Solved

sharepoint's calendar

Posted on 2011-03-25
2
374 Views
Last Modified: 2012-05-11
We use: sharepoint services 3.0. We have a calendar where people can place meetings for a room etc. But they can place meetings/items on a time that there already is a meeting for that room.
Can I configure this so that this can be forbidden? So when I place a meeting at 13 'till 14, there are no more meetings possible at 13 'till 14?

thanks in advance  
0
Comment
Question by:BERTLEEMAN
2 Comments
 
LVL 9

Accepted Solution

by:
kukdai earned 500 total points
ID: 35219647
Yes there is a way.
If you are good in coding you can create an event handler like item creating or created so that it will check the date column of all the items and compare if there is a matching then it will throe an error else it will continue.
check this URL i guess the user is describing the same situation here

http://blog.sharepointsydney.com.au/post/Setting-up-multiple-calendars-for-meeting-room-bookings-prevent-double-booking.aspx
0
 

Author Closing Comment

by:BERTLEEMAN
ID: 35873476
knowledge of development required.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SharePoint 2013 6 20
Citrix sharefile 1 54
Sharepoint 2013 error 4 49
SharePoint Installation Error - WDSRV.MSI file not found 5 41
Last week I faced a strange issue recently, i have deployed SharePoint 2003 servers for one project and one of the requirements was to open SharePoint site from same server. when i was trying to open site from the same server i was getting authentic…
There is one common problem that all we SharePoint developers share: custom solution deployment. This topic can't be covered fully in this short article, so all I want to do in this one is to review it from a development-to-operations perspectiv…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now