Solved

What happened to Mabry?  Need a control

Posted on 2006-11-29
7
572 Views
Last Modified: 2008-02-01
Hi all, I've used a tree control from Mabry before (in demo) and wanted to purchase it.  However, the site is down and the email bounces.  Does anyone know if they are still in business?  I would really like to use their tree control as I find the MS ActiveX one a pain.
0
Comment
Question by:OHIS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 85

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 50 total points
ID: 18039596
I don't think they are ... I've tried to go there to see if any updates are available for their GUI pack, been checking it for a couple of months now and I believe it's gone.

I use their treeview control. It works fine, but if I had to do it all again I'd probably get something from one of these guys:

http://www.bennet-tec.com/btproducts/tlist/tlist.htm
http://www.dbi-tech.com/product_page_Component_Toolbox.asp

The GUI pak from Mabry had a couple of controls, but some of them didn't work and some of them were very, very difficult to deal with in either Access or VB. I forgot what I paid for the GUI Pack, but it was about half the cost of competing products..
0
 

Author Comment

by:OHIS
ID: 18039726
Thanks for the info and links LSM.  I was hoping that was not the case.  I already have a completed project using the demo.  The demo I had was an older version.  Do you know where I could get a copy of the latest version?
0
 
LVL 85
ID: 18040745
Not sure if some of the component vendors would have one ... I checked a few (componentsource, programmersparadise, devexpress) and found no listing. One listed Mabry, but when I clicked on it I received a "No Current Listing" page ...

Hate to say it, but you might be out of luck ... is your app very dependant on the Mabry tree? How difficult would it be to migrate to a different control?

0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:OHIS
ID: 18047796
Sheesh, just my luck!  The other ones seem to be overkill and pricey for my needs.  Thanks LSMConsulting, if nobody has anything to add in a few days I'll award you the points.
0
 

Author Comment

by:OHIS
ID: 18049315
OK, I did find out that Mabry went out of business last year... :(  
0
 
LVL 85
ID: 18049693
Really ... that's a shame ... where did you see this bit of info? Just curious ....
0
 

Author Comment

by:OHIS
ID: 18069542
I emailed one of the authors that Mabry published and he told me.  Thanks LSMConsulting... awarding you the points.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Access developers frequently have requirements to interact with Excel (import from or output to) in their applications.  You might be able to accomplish this with the TransferSpreadsheet and OutputTo methods, but in this series of articles I will di…
If you need a simple but flexible process for maintaining an audit trail of who created, edited, or deleted data from a table, or multiple tables, and you can do all of your work from within a form, this simple Audit Log will work for you.
In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page. The problem with sub-reports and headings: Add a dummy group to the sub report using the expression =1: Set the “Repeat Section” property of the dummy…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question