Solved

Add-in packages

Posted on 2000-03-13
4
142 Views
Last Modified: 2010-04-04
I want to implement an application framework consisting of a baseform, an inherited child(c1) and an form c1 inherited child2(c2). All three reside in a different .bpl; Now i add a new class at c1 level and want c2 to inherited from it (run-time). Problem is that design time it compiles well but run-time i'm loaded with access violations etc. Could anyone give me an idea ?
0
Comment
Question by:MarlonR
  • 2
4 Comments
 
LVL 12

Expert Comment

by:rwilson032697
ID: 2613972
Can you show some code snippets where the violations occur?

Cheers,

Raymond.
0
 
LVL 12

Expert Comment

by:rwilson032697
ID: 2613979
0
 
LVL 1

Expert Comment

by:yk030299
ID: 2614561
listen
0
 

Accepted Solution

by:
dbuch earned 200 total points
ID: 2794877
Hi

I have implemented exactly what you are looking for successfully.

If you tell me a bit more about what violations are occuring we can see where it is happening. Ideally send me your code and I will look at it.

Cheers

David
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Simple Delphi Question 9 90
Working with hours 3 58
TEMBEDDEDWB how can i change its user agent ? 8 58
Firemonkey allowing RTL on android 6 33
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question