Solved

Perl and Microsoft Access

Posted on 1999-01-04
7
218 Views
Last Modified: 2010-03-05
Is it possible to read and write to a Microsoft Access database?  If so how can I find out how to do it?
0
Comment
Question by:donb1
  • 4
  • 3
7 Comments
 

Author Comment

by:donb1
Comment Utility
I would like to do it using perl 5.
0
 
LVL 5

Expert Comment

by:b2pi
Comment Utility
Are you on a win32 machine?
0
 

Author Comment

by:donb1
Comment Utility
I use phone link to an NT box

0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 5

Expert Comment

by:b2pi
Comment Utility
Is the machine on which you execute the code a win32 machine?  If it is, you can use the  Win32::ODBC module.  If not, you're either out of luck, or you can set up a perlserver on a Win32 machine which will do it for you.
0
 

Author Comment

by:donb1
Comment Utility
b2pi

My server admin came back to me with the following answer:

The answer is, yes we are WindowsNT which is 32 bit.   They are
referring to a library module that contains code for accessing Access dB's using ODBC.  Anyway, we need to find this Perl library routine and load it on the server so that you can call it's routines.  If you find something, Email it to me and I'll load it on the server and send you the path.

Does this help?

0
 
LVL 5

Accepted Solution

by:
b2pi earned 50 total points
Comment Utility
1.) Determine if they're using a native build, or ActivePerl
2.) If it's activeperl make _really_ sure that it's a newer build (preferably 508)
3.) Get and install Win32::ODBC from http://www.roth.net/odbc/
4.) Learn how to use it at http://www.roth.net/odbc/odbc.html

(Sorry but the author apparently isn't using either CPAN or pod documentation)
0
 

Author Comment

by:donb1
Comment Utility
Thanks - Looks to me like it is a lot easier to just use files in perl.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Many time we need to work with multiple files all together. If its windows system then we can use some GUI based editor to accomplish our task. But what if you are on putty or have only CLI(Command Line Interface) as an option to  edit your files. I…
I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now