Friday, November 5, 2021

Brand Lift surveys - YouTube Help [gg-youtube-en]

Brand Lift surveys

These policies play an important role in maintaining a positive experience for everyone using Brand Lift surveys. Be sure to check back from time to time as these policies may change.

All Brand Lift surveys must comply with our Ads Policies and Program Policies. You cannot use Brand Lift surveys to collect personally identifiable information.

In addition, any questions related to sensitive topics described below will not be allowed in our sole discretion:

  • Demographic info
  • Sexual orientation
  • Age
  • Race
  • Disturbing, distasteful, or adult content
  • Hateful or intolerant speech
  • Vulgar language
  • Other inappropriate content

Restrictions that apply to sensitive categories in Brand Lift surveys

When using Brand Lift surveys, you can't collect viewer feedback on sensitive topics. For the purposes of these policies, sensitive info includes, among others:

  • interest or participation in adult activities (including adult dating, pornography, and so on)
  • sexual behavior or orientation
  • racial or ethnic info
  • political affiliation
  • trade union membership or affiliation
  • religion or religious belief
  • financial status or situation
  • health or medical info
  • status as a child under 13

Also, any ads that our YouTube ads content policies already prohibit are prohibited from creating Brand Lift surveys.

What happens if I violate these policies?

  • Survey disabling: Brand Lift surveys that don't comply with these policies may be suspended. This means that these surveys can no longer be used with ad campaigns and new surveys cannot be created.
  • Account suspension: If you have several violations or a serious violation, your Google Ads account may be suspended. If this happens, all ads in the suspended account will stop running, and we may no longer accept advertising from you. Any related accounts may also get permanently suspended and your new accounts may get automatically suspended at setup.

Summary rows - Search Ads 360 Help [gg-searchads-en]

Summary rows

Summary rows appear at the bottom of each reporting table. They aggregate totals for each column that displays metrics. In the example below, the last three rows are summary rows for a keywords reporting table in a Google Ads engine account.

Summary rows.

Not available for all columns

Some columns do not display summary data because the individual rows already aggregate metrics. For example, the Clicks with extension showing column shows clicks on any part of an ad when a particular ad extension was showing. The number in an individual row may include clicks on other extensions that currently appear in the report. If the summary row added these two individual rows together, some of the clicks would be counted twice and the summary amount would be inflated.

In this case, the summary row displays "---" to avoid inflated totals.

Fix suspended Business Profiles - Google Business Profile Help [gg-business-en]

Fix suspended Business Profiles

We may suspend Business Profiles and user accounts that go against our guidelines. To fix a suspended profile, you must first submit a reinstatement form.

Important: As a precaution in light of COVID-19, we're operating with a limited team. It may take longer than usual to connect with us. We recommend our Help Community and YouTube Channel. Thank you for your patience.

Fix a suspended profile

Important: To avoid delays, submit only one reinstatement request per account.

  1. Review the Business Profile guidelines
  2. Sign in to manage your Business Profile. Ensure your profile follows the guidelines. Learn how to edit your profile.
  3. After your profile meets guidelines, you can ask for reinstatement. Use our form.

Appeal a denied request

If your request was incorrectly denied, we can help verify your eligibility. When you get an email from us, reply with:

  • Pictures of the front of the store
  • Summary of business operations

Fix issues with a reinstated profile

Important: We can't give specific reasons why any Business Profile was suspended.

If you have issues with your reinstated profile, reply to the email you got from us with info about your issues. We'll investigate.

Understand reinstatement requests

Response times
  • Most requests are reviewed, investigated, and resolved in 3 business days. 
  • If it's been more than 3 business days since you sent a request, reply with the email you get from us. We'll investigate.
What happens if we remove a profile

If we remove:

A profile

  • The public can't visit the profile. 
  • The owner and managers can't act on the profile. 
  • The owner and managers can ask us to reinstate the profile. If a profile gets reinstated, we also reinstate its owner and managers.

The owner's Google Account

  • We remove all the locations owned by that user.
  • If we reinstate the owner's Google Account, we'll also reinstate the owned locations.

A manager's Google Account

  • We suspend the manager on the accounts they manage. The locations aren't affected. 
  • If we reinstate a manager's Google Account, they regain access to the locations.

Related resources

Track mobile app conversions with Floodlight - Campaign Manager 360 Help [gg-campaignmanager-en]

Track mobile app conversions with Floodlight

Floodlight gives you insight into the actions that users take after they view or click on ads. There's no special setup for Floodlight on the mobile web. You can traffic your ads and set up your Floodlight activities and tags for any web page, whether users will be seeing that page on a desktop or a mobile device.

Some setup is needed if you want to use Floodlight for app installs or in-app activities. This article explains what you need to do to make Floodlight work in an app.

Due to differences in cookies and device ID settings, there may be times when conversions can't be measured directly. In some cases, Campaign Manager 360 uses machine learning and historical data to model conversions.

This article discusses implementation details for iframe and image Floodlight tags only. The global site tag is not intended to work in mobile apps.


Expand all sections   Collapse all sections

About Floodlight in apps


With in-app Floodlight activities, you can learn more about what actions users take within mobile apps after they interact with your ads, similary to how you can do so on a website. You can track installs of your app or activities that take place in the app, such as purchases or logins, which make it easier for you to determine the effectiveness of mobile app campaigns. View-through and click-through conversion data is available in Reporting, enabling you to view desktop and mobile campaign performance in one place.

