Elam, Debbie
DElam at jenkens.com
Fri Sep 9 16:58:21 CDT 2005
I have noticed most people tend to stick with what they always do unless traumatized by a bad design. I used a little of both early in my programming days, though mostly artificial keys since they were easier. Fortunately or unfortunately, fairly early on, I inherited a database with natural keys. The trauma the natural keys put me through with that &^%@# put me off the idea of natural keys forever. Debbie -----Original Message----- From: John W. Colby [mailto:jwcolby at colbyconsulting.com] Sent: Friday, September 09, 2005 4:51 PM To: 'Access Developers discussion and problem solving' Subject: Re: [AccessD] Autonumber Assigned Immediately >..not one mind changed ...again :( Hey, you don't know that. Martin came over from the dark side long ago, based almost entirely on one of these debates. John W. Colby www.ColbyConsulting.com Contribute your unused CPU cycles to a good cause: http://folding.stanford.edu/ -----Original Message----- From: accessd-bounces at databaseadvisors.com [mailto:accessd-bounces at databaseadvisors.com] On Behalf Of William Hindman Sent: Friday, September 09, 2005 5:21 PM To: Access Developers discussion and problem solving Subject: Re: [AccessD] Autonumber Assigned Immediately ..ah me ...another week on AccessD ...another gizillion posts on Autonumber ..not one mind changed ...again :( ..TGIF :) William -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com -- AccessD mailing list AccessD at databaseadvisors.com http://databaseadvisors.com/mailman/listinfo/accessd Website: http://www.databaseadvisors.com - JENKENS & GILCHRIST E-MAIL NOTICE - This transmission may be: (1) subject to the Attorney-Client Privilege, (2) an attorney work product, or (3) strictly confidential. If you are not the intended recipient of this message, you may not disclose, print, copy or disseminate this information. If you have received this in error, please reply and notify the sender (only) and delete the message. Unauthorized interception of this e-mail is a violation of federal criminal law. This communication does not reflect an intention by the sender or the sender's client or principal to conduct a transaction or make any agreement by electronic means. Nothing contained in this message or in any attachment shall satisfy the requirements for a writing, and nothing contained herein shall constitute a contract or electronic signature under the Electronic Signatures in Global and National Commerce Act, any version of the Uniform Electronic Transactions Act or any other statute governing electronic transactions.