Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Office Automation with Visual FoxPro

Buy
Visual FoxPro developers are used to building large, complex applications using only VFP as their programming environment. But Windows users are demanding more—integration with other applications such as the Microsoft Office suit—Word, Excel, PowerPoint and Outlook. Visual FoxPro can be used to automate—either visually or behind the scenes—any task or process that you could do manually in Office, plus much more. In Microsoft Office Automation with Visual FoxPro, users learn how to create powerful applications that span the entire Office suite, using Visual FoxPro in the driver’s seat.

This book grew out of another book. In 1995, when FoxPro grew into Visual FoxPro, Tamar, together with Ted Roche, the technical editor of this book, wrote a book called Hacker’s Guide to Visual FoxPro 3.0 (Addison-Wesley). The bulk of that book, nearly 700 of its 900-some pages, was an alphabetic reference to every command, function, property, event, method, and system variable in Visual FoxPro. Oddly enough, Tamar and Ted didn’t just sit down and create a single Word document starting from "A" and working their way through to "Z." In fact, about 600 documents went into that section of the book.

When the writing was done and the smoke cleared, Ted had a brilliant idea. (Actually, he had the idea well before the writing was done.) VFP 3 was the first version of the product to support Automation. He wrote some code to take those 600 documents and put them together in the right order to create the reference section of the Hacker’s Guide.

In 1998, Tamar and Ted were at it again with an updated and expanded version called Hacker’s Guide to Visual FoxPro 6.0 (Hentzenwerke). This time, Tamar took on the task of assembling the book while Ted used Automation to turn the whole thing into an HTML Help file. With the new material from VFP 5 and 6, there weren’t 600 documents involved; there were more than 800.

In addition, changes in the way the book was managed meant that, before producing the final version, a lot of clean-up work had to be done. For example, Microsoft had changed the name of the product during the beta process. (Visual FoxPro 98 became Visual FoxPro 6.) The copy editor had done a wonderful job of finding inconsistencies in terminology, catching things like "textbox" vs. "text box," but some sections edited early in the process needed to be corrected. The biggest issue of all came very late in the game when a decision was made to make the book 8.5" x 11" instead of 7" x 9"—this meant that margins had to be changed, tables had to be resized, and many other changes were needed to every one of those 800+ documents.

Handling all of these changes by hand would have taken months and the book would have been hopelessly late. Automation to the rescue. Tamar wrote VFP code to open each document in Word, do the necessary processing, and save it as a new document. After all the processing was done, an updated version of Ted’s original assembly code created the reference section.

Along the way, while falling in love with Automation, Tamar beat her head against the wall regularly. Brute force was the order of the day. The Word documentation was helpful, as were the people on CompuServe’s MSWord forum. But nowhere was there a real resource for someone writing Automation code like this, especially someone writing it from Visual FoxPro.


(HTML tags aren't allowed.)

Analog-Baseband Architectures and Circuits: for Multistandard and Low-Voltage Wireless Transceivers
Analog-Baseband Architectures and Circuits: for Multistandard and Low-Voltage Wireless Transceivers
Analog-Baseband Architectures and Circuits reviews the fundamentals and studies the state-of-the-art multistandard transceivers before describing novel architectural and circuit techniques for implementing multimode and wideband (tens of MHz) baseband analog front-ends under low-voltage constraints. Techniques developed on architecture...
Threat Forecasting: Leveraging Big Data for Predictive Analysis
Threat Forecasting: Leveraging Big Data for Predictive Analysis

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop...

Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
Visual Indexing and Retrieval (SpringerBriefs in Computer Science)
Visual Indexing and Retrieval is a wide-scope research domain which unites researchers from image analysis and computer vision, to information management.

For nearly twenty years, this research has been extremely active world-wide. With the advent of social networks conveying huge amount of visual information to the
...

Oracle APEX Best Practices
Oracle APEX Best Practices

Have you ever wanted to create real-world database applications? In this book you’re not only getting APEX best practices, but will also take into account the total environment of an APEX application and benefit from it.

"Oracle APEX Best Practices" will guide you through the development of real-world applications....

The Startup Owner's Manual: The Step-By-Step Guide for Building a Great Company
The Startup Owner's Manual: The Step-By-Step Guide for Building a Great Company
More than 100,000 entrepreneurs rely on this book for detailed, step-by-step instructions on building successful, scalable, profitable startups.  The National Science Foundation pays hundreds of startup teams each year to follow the process outlined in the book, and it's taught at Stanford, Berkeley, Columbia and more than...
Ethernet: The Definitive Guide
Ethernet: The Definitive Guide
The "Ethernet"--as distinct from the Internet, intranet, sneakernet, and others in the net family--is both a familiar face and a familiar name. However, it evokes the mental experience of the school crossing guard whose ownership of a corner of your mindscape is so context-sensitive that a change in venue renders the name or face...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy