Solved

DATABASE QUESTION

Posted on 1997-12-01
1
145 Views
Last Modified: 2010-04-04
HAVING PROBLEM WITH KEEPING INFORMATION POSTED TO THE TABLES
WHEN I SHUT OFF MY SYSTEM NEW RECORDS ARE LOST ON ONLY ONE TABLE.
WHAT AM I MISSING? WILL STORE TO ONE BUT NOT THE OTHER. HOW DO YOU SET UP CODE AND/OR TABLES TO STORE THE INFORMATION PROPERLY TO THE DATABASE.  
0
Comment
Question by:BBENDALL
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 1

Accepted Solution

by:
jackb022197 earned 50 total points
ID: 1352572
In the AfterPost method of your tables add
  DbiSaveChanges(Table1.Handle)
to flush all (cached) changes directly to disk.
Dbi functions are in the BDE unit, so you need to add BDE to the uses clause.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month9 days, 22 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question