click here to go home products downloads technicalsupport company_info contactus blackbar

 

Getting Started Guide

Elsinore

Visual Intercept

Incident Management System

For Windows® 95, Windows NT" 3.51, NT" 4.0, and Microsoft® Windows 3.x


Contents

Preface: Before You Begin
Elsinore Technologies Support Services
   Contacting Elsinore Support Engineers
Chapter 1: An Introduction to Incident Management
Why we use the word "Incident"
The Basics of Incident Management
A Typical Day for Visual Intercept
   Capturing the Information
   Routing the Information
   Monitoring Progress
   Monitoring the Process
The real benefits
Chapter 2: Quick Installation and Evaluation
Quick Installation
   For Windows 3.x Users Only
Setting up Visual SourceSafe Integration
   To attach a source code file to an incident:
   To check out a source code file attached to an incident:
   Importing Visual SourceSafe Project Trees
Optimizing Speed of Data Retrieval
   Network Installation
   Installing Visual Intercept to a network


Before You Begin



The Elsinore Technologiesí Visual Intercept Getting Started Guide contains an overview of incident management, and hints for quickly installing and exploring the Visual Intercept® Incident Management System.

The Getting Started Guide is intended to supplement the Visual Intercept User's Guide. For more detailed information on how to use or install Visual Intercept, please refer to the User's Guide.

If you are like most people who are just starting to learn about Visual Intercept, you probably have two goals in mind:

First, you want to get some idea of what the product does and what using it will be like.

Second, you want to be able to install it on your computer quickly and check out the key features of the program without too much fuss.

The Getting Started Guide will help you with both of these goals.

Chapter 1, An Introduction to Incident Management, will give you a clear impression of what Visual Intercept can do for you and your software development process. You'll get an overview of what incident management is, and see a hypothetical business using Visual Intercept to track a particular bug through the development process.

Chapter 2, Quick Installation and Evaluation of Visual Intercept, is a guide for quickly and efficiently loading the Visual Intercept Software onto your computer for evaluation. The chapter contains step-by-step instructions for installing Visual Intercept on an individual machine or on a network. The instructions guide you past some of the subtle pitfalls involved in setting up an ODBC data source, and show you how to use the Visual Intercept Wizard to start setting up your own projects in the system. This chapter also helps you configure some of the key features of the system, such as integration to Visual SourceSafe, so you can try them out immediately.


Elsinore Technologies Support Services

If you have a question about Elsinore Technologies' Visual Intercept, first look in the Visual Intercept User's Guide. On-line help is also available by clicking F1 or the Help button on the Menu bar. You can also find the latest updates and technical information in the readme.txt and install.wri files that came with your Visual Intercept diskettes.

No-charge support from Elsinore support engineers is available via a toll call between 9:00 A.M. and 4:00 P.M. Central Time, Monday through Friday excluding holidays. This support is available for all registered owners of Visual Intercept products.

When you call, you should be at your computer and have the appropriate Visual Intercept documentation at hand. Please be prepared to give the following information:

Contacting Elsinore Support Engineers

Phone: (713) 956-1221
Fax: (713) 956-0889
Email: [email protected]
Web: elsitech.com


Chapter 1
An Introduction to Incident Management

The big day is at hand: after months of work, your software product is finally being released. Confetti litters the floor outside your office, and down the hall you hear champagne bottles popping. Everyone is relieved and happy. Hundreds of copies have already shipped, and what started as just a dream has finally become a reality.

You brush the confetti off your keyboard and start up the 1.0 version, just to see the splash screen again and savor the victory. You cruise through the features, fiddling with the settings, thinking back on all the glitches and problems you worked through to make this happy day come about.

Then, out of nowhere, like a brick between your eyes, comes an unthinkable sight: an error message on your screen. Oh no, you think. It can't be true. That problem with the system integration you found months ago is still there, right there before your eyes in the released product. How could it have gotten through? It can't be true . . . you just released your product with a major bug.

Your happy victory thoughts are shattered, replaced by a slow, sinking sensation in the pit of your stomach. All you can think about now is the wave of tech support calls that will hit on Monday, and what will happen when your boss finds out . . .

Surely, you think, there must have been a way you could have avoided this. Isn't there some way we can keep things from slipping through the cracks?

It's a nightmare situation everyone dreadsó one of the hundreds of bugs that turned up in your software comes back to haunt you.

This scenario has happened often enough that people began to look for ways to avoid it. Thus, incident management was born.


Why we use the word, "Incident"

The software industry has a multitude of phrases for the process of keeping track of software glitches: bug-tracking, defect management, problem-tracking, configuration management, etc.

After much thought, Elsinore Technologies, Inc. decided to call Visual Intercept an "incident management system." We use the word "incident" rather than "bug" or "defect," because it is a broader and more flexible word, encompassing a number of different events that might affect software development. Elsinore recognizes that a development team must track more than just bugs ó one must also consider feature requests, customer complaints, production deadlines, vendor limitations, and a host of other issues.

This flexible, open-ended approach allows the Visual Intercept user to make the most of the product, communicating everything that matters to everyone that matters.


The Basics of Incident Management

When a group of people work together on a project over a long period of time, a multitude of problems arise. The array of problems that can arise in developing software is so broad and overwhelming that no one person can keep track of everything. Development teams thus need a systematic way to control the process of finding and fixing bugs and other problems. Incident management software such as Visual Intercept is designed to make the job of tracking problems as streamlined and efficient as possible, so development teams can spend their time solving problems instead of trying to remember all the problems that need fixing.

Whether you are a large team of 50 developers or a small three-man shop, the basic process of tracking incidents is usually the same:

  1. You need to capture information relevant to the development process ( i.e., bug reports, feature requests, etc.);
  2. You need to route that information to the appropriate people, so they can begin to address the problem;
  3. You need to monitor the progress being made on certain incidents, so you can quickly learn the current state of affairs;
  4. You need to monitor the process of development, to see where the most problems are occurring and figure out how best to allocate resources, avoid bottlenecks, and speed the overall process.

Every development team must go through these four steps in the process of building software. Many teams do it "on the fly," trusting that individual energy and attention will ultimately solve all problems that arise. Other (much wiser) teams try to do it systematically, using formal procedures for capturing and routing information. Such systems vary tremendously in their complexity and sophistication: ring-binders full of forms, post-it notes on someone's chair, email systems, centralized databases, etc.

Most people who use such systems nonetheless find them to be very cumbersome. Filling out paper forms, printing out screen shots of error messages, carrying reports to co-workers down the hall, leaving notes on someone's computer screen, all take time and disrupt the regular flow of work.

Visual Intercept automates each of the four basic steps in incident management. Using Visual Intercept, a developer can record all information related to an incident, forward it to the right people, check up on the incident later on, and even analyze the pattern of incidents occurring, all without leaving his or her desk.


A Typical Day for Visual Intercept

The following narrative is given as an example of how a software development team might use Visual Intercept in the course of their daily routine.

This example is by no means meant to be prescriptive. Every group of developers will have their own organization and their own ways of dividing tasks involved with development. A large corporate development team usually divides the development process into several distinct job categories: programmers, testers, Q/A technicians, tech support, documentation writers, and project managers, to name a few. In a small team of programmers, the job descriptions may be less defined, with everybody participating in every aspect of software development.

This story will give you a taste of how Visual Intercept's features can be used, and give you ideas for how you might use it in your own organization. Words in bold indicate particular features or commands in Visual Intercept.


XYZ Corporation is a highly successful consulting firm that builds custom software for a number of big corporate clients. With 30 employees, XYZ is growing quickly and has more business than it can comfortably handle.

Capturing the Information

Early one morning, Miss Susan TechSupport gets a call from an irate customer, Joe Shlabotnik of CFK, Inc. He is ticked off because the latest upgrade of XYZ Wizzbang is not integrating with Microsoft Word. Susan listens to Mr. Shlabotnik's problem, and realizes that this is probably a bug that needs addressing. She doesn't remember this bug being reported before, but she decides to check the Visual Intercept database to see if someone else has ever run across this bug.

She pulls up her Visual Intercept Manager program, which she keeps running in the background most of the time. Using the Browser, she looks inside the Project labeled WizzBang, and then in the subproject Third-Party Products. A few incidents have been recorded in this subproject, but based on the descriptions none of them seem to be related to Microsoft Word.

Susan reassures Mr. Shlabotnik, and tells him that XYZ Corp. will look into his problem immediately. She creates a new Incident document in Visual Intercept, and then asks Mr. Shlabotnik specific questions about the bug. As Mr. Shlabotnik tells her about the problem, she records all the information into the Description field of the Incident.

She then clicks on the Fetch All Contacts icon, to see if Mr. Shlabotnik had ever reported a bug before. She finds that he has called the tech support desk before.

She double-clicks on his listing, pulling up a window with his full name, title, address and phone numbers. She double-checks all this information with him, and finds that while most of the information is correct, his phone number has changed. She corrects the Contact information, and tells Mr. Shlabotnik that she'll call him back as soon as she knows what's wrong.

Now that she's off the phone, Susan takes a moment to fill in the rest of the information. She sets the Priority to High, since this is not a complete show-stopper for Mr. Shlabotnik but obviously something he needs very much. Susan sets the Severity to Unexpected, since he did expect the Wizzbang to behave like its previous versions. She sets the Requested field to her own UserID, stech, so others know that she received the call and registered the Incident. She doesn't mess with the Assigned tag, since she's not quite sure who should handle this problem.

Having filled in the General information fields, she clicks on the Contacts tab. She clicks the Attach button, and adds Joe Shlabotnik to the list of Contacts associated with this Incident.


Routing the Information

Now, having gathered all the information she can, Susan inserts the Incident document into the database. Now all the information is available for other Visual Intercept users to see. She reduces Visual Intercept to the background, and goes back to taking support calls.

Susan's incident was inserted into the Third Party Products folder of the Wizzbang project. Now the information is automatically routed to the Project Lead responsible for third-party interfaces, Bob Manager. Mr. Manager is working on a budget report when his Visual Intercept program beeps at him, and a Notification Window pops up.

Bob checks the Notification, and finds the Incident document which Susan has filed.

Bob and his team of programmers is responsible for third party product issues, and when he reads the incident description, he realizes he has a major bug on his hands. Bob notices that the bug report comes from CFK Industries, one of biggest companies using WizzBang, so he knows this problem should get a very high priority. He immediately changes the Priority from High to Urgent, and changes the Status from New to Investigation, to indicate that he has started to look into the matter. He starts up his own copy of Wizzbang, and tries to recreate the bug that was reported. Sure enough, he gets the same error message Mr. Shlabotnik had reported. Bob takes a screen shot of the error message and Attaches the bitmap document to the Incident.

He then adds his own comments to the description window, telling how he recreated the bug. His comments are stamped with his userID, date and time, so they are kept separate from Susan's original description of the problem.

Bob decides to assign this problem to his best developer, Joe Programmer. Bob sets the Assigned User to jprogr, so Joe knows that he has been assigned the task. He also resets the Requested field to his own userID, Bmanage, so Joe knows it was his boss who is making the request. Bob then uses the Send command, to automatically email a copy of the incident document to Joe as well, since Joe might not have Visual Intercept running at the moment, but he does usually check his mail regularly. Bob adds his own comments to the email: "Joe, get on this right away! It's a real bug!" Bob then goes back to working on his budget report, hoping that Joe will be able to solve the problem quickly.

Joe checks his email by mid-morning, and finds the message from his boss Bob. Joe fires up his Visual Intercept program, and pulls up the Incident to read all the detailed comments. Joe has been working on a number of minor bugs lately, but he immediately sees that this is more important. He sees that Bob already recreated the bug, and he double-clicks on the attached bitmap to see the screenshot. Joe is really glad Bob included that screenshot ó it told him exactly what he needed to know. Joe goes to the SCCS tab of the Incident and clicks Attach, so he can go directly to the Visual SourceSafe version control system to find the source code he needs to work on.

Joe attaches the source files to the incident, and then clicks Checkout to have the documents automatically checked out to his working directory. He looks at the code, and after half an hour finds the probable cause of the problem. Joe resets the Status of the Incident to Development, so Joe and Susan know that he's found the problem and started working on it. He makes a few quick notes in the Description field, explaining what caused the failure and what he'll try to do to fix it.


Monitoring Progress

Meanwhile, Susan Tech-Support has not forgotten about the incident. She would like to call Mr. Shlabotnik back before noon so she can reassure him that they're working on it. She looks in on the Incident report, and sees that Bob and Joe have already gotten on it. She reads Joe's comments, and is pleased to hear that Joe thinks he can repair it today. Susan calls Mr. Shlabotnik back, and tells him that his bug is already been tracked down and that a fix is in the works. Mr. Shlabotnik is incredibly impressed that XYZ got back to him the same day, and he thanks Susan for the call.

