Replacing a database design with a template

Posted on 2005-05-17
Last Modified: 2013-12-18
Is there a way to replace the design of multiple databases with a template - WITHOUT inheriting the design using Database - Properties.  

The infrastructure team here refuse to allow databases to inherit their design from a template - so can it be done with LotusScript?
Question by:androgyny7
    LVL 46

    Expert Comment

    by:Sjef Bosman
    What's the question behind it? Why do you want it to inherit changes?

    By the way, if you select File/Database/Replace Design, you have the option to deselect "Inherit future design changes". If you do that, the database design will not be refreshed automatically.
    LVL 31

    Accepted Solution

    Using nornal scirpting methods, no, you can't.  You'd have to build a complex API program, and that really is not going to happen.

    What you have here is a conflict between:
        - an infrastructure rule that has a business basis of (most likely) risk/safety
        - a business requirement whose basis is avoiding the drudgery of a) keeping track of the related databases b) updating each manually

    So, the first question is, can you and they discuss this rationally?
    Next, who has a stronger business case?
    Next, who has more political mojo?
    Next, what can you do to alleviate their concerns?

    Author Comment

    Thanks qwaletee.

    What happens in this situation where the infrastructure team says no! :)  If you want to upgrade everyone's mail file for example - is this now a manual process??
    LVL 46

    Expert Comment

    by:Sjef Bosman
    So you're in a no - yes situation? They won't give in a little?

    Follow Qwaletee's 4-stage approach: try some rationality. You built your case, I take it it's a strong one, but can they give any sound reason why they say "no"? So not some statement "policies forbid it", but can they explain why, also pertaining to this case? What are their worries?

    PS Read my profile...

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    For Desktop Techs: How to retain a user's Notes configuration data when swapping out the end user's computer. (Assuming that you are not upgrading to a completely different version of Notes client) All you need to do is: 1) install Notes o…
    You’ve got a lotus Domino web server, and you have been told that “leverage browser caching” is a must do. This means that we have to tell the browser everywhere in the web to use cache. In other words, we set (and send) an expiration date in the HT…
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    758 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now