How to replace troublesome parts of item values using scanEZ’s Diff feature and a little bit of @formula

0 Comments9 Minutes

This tooltip post is sort of adjacent to the previous one, where I ran through how to use scanEZ’s Diff function as the launchpad for modifying an…

Read More

Manage thousands of profile documents easily with EZ Suite and three pre-made scripts

1 Comment29 Minutes

In a recent blogpost, you got a walkthrough of one of Ytria’s recent customer cases where we helped out with a massive (and successful!) renaming…

Read More

Here’s how to modify an item value in a whole bunch of documents. (Hint: It’s not as hard as it seems.)

0 Comments13 Minutes

Anyone who has worked in purchasing knows the importance of keeping accurate invoicing records. Even without going as far as bringing the “taxman”…

Read More

Renaming 80 rooms across 3000 mail files in one click

0 Comments16 Minutes

We recently finished a successful customer project using Ytria XML Automation capabilities and we wanted to share how it went. What’s in a name?The…

Read More

Got hundreds of email attachments to save? Here’s how I helped one user do exactly that.

0 Comments7 Minutes

Not too long ago, I was talking with a user about a situation that got me rather worried at first. But once I thought about it for a minute, I…

Read More

Can you beat our 3-step solution to scan and report all encrypted emails across all mail files?

0 Comments10 Minutes

One common requirement we hear about from customers preparing to migrate their mail to IBM Connections Cloud—or platforms such as Exchange or Google,…

Read More

Live from IBM Connect 2017: Long-awaited @formulas announced for FP8 and an in-depth guide on how to use them

2 Comments10 Minutes

A hot announcement at IBM Connect 2017 was the news that Feature Pack 8* includes support for two new formulas: @ModifiedInThisFile and…

Read More

Deep Dive into IBM Domino Security Part 1: Password Hashes

5 Comments18 Minutes

Over the past few years we’ve had the opportunity to discuss IBM Domino security at various conferences, as well as exchange views with customers…

Read More

Restoring deleted folder designs, and returning their documents to their rightful place

0 Comments12 Minutes

“I’ve deleted a folder—the design itself—not the documents contained in the folder. How can I get everything back to the way it was?” This is a…

Read More

Establish Server Downtime and ID Irregular Shutdowns across All Servers, in Three Clicks

0 Comments13 Minutes

After receiving a very thought-provoking question from one of our customers faced with the time-intensive task of tallying up server downtimes, we…

Read More

Longstanding IBM Notes Database Unread ID Table Replication Issues, Now Solved!

1 Comment13 Minutes

In talking to hundreds of IBM Domino administrators and developers every week over a good many years now, we’ve frequently heard of problems that…

Read More

The resolution of resurrections: Tracing the replication journey of ‘ghost’ documents to find out who brought them back

0 Comments13 Minutes

Incidents of “ghost” (aka “zombie”) documents mysteriously re-appearing into IBM Notes and Domino databases have been reported since the very…

Read More

All eyes towards a secure environment: Deciphering facets of modern IBM Notes and Domino encryption through Ytria tools.

5 Comments21 Minutes

IBM Domino, the secure platform that it is, provides you with a full range of encryption options to cover data stored on Domino servers or user…

Read More

Breaking behemoth IBM Notes databases into workable NSFs

4 Comments6 Minutes

Surely, some of you out there have to deal with databases that, over time, have become too large to handle comfortably. It does happen. Recently, an…

Read More

mail-rules-architecture-sort-scanez

Mail Rules Architecture and how to sort it out with scanEZ

0 Comments18 Minutes

The latest IBM Notes releases have significantly improved the handling and overall architecture of mail rules. However, problems like “ghost mail…

Read More