The document provides guidance on developing custom reports in Ipro. It discusses why custom reports are useful, the necessary skills and considerations for creating them. It outlines the process for building custom reports, including creating the schema, report, and stored procedure. It also covers adding parameters, defining parameter lists, and inserting the report definition into the database so the report appears in Ipro Reports. The goal is to equip users with the knowledge to build fully customized and parameterized reports accessible from Ipro.
FlexNet Delivery and FlexNet Operations On-Demand Tips & TricksFlexera
FlexNet provides tips and tricks for self-registration, Google Analytics, password security, batch queuing, email customization, HTML documents, evaluation orders, and the Reporter tool. Some highlights include allowing self-registration by email domain; viewing Google Analytics data by language, connection speed, and country; setting password expiration policies and member expirations; prioritizing batch jobs; adding order links and localization to emails; inserting help content and instructions as HTML; and creating mass filters and inline functions in Reporter.
Cruise, Eat, Sleep, Repeat Best Practices on Setup and Customizing Your Case ...Ipro Tech
The document discusses best practices for customizing case templates in Eclipse. It provides examples of customizing processing templates to set expectations for document handling, and review templates to save time when creating future cases. The hands-on sections demonstrate how to modify settings for a new employment case, create additional processing cases for different file types, and edit review settings like tags, coding forms and saved searches.
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
This document summarizes a research paper that proposes a method for enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. The method allows users to remotely store and share data in the cloud while ensuring data integrity and hiding sensitive information. It involves generating QR codes linked to file identifiers for data sharing and using signatures during integrity auditing to verify files stored in the cloud. The proposed method aims to address limitations in existing cloud storage systems regarding sensitive data sharing and remote integrity auditing.
The document provides a software requirements specification for an Investment Management System (IMS). The IMS will allow a user to track investments in stocks and bank accounts. It will maintain portfolios, securities (individual investments), and transactions. Key features include computing the net worth and rate of return for investments, downloading current stock prices, and setting alerts. The document defines the system scope, user characteristics, and provides use cases to describe the functional requirements.
This document discusses security templates in Ipro and provides three hands-on scenarios to demonstrate customizing user permissions:
1. The first scenario shows how to create a new user ("SME") and group, apply the "External User" template permissions, and create a secured review pass for the user to limit them to view-only access for a set of documents without tags.
2. The second scenario restricts an attorney user further by disabling search and review functions, review management, and other features to focus them on only tagging documents.
3. The third scenario addresses a case manager's issue with reviewers printing too many pages by having administrators override the print permission for a specific user from the Job Manager.
The document outlines specifications for automatically creating vendor and customer codes in SAP for employees based on their personnel numbers. It will retrieve employee data from the HR master and create matching vendor/customer codes. The addresses will be populated from other employee records. It provides technical details on using BDC transactions to create the vendor/customer master records and any required extensions. It lists test scenarios to validate automatic creation of vendor and customer codes that match employees.
- Users can now check differences when importing applications or archives into Accel Studio to see how existing resources may be impacted.
- An application archiving function allows users to create archives of applications and recover them from any archive.
- Accel Platform now supports defining error handling flows within logic flow definitions to simplify error handling.
This document outlines specifications for a GL mass upload module in an ERP system. It will allow users to upload multiple GL postings from an Excel template. The upload process will include input screens to select the file and define the row range. It will output document numbers for each uploaded row. Technical details describe using internal tables to store the data and calling BDC to perform the actual postings. Test scenarios are provided to validate error handling and normal processing.
FlexNet Delivery and FlexNet Operations On-Demand Tips & TricksFlexera
FlexNet provides tips and tricks for self-registration, Google Analytics, password security, batch queuing, email customization, HTML documents, evaluation orders, and the Reporter tool. Some highlights include allowing self-registration by email domain; viewing Google Analytics data by language, connection speed, and country; setting password expiration policies and member expirations; prioritizing batch jobs; adding order links and localization to emails; inserting help content and instructions as HTML; and creating mass filters and inline functions in Reporter.
Cruise, Eat, Sleep, Repeat Best Practices on Setup and Customizing Your Case ...Ipro Tech
The document discusses best practices for customizing case templates in Eclipse. It provides examples of customizing processing templates to set expectations for document handling, and review templates to save time when creating future cases. The hands-on sections demonstrate how to modify settings for a new employment case, create additional processing cases for different file types, and edit review settings like tags, coding forms and saved searches.
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
This document summarizes a research paper that proposes a method for enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. The method allows users to remotely store and share data in the cloud while ensuring data integrity and hiding sensitive information. It involves generating QR codes linked to file identifiers for data sharing and using signatures during integrity auditing to verify files stored in the cloud. The proposed method aims to address limitations in existing cloud storage systems regarding sensitive data sharing and remote integrity auditing.
The document provides a software requirements specification for an Investment Management System (IMS). The IMS will allow a user to track investments in stocks and bank accounts. It will maintain portfolios, securities (individual investments), and transactions. Key features include computing the net worth and rate of return for investments, downloading current stock prices, and setting alerts. The document defines the system scope, user characteristics, and provides use cases to describe the functional requirements.
This document discusses security templates in Ipro and provides three hands-on scenarios to demonstrate customizing user permissions:
1. The first scenario shows how to create a new user ("SME") and group, apply the "External User" template permissions, and create a secured review pass for the user to limit them to view-only access for a set of documents without tags.
2. The second scenario restricts an attorney user further by disabling search and review functions, review management, and other features to focus them on only tagging documents.
3. The third scenario addresses a case manager's issue with reviewers printing too many pages by having administrators override the print permission for a specific user from the Job Manager.
The document outlines specifications for automatically creating vendor and customer codes in SAP for employees based on their personnel numbers. It will retrieve employee data from the HR master and create matching vendor/customer codes. The addresses will be populated from other employee records. It provides technical details on using BDC transactions to create the vendor/customer master records and any required extensions. It lists test scenarios to validate automatic creation of vendor and customer codes that match employees.