Back in development lab, Joe hacks away at the code. He reworks a critical routine and, impressed with his own brilliance, declares the bug to be fixed. He changes the incident's Status to Q/A, sets the assigned user to wqual (Walter Quality), and updates the changes to the incident to the database. He then goes back to playing video games.

Walter Quality, a scrupulous quality assurance officer, frequently checks the Visual Intercept database to see if any incidents need his attention. He does this by using a pre-set Query called QA Incidents, which searches the database for any incidents that have recently been promoted to Q/A status. That afternoon, Walter sees the Wizzbang incident when he runs the query. Walter reads the Incident Description carefully, and even recreates the bug occurrence just to satisfy himself that he knows what he's up against. He then takes the repaired code modules that Joe attached to the incident, rebuilds the application, and tests it to see if the fix worked. Lo and behold, Joe's work fails the test ó the bug is still present, and Wizzbang 4.0 still doesn't integrate to Microsoft Word. Walter curses silently; this is just like Joe, to send a bug-fix along without testing it first. Walter appends his comments to the Incident Description, sets the Assigned field back to jprogr, and sends the Incident back to Joe.

Joe is mortified when his Visual Intercept program beeps at him again late that afternoon. He was sure he had fixed the bug, but looking at the incident he sees that Walter flunked his fix. Joe calls one of his friends at Microsoft, Bill Superguy, and asks for advice on the problem. Bill emails Joe some helpful hints on integration to Word, and Joe attaches that document to the incident, and also adds Bill to list of Contacts associated with the incident. With renewed confidence, Joe tears into the code again, and a few hours later emerges with a fix that works. He tests it this time, just to be sure, before he sends it on to Walter again.

Walter checks for Q/A incidents again first thing the next morning, and after retesting the code he approves Joe's fix. Walter then sets the incident Status to one of XYZ's custom-defined Status values, called Distribute. This means the company is now in the process of getting the bug fix out to the customers. Walter emails Bob Manager, and lets him know that he can proceed.


Monitoring the Process

When Bob looks at the incident again, he can see all the work that went into the bug-fix clearly documented. He reviews the History tab in the incident, pleased to see that everyone responded so quickly when the bug came in.

In fact, he was even thinking of putting this and other incidents in his budget proposal; by demonstrating how quickly his team responds to Urgent- and High-Priority bugs, Bob can impress the president of XYZ and justify the extra money spent on salaries.

Bob does note with mild disapproval that Joe's first bug-fix was sent back by Q/A. Bob seems to remember that Joe does that a lot, always sending code along before he's tested it. Just to check, Bob clicks on the Query Builder, to search the Visual Intercept database for very particular incidents. He requests all incidents in Joe's projects that were inserted within the past month.

The request pulls up five incidents, and sure enough, four of the five incidents involved Q/A sending the code back to Joe for more work. Bob sends Joe a brief email, praising him for his good work on the bug, but reminding him firmly to check his fixes more thoroughly in future.

Bob assigns the incident to Elvira Webb, the company's web master, to take care of putting the bug-fix up on the Web so customers can down-load the corrected software. Elvira puts together a spiffy-looking HTML page, informing the customers of the problem and how they can get the new, corrected version: WizzBang 4.0.1. Once customers are successfully downloading the corrections, Elvira sets the incident Status to Closed. She writes up a final summation of the bug-fix distribution in the Resolution field of the incident, so that if others called in with the problem Susan would be able to direct them to appropriate solution.

Susan, meanwhile, is still busy dealing with the bug. Other customers also called in with reports of the same bug. She recorded the details of each report faithfully, but set the Status to Duplicate so everyone would know it was a bug they'd already seen before. After reviewing each duplicate incident to be sure they were all the same thing, Bob Manager would attach the Incident documents to the original bug report. That way, once the bug was fixed, they could easily find all the duplicate incidents, and inform everyone who reported it that a fix was ready.


The real benefits

Our story took us through the complete process of finding and repairing a single bug. Any software company would go through a similar procedure to fix a bug. What makes XYZ's story so remarkable is that by using Visual Intercept:

  1. Nobody had to leave their desks while participating in the process. From bug discovery to bug resolution, everybody involved was able to do their job without having to hunt someone down, or run to the printer, or search for the right form, or search for missing information, or do anything else that pulled them away from their primary functions.
  2. The whole process was effortlessly and automatically documented. Nobody was ever in doubt as to what they needed to do, or what everyone else was doing. At any time, people could check up on progress, or even analyze the development process as a whole.

