Solved

TransferText

Posted on 2004-04-22
5
484 Views
Last Modified: 2012-06-21
I am trying to import a text file from an ftp site but cant seem to get the proper wording. Its in a Macro TransferText action.
I have...

ftp://cmcgregor:pass2000@148.123.2.130/data/SAS/Starii_Extract/cmcgregor/FSAsNotDelivered.txt

in the file name field but it doesnt seem to work. It says ...jet engine could not find the object
0
Comment
Question by:cmcgregor
  • 2
  • 2
5 Comments
 
LVL 39

Accepted Solution

by:
stevbe earned 50 total points
ID: 10891396
I use code to pull the file via FTP before I import. You can find code for FTP at ...
http://www.mvps.org/access/modules/mdl0015.htm

Steve
0
 

Author Comment

by:cmcgregor
ID: 10891421
I looked at that and dont really understand it at all. I would like to accomplish it through a Macro using TransferText
0
 
LVL 39

Expert Comment

by:stevbe
ID: 10901548
if the line you are using works in windows explorer address bar but not with the TransferText method then I don't think you can do it directly.

The original link requires you to make a .scr file (plain text file with .scr extension instead of .txt) with the FTP commands you want to execute.

Here is another link that contains a complete object model that you can reference in your database and then execute the commands from within your code.
http://www.mvps.org/access/modules/mdl0037.htm

Steve
0
 
LVL 50

Expert Comment

by:Steve Bink
ID: 11957049
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

Accept - stevbe

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

RoutineT
EE Cleanup Volunteer

0
 

Author Comment

by:cmcgregor
ID: 11957070
Didnt help me at all but thanks anyway.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It took me quite some time to sort out all the different properties of combo and list boxes available from Visual Basic at run-time. Not that the documentation is lacking: the help pages are quite thorough and well written. The problem was rather wh…
Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
What’s inside an Access Desktop Database. Will look at the basic interface, Navigation Pane (Database Container), Tables, Queries, Forms, Report, Macro’s, and VBA code.
With Microsoft Access, learn how to start a database in different ways and produce different start-up actions allowing you to use a single database to perform multiple tasks. Specify a start-up form through options: Specify an Autoexec macro: Us…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now