|
- Advanced | Flow of the Week: Localize messages used in Flows using JSON . . .
With this pattern, the flows will be far easier to read, maintain, and extend in the future The example scenario is as follows: Let's say that you have a Flow that will send short messages to customers, but you want the subject, body, etc to be localized in the customer's preferred language
- Power Automate UI Flows December 2019 update is now available
We are glad to announce that the December 2019 update for Power Automate UI flows (preview) is now available This is a follow up to the initial release announced on November 4th at Microsoft Ignite for which we’ve seen substantial interest and usage
- How to build nested flows with the HTTP action
In order to have a flow that can be called by other flows, you will need to start with the Request trigger This trigger exposes an HTTP endpoint that can be called to kick off the flow
- Solutions in Microsoft Flow | Blog de Power Automate
In this blog post, we will share more details about how Microsoft Flow makers can use Solutions to bundle related flows (and apps) within a single deployable unit
- 25 Days of flows – The Power Automate Advent Calendar
Many of you were following along during our YouTube holiday event 25 Days of flows – the Power Automate Advent Calendar In this special 25 day suite of both content and flow downloads, you were invited to take a journey with me around the possibilities
- Beginner | Flow of the Week : Automate Onboarding Communications with . . .
Now we’ll build four Flows That’s one each for the cascade requestor, manager, and new hire; and a “bonus” fourth Flow for a welcome message from the geographically appropriate regional leader
- Introducing the Microsoft Teams connector for Flow
For example – you can build flows to monitor all activity on social media forums and alert your team about events that are unexpected or require action Enlisted are a few examples of such flows
- Click to Flow: Our First Hackathon | Blog Power Automate
Normally, Flows are triggered based on virtual events, like an email sent or a Trello card posted For the first time, these hackers were triggering actions from the press of a button in the physical world
|
|
|