Thus, Visual Intercept allows you to gather and use incredibly valuable information without hindering your productivity. If fact, the system improves productivity by automating the process of routing incident information to those who need it.


Chapter 2
Quick Installation and Evaluation

Now that you've gotten a sense of what Visual Intercept Incident Management System can do for you, you're probably eager to install the software on your computer.

However, there are a few tricky steps involved in getting the Visual Intercept System working. Even once the programs are loaded on your computer, one must still hook the programs up to an ODBC data source.

If you are still evaluating Visual Intercept and are primarily interested in getting started quickly, we suggest you use the procedure for Quick Installation below. This procedure will automatically install a Microsoft Access database for Visual Intercept to use as its data source. That way, you won't have to deal with your system's ODBC interface to select a data source. You will be able to run Visual Intercept on a single computer and evaluate it. The Quick Installation will also show you how to use the Visual Intercept Wizard to immediately set up a sample project.

When you evaluate Visual Intercept, you will probably want to try out one of the system's most powerful features: integration with Visual SourceSafe". This chapter also contains instructions for Setting Up Visual SourceSafe" Integration, starting on page 18.

After you have evaluated Visual Intercept on a single computer and tried out its features, you will eventually need to install it on your network server and on each client computer. Follow the directions for Network Installation, starting on page 22, when you are ready to put Visual Intercept on your network.

For more in-depth discussion of installation and ODBC data sources, please refer to Chapter 1 of the User's Guide, "Installation."


Quick Installation

Start by checking your system requirements. Elsinore Visual Intercept runs on the following operating systems:

The Quick Installation of Visual Intercept requires 10 MB of hard disk space.


For Windows 3.x Users Only

If you are using a 16-bit operating system (i.e., Windows 3.x), the Visual Intercept Setup program will prompt you to install the Win32s v1.30 (or higher) subsystem. The Win32s subsystem allows applications developed for 32-bit operating systems to run under Windows 3.x. Win32s 1.30 is available through Microsoft or Elsinore Technologies, Inc.


  1. Insert the Intercept Disk 1 or CD-ROM in your disk drive.
  2. Do one of the following:

  1. Select Server and then click the Next button. This will start installation of a complete Visual Intercept system to your hard drive.
  2. Follow the installation prompts.

Once the installation procedure is completed, you will be prompted to launch the Intercept Wizard to build your project hierarchy. Go ahead and click the Wizard button.

The Wizard will list a few options for setting up project hierarchies in your Visual Intercept database:

To import the Example project into your data source.

  1. Select the Example Project at this time, and click the Next button.
  2. The Wizard will show you the sample project tree. Click OK.
  3. At this point, something tricky happens. The Wizard will ask you if you have Administrator privileges:

This is just a security feature built into the Wizard. If you are installing Visual Intercept for the first time, just click Yes.

  1. The Wizard will prompt you with this dialog box

  1. The Security window should default to look as it does above, with "Visual Intercept" as the Data Source, "isadmin" as the UserID, and nothing in the Password field. Don't change anything right now! Just click OK.

Note: If you select the Access database, the Data Source will show, "Visual Intercept - MS Access."

Once the wizard has copied the Example project hierarchy into the appropriate data source, you are ready to launch the Visual Intercept Manager and begin working with Visual Intercept.

To launch the Manager

  1. Do one of the following:
  2. The program will again prompt you with a Security dialogue:

  1. Make sure the Data Source selected is "Visual Intercept", the UserID is "guest", and no password is entered. Click OK.
  2. Congratulations! You're now ready to start using Visual Intercept!


Setting up Visual SourceSafe Integration

If you are currently using Visual SourceSafe for your source code control system (SCCS), then you'll definitely want to set up the Visual Intercept integration to Visual SourceSafe.

Setting Source Code Control System preferences.

  1. Launch the Visual Intercept Manager.
  2. From the Menu Bar, click Edit, then click Preferences.
  3. In the Preferences dialogue, click on the Integration tab to pull the integration dialogue to the front.

