Solved

List to flow downward not upward?

Posted on 2011-03-22
3
392 Views
Last Modified: 2012-05-11
Is there an out of the box way for me to get a SharePoint list to roll downwards, not upwards?  

I know the content editor can do a roll-"up" however we need a roll "down."  Where a master list is kept in the parent site, but then the child sites each display a filtered version of that master list that is relevant to the mission of that particular child site.


Thank you.

0
Comment
Question by:crmsharepoint
  • 2
3 Comments
 
LVL 14

Expert Comment

by:GeorgeGergues
ID: 35193072
You can do it with one of two ways

[1] If you have Enterprise license you can use the Content Query Web part.

[2] If not , you can use RSS Feed on the source and XML viewer / reader webpart at the destination page.


Best of luck.
0
 
LVL 1

Author Comment

by:crmsharepoint
ID: 35193170
Are you sure it can flow downward?  I always thought CQWP was only for "rolling" ***upwards**.

By all means do correct me if I'm mistaken.  Thanks.

Also, with this can we filter based on a column value as we are rolling downward?
0
 
LVL 14

Accepted Solution

by:
GeorgeGergues earned 500 total points
ID: 35193189
this can work anywhere on the site  Scope is limited to where you can read content.

yes, you can filter on the type of item / list and date and author etc.

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question