Database comparison functionality: what every Domino pro should know about the Designer client part 3

3 Comments22 Minutes

This is post number 3 in a series of 4 posts exploring some of my favorite features in the Domino Designer, and the tactics that I’ve used to make…

Read More

Search functionality: what every Domino pro should know about the Designer client part 2

0 Comments14 Minutes

This post is the second in a series of four exploring some tricks and tactics that I’ve used to make the most out of the Domino Designer client in my…

Read More

How you can get picky with regex to isolate all Agent Manager events across multiple server logs

0 Comments6 Minutes

Our support team recently received a pretty interesting request. The user was working in consoleEZ and trying to bring up all events that the agent…

Read More

Manage thousands of profile documents easily with EZ Suite and three pre-made scripts

1 Comment29 Minutes

In a recent blogpost, you got a walkthrough of one of Ytria’s recent customer cases where we helped out with a massive (and successful!) renaming…

Read More

Renaming 80 rooms across 3000 mail files in one click

0 Comments16 Minutes

We recently finished a successful customer project using Ytria XML Automation capabilities and we wanted to share how it went. What’s in a name?The…

Read More

Can you beat our 3-step solution to scan and report all encrypted emails across all mail files?

0 Comments10 Minutes

One common requirement we hear about from customers preparing to migrate their mail to IBM Connections Cloud—or platforms such as Exchange or Google,…

Read More

Live from IBM Connect 2017: Long-awaited @formulas announced for FP8 and an in-depth guide on how to use them

2 Comments10 Minutes

A hot announcement at IBM Connect 2017 was the news that Feature Pack 8* includes support for two new formulas: @ModifiedInThisFile and…

Read More

Deep Dive into IBM Domino Security Part 1: Password Hashes

5 Comments18 Minutes

Over the past few years we’ve had the opportunity to discuss IBM Domino security at various conferences, as well as exchange views with customers…

Read More

Restoring deleted folder designs, and returning their documents to their rightful place

0 Comments12 Minutes

“I’ve deleted a folder—the design itself—not the documents contained in the folder. How can I get everything back to the way it was?” This is a…

Read More

Establish Server Downtime and ID Irregular Shutdowns across All Servers, in Three Clicks

0 Comments13 Minutes

After receiving a very thought-provoking question from one of our customers faced with the time-intensive task of tallying up server downtimes, we…

Read More

Longstanding IBM Notes Database Unread ID Table Replication Issues, Now Solved!

1 Comment13 Minutes

In talking to hundreds of IBM Domino administrators and developers every week over a good many years now, we’ve frequently heard of problems that…

Read More

Access rights enigmas explained—new tools for modern, server-wide ACL effective access administration

0 Comments15 Minutes

Proper access rights management is a crucial aspect of security and compliance in any IT environment, yet the reality surrounding IBM Domino is that…

Read More

All eyes towards a secure environment: Deciphering facets of modern IBM Notes and Domino encryption through Ytria tools.

5 Comments21 Minutes

IBM Domino, the secure platform that it is, provides you with a full range of encryption options to cover data stored on Domino servers or user…

Read More

Breaking behemoth IBM Notes databases into workable NSFs

4 Comments6 Minutes

Surely, some of you out there have to deal with databases that, over time, have become too large to handle comfortably. It does happen. Recently, an…

Read More