Solved

Offline Access Database Synchronization vs Offline SQL Server Database Synchronization?

Posted on 2011-03-07
3
245 Views
Last Modified: 2012-08-13
Currently, we are using replicas of an Access database so that a number of people can use the database while disconnected from our network. When they come back into the office, they synchronize their copy of the database (with any modifications made) to the master and they also download changes made to the master directly to their replicas or from synchronization from other disconnected users.

We want to look into using a SQL server instead of an Access server. Is it possible to use synchronization with SQL even if the users are disconnected from the network?
0
Comment
Question by:CoopIS
  • 2
3 Comments
 
LVL 74

Expert Comment

by:Jeffrey Coachman
ID: 35061097
"Is it possible to use synchronization with SQL even if the users are disconnected from the network?"
"synchronization" or "replication"?

See here:
http://msdn.microsoft.com/en-us/library/ms151198.aspx

Or Google for more...
0
 

Author Comment

by:CoopIS
ID: 35072337
Any other comments?
0
 
LVL 74

Accepted Solution

by:
Jeffrey Coachman earned 250 total points
ID: 35072674
You can wait a few days to see if another Expert chimes in.


Replication is becoming a thing of the past in some circles.

With the advent of technologies like:
Terminal Server (Services)
Ctrix
VPN
Access Web Databases (Access 2010)
Remote log in apps
Remote Access
Remote Assistance
Access email Data collection
MS SharePoint
... the world is becoming "Always connected"
So having users "disconnected" from the data is becoming more and more a thing of the past.

As you know, because of conflicts, replication was never "Perfect" and sometimes needed some baby-sitting.
One theory is that the reason MS Dropped support for replication in 2007 is because of these new technologies

So you may want to look into one of these alternatives...

;-)

JeffCoachman
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Introduction The Visual Basic for Applications (VBA) language is at the heart of every application that you write. It is your key to taking Access beyond the world of wizards into a world where anything is possible. This article introduces you to…
A simple tool to export all objects of two Access files as text and compare it with Meld, a free diff tool.
Learn how to number pages in an Access report over each group. Activate two pass printing by referencing the pages property: Add code to the Page Footers OnFormat event to capture the pages as there occur for each group. Use the pages property to …
Viewers will learn how to use the SELECT statement in SQL to return specific rows and columns, with various degrees of sorting and limits in place.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now