Solved

export/import Palm ToDo list

Posted on 2001-08-30
9
638 Views
Last Modified: 2007-12-19
Is there a way to export a to-do list from a 3rd-party program so that it can be imported into the standard Palm Todo list? thinking of something similar to exporting a Comma-separated Text file and then importing into the Address book.

I have an Access database that generates a list of delivery items, and am curious whether I could somehow get it into the Palm. (Making the text file is not a problem if there is a way to import it into the Palm.)

TIA
0
Comment
Question by:jacksonmacd
9 Comments
 
LVL 8

Expert Comment

by:tskelly082598
ID: 6447469
Besides a tedious cut and paste, record by record, you might be able to find a commercial program or write some code to do it.

You might be able to use Intellisync, converting through another program's Todo list first.

0
 
LVL 8

Expert Comment

by:tskelly082598
ID: 6451388
Here is a commercial product that converts to and from Microsoft Access:

http://www.ddhsoftware.com/dataexchange.html
0
 
LVL 2

Expert Comment

by:melchioe
ID: 6480445
I've been trying to do this for quite some time.  If you write a program to do it, I'll buy it.  The ddhsoftware product mentioned above does not convert to or from the .tda todo file format.  It only works for HandBase files.

The .tda format is a proprietary Microsoft format that Palm doesn't even know.  I think tskelly's idea of using an intermediate program just might work, although all attempts I've made at it haven't been successful.

From Palm:

"The Palm? Desktop data file formats (*.dat, *.dba, *.tda) are the result of serialized MFC objects, even the files on the Macintosh. Regretfully, we do not know their precise binary format; they are in an undisclosed format proprietary to Microsoft. An investigation showed that they contain some clear text, and remnants of deleted, but not yet removed records.

It is possible to write an independent MSVC++ 4.1 MFC application to read the (*.dat) files; note that they are MFC-version dependent. The *.dba and *.tda files can be renamed to *.dat; the reason their names are different is to identify what they are: *.dba (datebook archive), *.tda (todo archive).

Oftentimes the best solution is to write a conduit that moves data directly from the Palm OS handheld to your end application. Performing all processing in a single step is easier on the user, and more compatible with the Palm approach. You are welcome to use the conduit source code in the Conduit Development Kits to get you on your way."

(above from http://oasis.palm.com/dev/kb/faq/1057.cfm)
0
 
LVL 5

Expert Comment

by:buddhole
ID: 6526972
Chapura pocketmirror can synch the palm to do list with microsoft outlook (and more).. http://www.chapura.com
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 

Expert Comment

by:amp072397
ID: 6770091
jacksonmacd:

Please return to this question and provide feedback.

thanks!
amp
community support moderator
0
 

Author Comment

by:jacksonmacd
ID: 6770130
No satisfactory answer. I subsequently found software called JetPilot that is able to do what I need.
0
 
LVL 8

Expert Comment

by:tskelly082598
ID: 6770943
Thanks for sharing the information.


Link to commercial product:


http://www.consult-us.cc/html/body_jetpilot_us.htm

http://www.consult-us.cc/html/jetpilotdemo_us.htm
0
 

Accepted Solution

by:
amp072397 earned 0 total points
ID: 6772760
Okay, everyone. If no objections, I'll return jacksonmacd's points and PAQ?

Please understand that when you're asked this question by a moderator, it's not just a courtesy, we really want you to let us know if you object.

:)
thanks!
amp
community support moderator
0
 

Expert Comment

by:amp072397
ID: 6781272
PAQed.

amp
community support moderator
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now