Solved

Write in SQL Server 2000 from Domino Server (through ODBC?)

Posted on 2004-10-13
3
418 Views
Last Modified: 2007-12-19
The Domino Server runs under Linux (SuSE 9 Enterprise), the SQL Server 2000 is under MS Win 2k3 Server.

I already implemented Easysoft's ODBC-ODBC Bridge. But I think there has to be a Lotus or a Microsoft solution for this.

(I don't know how many points to assign for this one. Suggest please.)
0
Comment
Question by:mmartha
  • 2
3 Comments
 
LVL 15

Assisted Solution

by:Bozzie4
Bozzie4 earned 50 total points
Comment Utility
No, this is the way to go.  On the unixodbc.org site, you can also find another driver (http://www.freetds.org/)  to connect to MS SQL

Another possibilty that's worth while researching is using a JDBC connection (then you will need to write Agents in Java).  

cheers,

Tom
0
 
LVL 31

Accepted Solution

by:
qwaletee earned 200 total points
Comment Utility
You can use an agent that runs ODBC using either LS:DO (Uselsx "*odbc") or the Lotus Connector objects (Uselsx "*lsxlc").  Both are documented, but the LS:DO documentation is easier to understand.  LSXLC is much more difficult and weird, but it is a stronger provider.

You might also consider getting LEI or using DECS.  DECS and LEI and LC all use the same underlying technology.  LEI does things in batch on a schedule.  DECS does almost exactly the same thing, except it does it real-time -- if you read a document, it can be set to automatically set some of the fields as you read them to a SQL result set, and when you write to a document, it can force an insert or update in SQL to match.  LEI and DECS are essentially in terface driven, no real programming involved.
0
 
LVL 31

Expert Comment

by:qwaletee
Comment Utility
Oh, forgot to mention, LEI is a costly add-on produdtc for Domino from Lotus.  DECS comes in the box, as does lsxlc and LS:DO.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Restore Procedure question 4 28
MS SQL server Varchar and nvarchar, GMT_DATE 23 49
Shop sales Actual vs Forecast 2 25
Test a query 23 11
In this article—a derivative of my DaytaBase.org blog post (http://daytabase.org/2011/06/18/what-week-is-it/)—I will explore a few different perspectives on which week today's date falls within using Microsoft SQL Server. First, to frame this stu…
JSON is being used more and more, besides XML, and you surely wanted to parse the data out into SQL instead of doing it in some Javascript. The below function in SQL Server can do the job for you, returning a quick table with the parsed data.
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
Viewers will learn how to use the SELECT statement in SQL and will be exposed to the many uses the SELECT statement has.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now