- Users can now check differences when importing applications or archives into Accel Studio to see how existing resources may be impacted.
- An application archiving function allows users to create archives of applications and recover them from any archive.
- Accel Platform now supports defining error handling flows within logic flow definitions to simplify error handling.
This document outlines specifications for a GL mass upload module in an ERP system. It will allow users to upload multiple GL postings from an Excel template. The upload process will include input screens to select the file and define the row range. It will output document numbers for each uploaded row. Technical details describe using internal tables to store the data and calling BDC to perform the actual postings. Test scenarios are provided to validate error handling and normal processing.
This document describes how to create Active Reports in ReportStudio that enable disconnected linking between reports on the Apple iPad using IBM Cognos Mobile. It provides steps for adding an Application Drill-Through definition to allow a report to link to another report. Considerations for design include ensuring all context variables are public, variables match between reports, and scheduling linked reports together. On the iPad, users can drill between linked reports and use the back button to navigate.
Kieran McDonnell from Vuzion Ireland gave a presentation on digital transformation and how Vuzion can help businesses future proof themselves. Vuzion is a cloud aggregator that has been delivering and selling cloud services for 20 years. They have a rich portfolio of cloud services and work with a smart ecosystem of partners. Vuzion's GTM model involves pre-sales engagement, operational delivery, capability development, and bespoke solutions. Julian Dyer from Vuzion then provided direction on Microsoft including updates on products like Skype for Business and Security as a Service. Elaine Pakes from DocuSign discussed how DocuSign can be used to sign documents anytime, anywhere on any device to ensure secure and compliant
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Amazon Web Services
Warden is a homegrown compliance engine used at Discover that leverages AWS native service, such as AWS Lambda, AWS CloudTrail, Amazon S3, Amazon CloudWatch, and Amazon SNS. In this session, discover how Warden empowers Discover employees to deploy AWS resources that meet Discover’s rigorous information security requirements through automated guardrails and near-real-time configuration monitoring, in addition to configuration self-healing and auto-remediation of noncompliant resources.
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...IRJET Journal
The document discusses how artificial intelligence and machine learning (AIML) capabilities can be used to develop an automated platform to handle sensitive business information during mergers and acquisitions. It proposes using AIML for tasks like identifying and redacting personally identifiable information from documents, determining the context of keywords in long documents, and separating signature blocks from email bodies. The platform would allow small and medium enterprises to benefit from these AIML capabilities at a lower cost than using cloud APIs directly.
This document discusses using Amazon SageMaker and GuardDuty to identify anomalous traffic through machine learning. It provides an overview of the goals, agenda, and key components involved. The goals are to demonstrate machine learning for security, show fundamentals of AWS services like CloudTrail and GuardDuty, and discuss building a model in SageMaker. The agenda involves using the AWS Jam platform, reviewing GuardDuty findings, preprocessing log data, training a model in SageMaker, and fusing results. Key components discussed are CloudTrail logs, GuardDuty findings and data sources, and the SageMaker workflow.
You’re Spiky and We Know It With Ravindra Bhanot | Current 2022HostedbyConfluent
You’re Spiky and We Know It With Ravindra Bhanot | Current 2022
Twilio is a communications company with SMS, Voice APIs which see traffic spikes and troughs based on times of the day and week when companies send out communications(think early morning stock updates) or when end customers interact with companies(think restaurant delivery orders placed at lunch or dinner times)
When building a generic monitoring system using Kafka Streams with exactly-once-processing, this spiki-ness can cause some set of our customers(think companies with a lot of interactions as above) to have more traffic at certain times of the day which can let them overpower traffic for other customers(think a group of hospitals sending communication about appointments).
This talk elaborates the challenges that Twilio faced when building such a monitoring platform, which can aggregate customer data and send alerts in a timely manner under SLA. The optimizations we would go in depth are :-
1. TOPOLOGY - Spreading of work in Kafka Streams application topology
2. STORAGE - Statestore reads and writes from topology nodes to avoid data skewness
3. COMPUTE - Use of Punctuator from Processor API to avoid competition between customers
Do listen to this talk if building a real time alerting pipeline OR spreading a mix of global and local state stores OR aggregations over upserts OR use of punctuators in the wild piques your interest.
This document provides instructions for configuring User-ID on a Palo Alto Networks firewall to map users to IP addresses and enumerate users and groups from an Active Directory server. It discusses using the User-ID agent and agentless methods. For agent-based mapping, it describes installing the agent, configuring permissions, and adding the agent to the firewall. For agentless mapping, it covers configuring the firewall and a service account. It also provides information on integrating User-ID with Microsoft NPS and DHCP through a script to automatically map authenticated wireless users.
6 Key Stages to CIF Self-Certified Status_v1.3 DR1115Jason Wyatt
This document outlines the 6 key stages to achieve Self-Certified status under the Cloud Industry Forum's Code of Practice. It describes the stages as: 1) Register and Prepare, 2) Complete the Transparency section, 3) Complete contractual transparency requirements, 4) Complete the Capability section by providing documentation on management systems and resources, 5) Provide a professional reference, and 6) Complete the Accountability section with a management declaration. The document provides guidance on the requirements and documentation needed at each stage to demonstrate accountability, capability, and transparency.
Handling security, multi-tenancy, and self-service reporting for your data as a feature app.
This workshop series features a brand-new demo application—created by the TIBCO Jaspersoft team and projekt202—that illustrates and teaches you how to create answer-generating applications of your own. Over the course of 5 webinars, we will introduce you to the what and the why of data as a feature applications and how you can build your own.
Topics covered in this session:
- Ways to visualize data with Jaspersoft
- Developing a visualization template
- Customizing charts using styles & chart properties
- Creating expressions and data functions
- Using data for non-Jaspersoft visualizations
“CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.”
What is the CompTIA PenTest+
Exam Objectives
Exam Format
Areas to Focus on – Frameworks (NIST, FISMA, FIPS, ISO)
DOD 8570
Observations
Course Coming April 2018
Canadian Maximo User Group Technical Training - Maximo Reporting 201Helen Fisher
BPD Zenith sponsored the Toronto CanMUG 2018. Stephen Hume ran a Training Workshops on BIRT Reporting. This course was designed to improve your company’s ability to make the most of its Maximo data. Plus, discover a cool way to generate a detailed report without BIRT or any SQL by using Maximo MBOs, relationships, automation scripts and actions to their full potential.
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Amazon Web Services
This workshop provides a hands-on opportunity for you to learn to use machine learning (ML) via Amazon SageMaker in your security pipeline. You are guided through the process of feeding data from AWS CloudTrail and Amazon GuardDuty into Amazon SageMaker in order to augment GuardDuty findings. You’ll receive an introduction to Amazon SageMaker and leverage the IP Insights algorithm to train a model based on IP addresses in the CloudTrail logs. This model is used to score IP addresses from GuardDuty findings to gain additional threat information about alerts, enabling security operators to better prioritize alerts for further action.
This document outlines specifications for an AP mass upload program in SAP. It describes uploading vendor payment data from an Excel file, with each row creating a debit or credit note. Key elements include an input screen to select the file, rows to upload, and an execution button. The output would display document numbers. Technical details cover using function modules to import the Excel data, populate internal tables, validate fields, and use batch input to post the documents. Test scenarios are provided to validate uploading data and handling errors.
I doc packaging and mapping techniques.docVERUS BRASIL
This document discusses techniques for configuring file to IDoc packaging scenarios and important mapping functions in SAP XI. It provides steps to configure a scenario to package multiple IDoc instances from a single file in an XI message. It also explains key mapping functions like Copy Value, Exists, Create If, Remove Contexts, Split by Value, and Concat that can be used for complex mappings. Finally, it lists important SAP transactions for working with IDocs, message types, and the integration engine.
ompTIA PenTest+ is a certification for intermediate skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network
Top Ten Tips for IBM i Security and CompliancePrecisely
Users and IT administrators have the belief that the IBM i is a secure system on its own, but what is the actual truth here? While the IBM i is known to be a highly securable system, it also presents unique challenges to security auditors and system administrators alike.
Achieving a secure and compliant IBM i environment is often a complex and difficult process. External threats, the array of security regulations and the increasing demands of auditors continue to grow and evolve every day.
View this webinar on-demand to learn about the top ten key tips for achieving compliance and managing security including topics like:
• Encrypting, masking or scrambling your sensitive data
• Assessing your system definitions and setting them to conform to policy or compliance requirements
• Adding an additional layer of password security with multi-factor authentication
• Making sure your security assessment is done by someone who isn’t managing the system
• and MORE!
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
Agenda:
Introducing Custom Policies in Azure AD B2C
Custom Policy Components
Relying Party and User Journeys
Claims Definitions
Technical Profiles
Getting Started with Azure AD B2C Custom Policies
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
Learn more on getting hands-on with Cisco DNA Center Platform APIs. Join us as we go over the brand new DNA Center Platform and show you how to start integrating and developing your own applications on DNA Center. The possibilities are endless!
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Blockchain is the Internet of exchange. Join this session to get a great introduction to the realm of decentralization and Blockchain technology. You will have the opportunity to be hands-on and build a Blockchain during this session as you learn how this emerging technology will impact eDiscovery.
Financials and eDiscovery - A Primer for Non-AccountantsIpro Tech
Law Finance does not have to be complex. In this session, you will learn the basics of how accountants think and work, and where investigators should begin the search for potential evidence.
More Related Content
Similar to Get the Scoop: Developing Custom Reports
This document describes how to create Active Reports in ReportStudio that enable disconnected linking between reports on the Apple iPad using IBM Cognos Mobile. It provides steps for adding an Application Drill-Through definition to allow a report to link to another report. Considerations for design include ensuring all context variables are public, variables match between reports, and scheduling linked reports together. On the iPad, users can drill between linked reports and use the back button to navigate.
Kieran McDonnell from Vuzion Ireland gave a presentation on digital transformation and how Vuzion can help businesses future proof themselves. Vuzion is a cloud aggregator that has been delivering and selling cloud services for 20 years. They have a rich portfolio of cloud services and work with a smart ecosystem of partners. Vuzion's GTM model involves pre-sales engagement, operational delivery, capability development, and bespoke solutions. Julian Dyer from Vuzion then provided direction on Microsoft including updates on products like Skype for Business and Security as a Service. Elaine Pakes from DocuSign discussed how DocuSign can be used to sign documents anytime, anywhere on any device to ensure secure and compliant
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Amazon Web Services
Warden is a homegrown compliance engine used at Discover that leverages AWS native service, such as AWS Lambda, AWS CloudTrail, Amazon S3, Amazon CloudWatch, and Amazon SNS. In this session, discover how Warden empowers Discover employees to deploy AWS resources that meet Discover’s rigorous information security requirements through automated guardrails and near-real-time configuration monitoring, in addition to configuration self-healing and auto-remediation of noncompliant resources.
Autonomous Platform with AIML Document Intelligence Capabilities to Handle Se...IRJET Journal
The document discusses how artificial intelligence and machine learning (AIML) capabilities can be used to develop an automated platform to handle sensitive business information during mergers and acquisitions. It proposes using AIML for tasks like identifying and redacting personally identifiable information from documents, determining the context of keywords in long documents, and separating signature blocks from email bodies. The platform would allow small and medium enterprises to benefit from these AIML capabilities at a lower cost than using cloud APIs directly.
This document discusses using Amazon SageMaker and GuardDuty to identify anomalous traffic through machine learning. It provides an overview of the goals, agenda, and key components involved. The goals are to demonstrate machine learning for security, show fundamentals of AWS services like CloudTrail and GuardDuty, and discuss building a model in SageMaker. The agenda involves using the AWS Jam platform, reviewing GuardDuty findings, preprocessing log data, training a model in SageMaker, and fusing results. Key components discussed are CloudTrail logs, GuardDuty findings and data sources, and the SageMaker workflow.
You’re Spiky and We Know It With Ravindra Bhanot | Current 2022HostedbyConfluent
You’re Spiky and We Know It With Ravindra Bhanot | Current 2022
Twilio is a communications company with SMS, Voice APIs which see traffic spikes and troughs based on times of the day and week when companies send out communications(think early morning stock updates) or when end customers interact with companies(think restaurant delivery orders placed at lunch or dinner times)
When building a generic monitoring system using Kafka Streams with exactly-once-processing, this spiki-ness can cause some set of our customers(think companies with a lot of interactions as above) to have more traffic at certain times of the day which can let them overpower traffic for other customers(think a group of hospitals sending communication about appointments).
This talk elaborates the challenges that Twilio faced when building such a monitoring platform, which can aggregate customer data and send alerts in a timely manner under SLA. The optimizations we would go in depth are :-
1. TOPOLOGY - Spreading of work in Kafka Streams application topology
2. STORAGE - Statestore reads and writes from topology nodes to avoid data skewness
3. COMPUTE - Use of Punctuator from Processor API to avoid competition between customers
Do listen to this talk if building a real time alerting pipeline OR spreading a mix of global and local state stores OR aggregations over upserts OR use of punctuators in the wild piques your interest.
This document provides instructions for configuring User-ID on a Palo Alto Networks firewall to map users to IP addresses and enumerate users and groups from an Active Directory server. It discusses using the User-ID agent and agentless methods. For agent-based mapping, it describes installing the agent, configuring permissions, and adding the agent to the firewall. For agentless mapping, it covers configuring the firewall and a service account. It also provides information on integrating User-ID with Microsoft NPS and DHCP through a script to automatically map authenticated wireless users.
6 Key Stages to CIF Self-Certified Status_v1.3 DR1115Jason Wyatt
This document outlines the 6 key stages to achieve Self-Certified status under the Cloud Industry Forum's Code of Practice. It describes the stages as: 1) Register and Prepare, 2) Complete the Transparency section, 3) Complete contractual transparency requirements, 4) Complete the Capability section by providing documentation on management systems and resources, 5) Provide a professional reference, and 6) Complete the Accountability section with a management declaration. The document provides guidance on the requirements and documentation needed at each stage to demonstrate accountability, capability, and transparency.
Handling security, multi-tenancy, and self-service reporting for your data as a feature app.
This workshop series features a brand-new demo application—created by the TIBCO Jaspersoft team and projekt202—that illustrates and teaches you how to create answer-generating applications of your own. Over the course of 5 webinars, we will introduce you to the what and the why of data as a feature applications and how you can build your own.
Topics covered in this session:
- Ways to visualize data with Jaspersoft
- Developing a visualization template
- Customizing charts using styles & chart properties
- Creating expressions and data functions
- Using data for non-Jaspersoft visualizations
“CompTIA PenTest+ is a certification for intermediate level cybersecurity professionals who are tasked with penetration testing to identify, exploit, report, and manage vulnerabilities on a network.”
What is the CompTIA PenTest+
Exam Objectives
Exam Format
Areas to Focus on – Frameworks (NIST, FISMA, FIPS, ISO)
DOD 8570
Observations
Course Coming April 2018
Canadian Maximo User Group Technical Training - Maximo Reporting 201Helen Fisher
BPD Zenith sponsored the Toronto CanMUG 2018. Stephen Hume ran a Training Workshops on BIRT Reporting. This course was designed to improve your company’s ability to make the most of its Maximo data. Plus, discover a cool way to generate a detailed report without BIRT or any SQL by using Maximo MBOs, relationships, automation scripts and actions to their full potential.
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Amazon Web Services
This workshop provides a hands-on opportunity for you to learn to use machine learning (ML) via Amazon SageMaker in your security pipeline. You are guided through the process of feeding data from AWS CloudTrail and Amazon GuardDuty into Amazon SageMaker in order to augment GuardDuty findings. You’ll receive an introduction to Amazon SageMaker and leverage the IP Insights algorithm to train a model based on IP addresses in the CloudTrail logs. This model is used to score IP addresses from GuardDuty findings to gain additional threat information about alerts, enabling security operators to better prioritize alerts for further action.
This document outlines specifications for an AP mass upload program in SAP. It describes uploading vendor payment data from an Excel file, with each row creating a debit or credit note. Key elements include an input screen to select the file, rows to upload, and an execution button. The output would display document numbers. Technical details cover using function modules to import the Excel data, populate internal tables, validate fields, and use batch input to post the documents. Test scenarios are provided to validate uploading data and handling errors.
I doc packaging and mapping techniques.docVERUS BRASIL
This document discusses techniques for configuring file to IDoc packaging scenarios and important mapping functions in SAP XI. It provides steps to configure a scenario to package multiple IDoc instances from a single file in an XI message. It also explains key mapping functions like Copy Value, Exists, Create If, Remove Contexts, Split by Value, and Concat that can be used for complex mappings. Finally, it lists important SAP transactions for working with IDocs, message types, and the integration engine.
ompTIA PenTest+ is a certification for intermediate skills level cybersecurity professionals who are tasked with hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network
Top Ten Tips for IBM i Security and CompliancePrecisely
Users and IT administrators have the belief that the IBM i is a secure system on its own, but what is the actual truth here? While the IBM i is known to be a highly securable system, it also presents unique challenges to security auditors and system administrators alike.
Achieving a secure and compliant IBM i environment is often a complex and difficult process. External threats, the array of security regulations and the increasing demands of auditors continue to grow and evolve every day.
