Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Tcl 8.5 Network Programming

You're reading from   Tcl 8.5 Network Programming Learn Tcl and you‚Äôll never look back when it comes to developing network-aware applications. This book is the perfect way in, taking you from the basics to more advanced topics in easy, logical steps.

Arrow left icon
Product type Paperback
Published in Jul 2010
Publisher Packt
ISBN-13 9781849510967
Length 588 pages
Edition 1st Edition
Languages
Tools
Concepts
Arrow right icon
Toc

Table of Contents (18) Chapters Close

Tcl 8.5 Network Programming
Credits
About the Authors
About the Reviewers
1. Preface
1. Introducing Tcl FREE CHAPTER 2. Advanced Tcl Features 3. Tcl Standalone Binaries 4. Troubleshooting Tcl applications 5. Data Storage 6. Networking in Tcl 7. Using Common Internet Services 8. Using Additional Internet Services 9. Learning SNMP 10. Web Programming in Tcl 11. TclHttpd in Client-Server Applications 12. SOAP and XML-RPC 13. SSL and Security

Adding autoupdate to application


Very often we will want our clients to be able to update automatically, especially if clients are run on large number of computers and / or in different locations.

To make our application automatically update itself, we need to use a simple but efficient pattern for automatic updates. The approach is exactly the same as described in Chapter 3, Tcl Standalone Binaries.

All that is needed is to perform the following steps:

  • Check if an updated version of the binary is available; if not, then download it

  • Write the binary as a temporary file with the specified filename

  • Run the temporary binary

  • As the temporary binary, overwrite the actual binary and exit

  • As the temporary binary, run the actual binary, which is now updated and exit

  • As the actual binary, remove the temporary binary and perform normal actions

In order to be able to tell when we are running a temporary binary, we should always be able to know both file names. As our temporary binary will always be prefixed...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image