Managing Mission-Critical Access Applications

Published Dec 22 2020 09:55 AM 2,192 Views
Microsoft

Microsoft Access is the most popular desktop database in the world with millions of databases; some being mission critical. As such, CTO’s need to recognize and manage these kinds of applications to ensure business success and continuity.

 

The very worst moment to find out you’ve got a mission critical Access database is when it stops working, with little-to-no knowledge of how to troubleshoot the issue. Therefore, we’d like to cover what you can do in situations like these to ensure individual and business success.

 

Follow these steps to identify mission critical applications:

  1. Inventory all Access files that end in ACCDB on your network.
  2. Sort the list by last modified date.
    • Most, but not all Access applications are split into a data file and a programming file; it is likely that the data file will have a more recent date with a file name that ends in BE.
  3. With your sorted list, approach departments and ask them to identify any mission critical apps, along with a brief summary of what the database does and why it’s mission critical. Ask them to list the owner of the databases and the author, who may not be the same.

 

Make sure best practices are followed:

Now that you’ve identified your mission critical databases, follow these best practices:

  • Make sure every database is split into a Front End file with code, with a Back End file containing your raw data.
    • The Back End file should be on your network, and you should ensure to back up the file each night.
    • The Front End file should be saved on each user’s PC.
  • Have a database diagram created for each database if there is none.
  • Ensure that the VBA and macro code is well documented.
  • Add a table to document changes to the system by version and date.
  • Modify the startup form to include the version and issue date.
  • Meet with the database owner and author to document and understand the business case for the application:
    • Why is it mission critical?
    • Why can’t they use existing enterprise systems?
    • Are they experiencing issues with slowness and bugs that may impact performance as the system grows? (Access has a hard limit of 2 Gigabytes in size and as you approach it, it will get slower).

 

Maintenance

Maintenance of the Access database consists of doing a compact and repair on your Back End file every 3 or 6 months, as needed.

 

 

Your employees will continue to use Access, enable them.

Access can be a great tool in the right hands, allowing companies to leverage its ease of programming and rapid development. With your applications remaining as toolsets in Office installed on your desktops, your employees can successfully learn how to develop and manage Access apps, while fully reaping its benefits.

 

Summary:

As a result of its short development cycle, Access is the go-to’ application for productivity improvements. Therefore the time to identify when an Access application is mission critical is before a key developer leaves, or if the system stops working or becomes unstable. IT managers need to be proactive, working with departments to identify databases and document their behavior. Having a strategy in place for dealing with mission critical Access databases will ensure your company can continue leveraging the technology for years to come.

 

About the Author:

Juan Soto.jpg

Juan Soto is the President of IT Impact and a leading professional in the industry. He has been named an Access MVP by Microsoft since 2011 and is a frequent author on the official Microsoft Access blog as well as the co-founder of AccessUserGroups.org, where groups of Access enthusiasts around the world meet once a month on a wide range of topics. You can reach Juan at https://accessexperts.com/contact/

1 Comment
%3CLINGO-SUB%20id%3D%22lingo-sub-2010117%22%20slang%3D%22en-US%22%3EManaging%20Mission-Critical%20Access%20Applications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2010117%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Access%20is%20the%20most%20popular%20desktop%20database%20in%20the%20world%20with%20millions%20of%20databases%3B%20some%20being%20mission%20critical.%20As%20such%2C%20CTO%E2%80%99s%20need%20to%20recognize%20and%20manage%20these%20kinds%20of%20applications%20to%20ensure%20business%20success%20and%20continuity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20very%20worst%20moment%20to%20find%20out%20you%E2%80%99ve%20got%20a%20mission%20critical%20Access%20database%20is%20when%20it%20stops%20working%2C%20with%20little-to-no%20knowledge%20of%20how%20to%20troubleshoot%20the%20issue.%20Therefore%2C%20we%E2%80%99d%20like%20to%20cover%20what%20you%20can%20do%20in%20situations%20like%20these%20to%20ensure%20individual%20and%20business%20success.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-144397268%22%20id%3D%22toc-hId-144397274%22%20id%3D%22toc-hId-144397274%22%20id%3D%22toc-hId-144397274%22%3E%3CSTRONG%3EFollow%20these%20steps%20to%20identify%20mission%20critical%20applications%3A%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3COL%3E%0A%3CLI%3EInventory%20all%20Access%20files%20that%20end%20in%20ACCDB%20on%20your%20network.%3C%2FLI%3E%0A%3CLI%3ESort%20the%20list%20by%20%3CU%3Elast%20modified%20date%3C%2FU%3E.%3CUL%3E%0A%3CLI%3EMost%2C%20but%20not%20all%20Access%20applications%20are%20split%20into%20a%20data%20file%20and%20a%20programming%20file%3B%20it%20is%20likely%20that%20the%20data%20file%20will%20have%20a%20more%20recent%20date%20with%20a%20file%20name%20that%20ends%20in%20BE.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EWith%20your%20sorted%20list%2C%20approach%20departments%20and%20ask%20them%20to%20identify%20any%20mission%20critical%20apps%2C%20along%20with%20a%20brief%20summary%20of%20what%20the%20database%20does%20and%20why%20it%E2%80%99s%20mission%20critical.%3CSPAN%3E%20Ask%20them%20to%20list%20the%20%3C%2FSPAN%3E%3CSPAN%3Eowner%20of%20the%20databases%20and%20the%20author%2C%20who%20may%20not%20be%20the%20same.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--1663057195%22%20id%3D%22toc-hId--1663057189%22%20id%3D%22toc-hId--1663057189%22%20id%3D%22toc-hId--1663057189%22%3E%3CSTRONG%3EMake%20sure%20best%20practices%20are%20followed%3A%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3ENow%20that%20you%E2%80%99ve%20identified%20your%20mission%20critical%20databases%2C%20follow%20these%20best%20practices%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMake%20sure%20every%20database%20is%20split%20into%20a%20Front%20End%20file%20with%20code%2C%20with%20a%20Back%20End%20file%20containing%20your%20raw%20data.%3CUL%3E%0A%3CLI%3EThe%20Back%20End%20file%20should%20be%20on%20your%20network%2C%20and%20you%20should%20ensure%20to%20back%20up%20the%20file%20each%20night.%3C%2FLI%3E%0A%3CLI%3EThe%20Front%20End%20file%20should%20be%20saved%20on%20each%20user%E2%80%99s%20PC.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EHave%20a%20database%20diagram%20created%20for%20each%20database%20if%20there%20is%20none.%3C%2FLI%3E%0A%3CLI%3EEnsure%20that%20the%20VBA%20and%20macro%20code%20is%20well%20documented.%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EAdd%20a%20table%20to%20document%20changes%20to%20the%20system%20by%20version%3C%2FSPAN%3E%3CSPAN%3E%20and%20date%3C%2FSPAN%3E%3CSPAN%3E.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EModify%20the%20startup%20form%20to%20include%20the%20version%20and%20%3C%2FSPAN%3E%3CSPAN%3Eissue%20date.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EMeet%20with%20the%20database%20owner%20and%20author%20to%20document%20and%20understand%20the%20business%20case%20for%20the%20%3C%2FSPAN%3E%3CSPAN%3Eapplication%3C%2FSPAN%3E%3CSPAN%3E%3A%3C%2FSPAN%3E%3CUL%3E%0A%3CLI%3E%3CSPAN%3EW%3C%2FSPAN%3E%3CSPAN%3Ehy%20is%20it%20mission%20critical%3F%20%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EWhy%20can%E2%80%99t%20they%20use%20existing%20enterprise%20systems%3F%20%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%3EAre%20they%20experiencing%20issues%20with%20slowness%20and%20bugs%20%3C%2FSPAN%3E%3CSPAN%3Ethat%20may%20impact%20performance%20as%20the%20system%20grows%3F%20(Access%20has%20a%20hard%20limit%20of%202%20Gigabytes%20in%20size%20and%20as%20you%20approach%20it%3C%2FSPAN%3E%2C%3CSPAN%3E%20it%20will%20get%20slower).%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMaintenance%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EMaintenance%20of%20the%20Access%20database%20consists%20of%20doing%20a%20compact%20and%20repair%20on%20your%20Back%20End%20file%20every%203%20or%206%20months%2C%20as%20needed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EYour%20employees%20will%20continue%20to%20use%20Access%2C%20enable%20them.%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAccess%20can%20be%20a%20great%20tool%20in%20the%20right%20hands%2C%20allowing%20companies%20to%20leverage%20its%20ease%20of%20programming%20and%20rapid%20development.%20With%20your%20applications%20remaining%20as%20toolsets%20in%20Office%20installed%20on%20your%20desktops%2C%20your%20employees%20can%20successfully%20learn%20how%20to%20develop%20and%20manage%20Access%20apps%2C%20while%20fully%20reaping%20its%20benefits.