Improve company productivity with a Business Account.Sign Up

x

Microsoft Access

219K

Solutions

51K

Contributors

Microsoft Access is a rapid application development (RAD) relational database tool. Access can be used for both desktop and web-based applications, and uses VBA (Visual Basic for Applications) as its coding language.

Share tech news, updates, or what's on your mind.

Sign up to Post

For those of you wondering what might be up and coming in Office, one way to stay on top of that is the office 365 road map page:  https://products.office.com/en-us/business/office-365-roadmap?filters=#abc

and checking the "In Development" section.  For those interested in Microsoft Access, you will find a new feature listed there:

"Access: New charts for modern data visualization
Introducing new charts to help you visualize data managed in Access in an appealing and modern way. Add any of the new eleven chart types, including a combo chart, to a form/report to visualize your data and make informed decisions."

Sounds like we are going to get a major new feature!   Of course, if your part of the Office Insider program, you'll be one of first to be able to check it out!
0
Free Tool: Path Explorer
LVL 12
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

I want the easiest way to link a desktop access file to mysql in the web cpanel
any aides please?
0
 
LVL 17

Administrative Comment

by:Andrew Leniart
Hi Azad, welcome to Experts Exchange.

What you done here is made a "Post" which is just a means to share information with the rest of the EE community.

To get expert help with your problem, please use the big blue Ask a Question button at the top of your browser when you are logged in to Experts Exchange.

Hope that's helpful.

Regards,

Andrew Leniart
EE Topic Advisor
0
 

Expert Comment

by:Ancy Hollo
This site http://www.vanskeys.com/office-2016-c-185.html can help you solve your problem, it offers all versions of office product keys and the keys are very cheap, you can go to have a look.
0
Microsoft has added a page to their Office Templates which provides templates for five types of Access databases (Asset Tracking, Contacts, Students, Event Management, and Task Management).  I have not had a chance to review these databases, but this is the first move we have seen in quite some time to add anything "Access" to Office marketing, and is good news.

Please download these templates and encourage others to do so.  If we generate enough traffic, maybe we will be able to get additional templates on the website.

0
0
With this "gap", Microsoft is going to have an improvement to the Controlled Folder Access functionality (luckily they accepted to change it). Look out for the next update ... Meanwhile, I foresee there will malware that will attempt the bypass (really soon...)
 http://www.securitybydefault.com/2018/01/microsoft-anti-ransomware-bypass-not.html
0
AI and machine learning humanize app development and marketing

Machine learning is being used as a marketing tool as it can access user data and gather additional insights on the users’ behavior and engagement preferences.
While artificial intelligence (AI) has been around for a while, scientists have recently made massive breakthroughs in the field of machine learning, a subfield of AI, as noted by NPR.


https://goo.gl/w4K83B
0
Adding awesome vector clipart to LibreOffice

I was recently poking around with LibreOffice and figured out how easy it is to add great vector clip art to ones LibreOffice gallery collection.  My experience with both LibreOffice and the site that provides so many awesome clip art images in vector and many other formats was so pleasant, I figured I would post this tutorial to give then both some love.

Step one in the tutorial is where we download the vector images we want to add to our gallery. This is where flaticon.com comes in.  They have over six hundred thousand icons - all of which you can download in multiple image formats including .png, .svg, .eps and .psd.  Many of the icons are available with their free account but you can get full access to a richer set of icons with their premium plans. Plans range from about $7.50 to $9.99 per month at the time of this writing. If you like their work, consider getting one of their premium plans.  

Gallery1.PNG  Gallery2.PNG











Once you are on flaticon.com, if you are a free user look for one of the icon packs with the [S] in the top left corner - this means the pack is available for free. Icon packs are saved as zip files by default, so you will need to unzip the folder to a familiar location on you hard drive such as Photos folder if you are using Windows - as I am in this tutorial.

With the folder unzipped, you are now ready to fire up LibreOffice. I am using LibreOffice Version: 5.3.4.2 (x64).



Gallery3.PNG
0
We have a List where data is fed through  a form i.e (+ New), I would like to restrict it in a way that majority of the Sharepoint users can only view the List and not be able to access the options in the red box. Only assigned users can have access to the red box.RFLForm.jpg
0
 
LVL 23

Expert Comment

by:Ferruccio Accalai
Is this meant as a question? If so open a question instead of a post
0
 

Author Comment

by:RFLafferty
Thank you
0
Get 10% Off Your First Squarespace Website
Get 10% Off Your First Squarespace Website

Ready to showcase your work, publish content or promote your business online? With Squarespace’s award-winning templates and 24/7 customer service, getting started is simple. Head to Squarespace.com and use offer code ‘EXPERTS’ to get 10% off your first purchase.

I have an access form, "frmCompetition" with a subform, "sfrmDogBrace." This is a database for field trials for bird dogs.   I would like to filter the contents of the subform based on selections I make in 3 separate comboboxes in the main form.  Any advice?  I've tried makeing the underlying query of the subform reference the contents of the 3 comboboxes as criteria.  No luck. Is there some vba code I could use?  My comboboxes are cboyear, cboday, and cbo brace.
0
 
LVL 59

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
Use the blue "Ask a Question" button in the page header.

Posts are for sharing news items.

Jim.
0
 
LVL 59

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
or something that you did and want to share, without writing an article or doing a video (think blog type stuff).

Jim.
0
0
In exchange 2007, wondering if anyone knows how to limit the view of specific public fodders to certain people or security groups.

I know how to limit access (ie author, contributor, editor, etc) but a client has asked that only certain people be able to see certain public folders to reduce the overall amount of viewable public folders (to reduce "clutter" if you will) for everyone viewing the public folder structure. ....
0
 
LVL 17

Administrative Comment

by:Andrew Leniart
Hi classanets,

What you've done here is made a "Post".  The Post function is designed to share information with the Experts Exchange community.

You'll get much better results if you use the Ask a Question button.

It's the big blue button at the top of your browser screen. See below...

Ask a Question

Hope that's helpful.

Andrew
EE TA
1
This is a copy of part of the article located here:
http://www.tomshardware.com/news/how-to-fight-fcc-net-neutrality,36017.html

net neutrality
vote takes place 12/14/17:


Even so, it is the work of but a moment, so we all may as well do it. Go to www.fcc.gov/ecfs/filings/express, and under Proceeding, enter 17-108 (the dystopian-named “Restoring Internet Freedom” order). Fill in the form very, very, very carefully, ensure you get an email confirmation, and submit.

Your voice will be louder, as it were, with a phone call. Call the FCC and leave a message letting the agency know that you want to keep net neutrality as it is. Dial 1-888-225-5322, and be polite, patient, and persistent. You want Option 1, Option 4, Option 2, Option 0. Enter a complaint on proceeding 17-108.

Here’s a sample script: “Hi, my name is ___, and I live in [city], [state]. I’m registering a complaint about the proposed repeal of net neutrality, because it will hurt American consumers, reduce internet access, and restrict the open flow of information. I strongly oppose the undoing of net neutrality, which is at the core of proceeding 17-108. Thank you.”

Then call your members of Congress. The FCC commission is appointed and makes these decisions, but Congress can pressure the agency to do the right thing, and it can also put forward legislation to make net neutrality law instead of just policy. Find your congresscritter at https://contactingcongress.org/, and call the local office …
1
I need assistance here, I have many tables in Access (about 9), which I want to export just by clicking a tab to a single excel sheet. I have tried some code and it did not work, I will appreciate if I can be assisted....
0
 
LVL 35

Expert Comment

by:Rob Henson
Alabi, you have raised a post here. You will get better response from Experts if you raise this as a question. Use the big blue button at the top of the screen or this link:

https://www.experts-exchange.com/askQuestion.jsp
1
 

Author Comment

by:ALABI ADEWALE
Thanks Mr. Rob Henson, I appreciate. I already post there, expecting replies
0
EQIFAX DATA BREACH.

The Equifax data breach is one of the deadliest cyberattacks in the modern times not only in terms of affected people but also due to the intensity of accessed personal data. Equifax reported that between mid-May and June 2017, their system was hacked and the personal information of 173 million customers was exposed. Below we highlight some incites about this breach and then take a look at exactly how this was accomplished at the bottom.

Accessed information

According to Equifax, the hackers were able to access customer’s names, Social Security Number, customer’s date of birth, card numbers, addresses and driver’s license numbers.

Why this breach is one of the deadliest attacks

The Yahoo data breach in 2016 had 1 billion customers affected where only the passwords and phone numbers were accessed. But in the case of Equifax, sensitive data was accessed which means that:

Criminals can use the Social Security number to other credit accounts using a customer’s names.
Hackers can also maneuver their way and shop online using the credit card details obtained.
The hackers can sell the data to other criminals which makes the effect very grave.
An accessed customer’s data is not immune to future’s fraud, extortion and blackmail. The accessed information can haunt a customer forever.
How to find out if your information was exposed

Equifax has established a “Potential Impact” tab on its website (www.equifaxsecurity2017.com) that helps …
0
 
LVL 9

Expert Comment

by:Sean Plemons Kelly, CISSP
This was literally copied and pasted from hackingloops.

Let's go to a "Security" site from a company that hid the fact that they had a massive data breach that affected (more or less) everyone with a credit score in the US. Let's plug in our SSN anyway (fun fact, it doesn't matter if you are on a secure system or using encryption if the destination isn't secure).
0
This is my school project / assignment scenario - I have to draw a Logical Network Design...NEED HELP

The rollout of the wireless network has been suspended for now, but the stock analysis tool is being implemented. It is to be called My Stock Analysis Tool (MSAT). MSAT is going to use a three-tier client-server architecture. The tiers will be a web browser at the client end, a separate web server tier, and the MSAT server that performs application logic and all the data storage and access logic. In this way, there is no issue with installing/supporting a software client on end-user computers. Both customers and DRUB staff will use MSAT through a web-based interface, although staff may see extra options. Apart from accessing MSAT, staff also use Microsoft spreadsheet and word processing software on their computers (Windows XP PCs and laptops) for preparing reports, with work-in-progress files stored on staff computers.
0
 
LVL 35

Expert Comment

by:Rob Henson
Snowbella, well done for being honest and up-front that this is a school project; that will help experts guide you rather than propose answers as they would for normal questions.

However, to get better assistance you need to raise this as a question using the big blue button at the top of the page or this link:

https://www.experts-exchange.com/askQuestion.jsp
0
Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
Easily Design & Build Your Next Website
Easily Design & Build Your Next Website

Squarespace’s all-in-one platform gives you everything you need to express yourself creatively online, whether it is with a domain, website, or online store. Get started with your free trial today, and when ready, take 10% off your first purchase with offer code 'EXPERTS'.

Your access to October’s Course of the Month expires today! Enroll now and begin adding Microsoft SQL to your professional skills.
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
Gmail just launched a physical Security Key access option, dubbed as Advanced Protection, for their service:
https://landing.google.com/advancedprotection/

You'll need to purchase two physical security keys to enroll in it.

Here is the announcement from their blog:
https://www.blog.google/topics/safety-security/googles-strongest-security-those-who-need-it-most/

Good to see a big email service provider taking security seriously, for 'personal' users.

7
 
LVL 55

Expert Comment

by:Scott Fell, EE MVE
Good post. Because I am lazy, I made a request to have this type of thing save to my ee knowledgebase or browser bookmark.

https://www.experts-exchange.com/bugs/21366/Save-posts-to-knowledge-base-as-a-bookmark.html
1
Has your access to vSphere Web Client (VCSA 6.5) crashed this morning with Shockwave Crashed, Google have released a sneaking update 27.0.0.170 to flash which causes Shockwave to crash when accessing VCSA 6.5.

Fix - delete 27.0.0.170 and put back an older version!

You can also read about it here

http://www.virtuallyghetto.com/2017/10/shockwave-flash-has-crashed-workaround-for-vsphere-web-flash-client.html
3
 
LVL 1

Expert Comment

by:patron
Thanks , now we did replaced the dll to get this working , further will wait for another version
0
 
LVL 126

Author Comment

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Chrome and Adobe have now been updated with a release version which works!
1
Cyber News Rundown: 10/13/17

CyberNewsRundown.jpg
Rigzone Founder Caught Stealing Data

Over the last few months, officials have been piecing together the case against Rigzone founder, David Kent. After selling the Rigzone domain several years ago, Kent used several backdoors he’d implemented to access account information for over 700,000 customers, which he then attempted to sell back to Rigzone. By setting up several dummy accounts, Rigzone staff determined the specific IP address Kent used and apprehend him.

Criminals Hack Eastern Europe Bank for Millions

In the last year, banks in several Eastern European countries have seen a drastic rise in fraudulent charges at ATMs that have allowed hackers to make off with nearly $40 million dollars. Attackers start by manipulating the banks overdraft protection and setting up proxies to allow accomplices in other countries withdraw massive quantities of money from separate accounts. In addition to spoofing the overdraft system, the attackers also installed remote access software on bank computers to enable further intrusion to the institution’s systems.

More on our blog here.
2
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4

Microsoft Access

219K

Solutions

51K

Contributors

Microsoft Access is a rapid application development (RAD) relational database tool. Access can be used for both desktop and web-based applications, and uses VBA (Visual Basic for Applications) as its coding language.