In-app activities can be attributed to display and video ads that run in other apps. These attributed conversions appear in the standard Conversion metrics available throughout Campaign Manager 360. For conversions attributed to ads that ran on web sites or on other devices, these metrics are reported on within the cross-device conversions report.

To implement Floodlight inside apps, first you'll need to create and configure your Floodlight activities in Campaign Manager 360. Once your tags are ready, we provide two different options for tracking in-app installs or activities with them.

Who's involved

There are two partners that make in-app Floodlight work:

  • The agency or advertiser that uses Campaign Manager 360 to serve ads in apps and wants to use Floodlight to track installs or other app activities for their promoted app back to their ads.

  • A media partner or publisher that has available inventory in apps.


Values passed to tags

Before you can attribute app installs or activities back to ad impressions and clicks in apps, the partners need to work together to ensure that user-resettable device identifiers and other values are passed to both Floodlight tags and the ad tags running in apps. Campaign Manager 360 uses the identifiers to uniquely identify a user and attribute app activities back to the in-app ads they viewed or clicked on.

  • dc_rdid=: User resettable device identifiers in the form of IDFA for iOS or advertising ID (AdID) for Android. This parameter is required. The publisher must pass a value into this parameter in order to enable in-app conversion tracking. The values should be the unhashed, raw value. We will only accept values passed securely over SSL-enabled tags.

    Note: We strongly recommend using the dc_rdid parameter for device IDs instead of the legacy parameter dc_muid, which accepts uppercase MD5-hashed IDFA, Android ID, and AdID values.

    • SSAID is available for non-Play Android devices in China.

  • tag_for_child_directed_treatment=: Accepts a value of 0 or 1. A value of 1 indicates that this particular request may come from a user under the age of 13, under COPPA compliance.

  • dc_lat=: Accepts a value of 0 or 1. A value of 1 means that the user has enabled the "Limit Ad Tracking" option for IDFA or AdID in order to opt out of interest-based ads and remarketing. If "Limit Ad Tracking" is off, the value is 0.

Make sure that the HTTP header user agent is the same as that of the app where the conversion activity took place. This is especially important when making server-to-server calls to Floodlight.

Set up Floodlight in apps

Ensure ad tags pass proper values from publishers

Tracking in-app conversions requires that specific values are passed into ad tags by the app publisher when the ads are served.

Advertisers or agencies should send example ad tags to the app publisher and get confirmation that the publisher can pass parameters into the ad tags, particularly into the required dc_rdid parameter. Usually, the app publisher will support site-macros to provide these values.

Below are samples of what ad tags might look like once the publisher passes the values needed for in-app ads:

The beginning of a sample ins tag (the preferred option for mobile environments):

<ins class='dcmads'
 <script src=''></script>

A sample standard tag (used for image banners):

<A HREF=";sz=320x50;ord=[timestamp]?"> <IMG SRC=";sz=320x50;ord=[timestamp];dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0?" BORDER=0 WIDTH=320 HEIGHT=50 ALT="Advertisement"></A>

The beginning of a sample JavaScript tag (typically used for HTML5 or rich media banners):

<SCRIPT language='JavaScript1.1' SRC=";sz=320x50;ord=[timestamp];dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0?"> </SCRIPT>

A sample pre-fetch tag (used for in-stream video and audio ads):

VAST 2.0 pre-fetch tag;kw=[keyword];sz=widthxheight;ord=[timestamp];dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0;dcmt=text/xml;dc_sdk_apis=[APIFRAMEWORKS];dc_omid_p=[OMIDPARTNER]

VAST 3.0 pre-fetch tag;kw=[keyword];sz=widthxheight;ord=[timestamp];dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0;dcmt=text/xml;dc_sdk_apis=[APIFRAMEWORKS];dc_omid_p=[OMIDPARTNER];dc_vast=3

VAST 4.0 pre-fetch tag;kw=[keyword];sz=widthxheight;ord=[timestamp];dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0;dcmt=text/xml;dc_sdk_apis=[APIFRAMEWORKS];dc_omid_p=[OMIDPARTNER];dc_vast=4

A sample tracking ad image tag for impressions:

<IMG SRC=";dc_trk_aid=278142637;dc_trk_cid=56651190;ord=[timestamp];dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0?" BORDER="0" HEIGHT="1" WIDTH="1" ALT="Advertisement">

A sample tracking ad tag for clicks:;dc_trk_aid=278142637;dc_trk_cid=56651190;dc_lat=0;dc_rdid=38400000-8cf0-11bd-b23e-10b96e4ddddd;tag_for_child_directed_treatment=0

The dc_rdid=, tag_for_child_directed_treatment= and dc_lat= parameters are included in tags for all placements. The publisher passes the value into all of the keys at serve time.

Fire Floodlight tags when tracking app activities

Campaign Manager 360 provides two different methods for agencies and advertisers to use Floodlight tags for apps. The advertiser or agency should work with the developer of the promoted app to confirm that either of these methods are supported.

Use a GET request to make Floodlight calls directly

You can use a GET request to make Floodlight calls directly from your app or server code whenever there's an install or other app event. This method may be preferable if your app developer has custom code or doesn't use Google Tag Manager. The advertiser's app can make a GET request to Floodlight using the corresponding activity values (src, cat, type). Be sure that the necessary values are passed to parameters, particularly the required dc_rdid= value.


Fire Floodlight tags with Google Tag Manager

You can use a Google Tag Manager container to dynamically fire your tags in-app when there's a conversion activity.

If you have multiple mobile Floodlight tags, you can easily manage how they're dynamically loaded and fired in-app using Google Tag Manager. First you'll need to establish a link between the Floodlight configuration and a Google Tag Manager container, then push your activities to the container. The steps are similar to those for linking a regular Floodlight configuration and a Google Tag Manager container, but with a few additional changes required, mostly on the Google Tag Manager side.

If you've already created a Google Tag Manager container to fire your regular Floodlight tags, note that you'll need to create and maintain a separate mobile container specifically for mobile Floodlight tags.

To link your Floodlight configuration to a Google Tag Manager container:

  1. Follow the steps for creating Floodlight activities in Campaign Manager 360.

  2. Follow the instructions for creating a container for mobile apps in Google Tag Manager (additional details are provided in Setup and Workflow: Mobile Apps). Make sure you keep the container ID on hand.

  3. In Campaign Manager 360, select your advertiser and click Floodlight > Configuration.

  4. Expand the Google Tag Manager section and click Link to a Google Tag Manager container. Enter the ID of your mobile container in the new row that appears.

  5. Click Save.

    A link request will be sent to the Google Tag Manager administrator. When the administrator approves the association, the container type will appear as "Mobile apps" and its status will be "Linked".

Once your Floodlight configuration is linked to a Google Tag Manager container, you can start pushing tags to the container so that they can be fired when an in-app conversion event occurs. You can configure the tags to fire on one-time events (such as when a user installs the app) or events that may be repeated (such as completing a purchase).

You'll need to set up a mobile tag container using the Google Tag Manager for Mobile SDK and add it to your iOS or Android app before publishing it. Note that additional libraries are needed to pass iDFA. You can then generate tags for your placements and traffic them on mobile app networks or app publishers as usual. The SDK makes a GET request to Floodlight when it receives a conversion event that matches the values you set for your Floodlight activities.
  1. Select the activity in Campaign Manager 360 and expand the Google Tag Manager section. You should see any containers you've already linked to for this Floodlight configuration.

  2. Select the specified mobile container and (optionally) enter instructions for the administrator who will be implementing the tag in Google Tag Manager. You can include specific conditions for firing the tag.

  3. Click Push to Google Tag Manager.

  4. Save your changes.

    After you save, the updated tags will be sent to the Google Tag Manager administrator. When the administrator approves the updated tags, the tag status will change to "Approved."

  5. The Google Tag Manager administrator will review the tag settings and set up rules for when they fire.

    • Unrepeatable: Check this box if the Floodlight tag should fire only once over the lifetime of the app (for example, when a user downloads or installs an app).

    • Firing rules: The activity must be tied to a firing rule in Google Tag Manager so that the tag fires.
  6. Validate your changes by testing the implementation.

If you later decide to make changes to a mobile activity and re-push it, you'll actually be creating a new instance of the tag rather than replacing the existing tag. Make sure to disable the original tag before enabling the new one.

What is Google Vault? - Google Workspace Admin Help [gg-a-en]

What is Google Vault?

Retention and eDiscovery for organizations

Vault is an information governance and eDiscovery tool for Google Workspace. With Vault, you can retain, hold, search, and export users' Google Workspace data. You can use Vault for the following data:

  • Gmail messages
  • Drive files
  • Google Chat messages (history turned on)
  • Google Meet recordings and associated chat, Q&A, and polls logs
  • Google Groups messages
  • Google Voice for Google Workspace text messages, voicemails and their transcripts, and call logs
  • new Google Sites
  • Classic Hangouts messages (history turned on)

Learn more about supported data types.

License requirements

For Vault to search and retain a user's data, users must have a Google Workspace license and a Vault license.

Vault licenses included Vault add-on licenses available
  • Business Plus
  • Enterprise
  • Enterprise Essentials (domain-verified only)
  • Education Fundamentals and Plus
  • G Suite Business
  • Frontline
  • G Suite Basic

Compare your edition

How licensing works

  • If Vault is included with your edition, all users in your organization are automatically assigned a Vault license.
  • If Vault is available as an add-on license, you can buy Vault licenses for some or all users in your organization. Only users with Vault licenses assigned to them are covered by Vault. Learn more about how to get Google Vault.
  • If you delete a user or a required license, their data may be irreversibly purged and no longer available to Vault.

Information governance: Retain and delete data

  • Keep data for as long as you need it. If your organization is required to preserve data for a set time, you can configure Vault to retain it. Data remains available to Vault even when users delete it and empty their trash.
  • Remove data when you no longer need it. If your organization is required to delete sensitive data after a set time, you can configure Vault to remove it from user accounts and start purging it from all Google systems.

Vault retention rules are directly applied to the data systems of supported Google services. Vault isn't a data archive. When retention rules expire, any data deleted by users or admins that isn't on hold is subject to standard deletion processes. When data is purged after a retention period ends, it can't be recovered by users or admins. Learn more about how retention works.

Note: Vault doesn't retain data until you set up retention rules. Until you do, users can delete data and services can purge it according to that service's protocol.

eDiscovery: Search, hold, and export data of interest

With Vault, authorized users can search for data, put data on hold, and export data for further analysis.

