My mom always told me that if something appears too good to be true, that it probably is. This statement holds true in many things, including programming in LotusScript. We have found a property within the NotesView class that appeared to be an easy way of determining what was needed, when actually, it was causing significant issues with processing time in Sherpa’s Mail Attender for Lotus Notes software.
When you are either traversing all of the folders/views within a database or have instantiated a NotesView explicitly, the only way to tell if you have a handle to a folder or a view, is to check the IsFolder property. This appears to be a very harmless property, but that couldn’t be further from the truth. Even if you set the AutoUpdate property to false before checking the IsFolder property, Domino will index that folder/view when you check the IsFolder. If the database is small, this is of little significance, however, if the database is larger (e.g. 1 GB), this can result in waiting for the index to be built. This also costs the server a tremendous amount of I/O time, as well as using additional storage to hold the folder/view indexes.
For this month’s Off the Topic article, we will explore the interesting history behind the Kentucky Derby, with help from NewsDay and HorseRacingNation.com. Why now? Because (as you’ll read below) the first Kentucky Derby took place in the month of May back in 1875 and now the event occurs every year during the first weekend of May. Congratulations to Orb, the 2013 Kentucky Derby winner! Enjoy!
1) The Derby debuted in 1875. Its model was the Epsom Derby, a 1½-mile grass race that has been run in England since 1780.
2) The idea for the Kentucky Derby was conceived by explorer Meriwether Lewis. In fact, the land where it is run was donated by his relatives, the Churchills – thus the name “Churchill Downs.”
3) Since 1946, it’s been run on the first Saturday in May.
Sherpa Software’s “Approach” to 2013 and beyond is to become a Complete Solutions Provider for our customers, to more accurately align with their changing needs. Our plan is to enhance and extend our current offerings around consulting, configuration, training, customization, and other services (such as our new hosted information management platform called “Attender Online”) in our specific areas of expertise. These areas include email management, e-Discovery, PST migration and management, archiving, and compliance. Our focus on providing a complete information governance solution ensures the effective and efficient use of information in support of our customers’ goals. Sherpa will combine products and services into solution packages that fall into three broad categories:
1) Product Services
2) Professional Services
3) Partner Services
Read more below…
One of the most popular features of Mail Attender is its ability to set a Quota on a mail file. Right away you might be asking, “Why would I want to buy this when I can use the quotas that are already in Domino,” and that’s a good question. Domino already provides the ability to set both warning and a lockout quota on the mail file. But, as you may have already experienced, this functionality is very limited. It requires a lot of configuration to make it work and even then, it’s still very limited.
So let’s start by asking a few questions and if you answer yes to any of the following needs, then Mail Attender quotas are for you.
The following is part three of a fictional story, based on a true-to-life situation. (Part one is available here. Or check out part two here.) The names of companies and people are fictitious, but the situations they face are the same as those faced by many companies. Perhaps, as you read the events unfolding at Gensui Imaging, you will see similarities to the challenges you face as well as ways to meet them.
Cryptography, or the practice of encrypting or disguising private messages/information, has deep roots. So deep in fact that they trace all the way back to 1900 BC. It’s easy to think that the ways in which your computer’s information is protected aren’t that big of a deal, but it’s been a long journey getting the world to this point. While a number of our day-to-day computer-related activities touch cryptography in one way or another, we seldom stop to think about just how it is that our information is protected. We take for granted the great technological advancements that history has brought cryptography, forgetting that we used to disguise messages via quill and ink. Let’s take a few minutes to explore the history of message concealment and cryptography, so we can appreciate how far we’ve come.
The most basic manifestation of message concealment came in the form of mere pen on paper. Since most individuals could not read, even perfectly legible transcriptions were nothing more than jumbles of graphemes.