All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.
FIELD status:="Pending Approval"; FIELD submit_flag:="done"; FIELD submit_date:=@Today; SendTo := approver; CopyTo := ""; BlindCopyTo := bcc; Subject := "IBPC Admin Equipment Order for " + username_hidden + " requires your approval"; Remark := "An IBPC Admin Equipment Order has been entered for " + username_hidden + ". Your approval is required. Please click on the following link and approve or reject the request."; @Prompt([Ok];"Order Received.";"Thank you for completing this order. Your order has been received and is pending approval."); @MailSend(SendTo; CopyTo; BlindCopyTo; Subject; Remark; "";[IncludeDoclink]); @Command([Compose];"ibpc_order_form_peripherals"); @PostedCommand([FileSave]); @Command([FileCloseWindow]); @PostedCommand([FileCloseWindow])
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
18 Experts available now in Live!