Vault supports the first steps of the eDiscovery process outlined by the Electronic Discovery Reference Model (EDRM):

  • Identification—You can search your organization's Google Workspace data by user account, organizational unit, date, or keyword, and preview messages, attachments, and supported files. Most services support Boolean operator searches. Learn more about search.
  • Preservation—To preserve data indefinitely for legal or other retention obligations, you can put holds on accounts, organizational units, and groups. For Gmail and chat messages, you can also set conditions to limit the hold to messages that match. Learn about holds.
  • Collection—After you search for data, you can export it for processing and analysis. Exports contain:
    • A comprehensive copy of all the data that matches your search criteria
    • The metadata you need to link the exported data to individual users in your organization
    • The corroborating information required to prove that the exported data matches the data stored on Google's servers.

    A data export is available in Vault for 15 days, then the export is deleted to protect that data. Learn about exports.

Access control and auditing

You can control who can access Vault and what actions are available to them. This ensures that only authorized users have access to your organization's data. Turn on Vault for select organizational units and assign the organizational units to an admin role with Vault privileges. Learn more about controlling access to Vault and Vault privileges.

Vault provides a complete audit log of user activity in Vault, including when a user creates or edits a retention rule, runs a search, or exports data. The audit log can't be edited. Learn more about audit reports.

Get started with Google Vault

  1. If your organization has a Google Workspace edition that doesn't include Google Vault, buy Vault licenses.
  2. Have a Google Workspace super admin set up Vault user access and Vault privileges. They can also set up default retention rules to immediately begin retaining data. We recommend you work with your organization's legal or compliance team to determine your information governance and eDiscovery requirements.
  3. Vault users can sign in and get started. For a quick start, see Get started with Vault search and export.

Have more questions? See the Google Vault FAQ.

Running into trouble? See the known issues and track fixes and new features in what's new.

Keeping iPhone, iPad, and iPod touch within acceptable operating temperatures - Apple Support

Keeping iPhone, iPad, and iPod touch within acceptable operating temperatures

Learn about the operating temperatures and temperature management of iPhone, iPad, and iPod touch (4th generation and later).

Use iOS devices where the ambient temperature is between 0º and 35º C (32º to 95º F). Low- or high-temperature conditions might cause the device to change its behavior to regulate its temperature. Using an iOS device in very cold conditions outside of its operating range might temporarily shorten battery life and could cause the device to turn off. Battery life will return to normal when you bring the device back to higher ambient temperatures. Using an iOS device in very hot conditions can permanently shorten battery life.

Store the device where the temperature is between -20º and 45º C (-4º to 113º F). Don't leave the device in your car, because temperatures in parked cars can exceed this range.

Your device might get warm

When you use the device or charge the battery, the device might get warm. You might notice that your device feels warmer in these situations:

  • When you set up your device the first time
  • When you restore from a backup
  • When apps reindex or reanalyze data, like Photos tagging for faces, places, or keywords after a software update
  • When you use graphics-intensive or augmented-reality apps or features

These conditions are normal, and your device will return to a regular temperature when complete.

Here are some of the higher ambient-temperature conditions and activities that might cause the device to change performance and behavior:

  • Leaving the device in a car on a hot day.
  • Leaving the device in direct sunlight for an extended period of time.
  • Using certain features in hot conditions or direct sunlight for an extended period of time, such as GPS tracking or navigation in a car, playing a graphics-intensive game, or using augmented-reality apps.

If your device gets too warm

If the interior temperature of the device exceeds the normal operating range, the device will protect its internal components by attempting to regulate its temperature. If this happens, you might notice these changes:

  • Charging, including wireless charging, slows or stops.
  • The display dims or goes black.
  • Cellular radios enter a low-power state. The signal might weaken during this time.
  • The camera flash is temporarily disabled.
  • Performance slows with graphics-intensive or augmented-reality apps or features.

Additionally, if you're navigating, the device might show this alert and turn off the display: "Temperature: iPhone needs to cool down." Navigation still provides audible turn-by-turn directions. When approaching a turn, the display will illuminate to guide you through the turn.

If you see a temperature warning screen

If the device exceeds a certain temperature threshold, it will present a temperature warning screen similar to this:

An iPhone showing this message might still be able to make emergency calls.

To resume use of your device as quickly as possible, turn it off, move it to a cooler environment, and allow it to cool down.

About the safety standard

iOS devices comply with the safety standard for Safety of Information Technology Equipment, IEC 60950-1. Many countries and regions have adopted this safety standard:

  • UL 60950-1 in the United States
  • CSA 60950-01 in Canada
  • EN60950-1 in Europe
  • AS/NZS 60950:1 in Australia and New Zealand.

Published Date: 
Character limit: 250
Maximum character limit is 250.
Thanks for your feedback.

Start a discussion in Apple Support Communities

See all questions on this article

Request ownership of a Business Profile - Google Business Profile Help [gg-business-en]

Request ownership of a Business Profile

Get started

If a Business Profile on Google has already been verified and you're authorized to manage the profile, you can request ownership from the current profile owner. If you try to access a claimed multi-location profile, you can also verify as a site manager.

If you can't find a "Claim this Business" or "Own this business" link on the Business Profile, you're likely already an owner for the business. On your profile, search for a "You manage this business profile" badge.

Learn how to claim ownership of a Business Profile from a Product Expert:

  1. To find the Business Profile you want to request ownership of, use either of these methods:
    • Go to
      • Enter the name and address of the business, then choose it from the search results.
    • Find your business on Google Search or Google Maps.
      • Under the Business Profile, click Claim this business.
  2. Click Continue.
    • You'll get a message that says someone else verified the profile. If you're authorized to manage the profile, you can request ownership from the current profile owner.
  3. Click Request access and fill out the form.
  4. Click Submit.
Tip: The current profile owner will get an email that asks them to contact you and you'll get a confirmation email.
Service-area Business Profiles

To request ownership of a service-area business from the current Business Profile owner:

  1. Go to
  2. Enter your business information.
  3. Click Continue.
  4. Complete the verification process.
    • Verification by postcard takes a few days. After you're verified, you'll get an "Owner conflict" dialog that indicates the location is a duplicate.
  5. Click Request access.
Tip: The current profile owner will get an email that asks them to contact you and you'll get a confirmation email.
Bulk-verified accounts

If you have a bulk-verified account, you can follow the storefront business instructions above or request ownership of an existing Business Profile:

  1. Upload the profile information via spreadsheet.
  2. In Business Profile, open the uploaded profile.
    • You'll get an "Owner conflict" dialog that indicates the profile is a duplicate.
  3. Click Request access.
Tip: The current profile owner will get an email that asks them to contact you and you'll get a confirmation email.

What to do after you've requested ownership

After you request ownership, the current profile owner has 3 days to respond. To check the status of your request, sign in to Business Profile or click the link in your confirmation email.

  • If your request is approved: You'll be notified by email and can manage the Business Profile.
  • If your request is denied: You'll be notified by email, and you can still suggest an edit to the profile. Also, you might be able to appeal the denied request.
  • If you don't hear back: If you don't get a response after 3 days, you might have the option to claim the profile yourself. To claim a Business Profile:
    1. Open the original confirmation email you received about your ownership request.
    2. Find your request and follow the instructions on-screen to verify. Alternatively, sign in to Business Profile, and look for a "Claim" or "Verify" button on your dashboard. 

Tip: The option to claim a profile is not always available.

Related resources

View business information live on Google - Google Business Profile Help [gg-business-en]

View business information live on Google

Business details displayed on Google come from a variety of different sources and are meant to provide customers with the most complete and up-to-date information possible. Learn how Google uses business information

Verify your business information to send it to Google Maps. To see business information live on Google:

  1. Sign in to Google My Business.
  2. If you have multiple locations, open the location you'd like to manage
  3. Click Info from the menu.
  4. Under "Your business is live on Google," you'll see links to view your listing on Google Search or Google Maps. Click any of these links to see how your business appears on the corresponding service.

Note: A link to live business information on Google Search may not be available in certain cases.

Related resources

Yahoo! Japan features in Search Ads 360 - Search Ads 360 Help [gg-searchads-en]

Yahoo! Japan features in Search Ads 360

Last updated December 24, 2020

The following lists the Yahoo! Japan features that Search Ads 360 supports, unsupported features, and any available workarounds.

Supported Yahoo! Japan features


Ad groups


Ad extensions

  • Sitelinks or QuickLinks (expanded QuickLinks are unsupported)


URL management 

Targeting and bid adjustments

Bid automation

  • Apply a bid strategy from campaign settings.


Unsupported Yahoo! Japan features


  • Day of week / hour targeting


  • Keyword insertion ads
  • Mobile URLs (Smartphone tracking URL)
    If you sign into Yahoo! Japan and add a Smartphone tracking URL, you can successfully sync the item into Search Ads 360, but Search Ads 360 ignores the additional URL. You cannot see the URL in Search Ads 360 reports or bulksheets.
  • Call extensions
    Create placeholder keywords to report on QuickLinks from Search Ads 360.
  • Ad Customizer

Ad extensions

  • Expanded sitelinks (QuickLinks) 


  • Quality index
  • Mobile URLs (Smartphone tracking URL). Use the {ifmobile} and {ifnotmobile} parameters to implement device-specific landing pages.
    If you sign into Yahoo! Japan and add a Smartphone tracking URL, you can successfully sync the item into Search Ads 360, but Search Ads 360 ignores the additional URL. You cannot see the URL in Search Ads 360 reports or bulksheets.

URL management

  • Custom parameters
    While Search Ads 360 uses one of the three available custom parameters to uniquely identify keywords and ads, you cannot view or manage Yahoo! Japan custom parameters from Search Ads 360. If you sign into Yahoo! Japan and add custom parameters for a keyword or ad, you can successfully sync the item into Search Ads 360, but Search Ads 360 ignores the custom parameters you created. Yahoo! Japan will apply the custom parameters when it serves an ad.


  • Yahoo! My Display Network


Next steps

Create a Yahoo! Japan engine account in Search Ads 360.

Google Groups content policy - Google Groups Help [gg-groups-en]

Google Groups content policy

Google Groups allows you to create and participate in online forums and email-based groups with a rich experience for community conversations. With Google Groups, you can set up your very own place to communicate and collaborate, organize meetings and events or find others with similar interests. Our policies play an important role in maintaining a positive experience for our users. Please follow these policies when using our products and services ("Services"). When we are notified of a potential policy violation, we may review and take action, including limiting or terminating a user's access to our Services.

