?
Solved

Q_21884491.html - Still a problem

Posted on 2006-06-15
4
Medium Priority
?
181 Views
Last Modified: 2013-12-18
Hi all,

In the link above is the code for the postdrag event of the calendar to help me drag and drop a calendar entry. Now with that i had a type mistmatch error. The error was fixed by implementing the following code inside the script in the link above.

      tmpList =doc.testdates
      i=0
      Forall x In tmpList
            Redim Preserve oldList(i)
            oldList(i) = Format$(x, "Short Date")
            i = i + 1
      End Forall

However, with this code now, the list that I am placing in the newList is a string list.
Now I want to try to convert it to date list(array of dates) instead of having newlist populated in my date field on the document as text list because I'll have a lot of other problems with it later.

I tried using the same loop above on the newlist, before assigning that to doc.testdates

              tmpList1 =doc.testdatefield
      j=0
      Forall elements In tmpList1
            Redim Preserve newlist(j)
            newlist(j) = Cdat(j)
            j = j + 1
      End Forall

I get out of subscript error.

I try the following:

newlist = cDat(newList)
I know though that this doesn't work because I know to change the value from text to date on each elements of the oldlist array.

I also tried to use Evaluate with @texttotime on newList and still had problems with it.

My question:
What's the simplest, most efficient way to resolve this problem and at the same time convert the newList array to short dates(without time) before assigning the value back to the field on the document?

Thank you all in advance.


0
Comment
Question by:varvoura
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 43

Expert Comment

by:Steve Knight
ID: 16910156
How about:

tmpList1 =doc.testdatefield
redim newlist (ubound(tmplist1))
for j=1 to ubound(tmplist)
  newlist(j)=cdat(oldlist(j))
next j

Can't you do it all in one too?:

tmpList =doc.testdates
     i=0
     Forall x In tmpList
          Redim Preserve oldList(i)
          oldList(i) = cdat(Format$(x, "Short Date"))
          i = i + 1
     End Forall

Steve
0
 
LVL 43

Accepted Solution

by:
Steve Knight earned 2000 total points
ID: 16910161
or even
tmplist1 =doc.testdatefield
redim newlist (ubound(tmplist1))
for j=1 to ubound(tmplist)
  newlist(j)=cdat(tmplist1(j))
next j
0
 

Author Comment

by:varvoura
ID: 16918257
It is so funny, when I look closely at your code, the first "j" bit, I tried it that way as well today. If i had access to this site in the day, I would've saved you the trouble.

Much much appreciated effort
0
 
LVL 43

Expert Comment

by:Steve Knight
ID: 16918265
No problem, again thanks for the points.

Steve
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
Sometimes clients can lose connectivity with the Lotus Notes Domino Server, but there's not always an obvious answer as to why it happens.   Read this article to follow one of the first experiences I had with Lotus Notes on a client's machine, my…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month10 days, 14 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question