How you can get picky with regex to isolate all Agent Manager events across multiple server logs
August 7, 2018Technical Articles,Tips,Tutorials,Articles for Notes Domino
0 Comments6 Minutes
Our support team recently received a pretty interesting request. The user was working in consoleEZ and trying to bring up all events that the agent…
Manage thousands of profile documents easily with EZ Suite and three pre-made scripts
November 28, 2017Technical Articles,Tips,Tutorials,Articles for Notes Domino
1 Comment29 Minutes
In a recent blogpost, you got a walkthrough of one of Ytria’s recent customer cases where we helped out with a massive (and successful!) renaming…
Renaming 80 rooms across 3000 mail files in one click
September 19, 2017Technical Articles,Tips,Tutorials,Articles for Notes Domino
0 Comments16 Minutes
We recently finished a successful customer project using Ytria XML Automation capabilities and we wanted to share how it went. What’s in a name?The…
Can you beat our 3-step solution to scan and report all encrypted emails across all mail files?
May 10, 2017Code for Notes and Domino,Technical Articles,Tips,Articles for Notes Domino
0 Comments10 Minutes
One common requirement we hear about from customers preparing to migrate their mail to IBM Connections Cloud—or platforms such as Exchange or Google,…
Live from IBM Connect 2017: Long-awaited @formulas announced for FP8 and an in-depth guide on how to use them
February 23, 2017Code for Notes and Domino,News and Events,Technical Articles,Tips,Articles for Notes Domino
2 Comments10 Minutes
A hot announcement at IBM Connect 2017 was the news that Feature Pack 8* includes support for two new formulas: @ModifiedInThisFile and…
Deep Dive into IBM Domino Security Part 1: Password Hashes
February 1, 2017IBM Notes secrets,Technical Articles,Tips,Articles for Notes Domino
7 Comments18 Minutes
Over the past few years we’ve had the opportunity to discuss IBM Domino security at various conferences, as well as exchange views with customers…
Restoring deleted folder designs, and returning their documents to their rightful place
November 29, 2016IBM Notes secrets,Technical Articles,Tips,Tutorials,Articles for Notes Domino
0 Comments12 Minutes
“I’ve deleted a folder—the design itself—not the documents contained in the folder. How can I get everything back to the way it was?” This is a…
Establish Server Downtime and ID Irregular Shutdowns across All Servers, in Three Clicks
October 3, 2016Technical Articles,Tips,Tutorials,Articles for Notes Domino
0 Comments13 Minutes
After receiving a very thought-provoking question from one of our customers faced with the time-intensive task of tallying up server downtimes, we…
Longstanding IBM Notes Database Unread ID Table Replication Issues, Now Solved!
August 8, 2016IBM Notes secrets,Technical Articles,Tips,Tutorials,Articles for Notes Domino
3 Comments13 Minutes
In talking to hundreds of IBM Domino administrators and developers every week over a good many years now, we’ve frequently heard of problems that…
Access rights enigmas explained—new tools for modern, server-wide ACL effective access administration
January 29, 2016IBM Notes secrets,Technical Articles,Tips,Tutorials,Articles for Notes Domino
0 Comments15 Minutes
Proper access rights management is a crucial aspect of security and compliance in any IT environment, yet the reality surrounding IBM Domino is that…
Upcoming events, and our take on the teamwork and reciprocity that define the Notes community
November 18, 2015News and Events,Articles for Notes Domino
0 Comments3 Minutes
If you’re a regular TechLab reader, you’ll know that I don’t make these types of posts too often. But as I look forward to the busy months ahead of…
The resolution of resurrections: Tracing the replication journey of ‘ghost’ documents to find out who brought them back
October 28, 2015IBM Notes secrets,Articles for Notes Domino
0 Comments13 Minutes
Incidents of “ghost” (aka “zombie”) documents mysteriously re-appearing into IBM Notes and Domino databases have been reported since the very…
All eyes towards a secure environment: Deciphering facets of modern IBM Notes and Domino encryption through Ytria tools.
August 18, 2015IBM Notes secrets,Technical Articles,Tips,Articles for Notes Domino
5 Comments21 Minutes
IBM Domino, the secure platform that it is, provides you with a full range of encryption options to cover data stored on Domino servers or user…
Breaking behemoth IBM Notes databases into workable NSFs
June 25, 2015Technical Articles,Tips,Tutorials,Articles for Notes Domino
4 Comments6 Minutes
Surely, some of you out there have to deal with databases that, over time, have become too large to handle comfortably. It does happen. Recently, an…
Interpret user activity traces for a portrait of global usage
May 14, 2015IBM Notes secrets,Technical Articles,Tips,Tutorials,Articles for Notes Domino
6 Comments14 Minutes
Sometimes, trying to find the answers to questions like “Who is using this application” and “Is anyone really using this?” can lead you down a long…