2020

Sunday, July 5, 2020

sqlservermanagementstudio.net

As name implies that it's  about forecasting cash, if you are working with Dynamics 365 and come across with a situation where you don't have any idea about how much cash your organization may have in future Cash flow forecasting is used for this task.

For this task to achieve in Dynamics 365 you need to know
You need to identify the liquidity account  details of your organization
Below is the details view of cash flow forecasting configuration as to how you actually achieve this using dynamics 365.
cash flow forecasting configuration in Dynamics 365 Finance and Operation
Advance detailed configuration of cash flow forecasting in Dynamics 365
Here are some more details you are working in an organization as technical finance consultant and your client needs you to configure cash flow forecasting to know how much cash this company may have in the near future so clients want some amount of percentage to reflect in other main accounts and for this what you would be doing.
of course, you will set up cash flow forecasting form using D365 and define dependent accounts and which account and its percentage associated with another main account there etc.
And some other details you might consider doing and understand are:
You should initially characterize the liquidity records to follow with income forecasting or cash flow forecasting. Regularly, these liquidity accounts are primary records or main accounts that are related to the ledgers that will receive and dispense money or cash.

On the Cash stream or stream or cash flow forecast arrangement page on the

General record tab, select the fundamental or main account to fundamental or main account to incorporate for forecasting.

On the off chance that a ledger has been related to the principle account on the Bank account page, you can check it might appear in the Bank account field.

You can set up a
dependent cash flow for a fundamental account that contains transactions that are straightforwardly identified and related in another fundamental account or main account for you to understand it easily.
Any line that you add in the independent main account area makes an income gauge or cash flow sum in a needy fundamental account or in the main account.
This sum is a level of the income that adds up to the essential principle account or primary main account that you chose.
To start with, setting the Main account field to the essential principle account or base main account where transactions are required to at first happen or start.
Setting the Dependent principle account to the account that will be influenced by the underlying transaction against the essential primary or main account. you can set other values for different fields on the line.
You can change the number in the Percent field to mirror the impact of the essential principle account on the reliant fundamental account or main account.
For a sales or buy or purchase forecast, select a Terms of installment esteem or term of payment value that is regular for most clients or sellers. Set the Posting type field to the normal posting type that is identified with the cash flow forecast.


Thursday, March 19, 2020

A network of connected objects be it a car, smartphone, camera or device or sensor – can communicate with other electronic devices to send and receive data called IoT.
what Internet network is that you are connected with all computer with each other, in mobile networks you can connect with another smartphone- but this internet of thing is actually an object of network connected with sensors etc and can connect with other objects that can include sensors or other devices can communicate with each other and all these sensors can transport data and actually can talk with each other.

How IoT works with Example:


A network of physical object or sensors network example includes google speaker, smart tv, c cooking appliances can communicate and understand your commands
This means that we are moving from traditional devices like mobile phone tablet to other sensors like temperature devices.

So once these sensors are communicating with other devices so must be transmitting data somewhere so it could be a process so that area is called services in this connectivity. typically it could be on the cloud.

IoT Summary:

In many fields it can be applied if you implement this IoT in manufacturing like car operation section then traditionally there are the different mechanism to start and stop production line for the purpose.
But understand that there is no replacement of humans even if you automate the entire production procedure using IOT technology in any operation procedure.

For example, you have a manufacturing production procedure where any error occurs then red led bulb lights up and halt the operation so nothing could go wrong any further.

So ideally a solution can contain a IOT device where the supervisor is not in the operation line then how he will know the production line has any super issue, so IOT can solve such issues as well, where the error occurs on the production line like your computer is connected with the raspberry pi and a sensor when something goes wrong employee attending activity can press a button connected with raspberry pi interface which is connected with your usb port as it required services layer to transport data – so finally this solution can halt the operation due to error issue and can also send SMS using IoT on your smartphone informing line manager asking him to take action.

What are security concerns related to IoT

Because any IOT solution or your IOT device communicating with sensors so it will not be done via TCP/IP so we can assume it’s not vulnerable or anyone can hack your IoT device or sensor and breach it so this is just close to impossible in solution based on IoT.

  • For this entire solution to be working you need azure services for IoT, raspberry pi, IOT kit, and of course a computer connected with your solution.
  • In this typical example, all devices and sensors connected to each other and there is no need for the internet to transport data among these devices.

Hope this might help you to understand IoT - please stay connected with this site to learn more about IoT in detail.

Tuesday, February 25, 2020

Actually phishing is activity used for stealing user id and password or credit card details by disguising some appearance- recently same thing has occurred through Google forms attacking on office 365 users.
If you are office365 users so this might has happened with you if not then beware of such stuff.
Phishers has deceived users using fake screen attacking office 365 suite on cloud– it’s been observed that phishing email generated from validate email account and trying to gather Microsoft credentials.

Initially it looks this email is coming from Microsoft and asking users to Update office 365 suite or user might face suspension of their account – and after looking at decisive email message – users just press panic button and start clicking on it where email message say ‘Update Your Office 365’ suite on cloud or your account will be suspended. As a result urging user to click on it so entire id and password information has been compromised.

 This is an absolute example of phishing where users is presented with the fake website  which matches the original site  where easily user can enter their password credential – now this time Microsoft user data – office 365 credentials has been compromised and “gone fishing” I mean phishing.

It’s difficult if you are working through mobile device because you have setup everything on your mobile where you see such altered screen which is difficult to recognize it as phishing message that urging you to click provide all confidential information and breaches whereas if you are working from desktop so might have this idea where that link is taking to provide such information whether that link is from Microsoft or not- this time Google forms has been used to gather all information and identical for office update message.

How to stay protected from Google docs form which says update office 365:

of course, don't click on such phishing messages
  • You can do some tweaking at your outlook level to mark such message as phishing
  • you also can do some tweaking at office 365 level
  • You can report such phishing message to Microsoft 
  • Make sure link is safe to click or not I mean is it coming from valid source
Google forms has been used for deceiving users and presented with screen where user could enter their password and email so entire stuff would be compromised.
You only  need to recognize it if that email is from legitimate site or not or let’s say-  is that email coming from Microsoft which says update your office 365 so user would not be clicking on it – this might be the only remedy for now.

if you have any other information how to stay protected from phishing message other than not to click on it then please leave comments









Friday, February 7, 2020

SharePoint can also be used to store list and libraries and save list item and document property's values also known as metadata which is also known as data about data –very powerful technique to use in search query so entire information can be accessed anytime about your items.  Thus creating a powerful search mechanism help you access specific information stored inside your document.

Metadata can also be used for accessing your media files or access assets once you associate them using keyword for browsing. You store files physical files or media files or any asset re so what if if you don’t need to remember media files location or document library so ideally you can define it for all these assets or files so you can access them via keyword that you have defined.

If you are familiar with content type technology which is available in SharePoint by using it anyone can store different information for different files using one document library which is beauty of SharePoint and automatically populate them via metadata.

Why use metadata with Record Center site:

Even when working with record management centre site you have ample room to define or classify data with your records which is traditionally hard to find and organize.
One flavour is to classify your record or even with your invoice you can define additional information about your invoice by adding  into it.


  • Other flavor is to enhance your search by defining it as keyword.
  • Many org and companies when storing document they store it into library.

And further create folder and then folder to store document in this document library- but main problem with this approach is difficult to find your documents from such structure – and if you define it at site level or document level so you can easily find your documents which will be auto populated too.

Why managed metadata so important:


As term employs that managed metadata is a place where you can manage your metadata centrally,
By enabling metadata service you can define managed metadata and termset and utilize them globally.

Don’t get confused with tagging – this technique is basically implementing it at specific list item
As final thought SharePoint provides central term management mechanism, so you can define common set of terms which can be used on entire site level. Once you define it then you can associate them with your list and libraries you also can take full advantage of auto populate metadata sharepoint and configured your portal based on this mechanism.





Friday, January 24, 2020

HIPAA can be defined as administrative provision of health insurance portability and accountability act practiced in United States and its implementing regulation, including privacy rule, breach notification rule and security rule also amended from time to time.

When it comes to implementation of HIPAA in azure then Microsoft keeps dual responsibility model between customer and azure container where Microsoft is fully liable for services offered on cloud and ensures that customers get security and privacy and compliance accordingly.

Where customer would be responsible for the services provisioned for them, also customers application and data and VM and regulatory requirement applicable to them.


How to make azure HIPAA compliant:


HIPAA encourage organizations to use cloud services whereas only security is real concern where customer data is fully protected.

As you know customer who are using cloud services for HIPAA is called BA (business associates such as cloud service provider, or IT Companies)  meaning business associates they process PHI on their behalf,  so first to understand that one thing is Microsoft offering cloud services another one is BAA business associate or organization practicing healthcare activity and another one is HIPAA act means healthcare insurance activity.

Azure service fabric HIPAA:


We hope you have better understanding about the term used in HIPAA rule called PHI which is patient health information – so covered entities includes doctors, health insurer or other healthcare companies at any point of time can disclose protected information to law enforcement personnel as required by act or for administrative request where azure services comes into picture where you are allowed to use HIPAA in azure.

To be very precise HIPAA regulation actually needs covered entities and their business associates here as you understood when Microsoft providing cloud services to covered entities means (health insurer) gets into contract to ensure PHI is protected.

All customers must have their own compliance mechanism policies and procedure in place according to the HIPAA requirement where customer has to verify it independently with their own legal entities that their needs meet the HIPAA requirements.

HIPAA has different security policies so Microsoft azure ensures that audit for such services is done by external auditor under ISO 27001 standard where all security standard are required to implement.
Many security item will be identified by application controlled by customer itself, few you can check as you design and implement solution on azure.

Microsoft does not monitor application or services on azure and data what customer wish to use on azure cloud. So as customer you should check VM(virtual machine) log, azure portal itself and azure storage,  here things are very clear Microsoft is giving you a platform to implement HIPAA act in terms of services - and it's you making it HIPAA compliant actually- then only you can say -Azure is HIPAA compliant.

 Customer is solely responsible for mitigating suspected or unknown incident which could cause harm application and ultimately azure database services.

Customer is also responsible for using any cluster environment and patching software if customers want to implement HIPAA with it or customer want to make it HIPAA compliant.

In terms of application data which is critical for functionality such as user access to entities or user access to patient health information will be controlled by design and customer’s application itself.
Customer also responsible for securities’ breaches and responsible for data being used by app to database to ensure unauthorized access should not be given.

As you understood that when customer are fully liable to secure their own app and that app accessing and sql databases in order to prevent unauthorized access.  This will cover any t-sql statement used inside their application through databases for improper use of data -customer is fully responsible for that.

Concluded observation:

As mentioned earlier its your organization responsibility to ensure compliance act in place followed by internal process and programs which aligns you and particular services  synced with HIPAA.

Legends:
VM: virtual machine
HIPAA: Health Insurance Portability and Accountability Act
PHI: Patient Health Information
BAA: Business Associates

Assuming it here you will be using number of services:
Azure Container - you can get it free for a month from Microsoft site.
you will store patient information including patents diseases and medical record in sql azure databases.
you will configure Azure AD which will help enhance security to implement role based access directory.
Technically- you will have to go deeper in order to implement solution which is HIPAA compliant.


Thursday, January 2, 2020

sqlservermanagementstudio.net

If you reached at the point where you think someone is causing you defame or causing your prestige at stake in the form of creating content hurting your site or content causing your site in trouble or your web reputation is in danger when we say content this means text, article, website media file etc. so here we will elaborate course of action how to remove negative articles from Google.


How to discard negative articles from Google:


If you are living in a bad neighbourhood then what will happen actually your reputation will be damaging because of it-especially when you can’t control that information or article or link.


We are assuming that we are dealing with article here and will guide you through the procedure as how to remove negative articles from google using google public removal tool.

Straightforward approach:

Step one is to identify those articles and try to reach out those site owners who has published them on their sites – request them to remove them from their sites.

Category of articles:

There are different type of content which can be removed from google, initially you learned articles and those articles must be published somewhere on other source sites, so eventually its pointing back to your site hurting your site – surprisingly  our site is becoming so spammy day by day.

Paid type content or articles:

If those articles are paid articles then it’s a bad practice for Google and eventually google targets those sites which have paid links.

Article link exchange:

If particular link or article is pointing back to your site as link exchange then it’s a bad link Google will take action against it.
  • Any site that is setup only for links goes into bad link or negative
  • Any comments that is pointing back to your site goes into spam category
  • Another type of article or link that is pointing back to you or your site but coming from non-targeted region means your site is English and link coming back to you from German site.


Good articles or links can make your site more powerful whereas bad negative article can do opposite so you need to handle bad article or remove it from source so google could protect you from link related penalties.

Beware of such activities:

There is warning from Google if someone is trying to remove article from Google so take great care of such activity when trying to remove negative articles from Google.
This procedure is bit techy and one of its kind  we hope you can do it if not then find and hit contact us form and we will love to help you in this procedure for free and inform Google about it on behalf of you.

Procedure to remove negative link is straightforward compile list of articles where you are sure links are pointing back to your site and causing issues for your site.

Discarding negative articles from Google using Google public removal tool:


There are various services out there can give you a list of those articles and you need to format those links into manageable format which is allowed by Google because Google has sophisticated mechanism to discard article from web which are used for damaging your site or reputation.
We are assuming it you have list of article and want to compile into manageable format. So for example you can download those links from webmaster tools – login your site in webmaster tools if you are doing it for the first time then verify your property in webmaster dashboard property is your website in webmaster tool.


how to remove negative articles from google
How to remove negative articles from google search



Then you will see console as seen above.
then you need to navigate to link from left hand navigation then you will see the screen below

amazing procedure how to remove articles from google
amazing procedure how to remove articles from google


And then you can  click on download sheet so you can compile list of articles
Excel sheet snapped while removing article from google search using google tool
Excel sheet snapped while removing article from google search
they are pointing back to your site as spammy link. It depends how you have extracted links- these links will be downloaded in different format.



These articles link are spammy and you have to format it according to google guideline so let’s add ‘http://’ for entire column so all entries should be complete url starting with http:// you can add column at first by placing pointer on header sheet as illustrated in the snap below and click right mouse on header you will see insert column pop up as shown below
amazing procedure to remove articles using google tool
amazing procedure to remove articles using google tool


And click insert 1 left column so you can enter ‘http://’ text in that column so articles could be formatted as per google guideline which would be starting as complete article url.


Add ‘http://’ text at first cell and drag it down to copy past it for entire articles entries then you will see complete url as shown below in picture for site.

List of articles needs truncation to submit them using google
List of articles needs truncation to submit them using google
We are assuming it -you have number of articles which includes url as shown spammy pointing back to your site as spammy article.

Now you need to trim this sheet to copy this urls data.

Now you need to concatenate  A4 and  B4 CELL and past it in new cell as illustrated in picture below to make it as complete article url starting with 'http://'  


trim urls to submit negative articles to google
trim urls to submit negative articles to google


You just need to write formula concatenate in excel to combine these two column and making it complete article url.
Write excel formula at I4 as shown in picture above and drag it down for entire article entries of urls.




Now you need to copy the entire cells not formula from this pop up menu as illustrated in below picture

Remove negative article using google
Remove negative article using google

And then past these values into new cell or sheet and making it a new file and save it as UTF -8 or ASCII format type while saving it as sheet file when you will save it as file it should be txt and UTF-8 or ASCII so all values from this sheet will be copied in new file as txt extension which will be acceptable by google.

As you can see below my copied values in new sheet and now I will save them as new txt file which has UTF-8 or ASCII type I will select this option while saving it through save dialog box.

how to remove articles using google tool
how to remove articles using google tool



As of now we have copied all article urls which were spammy and we have formatted as per google guideline. 

Removing article domain from google search:


Google says if you are marking any bad article then it should be starting with 'http:// ' and the entire url as you have gone through above example and if you are going to mark entire domain then there is different mechanism.

It depends on you whether you want to compile it as article file or you can compile it mentioning all articles from one domain

Once you decide which way you want to inform google about spammy  links just mention domain or article url.


Example of spammy article for a domain.
Article example to discard from google.


Domain example to remove articles from google search you review it in the snapped above.

Now you have text file ready to inform Google about bad articles you want them to be removed from Google search it's your choice you discard entire domain or one by one article urls.


if you think this entire procedure is lengthy then don't worry we are here to help you free,  hoping this help you out which is a procedure to discard article from google search.

Now you click link to upload this file here

Once you submit that file you will be able to remove negative google results using google public tool we believe so. If you have problem in identifying spammy domain or entire article then hit contact us form and we will help you out.