This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
lpopescu
Level 5
- Revenera Community
- :
- About lpopescu
Jun 17, 2020
03:55 PM
Hi, I'm getting an error message when trying to create the new report. Unexpected character ('}' (code 125)): was expecting double-quote to start field name
at [Source: (org.glassfish.jersey.message.internal.ReaderInterceptorExecutor$UnCloseableInputStream); line: 6, column: 2] Thanks,
... View more
Jan 24, 2020
11:41 AM
Thank you for the reply. We were really happy with the added "CodeAware" feature in FNCI 6.13.2 and were looking forward to use it in parallel with Palamida Analyzer. The way we were planning on using the Code Aware feature was as follow: In a project we would have workspaces scanned by the Palamida Analyzer and in the same project we also created workspaces for pypi, and bower that were scanned with Code Aware (IMO CodeAware does a better job for those packages). About 98% of our projects are scan with Palamida Analyzer. Since the GUI for Palamida Analyzer was removed on FNCI 6.13.3, the only way to enable the Analyzer is through the scanEngine.properties file. If we turn ON the Analyzer using "disableAnalyzer = false" in the config file, the Analyzer is turned on for ALL the projects/workspaces, even for the ones that are marked to be scanned with Code Aware only. If we want to scan one workspace with Code Aware, we would now have to stop Palamida, replace the disableAnalyzer flag, and restart palamida scanner, then we can scan the workspace. is this correct? Lauren
... View more
Jan 22, 2020
11:21 AM
1 Kudo
In your release notes for 6.13.3 it states: "CodeAware has now replaced the Analyzer as an analysis technique for scans and reporting." Yet on the on the Automated Analysis tab you still have this note: "If a project workspace was previously scanned with Analyzer, you are strongly recommended not to enable CodeAware (either in conjunction with or in place of Analyzer) for subsequent scans, as this can result in duplicate groups." Has this issue been fixed, or we are going to have to deal with duplicates since ALL our projects were scanned with the Analyzer. We are going to set disableAnalyzer = false since Analyzer is still our preferred scan engine. CodeAware is faster and does a better job for pypi and npm's in creating the components, but it does not find the correct license and copyright info as the Analyzer does. Thanks, LP
... View more
Labels
- Labels:
-
FlexNet Code Insight 6.x
Dec 04, 2019
05:33 PM
Hello Palamida Support Team, In FNCI 2019.R3 you have "Notices Text" box setup as a Rich Text field, however the Notices Report is generated as text only. Do you plan to have Notices Report generate the same formatting found in the Notices Text field? Thanks, LP
... View more
Labels
- Labels:
-
FlexNet Code Insight 7.x
Oct 31, 2019
12:38 PM
I'm seeing the same issue with "FlexNet Code Insight 2019 R3 (Build 93)" Log files can be found under "Case# 01938593" Thanks, 2019-10-29 17:48:00 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.RangeCpeStreamer - No CVE for id CVE-2010-1449 java.lang.Exception: No CVE for id CVE-2010-1449 at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.getFields(SearchCVEAnalyzer.java:345) at com.flexnet.codeaware.lucene.Index.storeDocument(Index.java:237) at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.indexFile(SearchCVEAnalyzer.java:125) at com.flexnet.codeaware.lucene.T2.run(T2.java:68) at java.lang.Thread.run(Thread.java:748) 2019-10-29 17:48:00 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.RangeCpeStreamer - No CVE for id CVE-2009-4134 java.lang.Exception: No CVE for id CVE-2009-4134 at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.getFields(SearchCVEAnalyzer.java:345) at com.flexnet.codeaware.lucene.Index.storeDocument(Index.java:237) at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.indexFile(SearchCVEAnalyzer.java:125) at com.flexnet.codeaware.lucene.T2.run(T2.java:68) at java.lang.Thread.run(Thread.java:748) 2019-10-29 17:48:00 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.RangeCpeStreamer - No CVE for id CVE-2010-5278 java.lang.Exception: No CVE for id CVE-2010-5278 at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.getFields(SearchCVEAnalyzer.java:345) at com.flexnet.codeaware.lucene.Index.storeDocument(Index.java:237) at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.indexFile(SearchCVEAnalyzer.java:125) at com.flexnet.codeaware.lucene.T2.run(T2.java:68) at java.lang.Thread.run(Thread.java:748) 2019-10-29 17:48:00 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.SearchCVEVendor - Created index /opt/palamida/CodeInsight/config/.codeaware/cves/vendor_index, 21302 files indexed, 0 not indexed, 0 files had exceptions, 4 threads 2019-10-29 17:48:01 [Thread-75] WARN c.f.c.cve.lucene.SearchCVEComponent - Invalid component line during create index: diplomat_\|_political_project| diplomat_\|_political| diplomat \| political 2019-10-29 17:48:01 [Thread-77] WARN c.f.c.cve.lucene.SearchCVEComponent - Invalid component line during create index: dell| data_protection_\|_encryption| data protection \| encryption 2019-10-29 17:48:01 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.SearchCVEComponent - Created index /opt/palamida/CodeInsight/config/.codeaware/cves/component_index, 65513 files indexed, 2 not indexed, 2 files had exceptions, 8 threads 2019-10-29 17:48:01 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.RangeCpeStreamer - Invalid component line during create index: diplomat_\|_political_project| diplomat_\|_political| diplomat \| political java.lang.Exception: Invalid component line during create index: diplomat_\|_political_project| diplomat_\|_political| diplomat \| political at com.flexnet.codeaware.cve.lucene.SearchCVEComponent.indexLine(SearchCVEComponent.java:189) at com.flexnet.codeaware.cve.lucene.SearchCVEComponent.access$100(SearchCVEComponent.java:46) at com.flexnet.codeaware.cve.lucene.SearchCVEComponent$T1.run(SearchCVEComponent.java:345) at java.lang.Thread.run(Thread.java:748) 2019-10-29 17:48:01 [http-nio-8888-exec-8] INFO c.f.c.cve.lucene.RangeCpeStreamer - Invalid component line during create index: dell| data_protection_\|_encryption| data protection \| encryption java.lang.Exception: Invalid component line during create index: dell| data_protection_\|_encryption| data protection \| encryption at com.flexnet.codeaware.cve.lucene.SearchCVEComponent.indexLine(SearchCVEComponent.java:189) at com.flexnet.codeaware.cve.lucene.SearchCVEComponent.access$100(SearchCVEComponent.java:46) at com.flexnet.codeaware.cve.lucene.SearchCVEComponent$T1.run(SearchCVEComponent.java:345) at java.lang.Thread.run(Thread.java:748) 2019-10-29 17:48:01 [http-nio-8888-exec-8] ERROR c.f.codeaware.spring.AnalysisService - Error creating CVE indexes: java.lang.NullPointerException: null at java.util.Hashtable.put(Hashtable.java:460) at com.flexnet.codeaware.cve.CVEIndexer2.build(CVEIndexer2.java:266) at com.flexnet.codeaware.cve.lucene.SearchCVEAnalyzer.createCVEIndexes(SearchCVEAnalyzer.java:100) at com.flexnet.codeaware.AnalysisDriver.createCVEIndexes(AnalysisDriver.java:113) at com.flexnet.codeaware.spring.AnalysisService.createCVEIndexes(AnalysisService.java:281) at com.flexnet.codeaware.spring.AnalysisController.createCVEIndexes(AnalysisController.java:280) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:133) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:97) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:849) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:760) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:85) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:967) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:901) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:970) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:861) at javax.servlet.http.HttpServlet.service(HttpServlet.java:635) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:846) at javax.servlet.http.HttpServlet.service(HttpServlet.java:742) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.web.filter.ApplicationContextHeaderFilter.doFilterInternal(ApplicationContextHeaderFilter.java:55) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.trace.WebRequestTraceFilter.doFilterInternal(WebRequestTraceFilter.java:111) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:99) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.HttpPutFormContentFilter.doFilterInternal(HttpPutFormContentFilter.java:109) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.HiddenHttpMethodFilter.doFilterInternal(HiddenHttpMethodFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:197) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.actuate.autoconfigure.MetricsFilter.doFilterInternal(MetricsFilter.java:103) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.springframework.boot.web.support.ErrorPageFilter.doFilter(ErrorPageFilter.java:130) at org.springframework.boot.web.support.ErrorPageFilter.access$000(ErrorPageFilter.java:66) at org.springframework.boot.web.support.ErrorPageFilter$1.doFilterInternal(ErrorPageFilter.java:105) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.springframework.boot.web.support.ErrorPageFilter.doFilter(ErrorPageFilter.java:123) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:199) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:493) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:137) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:81) at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:660) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:87) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:798) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:66) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:808) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1498) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.lang.Thread.run(Thread.java:748) 2019-10-29 17:48:01 [http-nio-8888-exec-8] ERROR c.f.c.spring.AnalysisController - Failed indexing CVEs
... View more
Oct 24, 2019
05:03 PM
Hello Flexera Support. We have a very large Auto-WriteUp.xlsx file on FNCI 6.13.2 and we'll like to import it into the Custom Data feature available on FNCI 2019.R3. Do you have any REST API's examples on how to create new custom detection rules. Thank you, LP
... View more
Labels
- Labels:
-
Both Versions
Sep 11, 2019
11:30 AM
Including some of the images for clarification.