  1. In the Directory field under Source Code Control, enter the directory path where the srcsafe.ini file is kept. (This file is usually in the \VSS directory on your network server.) If you are not sure of the path, click on the Locate button and browse through the directory tree to find the \VSS directory.
  2. Enter your SourceSafe UserID and Password in the appropriate fields in the Preferences dialogue. This is whatever UserID and Password you would normally use to log into the Visual SourceSafe program. Click OK.
  3. Now you should be able to attach source code documents directly to Visual Intercept incidents, and check out attached source code modules without leaving Visual Intercept.
To attach a source code file to an Incident
  1. Double click on an incident.
  2. Select the SCCS tab.
  3. Click the Attach button.
  4. Select code modules from the Visual SourceSafe project tree, just as if you were normally using the Visual SourceSafe interface. Click the Add button to attach these files to Visual Intercept and then click the Close button when you are through adding modules to be attached to the incident.

  1. From the Browser, you should now see the source code files attached to the incident.
To check out a source code file attached to an incident
  1. Double click on the incident.
  2. Select the SCCS tab view in the Incident window.
  3. Select code modules from the list of attached files.
  4. Click the check-out button.

For more information on attaching source code to incident documents, please refer to Chapter 4, "Incidents," of the User's Guide.

Importing Visual SourceSafe Project Trees

Another important aspect of Visual Intercept's integration to Visual SourceSafe is the ability to import Visual SourceSafe project trees into the Visual Intercept project tree. This allows you to coordinate your version control and your bug-tracking hierarchies.

To import your Visual SourceSafe tree into Visual Intercept, refer to Chapter 2, Wizard, in the User's Guide.


Optimizing Speed of Data Retrieval

Speedy retrieval of data is very important for an incident management system to be useful and effective. Certain settings in the Visual Intercept Preferences can have a profound impact on the speed of data retrieval. You might want to experiment with these Preference settings now, so you can see Visual Intercept working at its fastest.

From the menu bar, click Edit and then click Preferences.

  1. In the Defaults tab window, you will see a checkbox labeled, "Always fetch detail information." When this box is checked, Visual Intercept will retrieve all of the information about an item when you fetch it. Rarely does one need all of this information immediately; it is usually more efficient for Visual Intercept to fetch the detailed information when you ask for it by opening a document. Once your organization begins to use Visual Intercept in earnest, you will probably want to keep this option unchecked.

  1. In the Filters tab of the Preferences window, you will see a list of all items that are automatically fetched when Visual Intercept is launched. Usually, a Visual Intercept user will not be interested in seeing all the information in the database - they merely want to see information on the items that are directly related to their own work. You can use the Filters to limit the amount of information that is automatically fetched when Visual Intercept is launched.

For more information on using Filters, please refer to the, Working in Visual Intercept chapter of the User's Guide.


Network Installation

Visual Intercept is normally used in a network environment, with a data source located on a Windows NT Server and many client computers running the Visual Intercept application.

By far the easiest way to create a network installation of Visual Intercept is to use the Microsoft Access database included with the software.

If your organization uses SQL Server or Oracle as its database management system, and you wish to use that database system for Visual Intercept, you will first have to create the databases using scripts. Please refer to the Installation and System Administration chapters (chapters 1 and 9 repsectively) of the User's Guide.

Installing Visual Intercept to a network

Install the Visual Intercept program to the Windows NT Server first. This installation can be done exactly like the Quick Installation described earlier in this guide.

Install the Visual Intercept program on each of the client computers. The client installations can be done using the netsetup.exe created during the Server installation. The netsetup.exe will install Visual Intercept using most of the settings defined during the original installation.

The netsetup.exe is located in the primary installation directory on the server machine.

Note: You can find additional information in the install.wri and readme.txt files located in the primary installation directory, the User's Guide, and the Installation prompts during the setup procedure.


© 1996, 1997 Elsinore Technologies, Incorporated. All rights reserved.

Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted, by any means, electronic or mechanical, for any purpose, without the expressed written permission of Elsinore Technologies, Inc.

Elsinore and Visual Intercept are either registered trademarks or trademarks of Elsinore Technologies in the USA and other countries.

Microsoft is a registered trademark of Microsoft Corporation.
MS Access is a registered trademark of Microsoft Corporation.
SQL and SQL Server are registered trademarks of Microsoft Corporation.
Oracle is a registered trademark of Oracle Corporation.

 

bottomheader.gif (436 bytes)