CreateDataAdapter – Creating a DataAdapter for a given connection object, via Reflection

CreateDataAdapter – Creating a DataAdapter for a given connection object, via Reflection

' Create a suitable DataAdapter object for a given connection object.' Example:'    Dim da As DbDataAdapter = CreateDataAdapter(cn, "SELECT * FROM Titles")Function CreateDataAdapter(ByVal cn As IDbConnection, _    ByVal sql As String) As DbDataAdapter    ' We must box CN to invoke the GetType method.    Dim cnType As Type = CObj(cn).GetType()    ' The complete name of the assembly where the connection is defined.    Dim asmName As String = CObj(cn).GetType().Assembly.FullName    ' The complete names of the DataAdapter and CommandBuilder objects    Dim daTypeName As String = cnType.FullName.Replace("Connection", _        "DataAdapter")    ' Create the DataAdapter via Reflection.    Dim daType As Type = Type.GetType(daTypeName & "," & asmName)    Dim args() As Object = {sql, cn}    Dim da As DbDataAdapter = DirectCast(Activator.CreateInstance(daType, args), _        DbDataAdapter)    ' Create the CommandBuilder via reflection.    Dim cbTypeName As String = cnType.FullName.Replace("Connection", _        "CommandBuilder")    Dim cbType As Type = Type.GetType(cbTypeName & "," & asmName)    Dim args2() As Object = {da}    Dim cb As Object = Activator.CreateInstance(cbType, args2)    Return daEnd Function

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved