Solved

Redistribution of Documentum Foundation Classes (DFC)

Posted on 2007-11-20
5
1,373 Views
Last Modified: 2013-11-15
Hi Experts,

I'm writing a VB.Net 2005 application that integrates with Documentum 5.3 SP5 via the Foundation Classes (DFC's).  The application bulk imports files and creates folder structures etc by using methods in the DFC's.

How do bundle the DFC's with my application?

Thanks
0
Comment
Question by:PantoffelSlippers
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 21

Accepted Solution

by:
surajguptha earned 500 total points
ID: 20320513
If it only requires the DLL you could just package the DFC dll's in your project and deploy it. If it requires the DFC install prior to installing your application you can use the prerequisites in ur setup project
http://www.codeproject.com/useritems/Prerequisites_in_Setup.asp?df=100&forumid=404267&exp=0&select=1985205
0
 

Author Comment

by:PantoffelSlippers
ID: 20371956
Thank you surajguptha,

I think that I need the whole package to be installed.  I have already done what you suggested by the time that I posted the question.

I was hoping for some way of "silently" installing the package or at least be able to pass a few parameters to the setup program so that all of the parameters won't prompted from the user.

Am I asking for too much?

Thanks!
0
 
LVL 21

Expert Comment

by:surajguptha
ID: 20374467
If its to be done on your intranet you could schedule a PUSH of the install on the machines where it needs to be installed.

It isnt too much if you are trying to be perfect :)
0
 

Author Comment

by:PantoffelSlippers
ID: 20395831
Thanks for the help.
0
 

Author Closing Comment

by:PantoffelSlippers
ID: 31410081
Thanks
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we will look at our content management system as a whole, to get an idea of how we will start to manage these content items.
This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question