December 18, 2019 Blog FileMaker FileMaker 17 FileMaker 18 FileMaker Techniques #copyFilemakerHTMLJavaJavaScriptJS Copy & Paste JavaScript into FileMaker Here’s a step by step guide on how to copy and paste HTML and Javascript code into your FileMaker scripts. Read more By Karl Jreijiri
November 27, 2019 Blog FileMaker FileMaker Techniques FileMaker ServerFileMaker Server Running on MacOSOutdated PHP on FileMaker ServerUpgrade PHP How to Upgrade PHP on a FileMaker Server Running on MacOS What’s happening and why is it important? The default version of PHP that ships with FileMaker Server 17.0.4 up to 18.0.2 is 7.1.*. This particular version is no longer receiving active support and won’t receive any security updates starting on Dec 1st, 2019. Any version before FileMaker server 17.0.4 uses a version of PHP that […] Read more By Karl Jreijiri
November 18, 2019 Appworks FM Training Blog FileMaker Techniques developer trainingFileMaker classes Intermediate Level Training Series AppWorks is offering a 6-part training series for intermediate-level FileMaker users looking to improve upon their development skills. These classes will be offered in January and February of 2020, and can be taken as individual classes or as an entire series (for a discounted price). Read more By Eleanor Fulton
July 23, 2019 Blog FileMaker FileMaker Security FileMaker Techniques FileMaker ServerFileMaker Server MonitoringmonitoringZabbix Monitoring FileMaker Servers Why network monitoring? Monitoring your FileMaker server is crucial if you want to be proactive in keeping your business applications running without interruptions. Network monitoring software surveils server processes and alerts you of a failing or slow server. Read more By Karl Jreijiri
June 18, 2019 Blog FileMaker FileMaker 17 FileMaker 18 FileMaker Techniques AppWorksdata separationFileMaker Serverscript Data Separation and Account Security FileMaker’s built-in security features for accounts and privilege sets are flexible and robust enough to meet almost any need. There are times, however, when a particular scripted process needs to override an individual’s security access in order to complete its task. In most cases, the option to ‘Grant Full Access Privileges’ to individual scripts has […] Read more By Michelle Davison