News

News

  • July 15, 2004 15 Jul'04

    Java applet flaws found in Notes

    A consultant has discovered three Java applet flaws in Lotus Notes that could expose sensitive data. IBM has not yet offered fixes, but Notes users can stay secure by disabling Java applets.

  • July 13, 2004 13 Jul'04

    Domino downsized: Express edition courts SMBs

    The new Domino Messaging Express is intended for SMBs and comes with a discount for those dumping Exchange. An expert says it's more proof that Domino and the messaging market have a long life ahead.

  • July 08, 2004 08 Jul'04

    Lotus Workplace: The next Notes?

    Over the years, the IBM/Lotus product strategy has undergone a roller coaster worth of twists and turns (remember Rnext,

  • July 05, 2004 05 Jul'04

    SearchDomino.com members speak out!

    When we published our editors' and experts' favorite Web sites earlier this month, members reacted with a mixed feelings. So we asked to hear from you.

  • June 29, 2004 29 Jun'04

    Enterprise IM vendors in mad scramble

    ISVs are courting customers with incentives to grab market share following the departure of AOL and Yahoo from the market for enterprise-grade instant messaging technology.

  • Sponsored News

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    • Improve Security with Managed File Transfer

      File transfer is one of the vital functions of B2B collaboration. Organizations require safe, secure and compliant file transfer in order to drive revenue, satisfy customer requirements and enable effective collaboration across the entire B2B value chain. See More

    • Leveraging Cloud Models to Simplify B2B Collaboration

      Reducing complexity in managing business-to-business integration is one of the primary challenges for IT teams. With the growth of the Internet of Things (IoT), social networking and big data analytics, the need to simplify partner interactions and automate processes is becoming more critical than ever. By simplifying B2B collaboration, IT can reduce costs, enhance partner and customer experiences, and leverage real-time visibility and analytics to drive business innovation. See More

    View All Sponsored News
  • June 17, 2004 17 Jun'04

    E-mail archiving puzzles IT decision makers

    Most enterprises agree they can no longer simply dump old e-mail messages. Opinion varies, however, on just what to do with those mountains of messages.

  • June 08, 2004 08 Jun'04

    Domino developers ask: Why WebSphere?

    Experts say WebSphere can offer Domino shops a number of useful features and functions, but not every environment requires those extra capabilities.

  • May 21, 2004 21 May'04

    New and Notesworthy, May 2004

    Here's our roundup of announcements from the Domino community.

  • May 20, 2004 20 May'04

    RIM president hails scalability, partners

    CHICAGO -- Security was always the bugaboo that scared enterprises away from wireless data implementations. That changed in 1999, said Research In Motion (RIM) Ltd. president and co-CEO Mike Lazaridis, when his company launched the first iteration ...

  • May 20, 2004 20 May'04

    Get control of your access control lists, part 2

    Continuing from part one of this two-part series, Chuck Connell answers more ACL questions from SearchDomino.com members.

  • May 20, 2004 20 May'04

    Get control of your access control lists

    This two-part Q&A article offers a plethora of access control list (ACL) advice from our resident security and administration expert Chuck Connell. From ...

  • May 13, 2004 13 May'04

    Don't let email be your Achilles' heel

    An email policy expert offers advice on how to limit messaging system vulnerabilities without breaking the bank.

  • May 12, 2004 12 May'04

    E-mail policies save face, lawsuits

    Companies that don't have a sound e-mail policy open themselves up to potential lawsuits and public embarrassment. An expert offers insight on what your organization's plan should include.

  • May 11, 2004 11 May'04

    News from Enterprise Messaging Decisions 2004

    Check here for a wrap-up of Enterprise Messaging Decisions 2004, including coverage of sessions featuring Lotus Notes creator Ray Ozzie and noted anti-spam and e-mail policy experts.

  • May 11, 2004 11 May'04

    Spam fighter shares battle plan

    The man who wrote the book on fighting spam said some of today's popular techniques work quite well, but others don't do the job.

  • -ADS BY GOOGLE

    SearchWindowsServer

    Search400

    • iSeries tutorials

      Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

    • V6R1 upgrade planning checklist

      When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

    • Connecting multiple iSeries systems through DDM

      Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

    SearchEnterpriseLinux

    SearchDataCenter

    SearchExchange

    SearchContentManagement

    Close