Skip to main content

Accessing MS Access using JDBC


Since Microsoft does not provide 64 bit drivers for Access; it becomes a nuisance to access MS Access under 64 bit platforms.  

For a successfull connection to MS Access DB File (*.mdb) with JDBC under 64 bit platforms, follow following steps:

1-      Make sure Access drivers are installed. If access is installed it is already there, else download from this link and install.

2-      Configure Data Source Name using 32 bit ODBC Data Source Administrator. Use the executable at c:\windows\sysWOW64\odbcad32.exe.

3-      System DSN->Add->Microsoft Access Driver (*.mdb)

-          Specify a Data Source Name
-          Specify a description
-          Locate mdb file.
-          Click OK.


Picture 1 DSN Setup for MS Access


Picture 2 New DSN


4-      Use code fragment below to obtain connection.
private static Connection getConnection() throws SQLException, ClassNotFoundException {
    Class.forName("sun.jdbc.odbc.JdbcOdbcDriver");
    return DriverManager.getConnection("jdbc:odbc:SGECA");
}

5-      Launch Java application using 32 bit JVM which can be found under:
C:\Program Files (x86)\Java\jre7


Comments

Popular posts from this blog

Obfuscating Spring Boot Projects Using Maven Proguard Plugin

Introduction Obfuscation is the act of reorganizing bytecode such that it becomes hard to decompile. Many developers rely on obfuscation to save their sensitive code from undesired eyes. Publishing jars without obfuscation may hinder competitiveness because rivals may take advantage of easily decompilable nature of java binaries. Objective Spring Boot applications make use of public interfaces, annotations which makes applications harder to obfuscate. Additionally, maven Spring Boot plugin creates a fat jar which contains all dependent jars. It is not viable to obfuscate the whole fat jar. Thus obfuscating Spring Boot applications is different than obfuscating regular java applications and requires a suitable strategy. Audience Those who use Spring Boot and Maven and wish to obfuscate their application using Proguard are the target audience for this article. Sample Application As the sample application, I will use elastic search synch application from my G...

Behavioral Patterns : Chain of Responsibilities

Properties: -            Lets a request to be passed sequentially to a set of handlers. -            Each handler decides wheter to handle the request or pass it to next handler. Implementation: -            Handler  interface declares operations to handle requests. -            ConcreteHandler  decides wheter to handle the request or pass it to next handler. Java Standard Library Implementations: -            javax.servlet.Filter#doFilter(ServletRequest request,ServletResponse response,FilterChain chain) -            java.util.logging.Logger#log(Level,String) Example Usage: public   class  Logger  {      public ...

How To Use Keras Trained CNN Models

Introduction Keras is a popular deep learning api. It can run on top of Tensorflow , CNTK and Theano frameworks. Keras provides an easy to use interface which makes deep learning practice straight forward. It is widely used thus resources are easily accessible. Objective This article aims to give an introductory information about using a Keras trained CNN model for inference. This article does not contain information about CNN training. Audience This article assumes introductory information about python and Convolutional Neural Networks. For those who lack information may first begin with information from following resources. For python use  Python For Beginners For Convolutional Neural Networks use  CS231n Convolutional Neural Networks for Visual Recognition Software Installation Keras is a high level API. It requires a back-end framework to be installed. In this article, Tensorflow is used. Keras can transparently select CPU or GPU for processing. If use ...