VZW community employees should follow up on their comments and answers.

I've seen a lot of threads were a VZW employee drops a comment or answer to a members post then never follows up. I've also seen two employees offer similar or different solutions on the same thread but never post again to confirm or debate their contribution. I'm trying to throw anyone under the bus but if employees are going to contribute please do so. Don't just drop a one liner or a link and disappear . Thanks for your help and this community. 

DionM_VZW wrote:
Greenrobot, I know it's frustrating to get a response from a community member or a staff member and have it not fully resolve the concern. Believe it or not, it's frustrating for everyone involved! Whatever the issue is, we all want it solved yesterday. The thing is we want to keep everyone up to date with accurate information and avoid ignoring our customers. Sometimes, the time arrives where we have to reply but don't have a solution. So, from our perspective, the response that we give is the best (and often only) way to say we're aware of a situation and are working to fix it. I'm sorry but there are really only a few ways to phrase that, so yeah... sometimes it will come over as repetitive. I just want you and everyone that posts here to understand that. And thanks for letting us know about your concern over such responses. 
I get it these situations are true in many fields but in your cases the frustrating part about hearing from the VZW staff is the generic responses without any real content. We appreciate you're there and reading but if you're in the thread and feel you need to post something then put something in the post . " The issue has been brought up to our product investigation team as soon as a response or fix is announced we will post it. Thank you for bringing this to our attention " is nothing but letting us know you're kinda reading threads but then the lack of follow up tells us that nothing ever really gets looked into. Example, in the thread I linked above two different community employees posted the exact same thing in the exact same thread if the first or second employee really wanted to convey that you guys are there and working behind the scenes the original employee who post would have followed up and the second response would have been more like " Hi members I'm still looking into this and haven't gotten any new info but thanks for your continued feedback on this topic".  Or if you did in fact forward any info to a team of product investigators then call them and find out the progress of the investigation. DId they confirm the issue? Are they in fact working on a solution? Did they happen to find a work around till they can fix the issue? All I'm asking is to answer questions, ask more questions, follow up, take pride and responsibility in your posts. Some the members on here provide better content, answers, solutions, work around, and  follow ups ( sometimes to many ) then the VZW staff and it's your job to work with these devices. I work on cars, have done so almost 10 years and if a customer tells me my business I work hard to make sure it doesn't happen again or educate my self on the topic beyond were that customer could because I shouldn't know less than a user of a product that I'm dedicated to and payed by to be the best. I am closer to the source of information and I have the numbers to call for information about anything I need to satisfy my customers and I use them. All I'm asking is for is the same level of service from Verizon. I have a forum for technicians to discuss topics like issues with vehicles everyday and it's not much different than yours except techs aren't posting " I forwarded this to the manufacturer and well see if they fix it for us ". Transportation isn't much different than communication we use both every day and some rely on their communication more than transportation so don't act like not being able to use the internet or make a call is a temporary set back because for some people to have a problem with their communication device for longer than 24 hours could mean the difference of having a job or not. Almost the same as not making it to work because your car wont start could be similar to no data connection and not being able to use your hotspot for your work laptop. Or your car dies while on the freeway and you have to pull over to restart it could be like your Thunderbolt rebooting in the middle of a work conference call. 

Similar Messages

  • While uploading data for employee as a vendor (with their loans and advance

    Hi,
    We are going for one company live. We are not taking HR module as of now.
    We are creating employee as a vendor for all employees with outstanding loans and advances.
    Now while uploading initial data for these employee (created as vendor), business wants personal loan outstanding balances employee as a vendor wise.
    Generally in case of normal vendor, we treat like
    Vendor A/C Dr
    to takeover creditors a/C  Cr
    while going for initial upload.
    In above case what should we do if we want outstanding balances (personal loan) while initial balance upload?
    Thanks,
    Taral Patel

    Hi,
    You can create a separate employee vendor for Advances paid to them with an assignment to a separate recon account titled as Advance to Employees. Later, you can upload the entries by Debiting the Employee Advance Vendor account and crediting Vendor Upload Account.
    Advances paid to employees (recon account) will represent in the TB as a separate line item forming an MIS.
    Regards
    Hari

