Encountering Tabular Data Control Error

Encountering Tabular Data Control Error

Question:

I have an index page where the user clicks on a name to bring up that person’s biography on the next page. The names are hyperlinks to the next page followed by # and the number of that person’s record. I use the Internet Explorer ActiveX Tabular Data Control (TDC) to retrieve the biography info from my Data Source Object (DSO). I use a simple JavaScript to retrieve the number and call the appropriate recordset:

Most of the time (but not always) I get the error, “The operation requested by the application is not allowed if the object is closed,” when trying to load the TDC page and only the first record. This does not occur while running the page locally (off the hard drive)?only when it is online. How can I eliminate this problem?

Answer:
This error message is Remote Data Service’s (RDS) way to tell you that it can’t open the reference file, perhaps because it can’t find it, or perhaps because you don’t have a complete reference to its location. The source file should be located on the server if the requesting file is on the server. The other possibility is that the file in question is malformed in some way, and the component can’t properly parse it into the requested OLEDB data format. Given the intermittence that you describe, this explanation makes more sense than not being able to find the page itself.

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved