SearchDomino.com September 12, 2001 Admin Tip: All apps from Notes SmartIcons ================================================= Sponsored By: CS Development, s.r.o. ================================================= Are you bored by hundreds of SINGLE-IS portal solutions? Try "Better-Face of Notes"! Application Portal is an interface to ANY data SOURCE in ANY Information Systems. Acting as a container for DISTRIBUTED control, ADMINISTRATORS and DEVELOPERS will SAVE their TIME. Personalization can be done using USER-PROFILES so that UI is unique for EVERYONE or different, based on virtual teams. Download fully working DEMO, now! http://ad.doubleclick.net/clk;3304599;5058249;r?http://portal.csdevelopment.cz/reklamauk ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ================================================= TITLE: All apps from Notes SmartIcons This tip was submitted by Mike Andrews, a systems administator in Richmond, British Columbia. This tip allows clients to launch all applications from their Notes SmartIcon bar by adding custom icons. In this example, the application being launched is MS Word. First, create an icon for Word by copying the Word "W" into a Paint picture. Scale it to 24x24 Pels (Image-Attributes in Paint) and save it as a bmp in the your notesdataw32 directory. The icon should now be available in Notes-file-preferences-smarticon settings-available icons. Add the following code to the formula for the icon and you are in business. Please note that if the executable for your application is not in the system path and you have to explicitly enter the path in the code, remember that backslash characters must be entered as double backslashes ("c:\\program files\\office\\winword.exe" in the example). CODE: @Command ([Execute];"winword.exe") http://searchdomino.techtarget.com/tip/1,289483,sid4_gci757433,00.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ================================================= NEWLY POSTED ADMINISTRATOR TIPS: ================================================= We posted 9 new administrator tips last week. Thanks for your tips and keep them coming! ACL category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283820_alpD_idx0,00.html [1] Update ACL's on the server Address Book category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283821_alpD_idx0,00.html [1] Share a personal address book Database category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283822_alpD_idx0,00.html [1] Fast & easy mass replication [2] Statistics report Domino category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283824_alpD_idx0,00.html [1] Date/Time of created documents is incorrect Mail category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283826_alpD_idx0,00.html [1] Reply without attachments STMP category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283829_alpD_idx0,00.html [1] Load balancing relay hosts Server category: http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283832_alpD_idx0,00.html [1] Reduce NT CPU overhead [2] Server is not responding See all searchDomino administrator tips here: http://searchdomino.techtarget.com/tips/0,289484,sid4_tax283819,00.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ================================================= WIN SEPTEMBER'S TIP PRIZE: ================================================= Submit an administrator tip in September and you could win a Pen Cam Mini Digital Camera. This mini digital camera is no bigger than a cigar lighter; the Pen Cam is tiny but a mighty 5 inches tall. Take quality pictures with this sleek device. http://searchdomino.techtarget.com/tipsPrize/0,289492,sid4_prz764172_cts764173,00.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ================================================= FEATURED BOOK ================================================= White-Hat Security Arsenal: Tackling the Threats By Aviel Rubin Using a problem-oriented approach, Aviel Rubin walks you through everything from protecting against network threats to using credit cards on the Web. Each chapter begins with a problem statement, continues with a description of the threat, explains the technologies involved, and then offers solutions. Chapters conclude with one or more case studies, including information on secure remote access, protecting laptop data, configuring firewalls. http://www.digitalguru.com/DigitalGuru/product_detail.asp?catalog_name=Books&category_name=&product_id=0201711141&partner_id=60 ================================================= Disclaimer: Our tips services and online tips exchange are a way for you to learn from other IT professionals and share technical advice and expertise with your peers. Techtarget.com provides the infrastructure to facilitate this sharing of information. However, we can't guarantee the accuracy and validity of the material submitted. You agree that your use of the searchDomino.com tips services and your reliance on any questions, answers, information or other materials received through searchDomino.com will be at your own risk. ================================================= NOTIFY US WITH FEEDBACK ================================================= Send us your tips feedback! Cast your vote and send us your tips comments. If you have vital code information or other comments you'd like to add to one of our online tips, send your comments to [EMAIL PROTECTED], and we'll add your User Feedback to the online tip! ================================================= If you would like to sponsor this or any TechTarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] ================================================= If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://searchDomino.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