... View more
Sep 11, 2019
11:28 AM
I'm running FNCI 2019R2 on CentOS 7 I setup my Project under version control settings "Instance #1" to download and scan some source code from GitHub. Under my project id #14 FNCI created git.0 sub-directory, downloaded all the code from our internal GitHub, and scanned it. (OK so far.) After the scan I setup a second scan path where I uploaded the files that usually go to our customers. Now the Scan Paths look like this: /tw-src/ccm-latest (and contains the "Updates" subdirectory) /tw-src/14 (contains the "git.0" subdirectory) I started a new scan and noticed the following behavior: My "Updates" sub-directory that was under "/tw-src/ccm-latest" has been removed and a new git.0 was created. /tw-src/14 still contains the old "git.0" sub-directory from last week. Not sure if this is a bug or intended behavior, but I would have thought the git.0, git.1...etc... would have been created in /tw-src/14 and my directory path would have been left alone. Could you please explain the "correct" behavior when there are multiple scan paths? Including some of the images for clarification. Thanks, Lauren
... View more
Labels
- Labels:
-
FlexNet Code Insight 7.x
Aug 02, 2019
11:55 AM
Hello Flexera Team, As part of our automation in V7, we would like to be able to overwrite the Notices Text field with a specific Custom License based on the license detected by FNCI scan. e.g. For every Eclipse License detected by FNCI scan (if there are no multiple licenses detected) we'll like to have Notices Text field populated with a Custom Eclipse License. Can this be done through the API's or in FNCI v7 interface? Thank you, Lauren
... View more
Aug 02, 2019
11:47 AM
Hello Flexera Team, In FNCI V6 we use "Save as Standard Notice Data"/Load Standard Notice Data". Is this feature available in FNCI V7 (2019.R2,2019.R3?) Thank you, Lauren
... View more
Jul 31, 2019
11:36 AM
Hi vdonga, Please see another reason why the "As Found License Text" should not contain extra information that does not pertain to the License text. Docker scan plugins are Inventory only projects, and does not allow modification of any text fields. Please see: https://community.flexera.com/t5/FlexNet-Code-Insight-Customer/Notices-Report-from-the-Docker-Scan-Plugin-display-unnecessary/m-p/109636#M65 Thanks, LP
... View more
Jul 31, 2019
11:23 AM
Hello Flexera team, I'm running 2019.R2 on CentOS 7 and mySql 5.7. While trying to delete a project it shows the following error: "An error occured while deleting project: Palamida-Project-6" The project is deleted from my UI, however the root directory #6 is still present on the disk. I'm including Screenshots as well as part of the catalina.out log file while I was deleting the project. Thanks LP
... View more
Jul 31, 2019
10:09 AM
Hi, Are you looking for Rest API specifications for V6 or V7? I would like to see specs and examples from Flexera for V7 as well. LP
... View more
Jul 29, 2019
04:02 PM
Notices Report from the Docker Scan Plugin display unnecessary text. In FNCI 2019.R2 after running a scan of a docker container, and generating a Notices Report, the report contains additional, not necessary, information. ex1: The component title is specified as such: @elastic/filesaver 1.1.2 [Found inside docker3610470980375742434.tar] (MIT) "Found inside docker3610470980375742434.tar" is not necessary, since is a temporary file. ex2: "The following text is found in file:LICENSE at /tmp/a7584510-7e15-40aa-b330-053ba4bc872c/-1284141453/usr/share/kibana/node_modules/@elastic/numeral/LICENSE" This text belongs in the "Internal Auditing Notes" and not in the "Notices Report". Also this is a temporary file location. Missing: "Notice License URL" is missing. In V6 this was included but in V7 is no longer included. ex. Notice License URL: http://spdx.org/licenses/Apache-2.0.html While these issues can be removed using a find and replace, it would be easier if the report would publish the necessary License information only. Thanks, LP
