Solved

CDO programing in c++.net/CLI

Posted on 2006-06-22
7
177 Views
Last Modified: 2010-04-24
Any web sites or any other refreneces on how to program CDO using c++.net 2.0 with CLI?
0
Comment
Question by:Lysandus
  • 4
  • 3
7 Comments
 
LVL 15

Accepted Solution

by:
lakshman_ce earned 125 total points
ID: 16961052
Look at this link
http://support.microsoft.com/ph/6384/en-us/?aid=1&GSA_AC_More1
to get an idea to use in C# and VB. Same can be applied to C++ also.

Also you can refer to these articles
http://support.microsoft.com/?kbid=178480
http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B887805
0
 
LVL 1

Author Comment

by:Lysandus
ID: 16962597
THat's a good start but I need to be able to create and modify appointments and contacts.
0
 
LVL 15

Expert Comment

by:lakshman_ce
ID: 16962724
As for as I know,

CDOEX (CDO 3.0)includes objects for creating appointments and meeting requests to enable personal and group scheduling applications. The calendar protocols are based on Internet standards like iCalendar and provide full interoperability with Outlook 98 and Outlook 2000.


0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 1

Author Comment

by:Lysandus
ID: 17002030
Know of any coding examples I could look at?
0
 
LVL 15

Expert Comment

by:lakshman_ce
ID: 17004337
0
 
LVL 1

Author Comment

by:Lysandus
ID: 17084639
These examples all seem to be using CDO and interfacing to an exchange server.  Do you know of any that are strictly for Outlook?
0
 
LVL 15

Expert Comment

by:lakshman_ce
ID: 17084925
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

The following diagram presents a diamond class hierarchy: As depicted, diamond inheritance denotes when two classes (e.g., CDerived1 and CDerived2), separately extending a common base class (e.g., CBase), are sub classed simultaneously by a fourt…
In Easy String Encryption Using CryptoAPI in C++ (http://www.experts-exchange.com/viewArticle.jsp?aid=1193) I described how to encrypt text and recommended that the encrypted text be stored as a series of hexadecimal digits -- because cyphertext may…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now