• Getting Started
    • CIC Administration Application Overview
    • CIC Application Setup Roadmap
  • Before you Begin
    • How to Use this Guide
  • CIC for P6 EPPM
    • Roadmap for Configuring CIC for P6
    • Managing P6 Users for CIC
      • Adding CIC Users
      • Assigning CIC Roles in Primavera Administration Application
      • Assigning Construction Intelligence Cloud Access for P6 Users
    • Configuring P6 EPPM Data Sources
    • Running ETLs and ODI Loads for P6 EPPM Data Sources
    • Reviewing the Status of P6 Publication Services
    • Configuring Benchmarking Groups for P6 Projects
    • Configuring Threshold Settings for P6 Data
  • CIC for Aconex
    • Roadmap for Configuring CIC for Aconex
    • Managing Aconex Users for CIC
      • Assigning CIC Roles in Primavera Administration Application
      • Assigning CIC Access to Aconex Users
    • Configuring Aconex Data Sources
    • Running ETLs for Aconex Data Sources
    • Configuring Threshold Settings for Aconex Data
  • CIC for Aconex and P6 EPPM
    • Managing P6 and Aconex Users for CIC
  • Standard Administration Tasks
    • Running the STARETL Process
    • Stopping the STARETL Process
    • Scheduling STARETL Runs
    • Starting and Restarting ODI Load Plans
    • Reviewing the Global Status of STARETL Runs
    • Accessing Log Files of STARETL Runs
    • Accessing Recent STARETL Run Reports and Logs
  • Working with the Machine Learning Workbench
    • Selection Criteria for Training ML Models
    • Using ML Workbench for P6 EPPM
      • Configuring and Training CIC Models with P6 Data
    • Using ML Workbench for Aconex
      • Configuring and Training CIC Models with Aconex Data
  • Managing Personal Information
    • About Consent Notices
    • About Personal Information
    • Configuring Consent Notices for Construction Intelligence Cloud
    • Your Responsibilities
      • Ensuring Privacy of Data Collection
      • Limiting Granular Access to Data
      • Ensuring Data Masking is Supported
      • Ensuring IP White-Listing
      • Controlling Access to Special Categories of Data
  • Security Considerations
    • Introduction
    • Authentication: How Users Sign On
    • Authorization: What Users can Access
    • Machine Learning Security Considerations
    • Endpoint Security
      • Inherent Risks and Practical Policies
    • Privacy and Personal Information
      • Some Security Basics
  • What's Next?
  • Copyright