SearchDomino.com
September 12, 2001
Admin Tip: All apps from Notes SmartIcons
================================================= 
Sponsored By:  CS Development, s.r.o.
================================================= 
Are you bored by hundreds of SINGLE-IS portal solutions? Try
"Better-Face of Notes"! Application Portal is an interface to ANY
data SOURCE in ANY Information Systems. Acting as a container for
DISTRIBUTED control, ADMINISTRATORS and DEVELOPERS will SAVE their
TIME. Personalization can be done using USER-PROFILES so that UI is
unique for EVERYONE or different, based on virtual teams. Download
fully working DEMO, now! 
http://ad.doubleclick.net/clk;3304599;5058249;r?http://portal.csdevelopment.cz/reklamauk

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
================================================= 
TITLE: All apps from Notes SmartIcons

This tip was submitted by Mike Andrews, a systems administator in
Richmond, British Columbia.

This tip allows clients to launch all applications from their Notes
SmartIcon bar by adding custom icons. In this example, the
application being launched is MS Word. First, create an icon for Word
by copying the Word "W" into a Paint picture. Scale it to 24x24 Pels
(Image-Attributes in Paint) and save it as a bmp in the your
notesdataw32 directory. The icon should now be available in
Notes-file-preferences-smarticon settings-available icons. Add the
following code to the formula for the icon and you are in business.

Please note that if the executable for your application is not in the
system path and you have to explicitly enter the path in the code,
remember that backslash characters must be entered as double
backslashes ("c:\\program files\\office\\winword.exe" in the
example).

CODE:
@Command ([Execute];"winword.exe")

http://searchdomino.techtarget.com/tip/1,289483,sid4_gci757433,00.html

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
================================================= 
NEWLY POSTED ADMINISTRATOR TIPS:  
================================================= 
We posted 9 new administrator tips last week. Thanks for your tips
and keep them coming!

ACL category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283820_alpD_idx0,00.html
[1] Update ACL's on the server

Address Book category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283821_alpD_idx0,00.html
[1] Share a personal address book

Database category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283822_alpD_idx0,00.html
[1] Fast & easy mass replication
[2] Statistics report

Domino category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283824_alpD_idx0,00.html
[1] Date/Time of created documents is incorrect

Mail category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283826_alpD_idx0,00.html
[1] Reply without attachments

STMP category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283829_alpD_idx0,00.html
[1] Load balancing relay hosts

Server category:
http://searchdomino.techtarget.com/tipsIndex/0,289482,sid4_tax283832_alpD_idx0,00.html
[1] Reduce NT CPU overhead
[2] Server is not responding

See all searchDomino administrator tips here:
http://searchdomino.techtarget.com/tips/0,289484,sid4_tax283819,00.html

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
================================================= 
WIN SEPTEMBER'S TIP PRIZE: 
================================================= 
Submit an administrator tip in September and you could win a Pen Cam
Mini Digital Camera.  This mini digital camera is no bigger than a
cigar lighter; the Pen Cam is tiny but a mighty 5 inches tall.  Take
quality pictures with this sleek device.

http://searchdomino.techtarget.com/tipsPrize/0,289492,sid4_prz764172_cts764173,00.html

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
================================================= 
FEATURED BOOK
================================================= 
White-Hat Security Arsenal: Tackling the Threats
By Aviel Rubin

Using a problem-oriented approach, Aviel Rubin walks you through
everything from protecting against network threats to using credit
cards on the Web. Each chapter begins with a problem statement,
continues with a description of the threat, explains the technologies
involved, and then offers solutions. Chapters conclude with one or
more case studies, including information on secure remote access,
protecting laptop data, configuring firewalls.

http://www.digitalguru.com/DigitalGuru/product_detail.asp?catalog_name=Books&category_name=&product_id=0201711141&partner_id=60

================================================= 
Disclaimer: Our tips services and online tips exchange are a way for
you to learn from other IT professionals and share technical advice
and expertise with your peers. Techtarget.com provides the
infrastructure to facilitate this sharing of information. However, we
can't guarantee the accuracy and validity of the material submitted.
You agree that your use of the searchDomino.com tips services and
your reliance on any questions, answers, information or other
materials received through searchDomino.com will be at your own risk.

================================================= 
NOTIFY US WITH FEEDBACK  
================================================= 
Send us your tips feedback! Cast your vote and send us your tips
comments.  If you have vital code information or other comments you'd
like to add to one of our online tips, send your comments to
[EMAIL PROTECTED], and we'll add your User Feedback to the
online tip!

================================================= 
If you would like to sponsor this or any TechTarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]

=================================================



If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchDomino.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to