Solved

kix

Posted on 2002-04-07
3
173 Views
Last Modified: 2010-04-11
Hi,

I'm interested to path information from an external executable program (written in C), which does some calculations (that are not convinient to write in kix), to a kix script.

What's the best way to acomplish this?
(I'd like to avoid writing to a temporary file)

Thanks,
V.F.
0
Comment
Question by:zz_vf_zz
  • 3
3 Comments
 
LVL 24

Expert Comment

by:SunBow
ID: 6926243
I prefer temporary file
0
 
LVL 24

Accepted Solution

by:
SunBow earned 50 total points
ID: 6926257
Is this KixTart?

Never mind. As you have phrased this, I think I'd go with a canned script, a boiler-plate, if you will. Read in the static parts in C, and have the C code tuck in the new information, while outputting the combination into a single script file (not temporary, but readable, for troubleshooting, which is why I made prior comment, to benefit debugging efforts).

Answer: Use same C program to output the script itself.
0
 
LVL 24

Expert Comment

by:SunBow
ID: 6928576
Thanx.  I do tend to prefer simplification (KISS) and tracking (log & other 'temp' files) to maintain sense of control. My use of Boilerplate, to be clear, is that all of the 'canned' script, the parts that do not change over time, to have a standard file that is imported by the code. This permits ease of changing minor items, such as changed street address, city,, some data item not essential to programmatic functions.
Thanx, and

Good Fortune
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question