... View more
Jul 26, 2019
12:50 PM
Hello Flexera team, In 2019.R2 I'm finding random inconsistencies between the As-Found License Text file path vs. Associated Files. e.g. abbrev 1.0.9 (ISC) Associated Files: /tw-src/LATEST/ip360-vne-latest/artifacts/npm/abbrev/1.0.9/abbrev-1.0.9.tgz As-Found License Text: The following text is found in file:LICENSE at /tw-src/LATEST/ip360-vne-latest/artifacts/yum/centos-6/com/nodesource/rpm/nodejs/6.6.0-1nodesource.el6.centos.x86_64/nodejs-6.6.0-1nodesource.el6.centos.x86_64.rpm The license text is correct for abbrev 1.0.9, but the file paths do not match. so far I found this to be true for abbrev 1.0.9 (ISC) commander 2.9.0 (MIT) The following text is found in file:LICENSE at /tw-src/LATEST/ip360-vne-latest/artifacts/npm/bower/1.8.0/bower-1.8.0.tgz Associated files: /tw-src/LATEST/ip360-vne-latest/artifacts/npm/commander/2.9.0/commander-2.9.0.tgz concat-map 0.0.1 (MIT) The following text is found in file:LICENSE at /tw-src/LATEST/ip360-vne-latest/artifacts/yum/centos-6/com/nodesource/rpm/nodejs/6.6.0-1nodesource.el6.centos.x86_64/nodejs-6.6.0-1nodesource.el6.centos.x86_64.rpm Associated files: /tw-src/LATEST/ip360-vne-latest/artifacts/npm/concat-map/0.0.1/concat-map-0.0.1.tgz LP,
... View more
Latest posts by lpopescu
Subject | Views | Posted |
---|---|---|
3251 | Jun 17, 2020 03:55 PM | |
1457 | Jan 24, 2020 11:41 AM | |
1463 | Jan 22, 2020 11:21 AM | |
957 | Dec 04, 2019 05:33 PM | |
3635 | Oct 31, 2019 12:38 PM | |
1045 | Oct 24, 2019 05:03 PM | |
3149 | Sep 11, 2019 11:30 AM | |
3151 | Sep 11, 2019 11:28 AM | |
1203 | Aug 02, 2019 11:55 AM | |
1157 | Aug 02, 2019 11:47 AM |
Activity Feed
- Kudoed Code Insight 2024 R4 Release Is Now Available for cvirata. Nov 14, 2024 08:01 AM
- Kudoed Webinar: Setting up your OSS Management process for cvirata. Nov 04, 2024 11:43 PM
- Kudoed FlexNet Code Insight Electronic Update Release Notes for kledoux. Oct 09, 2024 04:52 AM
- Kudoed Announcing OSS Inspector, an IDE Plugin for your SCA needs! for cvirata. Sep 04, 2024 09:42 AM
- Kudoed Register Today: Software Composition Analysis User Group 2024 for cvirata. Aug 23, 2024 02:18 PM
- Kudoed [Recording Available]: SCA Customer Office Hours #37 - December 7, 2023 (Code Insight 2023 R4 Release Overview) for cvirata. Feb 22, 2024 03:50 PM
- Kudoed Code Insight 2024 R1 Release Is Now Available for cvirata. Feb 14, 2024 11:23 AM
- Kudoed Re: Code Insight 2023 R3 SP1 is now available for rjayasreekizana. Nov 13, 2023 01:06 AM
- Kudoed Detector launch issue (certificate expiration) for jfarnsworth. Nov 06, 2020 11:47 AM
- Posted Re: Custom Reports Framework in FlexNet Code Insight on Code Insight Knowledge Base. Jun 17, 2020 03:55 PM
- Got a Kudo for FNCI 6.13.3 - CodeAware Now Replacing Analyzer .. May 14, 2020 02:16 PM
- Posted Re: FNCI 6.13.3 - CodeAware Now Replacing Analyzer . on Code Insight Forum. Jan 24, 2020 11:41 AM
- Posted FNCI 6.13.3 - CodeAware Now Replacing Analyzer . on Code Insight Forum. Jan 22, 2020 11:21 AM
- Kudoed Re: Rich Text from Notices Text box is missing in Notices Report. for vdonga. Dec 05, 2019 10:16 AM
- Posted Rich Text from Notices Text box is missing in Notices Report. on Code Insight Forum. Dec 04, 2019 05:33 PM
- Kudoed Partial and exact matches results in a lot of wasted time chasing false positives for sewechad. Nov 22, 2019 10:52 AM
- Posted Re: Scan fail since last electronic update on Code Insight Forum. Oct 31, 2019 12:38 PM
- Kudoed Re: Automation of Custom Rules Creation for FNCI2019.R3 for vdonga. Oct 28, 2019 05:44 PM
- Posted Automation of Custom Rules Creation for FNCI2019.R3 on Code Insight Forum. Oct 24, 2019 05:03 PM
- Kudoed FlexNet Code Insight 2019 R3 is available! for cvirata. Oct 23, 2019 11:16 AM
Contact Me
Online Status |
Offline
|
Date Last Visited |
Dec 08, 2021
08:59 PM
|