Jump to content

Josh Ormond

  • Content Count

  • Joined

  • Last visited

  • Days Won


Josh Ormond last won the day on April 1

Josh Ormond had the most liked content!

Community Reputation

115 Excellent

1 Follower

About Josh Ormond

  • Rank
    Director of Structural Entropy

Profile Information

  • Title
    Senior Developer, FileMaker Certified
  • Industry
  • Gender
  • Location
    Rochester, NY

FileMaker Experience

  • Skill Level
  • FM Application

Platform Environment

  • OS Platform
  • OS Version
    High Sierra

FileMaker Partner

  • Certification
  • Membership
    FileMaker TechNet

Recent Profile Visitors

19,606 profile views
  1. What version of FileMaker are you using? Do you have FileMaker Pro or FileMaker Pro Advanced? Couple of notes: If you update your profile with the version you are using, that gives us a reference point to better answer your questions. If you are using v17 or 18, there is ONLY FileMaker Pro Advanced. And you have to go into Preferences and check the box, "Use Advanced Tools". Then restart FileMaker. You will then see the "Tools" menu.
  2. This looks like a driver issue on your machine. I don't see anyway this is related to FileMaker.
  3. FileMaker places a lock on the record as soon as someone starts to edit the data. So it's not possible for 2 people to change the same record at the same time.
  4. I do agree with you about the duplicate values and discussions on the forums. For the most part, I handle all the other error checking and rule handling in scripts. It's easier to debug, and provide feedback that way. The GetAsNumber ( input ) thing is a different discussion. But that's for another thread. FileMaker's datatype casting has some inconsistencies, especially when dealing with the JSON functions, and also some variable passing ( if you use dictionary functions ).
  5. Yeah, I get the approach. I've always appreciated your focus on the issue itself, and not the surrounding. It's partly why I didn't post the version I am using. As for understanding, I do understand how it works. I also ran it through a bunch of unit tests and saw how it breaks. We work with some junior devs that sometimes need to just copy and paste code from other sources to make something work. I both walk them through how and why, but I also don't have the time to chase minor bugs that take up precious time later. That is the reason for the unit tests. I try to make it as simple as possible, but not any simpler. My purpose of bringing it up was to prompt other readers to understand how it works. The default behavior, by most, would be just to throw 2 lists at it, and then complain it doesn't work. You and I, both, know that is the common behavior.
  6. Honestly, I would be hard pressed to find a regular scenario where they would not be unique also. However, I've already run into a scenario where it ( read by someone else ) was used in a way that presented duplicates and/or extra returns. I tend to try and guard against that, if it's possible and doesn't present other issues. In this case, running UniqueValues ( ) on both lists and removing any extraneous CRs is worth it to me. And doesn't carry a lot of extra weight. And I completely agree with your last comment. The use-case for this is not retaining duplicates.
  7. Looks like you also need to make sure the 2 lists are also unique. Duplicate values in either of the lists break the result.
  8. https://www.briandunning.com/cf/193 For that, I usually either script it, or use this Custom Function from Ray Cologon. Probably other ways to handle it, but I know this works.
  9. What happens if you open cmd and run the command manually? It's also possible there is some odd character or string that I didn't account for, because I didn't run into it.
  10. Try this. We may need to modify this a bit if you have someone running on Windows 7. The command may be a little different. One thing I, personally, don't like about this approach is that is uses the clipboard. Other options to make this work: write the result to a file, instead of the clipboard, and import the file. Read the data that way. use the BaseElements plugin, or your preferred plugin, to execute a system command. This way you can save the result directly to a variable. Anyway, hopefully this gets you moving in the right direction. MonitorInfoTest.fmp12
  11. For starters, why are you trying to do this with Groovy? And exactly what are you trying to do. You mention 2 screens, but not what you are trying to do. We need more details to help guide you. Also, while we can help guide you, the main purpose of the forum is not to build it for you, it's to help guide you and explain things you don't understand.
  12. It will be interesting to see exactly what happens. A colleague is at DevCon and had a nice chat with Srini Gurrapu ( the new VP of Product Design and Development ), and he talked about the vision. At this point, there are a lot of possibilities. He was very open and honest about what they are striving for. I’m sure we will see more come through official channels as they work through that vision. It’s clear. Both Brad and Srini are shifting things into high gear.
  13. Nothing really says they are completely abandoning on-prem servers. Just that their focus will shift, as has already been happening, to cloud tech. There are many businesses and organizations that can't use cloud tech to store data, so there will always be an on-prem component. This shift, overall, really helps drive the platform toward the future. This is where tech is heading.
  14. There are various thoughts regarding whether to leave the admin account intact or not. Here are some general thoughts for you to do some additional research into. 'admin' is a pretty common username, and definitely makes it easier for someone to use that to try and login. It's a good idea to, at the very least, change the user name to something else not as easily guessed. Obviously, makes sure it has a strong password. And don't lose it, or store it on a sticky note. Newer versions of FileMaker ( 17+ ) have an Account Lockout feature that slows down brute force attacks. Encryption At Rest ( EAR ) prevents someone from replacing part of the file to remove the password. Also, don't lose this password, or there is no way to retrieve the data. Full Access Accounts through External Authentication. Well, there are some dangers here. Somewhat mitigated by EAR, but you should at least recognize what the danger is. Someone could replicate your authentication groups that you use in the FileMaker file, in their own environment, and give themselves access to the file with Full Access privileges.
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.