One of my projects consists of two access databases. The one database is located on a server and contains only tables. The other database is located on six workstations and contains queries, reports, forms and links to the tables in the first database. This design solves most of the cases where access reports that another user has locked the database blah blah blah. I would like to know what other measures I can take to prevent this from happening. Thanks.