Leaderboard


Popular Content

Showing most liked content since 03/22/2017 in all areas

  1. 1 like
    HI RJS-IT, The error you are getting means that Java cannot complete the SSL handshake because the mail server you are trying to connect to either has a self-signed certificate or the certificate it has is not part of the Java trust store. Try adding the "forceTrust=true" parameter to the EmailConnectSMTP function call. This should force Java to trust the SMTP server's certificate and complete the SSL handshake.
  2. 1 like
    Hi Mike, Yep, there's no way to do that currently, nor will there be in v16 afaik. Why do you want to have one header across all layouts? For a menu?
  3. 1 like
    Basically, you have two options: 1. Import the file twice, once into the Payments table and once into Orders. In each table, define a Type field and set it to validate by calculation: Self = "Payment" and: Self = "Order" respectively, validate always. When importing, map the keyword to the Type field. 2. Import into a temp table first, then do a find for each type and import the found set into the corresponding target table. Both options can be scripted so that the user only needs to select the file.
  4. 1 like
    A zero is zero, no matter how it was entered. And GetAsText ( 0 ) ≠ GetAsNumber ( 0 ) returns false. IMHO, your real problem is having 90 fields - and I suspect you will run into it again.
  5. 1 like
    Hi again... Could you provide an updated ETA on an update that won't require Java 6? We have a major new release of a vertical market product in a couple months and really need to leave the Java 6 thing behind... I'd like to avoid figuring out an alternative to our custom ScriptMaster plugin if at all possible! Soon please soon!
  6. 1 like
    No, I don't think so. This is the second time you report a behavior that I cannot reproduce. Are you sure you're using Filemaker?
  7. 1 like
    I am afraid I cannot look at your file. In case it wasn't clear, you need to run a script that will create a record in the Emissions table for each combination of EngineYearlyConsumptions and Substance (i.e. every row in your report). There is no other way to populate the table (unless you want to do it manually, or you have an outside source you can import)).
  8. 1 like
    You have to start by splitting this into individual records in an EmissionFactors table that has fields for: • Substance • YearOfManufacture • MinimumHorsePower • EmissionFactor • Units Then for your report generate a record in a third Emissions table for each Engine/Substance combination, and let it calculate the total emission. So your structure would be: Engines -< Emissions >- EmissionFactors and the relationship between Emissions and EmissionFactors would be defined as: Emissions::Substance = EmissionFactors::Substance AND Emissions::YearOfManufacture = EmissionFactors::YearOfManufacture AND Emissions::HorsePower ≤ EmissionFactors::MinimumHorsePower with the records on the EmissionFactors side sorted by MinimumHorsePower, descending. I don't see a given year in the example. If you have year-by-year data, this may affect the structure.
  9. 1 like
    Well, yes and no: Gradation also means the passing of one tint or shade of color to another, or one surface toanother, by very small degrees, as in painting or sculpture. Although, given this is one colour directly to another (due to the way the sliders have been used), 'hard' may be an accurate modifier...
  10. 1 like
    A while back I wanted to see if I could emulate the UI of Reeder3. While not very practical, there is a bit of an illusion that is kind of interesting. The sample has two layouts. The one you see in the gif and another with actual data. Enjoy RIVET 3 panel slider.zip
  11. 1 like
    I have 4 layouts for a form that we print and the script goes to the layout for the form 4/6/8/12 depending on the data (wells) in the record. It turns out they need to batch print and its convoluted to write a print a script to switch layouts in an automated fashion. So I had revised it by using hide object when and stacked all the elements up on the layout but it turns out to be rather ugly in layout mode. this was using repeating fields in order to get the desired data to show. But then i decided on a better method - using button bars and hide objects. This essentially does the same thing but much easier to see in layout mode. Now I can write a script to print the found records and the proper form will print based on the data The segment or button bar will hide based on the record type, and the data displayed is also calculated and evaluated on the fly.
  12. 1 like
    Hey, Just wanted to let everyone know about a little module we put together for geocoding and mapping. Simple to install and free to download. I'd love to hear what people think. http://msnmedia.com/blog/2015/04/10/geocoding-and-mapping-module-filemaker-pro
  13. 1 like
    Hello all Here we've posted an example FileMaker 13/12 calendar. You can download it for free and use it in your own code. Go here to read blog post. Have fun! The igeeks
  14. 1 like
    Just added a blog post on what you get from Custom Function parameters... http://www.soliantconsulting.com/blog/2013/11/custom-function-parameters-value-or-reference
  15. 1 like
    The technique described is OK, but we've had FilterValues since FileMaker 7. Rather than: PatternCount ( "¶" & List ( cListOfJobIDs ) & "¶" ; "¶JOB11333¶" ) You can do this: FilterValues( List ( related::JobIDs ) ; "JOB11333" ) The result will be the text you searched for, rather than a boolean. You can then test for IsEmpty. Another nice thing about FilterValues is that you can test for multiple values at once. PS: your original formula was missing that second ampersand. PPS: note that single pilcrows no longer need quotes since FileMaker 7. PPPS: it seems likely that cListOfJobIDs is already a list, so you wouldn't wrap it in a List function.
  16. 1 like
    Hello all A short blog post you may find useful: improved PatternCount searches: http://www.igeek.co.uk/blog/66/FileMaker-Improved-PatternCount-Searches.html Thanks, The igeeks Twitter: igeekUK
  17. 1 like
    “What's in a name? that which we call a rose,
 By any other name would smell as sweet.” —Juliet (Romeo and Juliet, Act II, Scene 2, William Shakespeare)— “The beginning of wisdom is to call things by their proper name.” —Confucius— An entire series of recent studies published by well-known and well renown international security analysis and information industry firms have all made, in slightly varying language, the following key points: Data housed in files in organizations are under relentless and persistent attack by a variety of threat agents including criminals, nation states, so-called “hacktivists”, and disgruntled current or former employees.Organizations of all different sizes are vulnerable; however, smaller businesses and organizations are particularly susceptible to data breaches because they have fewer resources with which to protect themselves and are often in the supply chain of larger organizations that may house particularly valuable data. This is not to say that smaller organization themselves do not also have the same type of particularly valuable data.Financial gain, industrial espionage focused on the theft of intellectual property, and embarrassment or disruption of organization activity are three principal motivations driving threat agents to undertake attacks that result in data breaches.The data are the target, not networks or web sites, or other digital infrastructure items. It’s the data.The data housed in FileMaker databases and resident in organizations using FileMaker Pro and FileMaker Server fall squarely into this realm. So contrary to Juliet’s assertion, we need to adopt the Confucian approach and call this by its proper name. FileMaker databases are susceptible to attack, and the data in them can be compromised and stolen or altered or manipulated by unauthorized persons. The sooner the community recognizes this, and the sooner developers and administrators recognize this, the sooner we can begin a serious and focused discussion about how to identify the likely attackers, identify what vulnerabilities in the software they might exploit, assess the likely risk of their doing so, and develop plans to mitigate the adverse impact of successful attacks. What type data are vulnerable? The answer is: all types. Some categories are more valuable than others; these are likely high on the list of any attacker. Financial data, personally identifiable information, intellectual property, business process information, and organizational IT data are major targets. What type organization is most at risk? Both small and large organizations in the for-profit, the not-for-profit, and the government and education sectors are targets. While certain types of attacks tend to focus on different sized organizations, all are vulnerable. And since smaller organizations frequently lack the resources or the processes to protect themselves, they can be especially hard hit. FileMaker Pro database systems can be found in every type organization imaginable of every size and description in well over 100 countries on seven continents. Some of these databases are well-defended; others are defenseless. We in the developer community are lagging in our efforts to address the seriousness and pervasiveness of the threats to FileMaker databases found in all types of organizations, large and small, across a range of business segments. One sentence in one of those reports[2] I referenced at the beginning of this post stands out as a stark reminder: “Some interpret attack difficulty as synonymous with the skill of the attacker, and while there’s some truth to that, it almost certainly reveals much more about the skill and readiness of the defender.” It’s time for the developer community to get busy about and to get serious about protecting information stored in the systems we create. What information do your clients have that needs protecting? And what happens if you don’t do that? We will explore those two questions, along with how to determine threats and risks, in coming entries on this BLOG. Verizon, 2013 Data Breach Investigations Report Mandiant, 2013 M Trends Threat Report Solutionary, 2013 Global Threat Intelligence Report (GTIR) Sophos, Security Threat Report 2013 [2] Verizon Report p. 48 View the full article
  18. 1 like
    Hello Everyone, i hope this helps some people because it took me a while to figure it out so here is the attached sample file as well as a link to the video. http://www.youtube.com/watch?v=2abc1jIgsLc enjoy, -i cond-value-lists.fp7.zip
  19. 1 like
    http://filemakerinspirations.com/2009/01/google-like-search-through-relationship-filtering/
This leaderboard is set to Los Angeles/GMT-07:00