News

News

  • October 28, 2014 28 Oct'14

    IBM patches several Java vulnerabilities in Notes and Domino

    The IBM patches address several Java vulnerabilities, some of which were rated as severe, in the company's Notes and Domino platforms.

  • December 30, 2009 30 Dec'09

    Looking back at IBM Lotus in 2009 and ahead to 2010

    IBM Lotus made several important technological strides in 2009, but what's in store for 2010?

  • December 04, 2008 04 Dec'08

    Getting ready for Lotusphere 2009

    Here's a look at all that IBM Lotusphere 2009, in Orlando, Fla., has to offer. Geared toward Lotus Notes/Domino administrators and developers, Lotusphere 2009 has numerous tracks and sessions to help you further your Notes/Domino knowledge and gives...

  • June 26, 2008 26 Jun'08

    Exploring Lotus Notes Domino 8.0.1 and beyond

    Learn about some significant new features in IBM's Lotus Notes 8.0.1 release, such as Traveler and MyWidgets, and how they add to the previous 8.0 experience.

  • May 22, 2008 22 May'08

    Managing and maintaining mobile devices on Lotus Notes Domino

    Learn about some issues Lotus Notes Domino administrators may run into when deploying mobile devices in their organizations and thoughts on the future of Notes Domino mobility.

  • May 15, 2008 15 May'08

    Considerations for deploying mobile devices on Lotus Notes Domino

    Discover things you should consider when deploying mobile devices in your Lotus Notes Domino environment. This interview is available in text or audiocast format.

  • March 13, 2008 13 Mar'08

    A guided tour of the Lotus Notes Domino blogosphere

    Discover a handful of the best Lotus Notes Domino blogs on the Web that consistently deliver helpful tips for Domino administrators and developers.

  • January 28, 2008 28 Jan'08

    Developers mixed on direction of IBM Lotus R&D

    Some developers want IBM to focus on the Lotus Notes/Domino platform, while others at Lotusphere said the company's collaboration endeavors are dead on.

  • January 21, 2008 21 Jan'08

    IBM showcases Notes/Domino 8.5; new products at Lotusphere

    At Lotusphere 2008, IBM disclosed updates on Notes and Domino 8.5 and a mashup tool for end users.

  • January 17, 2008 17 Jan'08

    Looking forward, IBM Lotus needs back-end improvements

    At Lotusphere 2008, we'll hear about Lotus Notes and Domino 8.5 releases with more focus on the back end, performance and management capabilities, says Burton Group expert.

  • December 03, 2007 03 Dec'07

    Gearing up for Lotusphere 2008

    Get details about the tracks, sessions and keynotes taking place at this year's IBM Lotusphere 2008 conference in Orlando, Fla.

  • October 18, 2007 18 Oct'07

    WebSphere is a world of trouble, Domino readers say

    Find out what IBM WebSphere is and read about the challenges some Lotus Notes Domino shops are experiencing with their WebSphere implementations.

  • August 08, 2007 08 Aug'07

    IBM releases HR accelerator for SAP and WebSphere

    IBM releases a WebSphere accelerator that helps customers using SAP servers automate HR tasks.

  • May 10, 2007 10 May'07

    A coalescence of Domino admins and developers

    For the first time in the U.S., THE VIEW will hold its annual Admin and Lotus Developer events at the same time and in the same venue. An estimated 1,000 IT professionals are expected to attend the eighth annual Admin event.

  • April 18, 2007 18 Apr'07

    How to import an unlimited number of data records into Lotus Notes

    Here are step-by-step instructions for importing an unlimited amount of data records into Lotus Notes -- no programming experience required.

  • April 18, 2007 18 Apr'07

    How to import up to 65,000 data records into Lotus Notes

    Here are step-by-step instructions for importing up to 65,000 data records into Lotus Notes -- no programming experience required.

  • April 18, 2007 18 Apr'07

    How to import up to 8,000 data records into Lotus Notes

    Here are step-by-step instructions for importing up to 8,000 data records into Lotus Notes -- no programming experience required.

  • January 22, 2007 22 Jan'07

    IBM will add social networking tools for business

    If you like MySpace, you may have some interest in what Lotus has on tap for corporate customers.

  • January 12, 2007 12 Jan'07

    Lotusphere 2007 refocuses on users

    IBM offers a peek at the version 8.0 of Lotus Notes and Domino server coming later this year.

  • December 04, 2006 04 Dec'06

    The countdown to Lotusphere 2007 begins

    Lotusphere 2007 will be held in Orlando, Fla. from January 21 to January 25. Get the details on keynotes, session tracks and more.

  • October 26, 2006 26 Oct'06

    Mobility adds muscle to gym equipment vendor

    Gym equipment vendor, New England Fitness, boost productivity by deploying a handful of BlackBerrys linked to a Web-based work-order processing application.

  • October 26, 2006 26 Oct'06

    BlackBerry battles for mobility domination

    BlackBerry has been the heavyweight enterprise mobility champion for a long time now, but there are several new contenders entering the ring looking to slug it out for the title.

  • October 19, 2006 19 Oct'06

    E-discovery rules double-edged sword for CIOs

    The new rules regarding electronic discovery show a growing appreciation for the vastness and value of electronically stored data. But don't expect them to make your job easier.

  • October 19, 2006 19 Oct'06

    IM, blogs next target for litigation

    In litigation, email is still the No. 1 target of subpoenas for electronic records. But IMs and blogs are easily targeted, too, and need attention.

  • October 18, 2006 18 Oct'06

    Phishing: A whale of a problem for enterprises

    Phishing is no longer just a consumer problem, say experts. The scams are hurting companies' reputations and bottom lines.

  • October 18, 2006 18 Oct'06

    Three ways phishers are hooking you

    Researchers say the bad guys are getting a lot better at catching users on the phishing hook. Three methods are of particular concern.

  • October 17, 2006 17 Oct'06

    Latest Ajax tools from Nexaweb target SOA, Web 2.0

    Nexaweb's new Universal Client Framework aims at corporate developers building Ajax-fronted Web services applications.

  • October 12, 2006 12 Oct'06

    New phishing threat outpaces Netsky-P

    A new phishing threat targeting clients of a German-based bank is surpassing global detections of the prolific Netsky-P malware.

  • October 06, 2006 06 Oct'06

    PhishTank casts its net for malicious email

    PhishTank, a new information clearinghouse for phishing attack data, not only archives suspected and confirmed phishing emails, but also enables contributors to submit and access data.

  • September 28, 2006 28 Sep'06

    BlackBerry Pearl and other slick devices bring new challenges

    BlackBerry this week unveiled its Pearl, a slick handheld that makes older BlackBerrys appear clunky and antiquated. What can mobile managers expect as these hot new devices infiltrate the market and eventually the enterprise?

  • September 26, 2006 26 Sep'06

    Unsecured devices worry IT professionals

    IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.

  • September 14, 2006 14 Sep'06

    SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.

  • September 07, 2006 07 Sep'06

    Mobile workers push for smartphones

    Road warriors may prefer smartphones over laptops and PDAs, but equipping your entire mobile workforce with this nifty tool may not be such a great idea.

  • August 31, 2006 31 Aug'06

    Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.

  • August 25, 2006 25 Aug'06

    Symantec peddles enterprise vault tool

    The new Enterprise Vault software contains features developed because of a recent update to the Federal Rules of Civil Procedure.

  • August 22, 2006 22 Aug'06

    McAfee sued for patent infringement

    DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.

  • August 17, 2006 17 Aug'06

    Mobile Platforms: Palm OS -- not the best for the multitasker

    Mobile managers face a tough choice when weighing which mobile platform or operating system to deploy. We've assembled a team of experts and asked them to weigh the good and bad of each mobile platform to help you choose the one that's right for ...

  • August 17, 2006 17 Aug'06

    Mobile security starts with policy

    Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

  • August 17, 2006 17 Aug'06

    BlackBerry vulnerability, mobile viruses are real threats

    At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.

    That, ...

  • August 17, 2006 17 Aug'06

    Sun exec says Java ME release will push Java-Linux meld

    Sun's VP Rich Green talks about the pending software release from Sun that he thinks will result in more innovative applications on open source platforms.

  • August 17, 2006 17 Aug'06

    Antivirus researcher Gullotto leaves Symantec for Microsoft

    One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.

  • August 10, 2006 10 Aug'06

    Compliance software essentials: Build a technology toolbox

    There's really no one technology answer for regulatory compliance. Companies need a variety of tools to effectively meet the requirements of regulations such as Sarbanes-Oxley.

  • August 07, 2006 07 Aug'06

    Ajax threats worry researchers

    Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.

  • August 04, 2006 04 Aug'06

    Image-based spam scams on the rise

    By using images instead of text, spammers are invading your inbox with a lot more than offensive language. Not only are the emails vulgar and invasive, but they're also creating huge storage and bandwidth problems.

  • August 03, 2006 03 Aug'06

    Image spam paints a troubling picture

    Vendors say as many as one in four spam messages are now image-based, as attackers more commonly use hard-to-detect .jpg and .gif image files to bypass spam filters.

  • August 03, 2006 03 Aug'06

    Symantec: Searching for a strategy?

    After phasing out some appliances and watching EMC reel in RSA, some say Symantec is strategically adrift. To correct its course, experts say it must satisfy the demand for better product integration.

  • August 03, 2006 03 Aug'06

    McAfee products vulnerable to code execution flaw

    VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw.

  • July 20, 2006 20 Jul'06

    BlackBerry hosted server feeds SMB mobile email hunger

    BlackBerry maker RIM announced a hosted mobile email server, but some experts are wondering whether it makes sense to have hosted mobile email with an on-site email server.

  • July 17, 2006 17 Jul'06

    Symantec says enterprises failing to secure instant messaging

    Results of a recent Symantec survey suggest that nearly three out of every five organizations have not secured their instant messaging applications.

  • July 13, 2006 13 Jul'06

    New chapter and verse on Ajax security

    The increased use of Ajax has brought to the forefront concern about its security. Recognizing that this is an issue, the Open Web Application Security Project (OWASP) is updating its Guide to Building Secure Web Applications to include a separate ...

  • June 29, 2006 29 Jun'06

    Lotus Domino email archiving strategies and practices

    Notes/Domino expert Kevin Marshall teaches a step-by-step plan and strategy for implementing an email archiving and message retention system for a Notes/Domino environment.

  • June 29, 2006 29 Jun'06

    School district hooks up affordable compliance archive

    A Texas school district connected its email system to archiving software and DVD jukeboxes, avoiding a cost and management hassle.

  • June 22, 2006 22 Jun'06

    SMS vs. mobile email: Which is the 'killer app'?

    SMS -- yes, what your kids call text messaging -- is widely used in the enterprise. But can SMS surpass mobile email?

  • June 14, 2006 14 Jun'06

    JavaScript worm spreads through Yahoo Mail

    JS.Yamanner manages to propagate when end-users view a malicious email. A fix is pending, but other Web applications using JavaScript may soon be affected.

  • June 08, 2006 08 Jun'06

    Related links on Lotus Domino server spam prevention

    Here's a collection of resources to learn more about spam prevention for your Lotus Domino server.

  • June 08, 2006 08 Jun'06

    How to remove your Lotus Domino server from spam blacklists

    Learn about the measure you can take to get your Lotus Domino server removed from spam blacklists.

  • June 08, 2006 08 Jun'06

    How your Lotus Domino server can get blacklisted

    Learn about the different ways that your Lotus Domino server can get blacklisted.

  • June 08, 2006 08 Jun'06

    Who, or what, is reading your email?

    According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email.

  • June 01, 2006 01 Jun'06

    Mainsoft enables .NET applications to run on WebSphere Portal

    Mainsoft has released a new version of Visual MainWin for J2EE, which allows .NET applications to be transferred into Java bytecode that can then be deployed on WebSphere Portal.

  • May 31, 2006 31 May'06

    App security tools target Ajax vulnerabilities

    Security vendor Cenzic adds Ajax testing capability to its automated vulnerability assessment offerings, while Denim Group releases an open-source vulnerability scanner.

  • May 25, 2006 25 May'06

    Spammers hijack authentication mechanisms to send malware

    Content filtering provider AppRiver reports an attack gaining momentum by using trusted systems to push malware before anyone notices.

  • May 24, 2006 24 May'06

    Email archiving: What's right for your enterprise?

    There is a growing need to archive email data, and today there are several ways to do it. Stop to consider what would work best for your enterprise.There is a growing need to archive email data, and today there are several ways to do it. Stop to ...

  • May 22, 2006 22 May'06

    Email archiving: Should storage pros keep everything?

    From conniving lawyers to dodgy tape practices, here are some of the juicy tidbits we heard on the show floor and during sessions at Storage Decisions.

  • May 18, 2006 18 May'06

    BlackBerry extends mobile applications without e-mail

    BlackBerry maker Research In Motion Ltd. has a new server that pushes out MDS applications independently of e-mail.

  • May 17, 2006 17 May'06

    With Microsoft's Atlas toolkit, no wait for Ajax controls

    With two releases in the last month, the Atlas Control Toolkit is giving developers Ajax controls for ASP.NET apps long before Atlas is due for release. Soon developers will be able to submit their own controls as well.

  • May 15, 2006 15 May'06

    Symantec taps Dell to fix e-mail archiving support

    Admitting that its support for Enterprise Vault has been a problem, Symantec plans to lean on Dell to sell and support the software worldwide.

  • May 09, 2006 09 May'06

    Mobile device trends: Security, consolidation and more

    In a recent report, J.Gold Associates outlined the direction in which mobile devices will be heading in 2007 and 2008. Security is high on the list, while other trends such as consolidation and multi-modal user interfaces start generating some real ...

  • April 26, 2006 26 Apr'06

    Virus onslaught sickens smartphones

    Mobile viruses are still somewhat of an unknown. They're out there, but they've only just begun. What are they, what do they do, and what can you do for protection?

  • April 21, 2006 21 Apr'06

    Study: SOX-compliant firms see drop in costs in year 2

    According to a new report, companies following Section 404 of the Sarbanes-Oxley Act will see a decline in compliance costs in their second year. However, experts say IT spending on SOX compliance in general will continue to grow.

  • April 21, 2006 21 Apr'06

    Research shows smarter phishing

    Recent threat reports all suggest a steady increase in the aggressiveness and sophistication of phishing attacks, and bank customers are still a top target.

  • April 19, 2006 19 Apr'06

    What the new Office means for developers

    Visual Studio Tools for Office lets developers customize Office documents and applications. Once Office 2007 comes out, the UI Ribbon can get a new look, too.

  • April 18, 2006 18 Apr'06

    Report: IM, P2P threats on the rise

    Research shows a steady increase in threats that target unauthorized IM and peer-to-peer applications. Worse yet, most IT departments have no way of knowing the threats exist.

  • April 18, 2006 18 Apr'06

    Law firm picks Palm Treos over BlackBerry 'pancakes'

    A Houston law firm wanted devices that could do it all but were also nice and compact. After rigorous testing, the firm chose Palm Treo smartphones over BlackBerrys.

  • March 30, 2006 30 Mar'06

    Special Report: How much is that SOA in the window?, part 1

    The confluence of two major movements in the software industry is promising to cause a change in how vendors make money on technology, and how customers spend money on technology.

