Databases

56K

Solutions

40K

Contributors

Databases are organized collections of data, most commonly accessed through management systems including schemas, tables, queries and processes that allow users to enter and manipulate the information or utilize it in other fashions, such as with web applications or for reporting purposes.

Share tech news, updates, or what's on your mind.

Sign up to Post

How to re-read database for record with a key passed as an argument?

I have two forms: one a list of Products; and second, an edit page of additional Product information.  I have an event on On Dbl_Click on the List page with the following code:

DoCmd.OpenForm "Product_Edit", acNormal, , , acFormEdit, acDialog, Product_Nbr.Value

While I am able to see the Product_Nbr Argument being passed into the Product_Edit form, I'm not able to have this second form display this particular record.  It only displays the first record in the Product table.  

How to I tell Access to re-read the product table based on the Product_Nbr being passed into it?


Thanks....

Andre.
0
Powerful Yet Easy-to-Use Network Monitoring
Powerful Yet Easy-to-Use Network Monitoring

Identify excessive bandwidth utilization or unexpected application traffic with SolarWinds Bandwidth Analyzer Pack.

We are using Informatica 10.2 R1 for extract, masking, subset using Informatica's Test Data Manager. We have a large volume of DB2 tables to mask and subset from production on an Iseries and mainframe. The problems we are having are designing entities so that they are small enough to manage.  However, not all parent tables are represented for the child tables especially when we run into circular relationships. Can one entity be large enough to accommodate all 720 tables?
0
LVL 26

Expert Comment

by:Brian B
This is a post. Experts generally don't read the posts area. You should probably ask it as a question using the "ask a question" button.
0
Cloud Class® offers continuing education and professional training in tech-specific categories, like ITIL®, Hadoop, Scrum, and CompTIA, as well as business-focused curriculum in Business Administration, Accounting, Law, and Human Resources. That means we’ve had to add new topics on site to better index the training opportunities. Follow these topics to answer questions and lend your expertise to any discussions.
0
We have a new branch that uses the QuickBooks pro 2017 software, they are getting the following message below to update quickbooks software.
2018-04-12_13-01-47.png
i need to know how to upgrade the quickbook software. Please note the quickbook database is on a server in the datacenter that the quick books client connects to. Please advise.
1
LVL 105

Expert Comment

by:John
The update has already been downloaded. Just click on Install Now. The new update will work with your current Server Manager (assuming it to be V2017)

You should ask this in Q&A as there is no value to any of us in answering your posts.
1
LVL 44

Expert Comment

by:pcelba
It seems I should explain what meant my sentence "Public forum is not good place to ask questions like this."...

QuickBooks is a paid software installed in a company which must have some policies about updates and upgrades. Such updates should not be allowed to users which do not know how to handle them.  How such user can recognize what is installing, what software displays the message and what to do at all?

To simply tell "Install it" just because the dialog window in the question is similar to the one displayed by the paid product can install whatever the attacker needs on your computer! Any click on your computer is at your own risk. Even the internet Ad closing by the X button can do unpredictable things...

Following is derived for the person which has computer background and which maintains software installations in your company/branch:

The first place where to ask is QuickBooks support (https://community.intuit.com/products/quickbooks-help-en-us). They surely know the answer and you've prepaid your questions already.

The second place is regular question here as Brian B proposed. Go to https://www.experts-exchange.com/askQuestion.jsp and ask the question again.  DON'T FORGET to add  QuickBooks as the Topic and don't forget to add whether you are sure the dialog is from the QuickBooks software.
0
Microsoft has added a page to their Office Templates which provides templates for five types of Access databases (Asset Tracking, Contacts, Students, Event Management, and Task Management).  I have not had a chance to review these databases, but this is the first move we have seen in quite some time to add anything "Access" to Office marketing, and is good news.

Please download these templates and encourage others to do so.  If we generate enough traffic, maybe we will be able to get additional templates on the website.

