LPurvis
AWF VIP
- Local time
- Today, 01:17
- Joined
- Jun 16, 2008
- Messages
- 1,269
The example mentioned is an implementation of binding forms to recordsets in order to wrap the processes in a transaction.
While originally putting it together some time ago - there were one or two pitfalls which caused the process to be less than robust (you have to assign the recordset at just the right moment etc).
And it has the potential to become self design locking (i.e. as if another user were also editing the design) if you edit the code (particularly in the case of using ADO - due to the provider used) after use. (But then - so does much ADO work wherever you use the default Access provider connection).
And the example itself is left deliberately unpolished. For example the transactions are started and ended by manual button clicks - to leave each action obvious.
And the Rollbacks also don't necessarily render the effects well onscreen - some tidying for consistency is required.
Hence my stating next to the download link that it's not "comprehensive or clean"
.
But hopefully makes some begin to think about it.
For those willing to scroll down past the pretend obfuscation there's a discussion on the methodology at this Experts Exchange thread (as indicated there I'd long since made my example by then).
While originally putting it together some time ago - there were one or two pitfalls which caused the process to be less than robust (you have to assign the recordset at just the right moment etc).
And it has the potential to become self design locking (i.e. as if another user were also editing the design) if you edit the code (particularly in the case of using ADO - due to the provider used) after use. (But then - so does much ADO work wherever you use the default Access provider connection).
And the example itself is left deliberately unpolished. For example the transactions are started and ended by manual button clicks - to leave each action obvious.
And the Rollbacks also don't necessarily render the effects well onscreen - some tidying for consistency is required.
Hence my stating next to the download link that it's not "comprehensive or clean"
But hopefully makes some begin to think about it.
For those willing to scroll down past the pretend obfuscation there's a discussion on the methodology at this Experts Exchange thread (as indicated there I'd long since made my example by then).