FileMaker Pro 11 review
We review FileMaker Pro 11 to see whether new features and enhancements are worth the upgrade or not.
There are useful new features in this release, many concerned with improving usability and efficiency and these enhancements will definitely be appreciated by existing users. The arrival of charts is a huge bonus for FileMaker Pro users too. For business users it’s likely to prove a ‘must have’ and a major driver for adoption of version 11.
Also new is the Snapshot Link, a way of quickly sharing a view of data. A snapshot captures the current selected set of records, sort order and layout into an .fpsl file which can be opened by other FMP 11 users with access to the same database from which the snapshot originated. (There's a handy option to create an email with the snapshot as an attachment).
It is quick, easy and ideal for showing a colleague exactly what you were looking at when the brainwave for the next marketing campaign struck.
Whilst changes made to the database after the snapshot was taken will not appear in the snapshot, changes made to the snapshot file will automatically update the database.
Another productivity enhancing feature is Recurring Import. If you regularly import data from a Microsoft Excel file (.xls or .xlsx), .csv (comma separated variable) or .txt files (other formats are also supported), this one's for you. Set up the import routine able and thereafter whenever you open the database, the data will be updated automatically. During setup, a new table is created for the imported data and whenever the data is re-imported, the current data in the table will be deleted and replaced by the new data.
You can also create a recurring import script during set-up that can be run at any time.
Giving improved security to a FileMaker database is now possible with file access security features. Without protection, other users can make use of tables and work with them in a way which subverts the business logic which has been implemented on the original table. You can control access to the database schema (which determines the way tables and their fields are organised and the relationships between them) and once control is applied to secure a FileMaker solution, any use of the protected file will require authorisation.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Google faces 'first of its kind' class action for search ads overcharging in UK
News Google faces a "first of its kind" £5 billion lawsuit in the UK over accusations it has a monopoly in digital advertising that allows it to overcharge customers.
By Nicole Kobie Published
-
Darktrace unveils tailored AI models with a twist for its cybersecurity agent
News Darktrace has announced new AI models for its agentic AI security tool, but it's taken a novel approach to tackle hallucinations.
By Rory Bathgate Published
-
This tech company wants to pay staff to look after their mental and physical wellbeing
News Hot on the heels of its four-day week trial, tech company Thrive is offering staff new incentives to take care of their mental and physical wellbeing.
By Ross Kelly Published