I'll be attempting to use Python 2.7 and the Python Windows Extensions
to extract data from Autodesk Inventor. In theory it works, and
there's even some half-finished help pages on the Autodesk wiki.
Any tips or sanity checks?
I'm sure a nice presentation for GRPUG will come out of this no matter
how it ends up.
P.S. My fallback is to use the VBA embedded in Inventor, so I'm pretty
motivated to make Python work here.
--
Ben Rousch
bro...@gmail.com
http://clusterbleep.net/
--
You received this message because you are subscribed to the Google Groups "GRPUG: Grand Rapids Python Users Group" group.
To post to this group, send email to gr...@googlegroups.com.
To unsubscribe from this group, send email to grpug+un...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/grpug?hl=en.
I actually have that book, but my concern is that it's now more than
10 years old.
> --
> You received this message because you are subscribed to the Google Groups "GRPUG: Grand Rapids Python Users Group" group.
> To post to this group, send email to gr...@googlegroups.com.
> To unsubscribe from this group, send email to grpug+un...@googlegroups.com.
> For more options, visit this group at http://groups.google.com/group/grpug?hl=en.
>
>
--
I worked with win32 COM a lot many years ago to for lotus notes,
excel, and a few miscellaneous things -- It worked great, with
pywin32, the instructions for COM activities are the same as any other
language, so any documentation will do at that point.
If I had to do COM again I'd still prefer python, it brings a lot of
sanity, and having an interactive session and using dir() to inspect
com objects returned is very valuable. Seemed COM activities are very
limited, though, when I had to get more aggressive in automation in
windows I ended up using WMI, MFC, CBT hooks, or just win32 api in C.
I always tried to avoid the then-upcoming visual C++ and .NET
interfaces, so COM is usually the 2nd place I look.
CBT hooks were the strangest, only available in C though, but very
helpful for prodding and poking remote win32 applications:
http://msdn.microsoft.com/en-us/library/ms644977(v=vs.85).aspx