Content Boundaries

Our content policies play an important role in maintaining a positive experience for you, the users. Please respect these guidelines. From time to time, we may change our content policies so please check back here. Also, please note that when applying the policies below, we may make exceptions based on artistic, educational, documentary, or scientific considerations or where there are other substantial benefits to the public from not taking action on the content.

Adult Content: We do allow adult content on Google Groups, including images or videos that contain nudity or sexual activity. But, you must mark your group as 'adult' in your settings. There are some exceptions to our adult content policy:

  • Do not use Groups as a way to make money on adult content. For example, don't link to commercial porn websites in order to make money in your posts.
  • We do not allow non-consensual or illegal sexual content, including image, video or textual content that depicts or encourages rape, incest, bestiality, or necrophilia.
  • Do not post or distribute private nude, sexually explicit, or non-explicit intimate and sexual images or videos without the subject's consent. If someone has posted a private nude, sexually explicit, or non-explicit intimate and sexual image or video of you, please report it to us here.

Child safety: We have a zero tolerance policy towards content that exploits children. Some examples of this include:

  • Child sexual abuse imagery: We will terminate the accounts of any user we find publishing or distributing child sexual abuse imagery. We will also report that user to law enforcement.
  • Pedophilia: We do not allow content that encourages or promotes sexual attraction towards children. For example, do not create groups or post messages with galleries of images of children where the collection of images or text accompanying the images is sexually suggestive.

Hate Speech: We want you to use Google Groups to express your opinions, even very controversial ones. But, don't cross the line by publishing hate speech. By this, we mean content that promotes hate or violence towards groups based on race, ethnicity, nationality, religion, disability, gender, age, veteran status, or sexual orientation/gender identity. For example, don't write a post saying that members of Race X are criminals or advocating violence against followers of Religion Y.

Crude Content: Don't post content just to be shocking or graphic. For example, collections of close-up images of gunshot wounds or accident scenes without additional context or commentary would violate this policy.

Violence: Don't threaten other people on your group or messages. For example, don't post death threats against another person or group of people and don't post content encouraging your readers to take violent action against another person or group of people.

Violent Organizations and Movements: Known violent non-state organizations and movements are not permitted to use this product for any purpose. Do not distribute content that facilitates or promotes the activities of these groups, such as recruiting,  coordinating online or offline activities, sharing manuals or other materials that could facilitate harm, promoting ideologies of violent non-state organizations, promoting terrorist acts, inciting violence, or celebrating attacks by violent non-state organizations. Depending upon the content, we may also take action against the user. Content related to violent non-state organizations may be allowed in an educational, documentary, scientific, or artistic context, but please be mindful to provide enough information to help people understand the context.

Harassment: Do not harass or bully others. Anyone using Google Groups to harass or bully may have the offending content removed or be permanently banned from the site. Online harassment is also illegal in many places and can have serious offline consequences.

Copyright: It is our policy to respond to clear notices of alleged copyright infringement. More information about our copyright procedures can be found here. Also, please don't provide links to sites where your readers can obtain unauthorized downloads of other people's content.

Personal and confidential information: It's not ok to publish another person's personal and confidential information. For example, don't post someone else's credit card numbers, Social Security numbers, unlisted phone numbers, and driver's license numbers. Also, please keep in mind that in most cases, information that is already available elsewhere on the Internet or in public records is not considered to be private or confidential under our policies.

Impersonation and misrepresentation of identity: Do not impersonate a person or organization or misrepresent yourself. This includes impersonating any person or organizations you don't represent; providing misleading information about a user/site's identity, qualifications, ownership, purpose, products, services, or business; or falsely implying affiliation with, or endorsement by, another individual or organization. This also includes content or accounts misrepresenting or concealing their ownership or primary purpose, such as misrepresenting or intentionally concealing your country of origin or other material details about yourself when directing content about politics, social issues, or matters of public concern to users in a country other than your own. We do allow parody, satire, and the use of pseudonyms or pen names—just avoid content that is likely to mislead your audience about your true identity.

Misleading content: Do not distribute content that deceives, misleads, or confuses users. This includes:

Misleading content related to civic and democratic processes: content that is demonstrably false and could significantly undermine participation or trust in civic or democratic processes. This includes information about public voting procedures, political candidate eligibility based on age/birthplace, election results, or census participation that contradicts official government records. It also includes incorrect claims that a political figure or government official has died, been involved in an accident, or is suffering from a sudden serious illness.

Misleading content related to harmful conspiracy theories: content that promotes or lends credibility to beliefs that individuals or groups are systematically committing acts that cause widespread harm. This content is contradicted by substantial evidence and has resulted in or incites violence.

Misleading content related to harmful health practices: misleading health or medical content that promotes or encourages others to engage in practices that may lead to serious physical or emotional harm to individuals, or serious public health harm.

Manipulated media: media that has been technically manipulated or doctored in a way that misleads users and may pose a serious risk of egregious harm.

Misleading content may be allowed in an educational, documentary, scientific, or artistic context, but please be mindful to provide enough information to help people understand this context. In some cases, no amount of context will allow this content to remain on our platforms.

Illegal activities: Do not use Groups to engage in illegal activities or to promote dangerous and illegal activities. For example, don't author a post encouraging people to drink and drive. Please also do not use Groups to sell or promote regulated or illegal drugs. Otherwise, we may delete your content. Also, in serious cases such as those involving the abuse of children, we will report you to the appropriate authorities.

Spam: Spam takes several forms on Groups, all of which can result in deletion of your account or group. Some examples include creating groups designed to drive traffic to your site or to move it up in search listings, posting replies on other people's messages just to promote your site or product, and scraping existing content from other sources for the primary purpose of generating revenue or other personal gains.

Malware and viruses: Do not create groups that transmit viruses, cause pop-ups, attempt to install software without the reader's consent, or otherwise impact readers with malicious code. This is strictly forbidden on Google Groups.

Regulated Goods and Services: Do not use Groups to sell or facilitate the sale of regulated goods and services, such as alcohol, gambling, pharmaceuticals and unapproved supplements, tobacco, fireworks, weapons, or health/medical devices. Discussion of such goods and services, however, is allowed.

Enforcement of Google Groups' Content Policy

If you encounter a group or message that you believe violates our content policies, please report it to us using the 'Report Abuse' option. More information on reporting can be found here.

Our team reviews these flags for policy violations. If the content does not violate our policies, we will not take any action. If we find that the content does violate our policies, we take one or more of the following actions based on the severity of the violation:

  • Delete the offending content
  • Disable the author's access to his/her Google account
  • Report the user to law enforcement

If you see 'Your iPhone battery may need to be serviced' - Apple Support

If you see 'Your iPhone battery may need to be serviced'

Learn what to do if you see this notice in Settings > Battery.

This article has been archived and is no longer updated by Apple.

What the notice says

If your iPhone uses iOS 10.2.1 through iOS 11.2.6, this notice might appear in Settings > Battery: "Your iPhone battery may need to be serviced."

If your iPhone uses iOS 11.3 or later, refer to iPhone battery and performance to learn more about how to check your battery's health.

Battery settings in iPhone

Why the notice appears

Using diagnostics in iOS, we've detected that the battery in your iPhone may need to be replaced. When a battery gets closer to the end of its lifespan, the amount of charge and the ability to provide power reduces. As a result, a battery may need to be charged more and more frequently and your iPhone might experience unexpected shutdowns.

This isn't a safety issue; it's just to let you know that your battery may need to be replaced. You can continue to use your iPhone until you have your battery checked. In the meantime, you might notice longer app launch times, lower frame rates while scrolling, and other reductions in performance.

All rechargeable batteries are consumables and have a limited lifespan, eventually needing to be serviced or recycled. There are various factors that can affect the performance and lifespan of your device's battery, including number of charge cycles, chemical aging of your battery, and exposure to extreme heat or cold. Learn more about maximizing battery life and lifespan.

Get further assistance

To get help with a battery replacement, contact Apple Support for service options.

Apple's one-year warranty, AppleCare+, and consumer law include service coverage for a defective battery. If your battery doesn't have service coverage, Apple offers a battery replacement service for a fee.

* Some counterfeit and third-party batteries may not be designed properly and could result in safety issues. To ensure you receive a genuine Apple battery, we recommend visiting an Apple Store or Apple Authorized Service Provider

Published Date: 
Character limit: 250
Maximum character limit is 250.
Thanks for your feedback.

Start a discussion in Apple Support Communities

See all questions on this article
No comments:

Display creatives overview - Campaign Manager 360 Help [gg-campaignmanager-en]

Manage creatives

Display creatives overview

Display creatives are versatile banner creatives that feature:

  • Support for image and HTML5 assetsDisplay creatives are your one-stop-shop for adding image and HTML5 assets to Campaign Manager 360.

  • Click tag reporting: You can add reporting labels for display creative click tags in Campaign Manager 360. You can also add reporting labels for your backup asset. Note that for display creatives, landing pages are only used if you do not specify a landing page at the ad level.

  • Polite load: Campaign Manager 360 will automatically load your polite load image asset when the total creative size exceeds 150KB.

  • HTML5 benefits: If your creative uses HTML5, it can benefit from HTML5 features, such as multiple dimensions to support responsive assets, font files, and support across most browsers and mobile device types.

Reporting for display creatives

View display creative metrics in Reporting. Add these metrics when you create a Standard report in Report Builder.

Here are the available metrics:

If you're using a multi-sized display creative in a multi-sized placement, you can use the following dimensions to see details about the size of the ad slot and served creative asset:

Mac Pro: Power consumption and thermal output (BTU/h) information - Apple Support

Mac Pro: Power consumption and thermal output (BTU/h) information

Learn about the power consumption and thermal output of Mac Pro computers.