  • Multiple Digital Signatures - each signer enters their comments then signs

    Background / Problem:  I currently have a Microsoft Word Document I print out (multiple pages). Everyone reads the first page, puts their comments in their section, then signs under their comments. The same group of papers (2-3 pages) gets signed by 7 people. After I chase everyone down to add their comments and sign the paper, I then file it into a massive file cabinet.
    I am considering buying Adobe Acrobat very shortly (if this can solve the problem). I would like to convert the two or three page document I normally print out into a PDF file. I would like for someone to add a comment in their comment box, sign the document and save it. The next person will then add their comment sign it and save it. How do I do this and what version of Acrobat do I need (if acrobat can do this)?

    Yes, you can do that in Acrobat. Keep in mind that each user will sign the complete document (all pages with his/her comments on the first, second, whatever page). but the document will contain all signatures. You can design the document so that the signatures will appear on the pages where you want them to be. It is just that each signature will cover the complete document content which is what you want.
    You can save the original PDF as Reader-Extended which will allow your user to sign in in Reader. You do not need to buy a separate copy of Acrobat for all of them.

  • Best Buy should be ashamed of their lack of customer service.

    On Saturday, 7-26-14, I attempted to file a claim on a cell phone warranty. In store I was notified that the policy was inactive, yet a second phone that was attached to the account was all active. I researched the cause of this and found my credit card was cancelled due to my bank discovering possible fraud. My wife called customer service in May, and after dealing with rude representatives, she was able to get both phone insurance policies reinstated.
    When I called customer service today, after being hung up on twice, I was told that the policies were reinstated, but my wife failed to update the credit card information. I thought the error was on our part. My wife was able to find another email from Best Buy, that proved she updated the information. Conveniently however, Best Buy supervisor Mark was unable to find this proof email, but could find the earlier email. I find this highly unlikely.
    Mark did reluctantly reinstate the policy, and told me I would have to go back to store to follow through with the claim. I notified Mark that due to the incompetence of Best Buy, and their insistence that I was the one that failed to update my policy, I threw the paperweight of a phone away. He then told me that I was out of luck, but referred me back to the store.
    I understand the concept of "passing the buck" back to the store because that allows him to get off the phone with me. He also told me that my bank was the problem, yet I find it odd that the second phone on the account was current on payments. He also could not explain why, if it was my bank's fault, that no email was sent. Best Buy was quick to send an email when my credit card was cancelled due to fraud protection, but not this time?
    Best Buy customer service gives people the run around, fails to live up to their obligations, and loses certain emails that show the costumer is correct. Best Buy also refuses to make their mistakes right or to even admit mistake on their behalf. I was told by Mark that he is in charge of the Customer service call center, so I obviously will not receive a reasonable resolution to this problem.
    Best Buy has the absolute worst costumer service that I have ever dealt with. I will never conduct business with Best Buy again and I'll encourage every person that I come in contact with to do the same.

    Hello molonlabe-
    I’ve been fortunate enough to not have to need service on my cell phones to this point (knock on wood), but if I ever do, I hope that my experience doesn’t match yours.  It certainly sounds like it was frustrating.
    Generally, if we are unable to collect payment on a monthly Geek Squad Protection plan three months in a row, we should be sending out an email to whichever address we have on file instructing you to contact us about this issue.  I’m sorry that this did not happen. 
    Usually, the email letting your know that your credit card information has been updated in an automated system email and Mark would not have visibility to that, though he should have been able to see when your wife called in and had the plans reinstated.  I will definitely be documenting this feedback for training opportunities.
    If you no longer have the phone, we would be unable to assist you, however, if the plans have been reinstated, you may still end up being charged each month if you did not have Mark cancel the plan.  If you did not cancel that plan, I would recommend contacting us at 1-888-237-8289 for assistance with cancelling this to avoid any future issues.
    Thanks for connecting with us; I do hope that at some point in the future, you will allow us another opportunity to earn your business.
    Bill|Senior Social Media Specialist | Best Buy® Corporate
     Private Message

  • Employee should be treated as Vendor or Customer?

    Hello,
    Employee should be treated as Vendor or Customer?
    Loan payment and advance given....how can we handel it????
    Thanks

    Hi Pari,
    In Conpany's point of view, all Employees should be treated as Vendors.
    Loan Payment and Advances sould be treated as Other Special GL Transactions for Vendors.
    Steps to be followed:
    1. Define Alternative Reconciliation Account for Vendors (Here Employees)
    Path: IMG/FA/ARAP/Business Transactions/Postings with Alternative Reconciliation Account/Other Special GL Transactions/Define Alternative Reconciliation Account for Vendors
    Here you can create Special GL indicator for Loan Payment or Advances: Click Create (F6) and create special GL indicator (L) for Loan to Employees and save the data
    DC on the Special GL indicator: L - Loan payment
    Here give the following inputs:
    In Recon.acct: Give Recon A/c for Vendors (Employees) (B/S A/c - Liability Group) Ex. A/c No.1000
    In Special GL account: Give Alternative Recon. A/c to Employees i.e. Loan to Employee A/c (Create this a/c in FS00).  (B/S A/c - Assets group). Ex. A/c No. 3000
    2. Go to F-02 and post the entry.
    Entry will be:
    Employee A/c Dr
    To Bank A/c
    Entries in General Ledger View:
    Alternative Recon. A/c for Employee A/c Dr.  (In our example: A/c No. 3000)
    To Bank A/c
    Note: If you want to deduct TDS, then follow the same procedure for WT for Vendors for Payments.
    In this case the journal entry will be:
    Employee A/c Dr.
    To Bank A/c
    To Withholding Tax A/c
    To Sur charge A/c (if any)
    To Education Cess A/c (if any)
    Hope this helps you.
    Regards,
    Kannusamy S

  • How are businesses handling the "APPLE LOCK" on company cell phones when an employee leaves and their phone is unusable because the euipment was set up on the employee's personal Apple Account with their ID and password?

    How are businesses handling the "APPLE LOCK" on company cell phones when an employee leaves and their phone is unusable because the euipment was set up on the employee's personal Apple Account with their ID and password?  When an employee leaves a business and the company has purchased the equipment, the company should have the rights to reissue the equipment and Apple should provide an alternative to unlock the equipment from the employee's personal APPLE account and password so the company (that purchased the equipment) can reissue the line and equipment to another employee.

    If you can prove ownership to Apple, they may be able to help you.
    The best way of handing things would be strong policies requiring that the equipment be turned in in a usable state. i.e. not activation locked. Failing this, the employee should be charged the cost of the replacement phone. Held from their final paycheck if required.

  • I've tried to update my i-Tunes version after the site suggested I should following my i-Pad being plugged into it for the first time. The update seemed successful but the program would not open at all despite switching off the PC and re-starting several

    I’ve tried to update my i-Tunes version after the site suggested I should following my i-Pad Air being plugged into it for the first time. The update seemed successful but the program would not open at all despite switching off the PC and re-starting several times. I then tried wiping the original software from the computer and re-downloading from scratch. Each time I tried the download failed with a message saying “Service “Apple Mobile Device” failed to start. Verify that you have sufficient privileges to start system services” At this stage, the only way forward was to “abort” the download. This I have done now four times and the same thing happens. When I did finally manage to get an i-Tunes shortcut on my desktop, the program wouldn’t open saying: “i-Tunes was not installed correctly. Please re-install i-Tunes. Error 7 (Windows error 193)” Any ideas to resolve this?

    Try the following user tip:
    Troubleshooting issues with iTunes for Windows updates

  • My iphone was stolen, I was told by an apple employee  in canada that sometimes their customers discounts on the next purchase is this true?

    My iphone was stolen, I was told by an apple employee in canada that sometimes their customers get discounts on the next purchase is this true?

    Not from Apple, but if your carrier subsidizes the cost of the iPhone and you are eligible for an upgrade price with a new phone.

  • What are the naming conventions we should follow while creating an object

    hi
    what are the naming conventions we should follow while creating an object in ABAP dictionary, i.e while creating zee table.

    Hi,
    Namespaces and Naming Conventions
    SAP has reserved name ranges for customer objects and SAP objects. Use these customer name ranges to make sure that your objects are not overwritten by SAP objects during the import of corrections or an upgrade.
    This documentation lists the customer name ranges for the different system objects.
    Only use the customer name ranges. If you do not keep to the name ranges for customer objects you may lose your development objects.
    SAP delivers a few system objects with names that fall within the customer name range. These objects already existed when the customer name range was extended from YY/ZZ to Y/Z. These objects are listed in table TDKZ.
    Regards

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I am shooting aerial video with a GoPro H3  at 1080p 30fps and would like to edit videos and give them to my clients to use in as much media as possible for their advertising and marketing needs.  I would like to give it to them at the highest quality all

    I am shooting aerial video with a GoPro H3+ at 1080p 30fps and would like to edit videos and give them to my clients to use in as much media as possible for their advertising and marketing needs.  I would like to give it to them at the highest quality allowed.  What form should I save it in 'Publish and Share'?  I have Premier Elements 12.

    KM
    Can we assume that your 1080p30 is an AVCHD.mp4 file or other?
    You manually or the project automatically should set the project preset to
    NTSC
    DSLR
    1080p
    DSLR 1080p30 @29.97
    (If your frame rate is really 30 instead of 29.97, then go with DSLR 1080p30 instead of DLSR 1080p30 @29.97)
    See the following link for setting the project preset manually
    http://www.atr935.blogspot.com/2013/04/pe11-accuracy-of-automatic-project.html
    For your export
    Publish+Share
    Computer
    AVCHD
    with Presets = MP4 - H.264 1920 x 1080p30
    Please let us know if you have further questions on this or need clarification on anything written.
    Thank you.
    ATR

  • How to create a report of users in ucm about their roles and permission

    Hi All ,
    I need to create a report and it should contain all the users in ucm as well as their roles and permissions. Basically the report would be for the admin who can see all the users in a single report and can know about the roles and access of each and every users.
    How to create such report ?? I have tried from web layuot editor but the default report template i.e stdUserReport in user datasource does not contain more than three fields..Is there any method to get such kind of report???
    Please suggest!!

    There was an example component to demonstrate this kind of function. Under Stellent in version 7.5
    I do not know if they hand it out anymore but it is not on the standard samples page for Oracle. You may want to open a Support SR to ask for it. It should still be around in their servers if they can get permission to hand it out as a sample again.
    Sample CustomReports component to demonstrate how to create customized reports
    CustomReportsBundle.zip
    Date:     October 30, 2006
    Sample Version:     version=2006_10_20 (build 1)
    Product and Version:     Content Server
    Sample Status:     This is a Stellent Sample. Stellent Samples are free and include non-supported add-ons, utilities, tutorials or programming examples. It may require additional configuration or security auditing for maximum effect. It is not supported by Stellent without a consulting engagement.

  • HT201303 OK SO I BOUGHT MY 7YEAR OLD DAUGHTERS AN IPOD TOUCH FOR THEIR BIRTHDAY AND THE SECOND THEY START PLAYING WITH THEM ONE SET A PASSWORD TO ENTER THE IPOD AND FORGOT THE PASSWORD. IT SAYS THAT THE IPOD IS ENABLED... HOW DO I FIX THIS PROBLEM? HELP

    I BOUGHT MY 7 YEAR OLD DAUGHTERS A IPOD TOUCH FOR THEIR BIRTHDAY, THE SECOND THEY BEGAN TO PLAY WITH THEM THEY BOTH SET PASSWORDS TO ENTER THE IPOD HOME PAGE, WELL ONE OF MY GIRLS FORGOT THEIR PASSWORD AND NOW IT SHOWS THAT THE IPOD IS ENABLED... HOW SHOULD I GO ABOUT THIS?

    You will need to restore the device from the computer to which the device is synced. For information and instructions, see:
    http://support.apple.com/kb/ht1212
    If that will not work, you'll need to put the device into Recovery Mode and then try the Restore again:
    http://support.apple.com/kb/ht1808
    Forum Tip: It is generally considered inappropriate to type all in uppercase letters in Internet discussions, as text that is typed all in uppercase is by convention considered to be shouting.  Uppercase is also more difficult to read, so please use all uppercase sparingly and only when you really mean to shout, which we hope you won’t need to do here .
    Also, please note that you posted in the iPhone forum.
    Regards.

  • How come clients have to return to the original machine to access their photos and files? Why can't they access them from any client?

    When students login & upload images onto a client, they have to return to that same client. They cannot see their images if they log into another client the next day.
    Currently, I created uses as Local only on a server dns of ---- .server.private. via the "internet" not VPN. (as advised by a Apple Rep phone call).
    Do I change it to server HD? When I tried "Users" , they could not log into any client.
    Is it a permission issue on the client?  
    Are they pictures stored on the Client HD or the Server HD under users home folders? When I had Snowleopard, I could create folders outside their homes and see them on the server HD. Now I cannot see any folder created "ouside" the main Doc or Pictures Folder on the SERVER HD. They can, when they log into the same client each day.
    Advice?

    From what westhighphoto said "When I had Snowleopard, I could create folders outside their homes and see them on the server HD" it sounds like users have been saving files outside their home directory. In that case it does not matter whether they are using full-blown Network Home Directories or Portable Home Directories (with syncing) the files will not be copied back to the server.
    The users should be saving the photos inside the Photos folder inside their home directory. These will then be saved on to the server.
    Note: iPhoto if still being used should default to this.

  • How should we be going about creating and saving and/ or exporting our ODC files using Excel 2013 for use in Project Server 2013 Online?

    Hi I need your guidance on how I should go about setting up my Excel 2013 reports so that others in our Project Online 2013 environment can access and updates these reports of mine.
    My questions are as follows:
    I presume I need to create and save my ODC files in a PWA > Data Connections folder.  I have English and French users in our environment.  Do I need save them twice?  Once in the French and again in the English Data Connections folder?
     Likewise for the Excel file? 
    How should I go about creating my ODC files within Excel?  By default, the ODC files are being created on my PC's > My Documents > My Data Sources folder.  I presume I need to get them saved or exported to the PWA > Data Connections
    folder. So, How should I be going about creating and saving and/ or exporting the ODC files???
    FYI...My oData Feeds that I wish to use and join in this particular Excel file are as follows:
    https://cascades.sharepoint.com/sites/pwa/_api/projectdata/AssignmentTimephasedData01T00:00:00'
    https://cascades.sharepoint.com/sites/pwa/_api/projectdata/Projects()?$select=ProjectId,ProjectName,CAS_Classification,CAS_PCO,CAS_IT_Department,CAS_Program,CAS_SubProgram
    https://cascades.sharepoint.com/sites/pwa/_api/projectdata/TimeSet()?select=TimeByDay,TimeDayOfTheWeek$filter=TimeByDay ge datetime'2014-10-19T00:00:00'
    https://cascades.sharepoint.com/sites/pwa/_api/projectdata/Resources()?$select=ResourceId,ResourceName,Programs,Supplier,Source,Role,CostType
    Thanks in advance,
    \Spiro Theopoulos PMP, MCITP. Montreal, QC (Canada)

    Thank you Guilaume.  May I ask you to help clarify a bit more for me?  If I have to do it for both languages (the reports and ODC files), do I simply copy the same ODC files from e.g., the English to French folder in PWA (Odc files)?  Or does
    that defeat the purpose?  Or, do I need to create a new set of oData Feed Connection files with a French version of Excel 2013 and save them to the French Data Connections folder in PWA?  Do I need to have a French version of Excel 2013 to create
    French ODC files and ultimately French based reports and/ or vice versa?
    I did notice that the following oData metadata command from within a browser produces different results (ie., English versus French metadata returned) depending on who runs it (i.e., French or English user, etc).  As you can see I am a bit confused.
     Any help you can provide would be greatly appreciated.
    https://XXXXX.sharepoint.com/sites/pwa/_api/projectdata/$metadata
    \Spiro Theopoulos PMP, MCITP. Montreal, QC (Canada)

Maybe you are looking for