How you can get picky with regex to isolate all Agent Manager events across multiple server logs
August 7, 2018Articles for Notes Domino,Technical Articles,Tips,Tutorials
0 Comments6 Minutes
Our support team recently received a pretty interesting request. The user was working in consoleEZ and trying to bring up all events that the agent…
Manage thousands of profile documents easily with EZ Suite and three pre-made scripts
November 28, 2017Articles for Notes Domino,Technical Articles,Tips,Tutorials
1 Comment29 Minutes
In a recent blogpost, you got a walkthrough of one of Ytria’s recent customer cases where we helped out with a massive (and successful!) renaming…
Renaming 80 rooms across 3000 mail files in one click
September 19, 2017Articles for Notes Domino,Technical Articles,Tips,Tutorials
0 Comments16 Minutes
We recently finished a successful customer project using Ytria XML Automation capabilities and we wanted to share how it went. What’s in a name?The…
Can you beat our 3-step solution to scan and report all encrypted emails across all mail files?
May 10, 2017Articles for Notes Domino,Code for Notes and Domino,Technical Articles,Tips
0 Comments10 Minutes
One common requirement we hear about from customers preparing to migrate their mail to IBM Connections Cloud—or platforms such as Exchange or Google,…
Live from IBM Connect 2017: Long-awaited @formulas announced for FP8 and an in-depth guide on how to use them
February 23, 2017Articles for Notes Domino,Code for Notes and Domino,News and Events,Technical Articles,Tips
2 Comments10 Minutes
A hot announcement at IBM Connect 2017 was the news that Feature Pack 8* includes support for two new formulas: @ModifiedInThisFile and…
Deep Dive into IBM Domino Security Part 1: Password Hashes
February 1, 2017Articles for Notes Domino,IBM Notes secrets,Technical Articles,Tips
7 Comments18 Minutes
Over the past few years we’ve had the opportunity to discuss IBM Domino security at various conferences, as well as exchange views with customers…
Restoring deleted folder designs, and returning their documents to their rightful place
November 29, 2016Articles for Notes Domino,IBM Notes secrets,Technical Articles,Tips,Tutorials
0 Comments12 Minutes
“I’ve deleted a folder—the design itself—not the documents contained in the folder. How can I get everything back to the way it was?” This is a…
Establish Server Downtime and ID Irregular Shutdowns across All Servers, in Three Clicks
October 3, 2016Articles for Notes Domino,Technical Articles,Tips,Tutorials
0 Comments13 Minutes
After receiving a very thought-provoking question from one of our customers faced with the time-intensive task of tallying up server downtimes, we…
Longstanding IBM Notes Database Unread ID Table Replication Issues, Now Solved!
August 8, 2016Articles for Notes Domino,IBM Notes secrets,Technical Articles,Tips,Tutorials
3 Comments13 Minutes
In talking to hundreds of IBM Domino administrators and developers every week over a good many years now, we’ve frequently heard of problems that…
Access rights enigmas explained—new tools for modern, server-wide ACL effective access administration
January 29, 2016Articles for Notes Domino,IBM Notes secrets,Technical Articles,Tips,Tutorials
0 Comments15 Minutes
Proper access rights management is a crucial aspect of security and compliance in any IT environment, yet the reality surrounding IBM Domino is that…
Upcoming events, and our take on the teamwork and reciprocity that define the Notes community
November 18, 2015Articles for Notes Domino,News and Events
0 Comments3 Minutes
If you’re a regular TechLab reader, you’ll know that I don’t make these types of posts too often. But as I look forward to the busy months ahead of…
The resolution of resurrections: Tracing the replication journey of ‘ghost’ documents to find out who brought them back
October 28, 2015Articles for Notes Domino,IBM Notes secrets
0 Comments13 Minutes
Incidents of “ghost” (aka “zombie”) documents mysteriously re-appearing into IBM Notes and Domino databases have been reported since the very…
All eyes towards a secure environment: Deciphering facets of modern IBM Notes and Domino encryption through Ytria tools.
August 18, 2015Articles for Notes Domino,IBM Notes secrets,Technical Articles,Tips
5 Comments21 Minutes
IBM Domino, the secure platform that it is, provides you with a full range of encryption options to cover data stored on Domino servers or user…
Breaking behemoth IBM Notes databases into workable NSFs
June 25, 2015Articles for Notes Domino,Technical Articles,Tips,Tutorials
4 Comments6 Minutes
Surely, some of you out there have to deal with databases that, over time, have become too large to handle comfortably. It does happen. Recently, an…
Interpret user activity traces for a portrait of global usage
May 14, 2015Articles for Notes Domino,IBM Notes secrets,Technical Articles,Tips,Tutorials
6 Comments14 Minutes
Sometimes, trying to find the answers to questions like “Who is using this application” and “Is anyone really using this?” can lead you down a long…