0
AWS-cloud-computing-certification-tr.jpg
Nowadays AWS cloud computing has a very scope. Amazon web services, JPA solutions provide is the good platform for learning database storage, content delivery and more learn from cloud industry experts. We have experienced and industry trainer to teach AWS from basic level to advanced level.
0
I have an access form, "frmCompetition" with a subform, "sfrmDogBrace." This is a database for field trials for bird dogs.   I would like to filter the contents of the subform based on selections I make in 3 separate comboboxes in the main form.  Any advice?  I've tried makeing the underlying query of the subform reference the contents of the 3 comboboxes as criteria.  No luck. Is there some vba code I could use?  My comboboxes are cboyear, cboday, and cbo brace.
0
LVL 60

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
Use the blue "Ask a Question" button in the page header.

Posts are for sharing news items.

Jim.
0
LVL 60

Expert Comment

by:Jim Dettman (Microsoft MVP/ EE MVE)
or something that you did and want to share, without writing an article or doing a video (think blog type stuff).

Jim.
0
Are you looking at migrating your data centers to the cloud? Here’s how Experts Exchange successfully made the transition. #TechTuesday
2
I am struggling to complete a formulation for calculating the expiration of data entered which depending on which database table they are in depends on their expectoration time, either 24hrs, 7days, 14days or 21 days.
If there isn't any withing that particular table then it will default to 14.
This is my so far attempt, but have gaps i know and it is so frustrating that I cannot get my head around it....If anyone can shed some light it would be gratefully appreciated.

@example = INT(Table.example/2) MOD 2 <> 0

Open in new window


If {@example} then 1
Else
(

If IsNull{table.NAME} then
14
Else if {table.NAME}= help then
7
Else if {table.NAME} = more help then
21
Else
14
) 

Open in new window

0
LVL 102

Expert Comment

by:mlmcc
You probably should ask this as a question as not all Crystal experts follow the posts.

There is a BLUE button for ASK
https://www.experts-exchange.com/askQuestion.jsp

Need more information as to when each length applies

mlmcc
1

Author Comment

by:Kev wood
Sorry didn't realise, thank you. I have now done what you have said.
1
Big Business Goals? Which KPIs Will Help You
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

EQIFAX DATA BREACH.

The Equifax data breach is one of the deadliest cyberattacks in the modern times not only in terms of affected people but also due to the intensity of accessed personal data. Equifax reported that between mid-May and June 2017, their system was hacked and the personal information of 173 million customers was exposed. Below we highlight some incites about this breach and then take a look at exactly how this was accomplished at the bottom.

Accessed information

According to Equifax, the hackers were able to access customer’s names, Social Security Number, customer’s date of birth, card numbers, addresses and driver’s license numbers.

Why this breach is one of the deadliest attacks

The Yahoo data breach in 2016 had 1 billion customers affected where only the passwords and phone numbers were accessed. But in the case of Equifax, sensitive data was accessed which means that:

Criminals can use the Social Security number to other credit accounts using a customer’s names.
Hackers can also maneuver their way and shop online using the credit card details obtained.
The hackers can sell the data to other criminals which makes the effect very grave.
An accessed customer’s data is not immune to future’s fraud, extortion and blackmail. The accessed information can haunt a customer forever.
How to find out if your information was exposed

Equifax has established a “Potential Impact” tab on its website (www.equifaxsecurity2017.com) that helps …
0
LVL 9

Expert Comment

by:Sean Plemons Kelly, CISSP
This was literally copied and pasted from hackingloops.

Let's go to a "Security" site from a company that hid the fact that they had a massive data breach that affected (more or less) everyone with a credit score in the US. Let's plug in our SSN anyway (fun fact, it doesn't matter if you are on a secure system or using encryption if the destination isn't secure).
0
0
Black Friday Hosting.

About this time every year, my hosting clients begin asking about resizing hosting to handle Nov-Dec traffic increases, both real traffic + attack traffic (from competitors).

Here's the simple answer about how to handle traffic for any site.

Disk I/O is the killer. Database writes are the worst.

For MariaDB/MySQL installations, the fix is simple. Run mysqltuner + fix all diagnostics. Then enable the Performance Schema + track table i/o (file_summary_by_instance stats table) + track any table which has a huge amount of writes for no good reason.