View this webinar on-demand to learn about the top ten key tips for achieving compliance and managing security including topics like:
• Encrypting, masking or scrambling your sensitive data
• Assessing your system definitions and setting them to conform to policy or compliance requirements
• Adding an additional layer of password security with multi-factor authentication
• Making sure your security assessment is done by someone who isn’t managing the system
• and MORE!
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
Agenda:
Introducing Custom Policies in Azure AD B2C
Custom Policy Components
Relying Party and User Journeys
Claims Definitions
Technical Profiles
Getting Started with Azure AD B2C Custom Policies
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
Learn more on getting hands-on with Cisco DNA Center Platform APIs. Join us as we go over the brand new DNA Center Platform and show you how to start integrating and developing your own applications on DNA Center. The possibilities are endless!
Join us this month as we recap the Microsoft and 3rd Party security patches released on Patch Tuesday. We will discuss things to watch out for, products to be sure to test adequately, and which patches should be highest priority to roll out.
Similar to Get the Scoop: Developing Custom Reports (20)
Blockchain is the Internet of exchange. Join this session to get a great introduction to the realm of decentralization and Blockchain technology. You will have the opportunity to be hands-on and build a Blockchain during this session as you learn how this emerging technology will impact eDiscovery.
Financials and eDiscovery - A Primer for Non-AccountantsIpro Tech
Law Finance does not have to be complex. In this session, you will learn the basics of how accountants think and work, and where investigators should begin the search for potential evidence.
Panel discussion of the perspectives, pluses/negatives, offerings as well as challenges of utilizing an in-house (law firm) vs. an independent hot seat tech.
Project Management in Electronic DiscoveryIpro Tech
With over 1 million certified project management professionals working in 200 countries across every industry finding efficiency and promoting better outcomes, the time has come for legal professionals and e-discovery practitioners in particular to embrace project management. In this session, Mike Quartararo, the president of the Association of Certified E-Discovery Specialists (ACEDS), a former law firm director, successful consultant to law firms and corporate legal departments, and author of the 2016 the book, Project Management in Electronic Discovery, will share his experience using project management on e-discovery projects. This session will include the fundamentals of project management, best practices for leading e-discovery projects, and how to manage the “process” that leads to successful outcomes in modern-day discovery projects—all skills and competencies that may immediately be put to use on active matters.
Are you just re-posting other people’s content on social media or are you a content creator? In this session, two professionals working in the legal technology space will share their experiences managing their online personas and will teach you how to build your professional brand on social media. This will be an interactive session, and we will be posting LIVE, so bring you phones and don’t silence them!
Life of a GB: Where Is My Data Going and How Can I Get It There Faster?Ipro Tech
Ever wondered what happens to a document as it travels through the EDRM process? This session will focus on the many factors that come into play as data flows through Ipro for enterprise including where it is stored, what resources are being utilized, and how to get to the finish line faster.
Are you deciding whether or not to upgrade to the latest release of Ipro for Enterprise? Do you have questions about some of our newest features? This session is for you! Come and hear about features from our latest releases including new functionality, enhancements and what that might mean for making your workflows easier than ever before!
The document discusses the Ipro platform, which is a collection of microservices that provides functionality for Ipro for enterprise. It describes the key components, which include the Ipro Identity Server, Ipro Web, Ipro Web API, and Ipro Job Manager Agent. The platform establishes an identity provider, uses Redis for message queuing, implements Material Design, exposes public APIs, and enables features like faster development and support for multiple browsers. It provides an example of how the public APIs could be used to automate user account creation from Jira.
Double Down: Migrating Data from Desktop to Enterprise (and back)Ipro Tech
Are you an Ipro for desktop or Eclipse SE user? Perhaps you need to collaborate on document review with co-counsel? Do you have matters that would benefit from a more robust review tool in a cost-effective, hosted environment? This lecture session will discuss the workflow involved with exporting data from the Desktop, what you can expect as an Ipro Service/Cloud customer, and what can be delivered back to you when finished with the Cloud project.
This document discusses tools and workflows for managing electronic data in legal cases. It asks participants to share which tools they use for data collection, tracking, manipulation, importing, searching, and producing discovery. Common tools mentioned include Media Manager, Excel, Access, Tree Size, Icovert, Ultra Edit, Notepad++, and analytics software. The document aims to facilitate discussion among industry peers about best practices for efficiently handling electronic data from collection through case completion.
Do you have basic knowledge of TrialDirector? Ready to try your knowledge out in the Hot Seat? This session applies your previous knowledge and shows you how to prepare properly as well as think quickly on your feet as you sharpen your skills in the hot seat.
Diving Deeper into Networking & Local Options in TrialDirector 360Ipro Tech
What do you don’t have access to your firm’s network to present your TrialDirector case? This session covers the ins and outs of TrialDirector’s networking capabilities including how to ensure you have copy of your case for court.
Presenter’s Advantage: Preparing Exhibits in TrialDirector 360Ipro Tech
Learn best practices, tips & tricks from experts with 35 years’ combined experience as hot seat/litigation paralegals. Exercises include how to modify exhibit properties, annotation features, and how to prepare workbooks for quicker call out and smoother presentations.
This document discusses how TrialDirector 360 can be used to organize case materials like documents, depositions, and multimedia files. It describes creating workbooks to categorize evidence by claims, witnesses, issues, and more. Users can import transcripts and materials, link them together, create clips, and export customized reports and presentations. The tool allows attorneys to efficiently prepare cases, witnesses, and trials through organized evidence management and dynamic presentations.
Proactive v. Reactive Trial PresentationsIpro Tech
With all the intricacies of trial and case management, presentation can make it even more complicated. Here are the differences between the modes of TrialDirector 360’s way of presenting for a more seamless and effective presentation.
Deposition Management: Utilizing TrialDirector 360 to Prepare your Designatio...Ipro Tech
In this session, attendees will learn about TrialDirector 360’s Deposition management capabilities. Get hands on learning experiences with creating and managing party designations and depositions clips, as well as generating exports and reports of your deposition work product.
