Solved

Dialog list alias

Posted on 2006-07-10
7
518 Views
Last Modified: 2013-12-18
Most learned colleagues,

The field that I have a question about is an editable dialog list. One of the entries used to be called "ACL Request". Then it was requested that it be change to "ACL Rule Request". So I made "ACL Request" and alias of "ACL Rule Request". In the appropiate views I had the column formula @If(Categories = "ACL Request"; "ACL Rule Request"; Categories) so that the new entry would show up correctly.

Well now there is yet another request to change that entry to "Access Rule Request". Can I alias to 2 levels, that is "Access Rule Request" | "ACL Rule Request" | "ACL Request" and then change my formula to @If(Categories = "ACL Request"; "Access Rule Request"; Categories)? Or is there a better way to handle this?

Thank you.
0
Comment
Question by:notesrookie
  • 3
  • 3
7 Comments
 
LVL 18

Expert Comment

by:marilyng
ID: 17074333
I'm assuming these are hardcoded? that is in your formula you have:


ACL Rule Request
Another Entry
Entry 2

Rather than a reference to a shared field or dbcolumn lookup?
0
 

Author Comment

by:notesrookie
ID: 17074451
Yes, they are hardcoded. I know, I know, I should be using profile documents (i can hear sjef in my head) but I inherited this db so I need to make do for now. Thanks.
0
 
LVL 46

Accepted Solution

by:
Sjef Bosman earned 125 total points
ID: 17074676
Pssssst... This is the voice in your head: you don't need the 3rd alias in the form: the first one is shown on the screen and the alias is stored. The only modification is to the view column:
    @If(Categories = "ACL Request"; "Access Rule Request"; Categories)

Hm... Profile document. Not easy in this case, but can be done. The price is too high for a simple view, because it involves changing the view on-the-fly.
0
ScreenConnect 6.0 Free Trial

At ScreenConnect, partner feedback doesn't fall on deaf ears. We collected partner suggestions off of their virtual wish list and transformed them into one game-changing release: ScreenConnect 6.0. Explore all of the extras and enhancements for yourself!

 

Author Comment

by:notesrookie
ID: 17074873
Ahh, that's what I needed to know. As to profile documents, I'll still a little wary but I imagine if I had some time to read up on them, I be OK with them. I'll check out where my categroies appear and re-write the column formulas and get back to you.
0
 
LVL 18

Expert Comment

by:marilyng
ID: 17074998
I don't use profile documents for on the fly stuff, I use regular docs.  For inherited things I use a shared field at the top of the form, this way I only have to type it once.
0
 

Author Comment

by:notesrookie
ID: 17077381
Thank, sjef. That worked, of course. And to you, too, marilyng, for ideas that I will try to incorporate in future databases. But sjef answered my question and so I'm awarding him the points.
0
 
LVL 18

Expert Comment

by:marilyng
ID: 17077870
Not a problem!  :)
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I thought it will be a good idea to make a post as it will help in case someone else faces these issues. I trust this gives an idea how each entry in Notes.ini can mean a lot for the Domino Server to be functioning properly. This article discusses t…
IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question