Usually tables will relate to specific offender plugins, like those which handle security or link tracking or link rewriting (redirection). Simply replace these offending plugins, so your database writes approach zero.

These few simple activities allow sites to maintain speed + stability, independent of whatever traffic occurs.
1
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
v2-native-ad-no-button.pngOnly five days left to enroll in October’s Course of the Month! Once you enroll, you’ll have 30 days to complete the Microsoft SQL Server and Database Concepts course.
0
native-ad-no-button.pngThe end of October is approaching and you only have nine days left to enroll in our Microsoft SQL Server and Database Concepts course. Enroll today and take advantage of this complimentary Course of the Month training.
4
Have you enrolled in this month’s complimentary course? Enroll now for a free Microsoft SQL Server and Database Concepts course. Get 7+ hours of step-by-step SQL training, including possible topic interview questions.
0
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4
Build an E-Commerce Site with Angular 5
LVL 12
Build an E-Commerce Site with Angular 5

Learn how to build an E-Commerce site with Angular 5, a JavaScript framework used by developers to build web, desktop, and mobile applications.

How can I share out an old *.exe application to multiple users in an AD environment who are connected from home via VPN? The requirement is that the execution of *.exe must be from the office network, the *.exe application calls a bunch of databases from other servers in the office and will disconnect if the application runs from the user's computer via VPN.

I am thinking of setting up a Windows 2012 servers and allow RDP connections for users to run the *.exe on the server from home(via VPN). Are there any other ways?
1

Author Comment

by:Panda 5888
Thanks
1
LVL 26

Expert Comment

by:Brian B
0
onsite-native-ad-no-button-2017-sept.pngAccess to September’s Course of the Month expires in 2 days! Enroll today in our VMware Professional - Data Center Virtualization course.
1
v2-twitter-2017-september-ad.pngDon’t miss the chance to add VMware virtualization skills to your resume. Five days remain to enroll!
5
LVL 9

Expert Comment

by:Senior IT System Engineer
So if I enrol today, can I still access it on the next month ?
2
LVL 19

Expert Comment

by:Kyle Santos
You have 30 days from the date of enrollment to complete it for free.
3
Gain valuable virtualization processes skills that allow you the ability to store data, prevent vulnerabilities, and replicate environments for fast deployment. Enroll in September’s Course of the Month today!
0
Capture.JPG
Cyber News Rundown: Edition 9/8/17

The Cyber News Rundown brings you the latest happenings in cyber news weekly.
If you have any other questions, just ask!





Consumer Credit Reporting Agency Equifax Suffers Cyberattack Affecting 143 Million Customers

Equifax announced hackers gained access to sensitive company data that potentially compromised information for 143 million American consumers, including Social Security numbers, driver’s license information, and credit card details. This is the third major cybersecurity incident for the agency since 2015. Most concerning, Equifax knew of the breach on June 29 but waited until September 7 to disclose the information.

Instagram Hack Exposes Millions of Accounts
A group of hackers recently gained access to a large number of Instagram accounts for high-profile celebrities and other victims. The attackers were able to use an exploit in the Insta app to retrieve the email addresses and phone numbers for millions of account holders. They then used this information to take control of more valuable accounts and posted the credentials for sale on the dark web. While Instagram was quick to fix the bug, it is still unclear just how many accounts were compromised.

Customer Databases Belonging to Time Warner Cable Publicly Exposed
1
Please, i need help on how to upload files (PDF) into different categories of a database of an E-library so that the uploaded books or files can display books or be searched, on their individual categories using MySQL and php ... Thanks
0
LVL 9

Expert Comment

by:Sean Plemons Kelly, CISSP
Try reposting this as a question. You will likely have more assistance from experts.
1

Databases

56K

Solutions

40K

Contributors

Databases are organized collections of data, most commonly accessed through management systems including schemas, tables, queries and processes that allow users to enter and manipulate the information or utilize it in other fashions, such as with web applications or for reporting purposes.