Comparing Recordsets in a Database



Click here for a larger image.

Environment: VC6 SP4, NT4 SP6, ADO 2.5

Everyone knows this. You have a complex table structure in the database, and then you have to customize the software work and change this data. How do you compare and verify the results of the new version with the old? With this little tool, you can define a set of queries and its parameters (referenced in the query like $$parametername$$) and dump these results to a file. Two of these files can be compared with the program "WinDiff."

Tip: Look at the macros and the functions in the CAdoUti class.

Acknowledgements:

I used the CGridCtrl class from Chris Maunder, just because I thought it's the best. Thanks, Chris!!! (I have modified the grid to use it as a property sheet.)

Downloads

Download application - 80 Kb
Download source - 177 Kb


Comments

  • We had this but solve it differently

    Posted by Legacy on 09/23/2002 12:00am

    Originally posted by: Russ Freeman

    We had the same problem; Established DB and code to act on it...now the code needs to be changed and the data needs to be verified against the old code.

    We wrote some ASP pages that simply queried the two sets of data and produced web pages from the results of the comparison. It was quick to do and easy to see differences. Links were added to drill into the differences to better see why there were differences.

    Now, whenever we make such changes we run everything through the ASP pages.

    Works for us!

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • You may already know about some of the benefits of Bluemix, IBM's open platform for developing and deploying mobile and web applications. Check out this webcast that focuses on building an Android application using the MobileData service, with a walk-through of the real process and workflow used to build and link the MobileData service within your application. Join IBM's subject matter experts as they show you the way to build a base application that will jumpstart you into building your own more complex app …

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds