Mar 07

Total Access Statistics 2003 11.9 and 2007 12.9 Released

Total Access StatisticsWe are pleased to introduce new versions of Total Access Statistics for Microsoft Access 2007 and 2003; versions 12.9 and 11.9 respectively. They include the many features we introduced with the latest Access 2016 version.

Total Access Statistics is an add-in that is the most powerful data analysis program for Microsoft Access. It extends the power of Access queries to analyze the data in your local or linked tables. It generates results in tables you can view or include in other queries, forms, and reports. It offers a wide range of statistical functions such as:

  • Field Descriptives
  • Financial Cash Flow Calculations
  • Percentiles
  • Running Totals and Moving Averages
  • Field Comparison
  • Frequency Distributions
  • Regressions
  • Advanced Cross-Tabulations
  • Group Analysis (t-Tests and ANOVA)
  • Record Analysis and Rankings
  • Non-Parametric Analysis
  • Probability Calculator

New Features

  • Additional percentile types can be assigned to a field in your table
  • Enhanced data formatting
  • Improved financial calculations for IRR and XIRR
  • Updated user manual
  • Support for Windows 8 and 10

New Add-in and Runtime Library Files

Version 12.9 and 11.9 include new files for the Access add-in. It also has new runtime library files.

  • A digitally signed MDE library for MDB databases that support users of Access 2016, 2013, 2010, 2007 and 2003.
  • The Access 2007 version includes an ACCDE runtime library for ACCDB databases for Access 2016, 2013, 2010 and 2007 users
  • The Access 2003 version includes a runtime library for Access 2000 and 2002 users

For more information, visit New Version X.9 Features.

Try out the new enhancements with our
download-trial-blue

Feb 15

Total Access Admin 2016 Released

real-time-monitortotal-access-adminadmin-icondownload-trial-blue

We are excited to announce our release of Total Access Admin 2016! Total Access Admin is our administrator tool to help you monitor the users going in and out of your Microsoft Access databases (ACCDB and MDB formats) in real-time:

  • adminSee who is currently connected to your Microsoft Access database (you can manage multiple databases from one screen)
  • Monitor up to 150 databases at one time
  • Keep a log of users entering and exiting each database
  • Identify workstations or users disconnecting in a suspect manner which may be the source of database corruption
  • Compact your database when all users exit it
  • Prevent new users from logging into your database
  • Log off idle users
  • Communicate with your users in real-time

New Features

Total Access Admin 2016 is an update from the 2013 version and includes these enhancements:

  • Monitors ACCDB and MDB format databases created by Microsoft Access 2016 (32 or 64-bit version) and earlier versions of Access
  • Works in environments where Access 32 or 64-bit versions is installed, including installations from Microsoft Office365
  • Does not require Microsoft Access to be installed on the machine
  • Up to 150 databases can be monitored at one time (up from 100)
  • Setup program supports Windows 8 and 10, Server 2012 and later, with an option to launch the program after its installed

database-monitor

Download the free trial version today!

Existing customers can upgrade at a discounted price.

Jan 05

Sean Hannity Radio Show Interview on Julian Assange, WikiLeaks, Russian Hacking, and Cyber Warfare

sean-hannity-radioBackground

The day after an amazing personal interview of Julian Assange by Sean Hannity aired on his TV show, FMS President Luke Chung was invited to discuss the related technology on his radio show.

Hannity traveled to London to interview Julian Assange at the Ecuadorian Embassy where he’s seeking asylum. They discussed an overview of Assange’s role as founder of WikiLeaks, and their obtaining and publishing the emails from the Democratic National Committee the weeks before the US Presidential election. Some people attribute Hillary Clinton’s loss to the revelations in those emails especially from John Podesta, the former White House Chief of Staff and Chairman of the Clinton campaign. They are also accusing the Russians for hacking (stealing) and providing the data to Assange so Donald Trump could win the election.

Radio Show

On January 4, 2017, I was on the radio show with Sean Hannity and Brigadier General Eli Ben Meir, former Israeli Military Intelligence chief. The three of us discussed the WikiLeaks disclosures. I commented specifically on:

  • Cyber attacks and the security breach at OPM disclosed non-classified government employees and by omission who were covert at American Embassies globally.
  • Noting Julian Assange’s careful word choices to exclude Russia as source without excluding them as the ultimate source of his sources.
  • The need for WikiLeaks’ to keep their sources confidential and how they amplified the data from Bradley Manning and Edward Snowden.
  • Different approaches to preventing cyber attacks depending on the cause.
    “It’s one thing when someone steals your car because they broke into it. It’s another thing when someone steals your car because you left your keys in the ignition.”

Here’s the audio of the show:

My segment starts at the 6:50 mark. Sean and General Meir speak first, then I start around 9:25. Final comments at 14:15 and it wraps up by 14:50.

Additional Issues

Only a limited amount of information can be discussed in such a short interview. Some additional issues to consider are:

Data Security

Securing data over the internet and inside organizations is very challenging. Threats may come from:

  • External hacks that need to be monitored and defeated
  • Internal people who unintentionally leave the front door unlocked
  • Internal people who intentionally leak information

Different solutions are required for each type of threat. Some are at the software vendor, design, and developer level, while others involve end-user training, background checks, and monitoring.

Applications can be built so that simply disclosing a user name and password doesn’t compromise the whole system by require two-factor authentication and registering devices that can use those credentials.

Unfortunately, many systems were built well before today’s cyber threats existed. The cost of making those systems more secure without breaking their existing functionality will be daunting and expensive. In many cases, the original source code, development environment and/or vendor are long gone, so the only option is to replace them which is also very expensive and time consuming.

Julian Assange and WikiLeaks are Not Heroes

We need to keep in mind that the WikiLeaks exposed top secret US information by publishing the disclosures from Manning and Snowden. Lives were put at risk and lives may have been lost because of those publications. The Arab Spring was inflamed in part by the disclosure of diplomatic communications and one could argue the human tragedy in Syria is tied to this as well. While Republicans are celebrating and defending Assange and WikiLeaks now for the DNC emails, the tables may turn very quickly.

Data That’s Not Exposed May be More Dangerous

While many are focused on the DNC emails, it’s not unreasonable to assume the people who hacked that also got the RNC emails. Data can be power, and in the wrong hands, data can be used for nefarious purposes such as blackmail.

If the RNC data were compromised, we should be extremely worried if the hackers discovered it was more valuable to keep private than public. Whether they use it directly or sell it to another party or country, the information can make victims puppets by threatening the exposure of their personal data. It’s not uncommon during E-discovery of an email server to discover all sorts of inappropriate language, behavior and activity conducted by individuals in an organization. Disclosures of affairs, homosexual activity, underage sex, bribery, unethical business dealings, breeches of confidentiality, collusion, and actual crimes are often found in email threads and can be used for blackmail.

Additional Resources

Oct 28

FMS Inc. Joins Microsoft Enterprise Cloud Alliance

FMS Inc., a leader in software database development and design, is proud to announce it is joining the Microsoft Enterprise Cloud Alliance.

Celebrating 30 years in software development, FMS has a long track record of building mission-critical solutions for a wide range of organizations around the world. From desktop to web and mobile solutions, FMS serves tens of thousands of customers in over 100 countries ranging from small to large commercial organizations, non-profits, educational institutions, and government agencies.

The Microsoft Enterprise Cloud Alliance offers an innovative way for FMS Inc. to integrate its innovative products and services with Microsoft Corp.

“We’ve helped many organizations create and deploy database applications on the Microsoft Azure cloud,” said Luke Chung, President and Founder of FMS, Inc. “With Microsoft’s cloud center, our solutions are hosted on an enterprise quality infrastructure platform that’s highly scalable and reliable.  It eliminates the headaches of managing our own hardware and connectivity, and best of all, it’s a fraction of the cost compared to doing it ourselves. That translates to quicker time to market and lower costs for our customers.”

To learn more about the Microsoft Enterprise Cloud Alliance, please visit https://msdn.microsoft.com/en-us/mt438667.aspx

About FMS Inc.

Since 1986, FMS has created innovative software solutions for commercial and government organizations. A Microsoft partner since 1992, FMS is a leading provider of products for Microsoft Access and Microsoft Office. Our Professional Solutions Group offers custom solutions on Windows, web and mobile platforms. Our Advanced Systems Group created Sentinel Visualizer, an advanced link analysis and data visualization product for the intelligence, defense and law enforcement communities. For 30 years, FMS has helped over 50,000 customers in more than 100 countries make better data-driven decisions.

Aug 24

Total Visual Agent Available for Microsoft Access 2016

topbannertotal-visual-agent-60scheduler

Total Visual Agent, the world’s most popular maintenance scheduling tool for Microsoft Access/Office and Visual Basic 6 (VB6) is now available for Microsoft Access 2016 (and earlier). This is the ninth major release of Total Visual Agent and introduces many enhancements to automate maintenance chores easier than ever.

To keep your Microsoft Access databases healthy, you need to regularly compact them. For disaster recovery, you should also be making backup copies of your database regularly. You may also have regular tasks such as printing reports that are performed regularly. Total Visual Agent does this and much more on a schedule you specify. Run tasks hourly, daily, weekly, monthly or just one time. Perform database chores, run Access macros or Windows command lines. A complete audit trail is maintained, and you can even be notified by email if something goes wrong. Total Visual Agent can also be run as a Windows service to restart if the machine reboots and for added security since a user doesn’t need to be logged in.

Total Visual Agent 2016 leverages our vast expertise, and offers the best database management solution with many new features:

Total Visual Agent

  • Supports Microsoft Access 2016
  • Supports Windows 8 and 10
  • Does Not Require Access to be Installed on your PC
  • Database Lock Error Identifies Offending Machines
  • Activity Log is Separated from Settings Database
  • Activity Log Shows Duration of Each Activity
  • Email Notifications Support TLS and Office365 SMTP
  • Tasks are Not Run at the End of an Event Interval
  • Enabled/Disabled Status Shown on the Event Form
  • More Robust Windows Service Feature
  • Improved Monitor Settings Tab
  • Default Location of Archive and Extract Folders Moved
  • Improved Setup Program
  • New user manual and help file
  • download-trial-blueand More…

Download the free trial version today!

Easily Define and Manage Events, Tasks, Databases and Folders

manager_2016