Solved

How can I transport an application to another system

Posted on 2004-10-14
8
245 Views
Last Modified: 2013-12-18
I have written a number of Notes applicatons on a particular server.
I might be changing jobs and I'd like to take them with me to use at the new location.
What files must I take to make a complete migration to another Notes system.?
0
Comment
Question by:rbend
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 24

Accepted Solution

by:
HemanthaKumar earned 25 total points
ID: 12309217
Just Your application and other related dbs which might be needed by your app.

reset the acl default to manager so that you can use it with your new id...

~Hemanth
0
 
LVL 15

Expert Comment

by:Bozzie4
ID: 12310043
You should read your contract, though, because although you may have written the apps, I doubt you 'own' them (they probably are property of your current company), and some might consider this stealing....

And since you don't know how to take apps with you, I doubt you wrote them in the first place :-)

cheers,

Tom
0
 
LVL 31

Expert Comment

by:qwaletee
ID: 12310322
"Some" might consider this stealing?  Unless you have a contract that states otherwise, any work done at the request of an entity and specifically on behalf of that entity, is generally considered a work for hire or work product of your engagemnet to the entity, and hence, proprietary to that entity... especially iif done in its place of business.  They own the intellectual property.  Ask nicely if you can reuse it.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:rbend
ID: 12310413
Tom:
Thanks for the assumptions but you are incorrect on all counts.
0
 

Author Comment

by:rbend
ID: 12310428
HemanthaKumar:
just the .nsf files then is sufficient unless other DB's are involved.?
0
 
LVL 24

Expert Comment

by:HemanthaKumar
ID: 12310671
other Dbs meaning any support databases that your app might be depending on, commonly lookup databases
0
 
LVL 13

Assisted Solution

by:CRAK
CRAK earned 25 total points
ID: 12311926
Strange question for a developper....
The NSF probably holds data. If not illegal to copy it, it certainly more load to carry.
I'd make a copy into empty (no data) templates...
Copy ACL as well (for userroles), but do change the ACL after copying to have access using other id's.

Tom,
Isn't this "intellectual ownership"?
0
 

Author Comment

by:rbend
ID: 12312227
Ownership is both in my view.
Sure I wrote them under the umbrella of employment, but the concept and code came from my head. Isn't it reasonable to assume I could write it again if I wanted to take the time ?
That couldn't be prevented or proven to be otherwise.
Just saving myself some time by doing this.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Problem "Can you help me recover my changes?  I double-clicked the attachment, made changes, and then hit Save before closing it.  But when I try to re-open it, my changes are missing!"    Solution This solution opens the Outlook Secure Temp Fold…
This article covers general Notes 8.5 troubleshooting information including recreating the Notes\Data folder.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question