FileMaker Pro 11 review
We review FileMaker Pro 11 to see whether new features and enhancements are worth the upgrade or not.
There are useful new features in this release, many concerned with improving usability and efficiency and these enhancements will definitely be appreciated by existing users. The arrival of charts is a huge bonus for FileMaker Pro users too. For business users it’s likely to prove a ‘must have’ and a major driver for adoption of version 11.
Also new is the Snapshot Link, a way of quickly sharing a view of data. A snapshot captures the current selected set of records, sort order and layout into an .fpsl file which can be opened by other FMP 11 users with access to the same database from which the snapshot originated. (There's a handy option to create an email with the snapshot as an attachment).
It is quick, easy and ideal for showing a colleague exactly what you were looking at when the brainwave for the next marketing campaign struck.
Whilst changes made to the database after the snapshot was taken will not appear in the snapshot, changes made to the snapshot file will automatically update the database.
Another productivity enhancing feature is Recurring Import. If you regularly import data from a Microsoft Excel file (.xls or .xlsx), .csv (comma separated variable) or .txt files (other formats are also supported), this one's for you. Set up the import routine able and thereafter whenever you open the database, the data will be updated automatically. During setup, a new table is created for the imported data and whenever the data is re-imported, the current data in the table will be deleted and replaced by the new data.
You can also create a recurring import script during set-up that can be run at any time.
Giving improved security to a FileMaker database is now possible with file access security features. Without protection, other users can make use of tables and work with them in a way which subverts the business logic which has been implemented on the original table. You can control access to the database schema (which determines the way tables and their fields are organised and the relationships between them) and once control is applied to secure a FileMaker solution, any use of the protected file will require authorisation.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
The generative AI ‘scramble’ is over - now it’s time to sort your infrastructure or fall behind
News Building out robust infrastructure is key to ensuring future AI success
By Ross Kelly Published
-
Scattered Spider: Who are the alleged hackers behind the M&S cyber attack?
News The Scattered Spider group has been highly active in recent years
By Ross Kelly Published
-
Microsoft says this data center cooling technique can cut emissions by one-fifth – but switching to renewables will prove far more impactful
News In a cradle-to-grave environmental assessment, Microsoft has examined manufacturing, transportation, deployment, and end-of-life disposal
By Emma Woollacott Published