%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-824455638%22%20id%3D%22toc-hId-824455644%22%20id%3D%22toc-hId-824455644%22%20id%3D%22toc-hId-824455644%22%3E%3CSPAN%20style%3D%22font-weight%3A%20normal%20!msorm%3B%22%3E%3CSTRONG%3E%3CSPAN%3ESummary%3A%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FH4%3E%0A%3CP%3EAs%20a%20result%20of%20its%20short%20development%20cycle%2C%20%3CSPAN%3EAccess%20is%20the%20%3C%2FSPAN%3E%E2%80%98%3CSPAN%3Ego%3C%2FSPAN%3E-%3CSPAN%3Eto%3C%2FSPAN%3E%E2%80%99%20application%20for%20productivity%20improvements.%20%3CSPAN%3EThe%3C%2FSPAN%3Erefore%20the%3CSPAN%3E%20time%20to%20iden%3C%2FSPAN%3Et%3CSPAN%3Eify%20when%20an%20Access%20application%20is%20mission%20critical%20is%20before%20a%20key%20developer%20leaves%2C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Eor%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3Eif%20the%20system%20%3C%2FSPAN%3E%3CSPAN%3Estops%20working%20or%20becomes%20unstable.%3C%2FSPAN%3E%20%3CSPAN%3EIT%20managers%20need%20to%20be%20proactive%2C%20working%20with%20departments%20to%20identify%20%3C%2FSPAN%3E%3CSPAN%3Edatabases%3C%2FSPAN%3E%3CSPAN%3E%20and%20document%20their%20behavior.%3C%2FSPAN%3E%26nbsp%3B%3CSPAN%3EHaving%20a%20strategy%20in%20place%20for%20dealing%20with%20mission%20critical%20Access%20databases%20will%20%3C%2FSPAN%3Ee%3CSPAN%3Ensure%20your%20company%20can%20co%3C%2FSPAN%3E%3CSPAN%3Entinue%20leveraging%20the%20technology%20for%20years%20to%20come%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAbout%20the%20Author%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Juan%20Soto.jpg%22%20style%3D%22width%3A%20150px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F242242i2464A7081EF0E555%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Juan%20Soto.jpg%22%20alt%3D%22Juan%20Soto.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EJuan%20Soto%20is%20the%20President%20of%20IT%20Impact%26nbsp%3Band%20a%20leading%20professional%20in%20the%20industry.%20He%20has%20been%20named%20an%20Access%20MVP%20by%20Microsoft%20since%202011%20and%20is%20a%20frequent%20author%20on%20the%20official%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.google.com%252Fsearch%253Fsxsrf%253DALeKk02QnNXaF6Pub6_NAwa7jFh58jk7yA%25253A1585616778043%2526source%253Dhp%2526ei%253DipeCXr8Eitv6BNC0mvAI%2526q%253Dsite%25253Ahttps%25253A%25252F%25252Fwww.microsoft.com%25252Fen-us%25252Fmicrosoft-365%25252Fblog%25252F%252B%252522juan%252BSoto%252522%2526oq%253Dsite%25253Ahttps%25253A%25252F%25252Fwww.microsoft.com%25252Fen-us%25252Fmicrosoft-365%25252Fblog%25252F%252B%252522juan%252BSoto%252522%2526gs_lcp%253DCgZwc3ktYWIQA1CwB1iwB2ClCmgBcAB4AIABVYgBVZIBATGYAQCgAQKgAQGqAQdnd3Mtd2l6%2526sclient%253Dpsy-ab%2526ved%253D0ahUKEwi_8bXmwsPoAhWKrZ4KHVCaBo4Q4dUDCAg%2526uact%253D5%26amp%3Bdata%3D02%257C01%257CEbo.Quansah%2540microsoft.com%257C33bb90bd753e4724616b08d7d5101c76%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637212137547598745%26amp%3Bsdata%3Dory4%252FySuMTVMMptQQfANgfEx%252Bpp12cLQZUjAE0SHlOQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Access%20blog%3C%2FA%3E%26nbsp%3Bas%20well%20as%20the%20co-founder%20of%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Faccessusergroups.org%252F%26amp%3Bdata%3D02%257C01%257CEbo.Quansah%2540microsoft.com%257C33bb90bd753e4724616b08d7d5101c76%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637212137547608699%26amp%3Bsdata%3DhjC7bYhFHHWijKuCZj8bUhH9UjRhpgaQGnPlsUnaWl0%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAccessUserGroups.org%3C%2FA%3E%2C%20where%20groups%20of%20Access%20enthusiasts%20around%20the%20world%20meet%20once%20a%20month%20on%20a%20wide%20range%20of%20topics.%20You%20can%20reach%20Juan%20at%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Faccessexperts.com%252Fcontact%252F%26amp%3Bdata%3D02%257C01%257CEbo.Quansah%2540microsoft.com%257C33bb90bd753e4724616b08d7d5101c76%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637212137547608699%26amp%3Bsdata%3D7zScKeN0G%252FSadMv6MXQ%252BOnHlVzLOF3dHKtijx%252BrJ72Q%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Faccessexperts.com%2Fcontact%2F%3C%2FA%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2010117%22%20slang%3D%22en-US%22%3E%3CP%3EAccess%20MVP%20Juan%20Soto%20discusses%20the%20significance%20and%20steps%20to%20manage%20mission%20critical%20Access%20applications%26nbsp%3Bto%20ensure%20business%20continuity.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2010117%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAccess%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAdmin%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECTOs%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Edatabase%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EDeveloper%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMission%20Critical%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESystems%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2010298%22%20slang%3D%22en-US%22%3ERe%3A%20Managing%20Mission-Critical%20Access%20Applications%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2010298%22%20slang%3D%22en-US%22%3E%3CP%3EFor%20better%20or%20for%20worse%2C%20I%20would%20bet%20cash%20money%20that%20there%20are%20mdb's%20out%20there%20in%20production%20as%20well%20as%20accdbs%2C%20so%20the%20inventory%20should%20include%20them%2C%20along%20with%20the%20mde%20and%20accde%20variants.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Version history
Last update:
‎Dec 22 2020 10:00 AM
Updated by: