Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

check-in time in VSS

Posted on 2013-05-14
1
Medium Priority
?
364 Views
Last Modified: 2013-05-18
what is check-in time in VSS( Microsoft Visual Source Safe)?

Is it the timestamp on the file from the client side?
Is it the actual check-in time on the client side?
Is it the actual check-in time on the server side(assuming client and server are 2 different machines)?
0
Comment
Question by:Mydeen Yussouf
1 Comment
 
LVL 35

Accepted Solution

by:
sarabande earned 1000 total points
ID: 39167345
you can choose in vss what time to be used.

the options are 'current', 'modification', or 'check-in'.

'current' means that any file checked-out that was different to the local copy will get the current local timestamp. that would assure that it was considered for a new build.

'modification' means that it would get the timestamp of the last modification (wherever it comes from). that is tricky if the computers are out-of-sync or developers work at different time-zones.

'check-in' means server time of check-in. though it was in sync it normally would require a full build after check-out as the check-in times may be arbitrary.

see http://www.kevingao.net/version-control/sourcesafe/get-latest.html for a discussion of the topic.

Sara
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following diagram presents a diamond class hierarchy: As depicted, diamond inheritance denotes when two classes (e.g., CDerived1 and CDerived2), separately extending a common base class (e.g., CBase), are sub classed simultaneously by a fourt…
In Easy String Encryption Using CryptoAPI in C++ (http://www.experts-exchange.com/viewArticle.jsp?aid=1193) I described how to encrypt text and recommended that the encrypted text be stored as a series of hexadecimal digits -- because cyphertext may…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question