Flexible Processing for Dynamic WorkflowsIpro Tech
Discover the flexible processing methods available in Ipro for enterprise that allow various ways to perform ingestion, image creation, custom placeholders, and OCR generation. All of this while also reducing processing time minimizing data growth. Join us for this hands-on session that will examine Processing and Review workflows in a new way.
Did you know that Ipro Review has multiple ways to search – Visual and Advanced? Which one should you use… and when? Join our experts as they walk you through different scenarios and different searching techniques you can use to find the documents you need.
Have you ever used TAR in your case? Are you afraid to use it without having previously walked through it in detail? Then this session is for you! We will walk through the TAR process from beginning to end so that you can create the project, run the reports and know how to interpret your results with confidence.
Repro with Ipro: Simplifying your Imaging WorkflowsIpro Tech
In this session, our experts will discuss the best approaches for all phases of the imaging process. We will explore ways of reducing the workload of your imaging set, setting up system defaults for consistency for all your cases/matters, options for reprocessing and maintaining an orderly Imaging/QC environment to reduce clutter and confusion.
The Future of Criminal Defense Lawyer in India.pdfveteranlegal
https://veteranlegal.in/defense-lawyer-in-india/ | Criminal defense Lawyer in India has always been a vital aspect of the country's legal system. As defenders of justice, criminal Defense Lawyer play a critical role in ensuring that individuals accused of crimes receive a fair trial and that their constitutional rights are protected. As India evolves socially, economically, and technologically, the role and future of criminal Defense Lawyer are also undergoing significant changes. This comprehensive blog explores the current landscape, challenges, technological advancements, and prospects for criminal Defense Lawyer in India.
Business law for the students of undergraduate level. The presentation contains the summary of all the chapters under the syllabus of State University, Contract Act, Sale of Goods Act, Negotiable Instrument Act, Partnership Act, Limited Liability Act, Consumer Protection Act.
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
Integrating Advocacy and Legal Tactics to Tackle Online Consumer Complaintsseoglobal20
Our company bridges the gap between registered users and experienced advocates, offering a user-friendly online platform for seamless interaction. This platform empowers users to voice their grievances, particularly regarding online consumer issues. We streamline support by utilizing our team of expert advocates to provide consultancy services and initiate appropriate legal actions.
Our Online Consumer Legal Forum offers comprehensive guidance to individuals and businesses facing consumer complaints. With a dedicated team, round-the-clock support, and efficient complaint management, we are the preferred solution for addressing consumer grievances.
Our intuitive online interface allows individuals to register complaints, seek legal advice, and pursue justice conveniently. Users can submit complaints via mobile devices and send legal notices to companies directly through our portal.
What are the common challenges faced by women lawyers working in the legal pr...lawyersonia
The legal profession, which has historically been male-dominated, has experienced a significant increase in the number of women entering the field over the past few decades. Despite this progress, women lawyers continue to encounter various challenges as they strive for top positions.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
Genocide in International Criminal Law.pptxMasoudZamani13
Excited to share insights from my recent presentation on genocide! 💡 In light of ongoing debates, it's crucial to delve into the nuances of this grave crime.
2. Private and Confidential – Copyright 2019
Why use custom reports?
Enhance with
Visualizations
Can be secured or
restricted
Accessible from
Anywhere
Fully Customizable
3. Private and Confidential – Copyright 2019
Do you have what it takes?
SQL Experience
Ipro Schema familiarity
SQL Reporting knowledge
4. Private and Confidential – Copyright 2019
Where do we begin?
•Reports are executed by the Web service
• Basic - Automatically Detected
• Advanced - Manually Defined
•There are two flavors of custom reports
• Charts or Graphs
• Input Parameters
• Permissions
• Custom Formatting
• Report Interface Categorization
•Advanced reports are required for reports that will contain any of the following
5. Private and Confidential – Copyright 2019
Factors to Consider
∙ What is our END GOAL?
∙ What INFORMATION do we need meet the goal?
∙ Who is the AUDIENCE?
∙ Will the report need SECURITY?
∙ Which MODULE will the report be targeting?
∙ What is the SCOPE?
∙ Will INPUT PARAMETERS be required?
6. Private and Confidential – Copyright 2019
Rules of Engagement
The Numbered Circles on the slides indicate the text file with the appropriate code for that step.
Type or copy and paste the Code for your reports located here:
%Desktop%Ipro Tech Show DocumentsCloud WorkshopDay 2 - Wednesday - May 1stGet the Scoop -
Custom Reports
How do we add a report?
Create the
Schema
Create the
Report
Build the
Stored
Procedure
Verify your
Work
8. Private and Confidential – Copyright 2019
1.Launch SQL Management Studio
and connect to CLD-EVLADD001
Click New Query at the top of the
screen (CTRL+N)
1.Type the Query Code into the
‘New Query’ window
Execute the query (F5)
Create the Schema
%Desktop%Ipro Tech Show DocumentsCloud
WorkshopDay 2 - Wednesday - May 1stGet
the Scoop - Custom Reports
USE IproEclipse_Case000001
GO
CREATE SCHEMA UserDefinedReports
GO
Query Code:
9. Private and Confidential – Copyright 2019
Create the Report
1.1. Copy the
query from the
text file at path
below into SSMS
2. Paste the
Query Code
below into the
current query
window
3. Execute the
Query (F5)
SELECT Custodian
,COUNT(Custodian) AS EmailCount
FROM vDocumentFields VDF
INNER JOIN FileTypes FT
ON VDF.NATIVEFILETYPE = FT.FileTypeID
WHERE FileCategoryId BETWEEN 5 AND 8
GROUP BY Custodian
10. Private and Confidential – Copyright 2019
Build the Stored Procedure
Update the Script to a Stored
Procedure and Execute (F5)
CREATE PROCEDURE
UserDefinedReports.CustodianEmailCount
AS
BEGIN
SELECT Custodian
,COUNT(Custodian) AS EmailCount
FROM vDocumentFields VDF
INNER JOIN FileTypes FT ON
VDF.NATIVEFILETYPE = FT.FileTypeID
WHERE FileCategoryId BETWEEN 5 AND 8
GROUP BY Custodian
END
11. Private and Confidential – Copyright 2019
Verify the Report in Ipro Reports
1. Log into Ipro (Chrome)
2. Navigate to Reports > Select Globex Industries v ATLN Energy - Review> Uncategorized
3. Select Custodian Email Count > Run Report
Web Link User Name Password
https://add.iprotech.com administrator@iprotech.com Admin123!
13. Private and Confidential – Copyright 2019
What is a Report Definition?
Format data headers and columns
Allow Input Parameters
Display Charts and Graphs
Report Security
Categorize by product and type in the interface
14. Private and Confidential – Copyright 2019
Dive into Report Definition
INSERT INTO [Reporting].[ReportDefinition]
([Name]
,[ProductId]
,[ReportTypeId]
,[IsCommonReport]
,[ExecutionMetadata]
,[DisplayMetadata]
,[Description]
,[RequiredPermission])
VALUES
('CustodianEmailCount'
,3
,6
,1
,'{"StoredProcedure":"UserDefinedReports.CustodianEmailCount" }'
,'[ { "Header":"Total Number of Emails",
"Charts": [ {"Type":"horizontalBar",
"Caption":"Emails Per Case",
"XAxisField":"Custodian",
"YAxisFields":["EmailCount"] } ] } ]'
,'Total Number of Emails Per Custodian'
,'CustodianEmailCount')
16. Private and Confidential – Copyright 2019
Report Definition: Name
INSERT INTO [Reporting].[ReportDefinition]
([Name]
,[ProductId]
,[ReportTypeId]
,[IsCommonReport]
,[ExecutionMetadata]
,[DisplayMetadata]
,[Description]
,[RequiredPermission])
VALUES
('CustodianEmailCount'
,3
,6
,1
Name: The display name of the
report on the Reports page in
the User Interface.
Consider a standard naming
convention for custom reports to
ensure clarity and consistency.
*Be sure to use a Custom Schema Name for Defined Reports
17. Private and Confidential – Copyright 2019
Report Definition: ProductID
INSERT INTO [Reporting].[ReportDefinition]
([Name]
,[ProductId]
,[ReportTypeId]
,[IsCommonReport]
,[ExecutionMetadata]
,[DisplayMetadata]
,[Description]
,[RequiredPermission])
VALUES
('CustodianEmailCount'
,3
,6
,1
ProductID: Refers to the
product that your report will
be available to
This must be a value from
the Enterprise.Product table
18. Private and Confidential – Copyright 2019
Report Definition: ReportTypeID
INSERT INTO [Reporting].[ReportDefinition]
([Name]
,[ProductId]
,[ReportTypeId]
,[IsCommonReport]
,[ExecutionMetadata]
,[DisplayMetadata]
,[Description]
,[RequiredPermission])
VALUES
('CustodianEmailCount'
,3
,6
,1
ReportTypeId: Reports
are displayed in groups by
the report type in Ipro
Reports.
Report Type Descriptions
can be found in the
Reporting.ReportType
table.
19. Private and Confidential – Copyright 2019
Report Definition: IsCommonReport
INSERT INTO [Reporting].[ReportDefinition]
([Name]
,[ProductId]
,[ReportTypeId]
,[IsCommonReport]
,[ExecutionMetadata]
,[DisplayMetadata]
,[Description]
,[RequiredPermission])
VALUES
('CustodianEmailCount'
,3
,6
,1
IsCommonReport: This
field determines whether
your report is displayed in
the Ipro Reports page even
if it is not detected in the
product database.
Values are 0 or 1
20. Private and Confidential – Copyright 2019
Report Definition: ExecutionMetadata
,'{"StoredProcedure":"UserDefinedReports.CustodianEmailCounts" }'
,'[ { "Header":"Total Number of Emails",
"Charts": [ {"Type":"horizontalBar",
"Caption":"Emails Per Case",
"XAxisField":"Custodian",
"YAxisFields":["EmailCount"] } ] } ]'
,'Total Number of Emails Per Custodian'
,'CustodianEmailCount')
ExecutionMetadata: Contains the valid JavaScript
Object Notation needed by the system to run the
report. This is a complex field, see the Ipro Custom
Report Creation Guide for more details.
21. Private and Confidential – Copyright 2019
Report Definition: DisplayMetadata
,'{"StoredProcedure":"UserDefinedReports.CustodianEmailCounts" }'
,'[ { "Header":"Total Number of Emails",
"Charts": [ {"Type":“horizontalBar",
"Caption":"Emails Per Case",
"XAxisField":"Custodian",
"YAxisFields":["EmailCount"] } ] } ]'
,'Total Number of Emails Per Custodian'
,'CustodianEmailCount')
DisplayMetadata: Contains the valid JavaScript
Object Notation needed by the system to display the
results. This is a complex field, see the Ipro Custom
Report Creation Guide for more details.
22. Private and Confidential – Copyright 2019
Report Definition: Description
,'{"StoredProcedure":“UserDefinedReports.CustodianEmailCounts" }'
,'[ { "Header":"Total Number of Emails",
"Charts": [ {"Type":"horizontalBar",
"Caption":"Emails Per Case",
"XAxisField":"Custodian",
"YAxisFields":["EmailCount"] } ] } ]'
,'Total Number of Emails Per Custodian'
,'CustodianEmailCount')
Description: A brief summary, instructions, or
description of the report; displayed to end-users
23. Private and Confidential – Copyright 2019
Report Definition: RequiredPermission
,'{"StoredProcedure":“UserDefinedReports.CustodianEmailCounts" }'
,'[ { "Header":"Total Number of Emails",
"Charts": [ {"Type":"horizontalBar",
"Caption":"Emails Per Case",
"XAxisField":"Custodian",
"YAxisFields":["EmailCount"] } ] } ]'
,'Total Number of Emails Per Custodian'
,'CustodianEmailCount')
RequiredPermission: The permission object
associated with the report. Linked to the
Permissions.Permission table.
