Common Medisoft Error Codes

Medisoft Advantage Errors Defined

Errors in Medisoft can be frustrating, and can keep you from getting important work done. To make matters worse, the errors are not easy to read, making it even more difficult to determine the cause.

This is a list of the most common errors that we encounter in Medisoft, as defined by the creators of Advantage Database. If the issue you are experiencing is not listed below, or you would like some additional assistance in resolving the problem, please give us a call at (888) 799-4777 or check out our support options.

Common 5000-Level Medisoft Errors

*Note: 5000 level errors may often indicate issues with data


The Advantage Client Engine client version used is not compatible with the version of the Advantage server that was found. Upgrade your Advantage server to a newer version.


Advantage could not find an index order with the specified name.


The handle given was not recognized by Advantage. Verify the specified handle is open/active.


The statement constrain type specified was invalid. Valid choices are ADS_CONSTRAIN and ADS_NO_CONSTRAIN.


No database object matching the search condition was found in the data dictionary.


A request was made to get a property for an object in an Advantage Data Dictionary, but that property was not set for that object.


Problem: An operation was performed that is not legal to perform with the current user’s privileges. Most often this error is returned when a user attempts to change another user’s password, Internet access property, or logins disabled property.

Solution: Log in as the administrator (ADSSYS) or as the specified user to perform the operation. This error code has the same meaning as the 5054 AE_PERMISSION_DENIED error.


Trigger execution failed. Trigger execution failed either because of an Advantage error, or because the trigger code itself reported an error via the __error table. The error will be accompanied by a second error string, which will describe the exact problem encountered.


Advantage Local Server connections are restricted when used from a web server, an application server, a terminal server, or any other type of middleware or server product used to access data on behalf of remote computers.

If you receive this error, it is because your application attempted to make a local server connection from one of these restricted environments. Please review the Advantage Local Server Connections portion of the end user license agreement (license.txt, Section B) for details.

It is possible to get this error when you are not violating the license agreement. If, for example, your web application accesses local data that it uses internally, but is never transferred to a client, that usage is legal.

If you are using the Advantage Local Server to access data in this manner (or some similar manner where no data is used or seen by a client), and you receive this error code, you can add the following line to the ads.ini file under the [SETTINGS] section to disable this check:


Common 6000-Level Medisoft Errors

*Note: 6000-level errors often indicate networking issues

6097 – Bad IP address specified in connection path or in ADS.INI file

Problem: The Advantage Database Server was not found at the IP address and port specified in the connection path or in the ads.ini file.

Solution: Verify the following:

The IP address and port are correct for the Advantage Database Server you are trying to connect to. If you are specifying the address and port in the connection path (e.g., //server:port/path or //ip:port/path), verify that both are valid values.

The Advantage Database Server is currently running.

6410 – Destination address not available

The Connection with the server was unable to be established.

6420 – Unable to “discover” the Advantage Database Server

How to Resolve 6420 error in Medisoft

Problem: The Advantage application was unable to connect to the Advantage Database Server.

Solution: Several problems can cause this error to occur. Some common solutions are listed below. Reference the Advantage Knowledge Base for more detailed descriptions and a more complete list of known error cases.

Verify the Advantage Database Server is installed and running on the server where the database is located.

If attempting to use the Advantage Local Server and not the Advantage Database Server, make sure the application’s “server types” setting is set to use the Advantage Local Server.

If using the Native SQL Utility in the Advantage Data Architect, and you desire to use the Advantage Local Server and not the Advantage Database Server, make sure the Advantage connection type is set to “Local (ALS)”. This can be done via the Query Options dialog that is accessed by clicking the button that has the screwdriver, hammer, and wrench on it.

If the server is NetWare 5 or greater, make sure the version of the Advantage Database Server is 5.6 or greater, and make sure the Advantage client is v2.6 or greater.

If communicating to a server that only has IPX installed, make sure the Advantage client is enabled to send IPX packets.

If running through a firewall, make sure the Advantage IP send and receive ports are properly configured and opened up through the firewall.

6610 – The Advantage Database Server did not respond to a database request in a timely manner.

A communications problem has occurred between the server and workstation.

How To Resolve 6610 Error in Medisoft

Common 7000-Level Medisoft Errors

7003 – Maximum number of users exceeded:

Problem: The maximum number of users are already connected to the Advantage server.

Solution: Upgrade to a version of the Advantage Database Server that allows more users or wait until a current user logs out.

7004 – Maximum number of work areas exceeded:

Problem: The maximum number of configured work areas are already in use.

Solution: Increase the setting for the WORKAREAS configuration value in the Advantage Database Server for NetWare configuration file, ADS.CFG. If no WORKAREAS configuration key exists in ADS.CFG, add one and set the value to larger than the number of CONNECTIONS multiplied by 25 (which is the default value for the number of work areas if no WORKAREAS configuration key exists). Then re-load the Advantage Database Server.

7010 – Problem with Advantage server file read:

Problem 1: The Advantage server was unable to read from the specified file.
Solution 1: Check the status of the network and repeat the command.

7017 – Corrupt IDX, CDX, or ADI index:

Problem: The current CDX, IDX, or ADI index file contains corrupt or invalid data.
Solution: Rebuild the index.

7038 – Invalid record number

Problem: Attempted to read a record and the record number is greater than the number of records in the file. This error often results from using an index that contains more keys than the table has records. This can occur if a Pack or Zap is performed on the table when the index file(s) was closed.

Solution: Reposition to a valid record number. Reindex the index(es) that contain more keys than the table has records.

7040 – File creation error:

Problem: An error occurred when attempting to create a table or an index file.

Solution: Verify the directory where the file is to be created is accurate and exists. If the file already exists, verify no other users currently have the specified file open. Make sure the user has sufficient access rights to create and open the specified file (if using Advantage “check rights” security with free tables).

7041 – File not found:

Problem: The table or index file to be opened does not exist.

Solution: Make sure the directory where the file is to be opened is accurate and exists.

7057 – Record update failed:

Problem: The key value produced from this record was not unique, and the index for the current table has the UNIQUE property.

Solution: Replace the key value field(s) with a unique value(s). If this is not possible, cancel the operation. When using the Advantage Client Engine API directly, call AdsCancelUpdate. When using the Advantage TDataSet Descendant, use the TTable.Cancel method.

7058 – Corrupt ADI index:

Problem: The current ADI index file contains corrupt or invalid data. It is possible that the index file was created with a version of Advantage Database Server greater than the version you are currently using. For example, if Advantage Database Server 7.0 or greater is used to build a full text search (FTS) index, it is not possible to open that index file with prior versions of Advantage.

Solution: Rebuild the index.

7059 – Unique index creation error:

Problem: An index with the UNIQUE property was not able to be created because data in the table produced non-unique key values.

Solution: Make sure that the table data used to create the unique index is unique. When the record(s) was found that would cause a non-unique key to be place in the index, an error was logged in the Advantage error log (ADS_ERR.ADT or ADS_ERR_.DBF). That error log entry will indicate the record number, the tag name, and the index name associated with the non-unique index value. Use the Advantage error log to determine which records are in violation of the uniqueness property.

7077 – The Advantage Data Dictionary cannot be opened:

Problem 1: The auto-created ADT table cannot be opened from the command line or Windows Explorer using Advantage Data Architect.

Solution 1: Select File|Open Table and specify the path to the Advantage Data Dictionary the table is bound to. This error only affects Advantage Data Architect.

Need more help?


For Information regarding our phenomenal Medisoft Support check out our Medisoft Support page!










My Computer is Running Slow

How to Speed Up Your Computer 

Note: This page will cover steps for an overall slow computer but does not address computers that have a slow boot up or slow internet.

It is important that your computer run at its best. Over time, regular use of your computer will build up unneeded files and clutter your hard-drive. Bad Computer habits also can contribute to a slow computer. Using multiple programs at once, or putting your computer to sleep instead of rebooting regularly are examples of things that can slow your machine down.

Here is a list of steps you can take to speed up your computer, if you are still having trouble with your computer please give us a call at: (888) 799-4777


If you have not rebooted your computer recently, make sure that you plan a time to reboot it before following the article below.

Background Programs

One of the most reasons for a slow computer is that programs are running in the background. One option is to have your disable programs that automatically start each time the computer boots.

In addition, if you have an antivirus program, or spyware protection program on your computer, make sure it is not scanning your machine in the background. If the scan is in progress, it can decrease the overall performance of your computer. If this is the case, allow the scan to complete, and the computer’s performance should improve.

Note: You can see what programs are running in the background and how much memory they are using, through the Task Manager. If you are running the current version of windows you can use the Resource Monitor to see a better breakdown of how your computer’s memory is being used.

Delete Temporary Files

As a computer runs a program, temporary files are then stored on the computer’s hard drive. Deleting these files can help speed up your machine.

We don’t typically suggest deleting these files yourself as there are some critical files that if deleted can cause damage. However, if attempting this process, yourself, we suggest using the Windows Disk Cleanup utility to remove temporary files and other files that are no longer needed on your computer.

Scan for Viruses

If your computer is infected with a virus, this can cause the machine to run slowly.

For more information on best security practices check out our Network Security Page.

Update Your Drivers

Make sure you have the latest drivers and updates available for your computer hardware. Having out dated drivers can cause an array of issues, including slow performance, glitches or display issues.

Check Hard Drive Space

Make sure that there is at the very least, 250-500MB of free hard drive space. This available space allows the computer to have room for the operations to increase in size as well as room for temporary files.

Check Hardware

If you have had your computer for more than two years, you may need more memory. Today, we suggest that computers have a minimum of 2GB of memory (RAM) installed. The more memory the computer has the more ability to compute multiple actions at the same time. If your computer is running low on memory, it may become slow when multiple windows or programs are open at the same time.

Old Machine

If your computer is more than 5-7 years old, the age of the computer could be the cause of the slow performance. As more advanced technology and software programs are released, they are designed to run on newer computers. Older computers are not able to run these newer programs, which can cause them to perform slowly. If you believe your computer is need of replacing, we can help, AZCOMP Technologies is a Dell Certified Vendor and can help get you the right hardware for your needs.

Need more help?

Our IT technicians are here to assist you in resolving your computer or network issues!


How to Change Hours of Operation in Office Hours

Adjusting Hours of Operation in Office Hours

Many people find that the default hours of operation in Office Hours, doesn’t align with their open times.

In this snippet from our recent Medisoft U training, we will review how to change the hours of operation in Office Hours!

Be sure to check out all our other Medisoft training/support videos and subscribe to our YouTube channel!

FREE Medisoft Training Webinars

No matter how long you’ve been using the program, everyone can benefit from a little training. Whether you are looking for a refresher, or to learn some new tips and tricks to make you more efficient and productive, these Webinars are a great resource.

This video is a short clip from one of our recent Medisoft U Live Webinars. These webinars are free to everyone and held monthly. You can subscribe to receive notifications by visiting this page.

Hand pointing to Internet of Things concept on light brown wall background

September 2017 Cyber Security Webinar

In the last 12 months, hackers have breached half of all small businesses in the United States.

– 2016 State of SMB Cybersecurity Report

Join us for our free Executive Webinar: 7 Critical IT Security Protections EVERY Small Business Must Have in Place NOW to Avoid Cyber Attacks, Data Breach Lawsuits, Bank Fraud and Compliance Penalties.

Healthcare providers have a lot to worry about, including HIPAA compliance, avoiding data breach to protect patient PHI, and keeping your computer network safe from all the cybercrime that is going on. If you’re not in healthcare, you have a lot of the same issues to worry about like protecting customer credit card data and other important business data, your bank account, your computer network.

That is why we are hosting this free executive webinar.

There are a lot of threats to your network, every day, and we can almost guarantee that your business isn’t aware of all the threats. Therefore, you are at risk of losing EVERYTHING in an instant! Your bank account, your patient information, your billing and claims information (accounts receivable), everything you need to keep your practice running could all be wiped out and gone forever when you’re not doing the right things to protect yourself and your business.

The good news is there are some SIMPLE protections and precautions you can put in place to drastically reduce your chances of being a victim – which is what we’re going to show you at this webinar.

In a little more detail – here’s what we’re going to cover:

  • The #1 security threat to your business that antivirus, firewalls and other security protocols are defenseless against.
  • A SHOCKING truth about bank fraud that most businesses don’t know about that could (literally) wipe out your bank account.
  • How Mobile Phones and Cloud Apps are seriously jeopardizing your security and data protection- and what you need to do to protect yourself.
  • Why firewalls and antivirus software give you a false sense of security- and what it REALLY takes to protect your organization against new threats and today’s sophisticated cyber crime rings.
  • 7 critical IT security protections that EVERY small business must have in order to avoid cyber attacks and cyber crime.

Cyber Security Webinar Registration

The webinar is free, but you must register to attend. Go to our website to get all the details and to register. The webinar is being held on September 8th. Be sure to register and mark your calendars today!

Network Security

Understanding Network Security

These days, businesses are often so concerned with day-to-day operations that they have forgotten to invest in network security. Others understand the need for complete network security, but have a relaxed strategy in regards to their IT, which can be just as dangerous in the event of a data leak or issue.

What is Network Security?

  • It’s protection from getting hacked and helps keep the bad guys out
  • It’s keeping your data secure and backed up, automatically
  • It’s preventing your system from getting infected by a virus or malware attack
  • It’s performing routine maintenance and patching to keep your system up to date
  • It’s about being aware of possible security threats – Not sure how to do this? Click Here for a free IT Report on how to protect and preserve your data!

Network Security

What Can Network Security Protect Your Business From?

Bugs, Viruses, and other vulnerabilities have all existed since the beginning of computing, but the threats found in today’s technology world have vastly outnumbered and outperformed them.

In part, this is due to how society has grown heavily reliant on the internet and technology. Here are some of the threats which proper network security can protect your business from:

  • Spyware and Adware: While not particularly threatening they can invade your privacy and pave the way for more dangerous infections to enter the network. Spyware can log your keystrokes, providing the bad guys with your valuable information. While adware is simply an annoying means to gain profit, through things like pop-ups.
  • Phishing and Identity Theft: Hackers will often try to pose as a reputable institution which your business has relations with in attempt to steal information from you such as your credit card numbers, banking information, or passwords. They do this by appearing legitimate through an email address or a website designed to look like the real thing.
  • Viruses, Malware, and Exploitation of Vulnerabilities: The goal of the hacker is to infiltrate your databases and steal your information, or to leave behind a backdoor for later access at their leisure. Hackers often infect systems with viruses or malware which can either cause damage or allow for the hacker to gain remote control to the machine. These measures are difficult to remove as they are often implanted into several areas of the machine and hidden very well.

Network Security from AZCOMP Technologies

At AZCOMP Technologies, we take security very seriously. We take preventative measures to keep the threats from ever entering your system in the first place.

This lets you avoid costly repairs or downtime that often follow a hacking attack. We offer a comprehensive network security solution, that keeps threats of all kinds from entering your network and neutralizing those that already have. Some of things included in our network security solution are:

  • Next Generation Firewalls:  Firewalls are your first line of defense against outside threats. A firewall will analyze the traffic and data going to and from your network. You can think of it like a virtual bouncer which keeps dangerous things from entering your network.
  • Antivirus Software: If a virus or piece of malware does manage to get through your firewall, it can be killed off quickly with an enterprise-level antivirus software. An antivirus eliminates threats as quickly as possible while limiting the damage done.
  • Spam Blocking: Not only is spam annoying and useless, some phishing emails might slip through your defenses. Instead of going directly to the inbox where it may be accidentally opened, it goes to the spam folder, where it can be promptly ignored or deleted.
  • Content Filtering: Not all web content is safe for viewing, so it’s important that your team can tell when a site is fake and when they are real. Content filtering allows you to block certain websites from accessing your data. It’s also good for increasing productivity in the office by limiting employee access to time-wasting websites like Facebook, BuzzFeed, etc.
  • Security Patching: We ensure that your machines are up to date with the latest security patches available to help keep your network as secure as possible!


A Healthy network is a strong network, AZCOMP Technologies can handle all this technical information for you while you reap the benefits of a protected network.

Give us a call at 480.730.3055 or click below to receive your free report on what every small business owner must know about protecting and preserving critical data!



Medisoft Deposit List

Medisoft Deposit List Overview

Within Medisoft, the deposit list allows you to post, track and edit payments.

In this snippet from our recent Medisoft U training we review some of the features found within the Medisoft deposit list!

Deposit List

Be sure to check out all our other Medisoft training/support videos and subscribe to our YouTube channel!

FREE Medisoft Training Webinars

No matter how long you’ve been using the program, everyone can benefit from a little training. Whether you are looking for a refresher, or to learn some new tips and tricks to make you more efficient and productive, these Webinars are a great resource.

This video is a short clip from one of our recent Medisoft U Live Webinars. These webinars are free to everyone and held monthly. You can subscribe to receive notifications by visiting this page.

Hand pointing to Internet of Things concept on light brown wall background

If you have any questions, be sure to check out our webinar registration page or give us a call!

Lytec 2017 Hotfix 2

Hotfix 2 is Now Available for Lytec 2017

eMDs is proud to announce that Lytec 2017 Hotfix 2 is now available for download.

Lytec 2017 has been updated to validate chart numbers for patients during billing against the patient table instead of a list of allowed characters.

In addition, there were some issues resolved with the A/R Tracking, and Remote Desktop Usage.

To View the Full Lytec 2017 Hotfix 2 Release notes: Click Here

Download and Install Lytec 2017 Hotfix 2

If you are currently using Lytec 2017, we recommend you download and install the Hotfix, to correct these known issues. You can visit our downloads page by clicking the button below, or you can call if you need any help.

Shouldn’t the Cost of Lytec Include Training, Support, and Installation?

Lytec Monthly

Lytec Monthly™ is a low cost monthly plan that includes Lytec Software, PLUS- Installations, Unlimited Support, Training and More!


Medisoft U

Medisoft 21 Service Pack 2 Released

Service Pack 2 is Now Available For Medisoft V21

eMDs is proud to  announce that Medisoft 21 SP2 is now generally available.

This service pack focuses primarily on the most often used areas of the program such as Transaction Entry, Claim Management, and Statement Management, and focuses on  streamlining and improving the performance of the application in these areas.

During testing of v21, we had some practices who were experiencing these issues:

  • up to 8 second lag during the entry of diagnosis codes into Transaction Entry
  • creation or updating monthly statements taking up to multiple days

Medisoft v21 SP2 will completely remove any lag during entry of diagnosis codes into Transaction Entry, and will also reduce the time of creating or updating monthly statements down to 20 minutes.

To view the Medisoft Version 21 SP2 Release Notes: Click Here

Download and Install Medisoft V21 SP2

If you are currently using Medisoft V21, we recommend you download and install this service pack to correct these known issues. You can visit our downloads page by clicking the button below, or you can call if you need any help.


Haven’t Already Upgraded to Medisoft v21?

medisoft monthly

When you subscribe to our Medisoft Monthly™ plan, you will always be on the most recent version of Medisoft, get Medisoft installed for you, get UNLIMITED technical support, get training and more. Learn more about it by visiting our webpage.

The Cloud Makes Computing Easier

Cloud Computing

One of the biggest problems a business has with its IT infrastructure is the lack of funds a business has to commit to obtaining and maintaining the necessary computing infrastructure. Whether they’re trying to run resource-intensive application, or simply need more storage space than they can manage independently, the cloud can provide them with the means to do so.

What if you could leverage the power of tens, dozens, or hundreds of computers dedicated to completing the processes your business undertakes? What if issues could be resolved seemingly instantaneously? What if you didn’t have to manage an in-house server, and that it was maintained on your behalf–often with an up-time guarantee?

With a cloud solution, this can all be a reality.

A cloud provider can enable you to leverage their computing resources for far less capital investment than it would require you to create the same caliber of infrastructure for yourself. As a result, you are able to utilize a far more powerful solution to complete your necessary tasks. Your resource usage can even shift, depending on your needs at the moment. So, if you suddenly need more resources to complete a task, you no longer need to make alterations to your internal infrastructure. Instead, your cloud provider can simply allocate more of their resources to you (possibly increasing the rate that you will have to pay them), but ultimately allowing you to accomplish what your business needs.

Finally, you can expect most cloud providers to pass along the savings to you, as the technology they rely upon to function decreases in price. Therefore, as they are able to support more for less, they are apt to decrease their pricing in order to attract more, larger service agreements.

In essence, the cloud is made up of separate computing assets (that are meticulously cared for) that you are able to leverage for a fee. Should the server your computing infrastructure is allocated to fail, your resources are quickly migrated to another, minimizing the effect that you experience on your end.

Integrating a cloud solution into your IT strategy can have many more benefits to you and your business. To learn more about how the cloud can help your business, reach out to us at AZCOMP Technologies by calling (888) 799-4777.

Why Does Restarting a Computer Fix So Many Issues?

“Try Restarting Your Computer”

Few things cause more eye rolls than being told to restart a device. Most of us are used to hearing it by now. Many of the people that we help have already restarted their computers before they even call us, and there are some people that tend to have a “face-palm” moment when they’ve forgotten this technology fix-all.

Other people almost seem to take offense when they hear it, like they’ve somehow been insulted with this too-simple-to-help advice.

But guess what? It Does Work! We estimate that more than half of all issues in technology can are fixable with a simple reboot.

But why does rebooting fix problems?

When you are using your computer, you’re opening programs, installing and installing software, and moving files around. Sometimes windows like, internet browsers are open for hours, or even days at a time. There are a lot of background services that stop and start too, but you never really see these services.

We use our computers a lot, especially over the course of weeks or months.

What you may not realize, is that a lot of what you and your operating system does, is leaving behind a footprint. Usually this footprint is in the form of background processes you don’t really need running anymore or programs that didn’t quite close all the way.

These “left-over” items hog your system resources, and usually, your RAM.

When too much of this happens, you start to get problems, like a sluggish system, programs that won’t open anymore, etc.

When you reboot your computer, every single program and process ends as the power leaves your computer during the restart process.

Once the computer starts back up, you will have a clean state (of sorts) and more than not, a faster, better working computer.

Note: Restarting your PC is the same as rebooting or powering it off and then on. Restarting is not the same as resetting, which is a much larger process and usually includes erasing everything and returning to “factory defaults”.


Frequently Restarting May Indicate a Bigger Issue

Restarting your computer occasionally, is perfectly normal, and if you’re doing the type of work that requires multiple programs, it is encouraged.

However, if you find that the reboot is only a temporary fix for you, there may be a bigger problem at hand.

Hardware may be failing; important operating system files may be damaged or you may even have virus or malware files on your machine.

Give us a call, and we will work with you to find a solution any computer or network issues impacting your business. We’ll get the computer problems slowing down your office resolved quickly, and if you’ll allow us to, we’ll perform an assessment to determine what is causing your problems in the first place. This is called an IT Network Assessment, and we’ll do it for FREE! Call us now at (888) 799-4777 and we’ll start working on resolving your pressing computer issues.