new rule property for the path to find the new business calendar entry Create a new rule property for the time zone for the calendar
41. Adding Custom Calendars The creating user-defined calendars page on the rulemanager wiki has all the details. http://rulemanager.wikispaces.com
43. What the heck is a Time Bomb? A time bomb is the mechanism used to tell Rulemanager that something happened in the system
44. What the heck is a Time Bomb? A time bomb is simply a row inserted into the time_bomb table
45. Different kinds of Time Bombs Rule Scheduling Time Bomb Indicates an end-user event, such as Case Create Rule Time Bomb Reflect the upcoming action of a business rule Message Time Bomb Internal communication to rulemanager, such as telling it to re-cache information
46. Time Bomb Flow An event happens in the system (such as case is created) A new time bomb is created Rulemanager looks at all of the business rules in the system, to see if this event matches to any business rules If a start event matches, then Rulemanager evaluates the rule conditions If all of the conditions match, then a new time bomb is created for the rule action (this may be now, or in the future) When this time bomb expires, then the business rule action is fired
47. Time Bomb Data The flags field indicates: which kind of time bomb it is What event occurred The escalate field says when this time bomb will “go off” Other data : objid of the “act_entry” for this event objid and type of focus object (case 268435457)
48. Time Bomb Data The Business Rule Time Bombs document on the rulemanager wiki has all the gory details http://rulemanager.wikispaces.com
52. Logging is your friend Clarify Rulemanager: set the Logging Level to Verbose make sure the admin email address is set Dovetail Rulemanager : set the logging level to DEBUG log warnings and errors to a separate log file send email to admin on errors
53. Rules fire, but notifications are not set Check: User’s email address User’s Notification Preferences User’s Business Hours User’s Site’s Business Hours
54. Bad Time Bomb A bad time bomb will have it’s expiration date set way in the future (1/1/2999) This allows you to diagnose it Typically caused by custom time bombs Review log file (search the logs for the time bomb’s objid) Review the data in the time_bomb record
http://bit.ly/rulemanager Twitter hashtag: #rulemanagerTweets using that hashtag will also show up in the backnoise chat
I am the VP of productsWorking in Clarify for 15 years2 years as a customer, 4 years at Clarify as a Principal Consultant, 9 years here at DovetailI love sharing my knowledge of all things ClarifyMy blog at dovetailsoftware.comI actively participate in the Clarify forum on IT Toolbox
If sending to a tone or digital pager, then the abbreviated message is used. If sending to a text pager, then the full message is used.
If sending to a tone or digital pager, then the abbreviated message is used. If sending to a text pager, then the full message is used.
If sending to a tone or digital pager, then the abbreviated message is used. If sending to a text pager, then the full message is used.
If sending to a tone or digital pager, then the abbreviated message is used. If sending to a text pager, then the full message is used.
Technically, act_entry is optional. But I think it’s a good practice.
USERxxxx, where xxxx is a number between 1000 and 4999
This is more FYI – we won’t be covering these in detail today, as they are rarely used
Customize the Business Rules form (472)Add a new entry to the Object Type List (this is new)Add your custom events to the event List (same as earlier)Add your custom rule properties (we covered this last week in Part 1)Add your custom recipient aliases (we covered this last week in Part 1)Create your business ruleCreate your custom time bomb (same as earlier)
The value in the prop_name object will tell the rulemgr how to find a date-time field relative to the focus object (e.g. Case) to use as the Event Creation time. If prop_name is a date-time field: Time bomb trigger time = this date-time value + elapsed time indicated in Business Rule action If this prop_name is an elapsed time or long integer field: Time bomb trigger time = original event time + this elapsed-time/long integer value (taken in seconds) + elapsed time as indicated in the Business Rule action
One of our customers posed an interesting problem to me this week. They have offices in different locations, in different time zones, with different business hours. The employees in these offices work on different hours from one another, meaning that while one group is working, another group is not working, and vice-versa. The issue comes in when one group dispatches a case to a queue to be worked by the other group. More specifically, the issue is when the queue members should get notified by RuleManager. If the queue members are off-hours, then they should get notified as soon as their next work day startshttp://blogs.dovetailsoftware.com/blogs/gsherman/archive/2007/11/06/firing-business-rules-based-on-the-business-hours-of-a-queue.aspx
This is an easy way to tell if your rule action fired
A bad time bomb is one that can’t be successfully evaluated by rulemanager
I will be posting these slides on my blog, so you can get them there.