Full Sail Partners Blog | Heath Harris

Posts by Heath Harris:

Malware is Out to Get You

Posted by Heath Harris on July 19, 2017

MalewareIn today’s world of technology, computer users are faced with the constant threat of security issues. One wrong click of the mouse and your computer can be instantly crippled. It is not only important that you are aware of the types of threats that are out there, but you should also be familiar with the steps you can take to protect yourself.

Such security threats are collectively known as malware. The term malware is short for malicious software and references a variety of forms of intrusive software. It encompasses ransomware, spyware, viruses, email spoofing and multiple other malicious programs.

What’s Lurking Behind Your Next Click? 

Here’s a look at the different types of threats and the damage they do to your computer:

  • Computer Virus – A computer virus is a self-replicating program that can be spread via email or also by inserting copies of itself into other computer programs or documents. Viruses can lead to the inoperability of your computer and spread quickly to the computers of everyone you share files with or correspond with via email.
  • Ransomware – Like it sounds, ransomware literally holds a computer ransom by rendering it inoperable and attempts to extort “ransom” money from the unsuspecting victim. Ransomware is typically acquired via email messages and can be spread rapidly throughout the network.
  • Spyware – Spyware is an executable program that is extremely difficult to detect and has the ability of secretly gathering personal information about you or your company. Generally, it is not created to cause damage to your computer. However, it is utilized to monitor keystrokes, copy files and gather information about you. Spyware is most often installed on your computer with something you have clicked on, such as a pop-up ad, browser add-ons, or piggybacked on another software installation.
  • Email Spoofing – Email spoofing refers to sending emails with a sender address that is forged to make it look like it is sent from someone or somewhere other than where it came from. The sender of the email is hoping that the recipient will believe the forged address is from a legitimate person or company and will open it. Generally, spoof emails are more of a nuisance than anything, but they can contain links which install spyware, ransomware or viruses.

Protect Yourself from Malware Attacks 

The good news is that it is relatively easy to protect yourself from all the above-mentioned security attacks. In most cases, your IT person will have already taken measures to protect the network by installing firewalls, virus protection software and deploying DNS protection. The real question at hand is what can you do to help with the security of your information?

Here some of the measures you can take to be sure that you are doing your part:

  • Careful Clicking – Do not click on email attachments or links if you do not know the sender and you are not expecting the document. It is always best to open a browser and manually navigate to the website rather than click on a link which may or may not take you where you intend. Also, take a moment to run a virus scan on any attachments prior to opening them.
  • Smart Surfing – Always utilize pop-up blockers within your web browser and never enter personal, financial or any other sensitive information into any web browser that you have not manually navigated to.
  • Perform Routine Scans – At times, spyware threats and viruses can slip through the active protective engines due to the sheer number of new threats that are created daily. It is crucial that you update your malware protection and run system scans consistently.

Happy Clicking and Surfing 

Take these simple precautions to protect yourself from a software security breach. While all of this malware fear may seem a bit overwhelming, if you educate yourself, remain alert, and follow the measures listed above, your surfing and clicking will be worry free. Remember, keeping your data safe and secure is easily manageable.

Full Sail Partners Technology

Understanding How Deltek Vision Utilizes FILESTREAM and TDM

Posted by Heath Harris on July 16, 2015

As a Deltek Vision client, you may have heard the terms FILESTREAM and TDM thrown around and may be wondering what they are. To clarify, FILESTREAM and TDM are two different things but work hand in hand to provide the desired functionality in Vision.

describe the image

FILESTREAM is a SQL technology introduced in SQL Server 2008 to facilitate the storing and management of unstructured or Binary Large OBject (BLOB) data (image files, word documents, pdf documents, etc.), and ensures transactional consistency between the unstructured data stored in the network file system and the structured data stored in the tables.

Transactional Document Management is a Deltek Vision feature that facilitates the uploading of supporting documents (Expense Receipts, Vendor and Sub-Consultant invoices, etc.) and the ability to attach those supporting documents to transactions within Vision. With supporting documents uploaded to Vision it also gives the ability to easily review and print those supporting documents automatically when processing expenses or invoices. You can also attach several supporting documents to a single transaction or a single supporting document to multiple transactions for more flexibility.

So How DO I Get Started with TDM?

The basics of getting TDM enabled in your Vision database are as follows and take about an hour to setup:

  1. Enable FILESTREAM on the Vision SQL Server
  2. Create the Vision FILES database to store the uploaded documents
  3. Enable the FILESTREAM functionality for Vision
  4. Start using TDM inside Vision

Benefits of TDM

By enabling TDM you can:

  • Reduce the work of keeping track of your supporting documents in the typical Folder/File structure on your network
  • Streamline the process (especially for multi office firms) of allowing employees to scan and upload expense receipts directly to their Expense Reports in Vision instead of the typical procedure of scanning and emailing them to the main office or storing them in the Folder/File network
  • A/P and Interactive Billing also allow the uploading of supporting documents to be attached to invoices, again saving the time and hassle of navigating the File/Folder network structure to find the associated documents

To go a step further when supporting documents have been attached to client invoices they can now be viewed by the appropriate project team members easily and also printed with the invoices as they go out to the client. TDM creates efficiency for accounting as well as staff by having the relevant project accounting documents easily accessible in a consistent location that is available to everyone that has access to the project. 

Caveats of TDM Implementation?

There are a few things to remember if you implement TDM in Deltek Vision:

  1. Backup the FILES database at the same time as your Vision production database. So if you ever need to restore Vision to an earlier time you will also need to restore the FILES database from the same backup to maintain consistency between the two databases.
  2. The other consideration is the size of the FILES database. Although there is no limit to the size of the database, if it grows too large you may start to experience performance issues. As of now there is no known way to archive or reduce the size of the FILES database. This can be somewhat mitigated by making clear that the files uploaded to TDM need to meet a certain criteria (e.g. All documents uploaded to Vision must be in a PDF format and no more than 200 dpi greyscale scans). Unfortunately there is no way to set limits on the files at this time that can be uploaded to TDM. So clearly stating some criteria will help.
For more information on the use of TDM please review the following article from Deltek: 


TDM and Filestream in Deltek Vision



Latest Posts