G
Guest
A ouple of questions:
What is the preferred method of splitting the data base - before or after
implementing user level security? Should I use the wizard or do it manually
and how is it done manually.
What does 'distributing' my application involve? Do I just copy the front
end to each network machine and, if so, how does each copy remain linked to
the back end?
How do I amend permissions for the front end copies should I decide to
change them? Or do I just change them on the back end and the changes are
update automatically on the front end?
Thanx,
Rip
What is the preferred method of splitting the data base - before or after
implementing user level security? Should I use the wizard or do it manually
and how is it done manually.
What does 'distributing' my application involve? Do I just copy the front
end to each network machine and, if so, how does each copy remain linked to
the back end?
How do I amend permissions for the front end copies should I decide to
change them? Or do I just change them on the back end and the changes are
update automatically on the front end?
Thanx,
Rip