Solved

check-in time in VSS

Posted on 2013-05-14
1
357 Views
Last Modified: 2013-05-18
what is check-in time in VSS( Microsoft Visual Source Safe)?

Is it the timestamp on the file from the client side?
Is it the actual check-in time on the client side?
Is it the actual check-in time on the server side(assuming client and server are 2 different machines)?
0
Comment
Question by:Mydeen Yussouf
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 34

Accepted Solution

by:
sarabande earned 250 total points
ID: 39167345
you can choose in vss what time to be used.

the options are 'current', 'modification', or 'check-in'.

'current' means that any file checked-out that was different to the local copy will get the current local timestamp. that would assure that it was considered for a new build.

'modification' means that it would get the timestamp of the last modification (wherever it comes from). that is tricky if the computers are out-of-sync or developers work at different time-zones.

'check-in' means server time of check-in. though it was in sync it normally would require a full build after check-out as the check-in times may be arbitrary.

see http://www.kevingao.net/version-control/sourcesafe/get-latest.html for a discussion of the topic.

Sara
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following diagram presents a diamond class hierarchy: As depicted, diamond inheritance denotes when two classes (e.g., CDerived1 and CDerived2), separately extending a common base class (e.g., CBase), are sub classed simultaneously by a fourt…
In Easy String Encryption Using CryptoAPI in C++ (http://www.experts-exchange.com/viewArticle.jsp?aid=1193) I described how to encrypt text and recommended that the encrypted text be stored as a series of hexadecimal digits -- because cyphertext may…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question