Mac Pro (2019)
2.5GHz 28-core Intel Xeon W processor, two Radeon Pro Vega II Duo MPX Modules with Infinity Fabric Link, 1.5TB RAM (twelve 128GB 2933MHz DDR4 ECC DIMMs), Afterburner card, 4TB SSD
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
302 W 902 W 1030 BTU/h 3076 BTU/h


Mac Pro (2019)
3.5GHz 8-core Intel Xeon W processor, Radeon Pro 580X MPX Module, 32GB RAM (four 8GB 2666MHz DDR4 ECC DIMMs), 256GB SSD
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
101 W 430 W 345 BTU/h 1467 BTU/H


Mac Pro (Late 2013)
3.7GHz Quad-Core: Three 4GB 1866MHz DDR3 ECC DIMMs, 256GB PCIe-based flash storage, dual AMD FirePro D300 graphics processors
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
43 W 205 W 147 BTU/h 742 BTU/h


Mac Pro (Late 2013)
3.5GHz 6-Core: Four 8GB 1866MHz DDR3 ECC DIMMs, 256GB PCIe-based flash storage, dual AMD FirePro D500 graphics processors
Power Consumption Thermal Output
Idle CPU Max
Idle CPU Max
43 W 238 W 147 BTU/h 812 BTU/h


Mac Pro (Late 2013)
2.7GHz 12-Core: Four 16GB 1866MHz DDR3 ECC DIMMs, 256GB PCIe-based flash storage, dual AMD FirePro D700 graphics processors
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
44 W 270 W 150 BTU/h 921 BTU/h


Mac Pro (Mid 2010)
Quad-core 2.8GHz configuration: One 2.8GHz Quad-Core Intel Xeon "Nehalem" processor, 3GB memory (three 1GB 1066MHz DDR3 ECC DIMMs), 1 TB Serial ATA 3 Gb/s 7200-rpm hard drive, 18x double-layer SuperDrive, ATI Radeon HD 5770 with 1GB of GDDR5 memory
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
125 W 218 W 426 BTU/h 744 BTU/h


Mac Pro (Mid 2010)
8-core 2.4GHz configuration: Two 2.4GHz Quad-Core Intel Xeon "Westmere" processor, 6GB memory (six 1GB 1066MHz DDR3 ECC DIMMs), 1 TB Serial ATA 3 Gb/s 7200-rpm hard drive, 18x double-layer SuperDrive, ATI Radeon HD 5770 with 1GB of GDDR5 memory
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
162 W 248 W 552 BTU/h 845 BTU/h


Mac Pro (Mid 2010)
12-core 2.66GHz configuration: Two 2.66GHz 6-Core Intel Xeon "Westmere" processor, 6GB memory (six 1GB 1333MHz DDR3 ECC DIMMs), 1 TB Serial ATA 3 Gb/s 7200-rpm hard drive, 18x double-layer SuperDrive, ATI Radeon HD 5770 with 1GB of GDDR5 memory
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
145 W 285 W 494 BTU/h 972 BTU/h


Mac Pro (Early 2009)
Quad-core 2.66GHz configuration: One 2.66GHz Quad-Core Intel Xeon "Nehalem" 3500 series processor, 3GB memory (three 1GB 1066MHz DDR3 ECC DIMMs), 640 GB Serial ATA 3 Gb/s 7200-rpm hard drive, 18x double-layer SuperDrive, NVIDIA GeForce GT 120 with 512MB of GDDR3 memory
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
115 W 263 W 391 BTU/h 894 BTU/h


Mac Pro (Early 2009)
8-core 2.26GHz configuration: Two 2.26GHz Quad-Core Intel Xeon "Nehalem" 5500 series processors, 6GB memory (six 1GB 1066MHz DDR3 ECC DIMMs), 640 GB Serial ATA 3 Gb/s 7200-rpm hard drive, 18x double-layer SuperDrive, NVIDIA GeForce GT 120 with 512MB of GDDR3 memory
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
146 W 309 W 496 BTU/h 1051 BTU/h


Mac Pro (Early 2008)
8-core 2.8GHz Configuration: Two 2.8 GHz Quad-Core Intel Xeon 5400 series processors, 12 MB L2 cache per processor, 1600 MHz dual independent frontside buses, 2 GB memory (800 MHz DDR2 fully buffered DIMM ECC), ATI Radeon HD 2600 XT graphics with 256 MB of GDDR3 memory, 320 GB Serial ATA 3 Gb/s 7200-rpm hard drive, 16x double-layer SuperDrive
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
155 W 318 W 528 BTU/h 1085 BTU/h


Mac Pro
Quad Core 2.66 GHz Mac Pro Two 2.66 GHz Dual-Core Intel Xeon 5100 series processors, 4MB shared L2 cache per processor, 1.33GHz dual independent frontside busses, 1GB memory (667MHz DDR2 fully-buffered DIMM ECC), NVIDIA GeForce 7300 GT graphics with 256MB memory, 250GB Serial ATA 3Gb/s 7200rpm drive, 16x double-layer SuperDrive
Power Consumption Thermal Output
Idle CPU Max Idle CPU Max
171 W 250 W 584 BTU/h 853 BTU/h


  1. Power consumption data (watts) is measured from the wall power source and includes all power supply and system losses. Additional correction is not needed.
  2. "CPU Max" is defined as running a compute-intensive test application that maximizes processor usage and therefore power consumption. No external peripherals were attached.
  3. These numbers reflect a 23°C (73.4° F) ambient running environment. Increased ambient temperatures will require faster fan speeds which will increase power consumption. At 35° C (95° F), 50 W should be added to reflect increased power consumption.
  4. These numbers reflect no additional PCI Express cards installed.


Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: 
Character limit: 250
Maximum character limit is 250.
Thanks for your feedback.

Start a discussion in Apple Support Communities

See all questions on this article
No comments:
Newer Posts Older Posts Home

Search This Blog

Review data storage and compliance in Microsoft To Do [MS]

Review data storage and compliance in Microsoft To Do ...