24. Private and Confidential – Copyright 2019
Run and Verify the Report
1. Execute the Script (F5)
2. Log into Ipro (Chrome)
3. Navigate to Reports > Select Globex Industries v ATLN Energy - Review > Quality Control
4. Select Custodian Email Count > Run Report
Web Link User Name Password
https://add.iprotech.com administrator@iprotech.com Admin123!
26. Private and Confidential – Copyright 2019
• Reserved System Schema name
• Stored Procedures detected in an Ipro case database with this schema name will appear in the
Uncategorized Section of Ipro Reports and will not require a report definition.
• Reports designated by a custom schema name will require a report definition.
Ex: [ADDCustomReporting].[CustodianDocTypeCount]
UserDefinedReports Schema
27. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Permissions.Permission
Add the Report to the
Permissions table so that
it appears in the interface
28. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Managing Permissions
30. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Parameter Display Types
* Require an additional field to be specified in
order to work. See details starting on page 13.
** Only used for reports that require a
CaseProductEnvironmentId (CpeId) parameter (IE.
a Case Specific Report)
Text
Number
Checkbox
Date
List*
Multi-Select*
Hidden**
ABC
123
31. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Creating Parameterized Reports
•Add a Parameter
Definition to the Ipro
database
• Add a Parameter
Stored Procedure to
the Case database
•Parameter Stored
Procedure will need to
return two columns:
ID and Name
•The Parameter Stored
Procedure will be
referenced in the
Execution Metadata
of the report
definition
•May require a
secondary stored
procedure that returns
the values of the
parameter
32. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Parameter List Definitions
• Reporting.ParameterListDefinition table contains the
recommended Parameter List options
• Linked to the ExecutionMetadata field in your Report Definition
• Limited support for Custom Parameter list definitions
33. Instead of the report running on emails only, the
Case Administrator would like to pick the file type.
34. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Adding a Parameterized Report
Report
Definition
Parameter
List
Definition
Parameter
List Stored
Procedure
Report
Stored
Procedure
35. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Let’s add a Parameter: File Category
• Add a new Report Definition
with updated execution
metadata
• Specify a parameter list
definition
Example Execution Metadata:
{
'StoredProcedure’:’ADDCustomReporting.CustodianDocTypeCount',
'ParameterInfo': [
{
'Name': 'FileCategoryID',
'DisplayName': 'FileCategory',
'DisplayType': 'list',
'ParameterListName': 'GetFileCategories'
}
]
}
36. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Parameter List Definition
INSERT INTO [Reporting].[ParameterListDefinition]
([Name]
,[StoredProcedure]
,[RequiresCpeId]
,[ProductId]
,[DisplayColumn]
,[ValueColumn])
VALUES
('GetFileCategories'
,'ADDCustomReporting.GetFileCategories'
,0
,3
,'Name'
,'ID'
)
GO
Add a Custom Parameter List
Definition to the existing table.
37. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Parameter List Stored Procedure
CREATE SCHEMA ADDCustomReporting
GO
CREATE PROCEDURE ADDCustomReporting.GetFileCategories
AS
BEGIN
SELECT FileCategoryID AS [ID] ,
FileCategoryName AS [NAME]
FROM FileCategories
END
Create the following Stored Procedure in the IproEclipse_Case000001 Database:
38. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Parameterized Report Stored Procedure
CREATE PROCEDURE ADDCustomReporting.CustodianDocTypeCount
@FileCategoryID int = 0
AS
BEGIN
SELECT Custodian
,COUNT(Custodian) AS FileCount
FROM vDocumentFields VDF INNER JOIN FileTypes FT ON VDF.NATIVEFILETYPE =
FT.FileTypeID
WHERE FileCategoryId = @FileCategoryID
GROUP BY Custodian
END
Create the following Stored Procedure in the IproEclipse_Case000001 Database:
39. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
We’re All Done!
Upload a Preview Image for easy
recognition!
40. Presentation TitlePrivate and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
Private and Confidential – Copyright 2019
We’re All Done!
Gus
Ipro Reporting boasts a customization feature that enables the ability to provide useful, colorful, customized reports to clients and customers.
Ipro custom reports can be enhanced with visualizations.
Custom reports are accessible from anywhere, with the Ipro Solution.
Ipro custom reports can be secured or restricted to specific users or groups.
Gus’s Slide
Schema familiarity
Familiarity with SQL & reporting
Mike
Ipro Custom reports are executed by the Web service.
There are two flavors of custom reports:
Basic - automatically detected
Advanced - manually defined
An advanced report is required for reports that will contain the following:
Charts or graphs
Input parameters
Permissions
Custom formatting
Report categori
Mac
Scope : Multiple case or one and done
Mac
Gus - Story
Gus
Does it execute successfully?
Do you receive any errors?
Mac
Does it execute successfully?
Do you receive an error?
Mac
Mac
Gus
Who knows what a parameter is and can give me an example?
Gus
Gus
Mac
Mac
6 is Quality Control
Gus
Gus
TXT file #4
Mike
Mike
Who knows what a parameter is and can give me an example?
Which ones are most commonly used
Date and List
Mike
Parameterized reports may require a secondary stored procedure that return the values of the desired parameter
A Parameter Definition will need to be added to the Ipro database and the parameter stored procedure added to the case database.
The parameter stored procedure will need to return two columns: ID, Name
There parameter store procedure will be referenced in the Execution Metadata field of the report definition.
Screen shot of the Parameter List definition table – they will be in SQL so just have them open that table to view the options.
Mike