  • March 29, 2006 29 Mar'06

    Java developers can't afford to ignore app security

    For many Java developers, application security has not been an issue they've wanted to address. That changed last week as a panel of application security experts tackled the subject at TheServerSide Java Symposium in Las Vegas. The panel's message ...

  • March 23, 2006 23 Mar'06

    Harvesting email addresses and phishing

    Learn tools and techniques phishers use to harvest your email address to spam you.

  • March 23, 2006 23 Mar'06

    Phishing and email basics

    Here's an introduction to phishing, email basics and how email headers are recognized.

  • March 23, 2006 23 Mar'06

    Open relays, proxy servers and phishing

    Learn how phishers take advantage of open relays, combined with proxy servers to hide their IP addresses.

  • March 23, 2006 23 Mar'06

    Fighting phishing with spam filters

    Learn about using spam filters to fight phishers and spam.

  • March 23, 2006 23 Mar'06

    Forging headers and phishing

    Learn how phishers forge headers and how the new headers are allowed to get to your inbox.

  • March 23, 2006 23 Mar'06

    Sending spam and phishing; Tools of the trade

    Learn about the tools phishers use to send phish email to their victims.

  • March 23, 2006 23 Mar'06

    Anonymous email and phishing

    Learn how phishers forge headers to send you anonymous email

  • March 23, 2006 23 Mar'06

    Phishing and the mail delivery process

    Learn how phishers can manipulate the mail delivery process with this tip.

  • March 23, 2006 23 Mar'06

    Proxy chaining, onion routing, mixnets and phishing

    Learn how phishers use proxy chaining, onion routing and mixnets to falsify their IP addresses to send you anonymous email.

  • March 23, 2006 23 Mar'06

    Phishers, hackers and insiders

    Learn the risks you're facing as phishers use inside tactics to access your private information.

  • February 15, 2006 15 Feb'06

    Ajax development: The what, how and when

    The Ajax tool market remains plentiful. Before jumping on the bandwagon, make sure the technology is right for your application and your users, a Burton Group report concludes.

  • February 15, 2006 15 Feb'06

    Tibco sets its Ajax free

    Tibco's latest version of its General Interface Ajax and rich Internet application studio software will be available for a free license for public deployments, keeping in step with the hot, but inexpensive Ajax market.

  • February 01, 2006 01 Feb'06

    Ajax alert raises security, scalability issues

    XML security vendor Forum Systems wants to get developers thinking about potential vulnerabilities and performance hits with Ajax-style applications.

  • January 30, 2006 30 Jan'06

    IBM redesigns, renames iSeries for SMBs

    IBM's iSeries product line is reincarnated as System i5 and aimed straight at small and midsized shops.

  • January 19, 2006 19 Jan'06

    Incorporation of security in development lifecycle a sea change

    Top security expert Howard Schmidt has viewed IT security from nearly every angle -- from the private sector at eBay and Microsoft, where he co-founded Microsoft's Trustworthy Computer Security Strategies Group, and from the government side, where ...

  • January 08, 2006 08 Jan'06

    Revelations from a reformed spammer

    Continuing from part one of this two-part article, Spammer-X, reformed spammer and author of the book Inside the Spam Cartel, answers ...

  • December 22, 2005 22 Dec'05

    Compliance gets more expensive for IT budgets

    New study shows IT spending has increased in order to keep pace with the growing demands of Sarbanes-Oxley and other regulations. Analysts predict that this may lead to the canceling of other projects.

  • December 21, 2005 21 Dec'05

    Compliance gets more expensive for IT budgets

    New study shows IT spending has increased in order to keep pace with the growing demands of Sarbanes-Oxley and other regulations. Analysts predict that this may lead to the canceling of other projects.

  • December 09, 2005 09 Dec'05

    Ajax hype vs. reality

    Ajax is a powerful rich Internet application technology, but Burton Group cautions against overkill and notes that tools and frameworks for using it are nascent.

  • December 09, 2005 09 Dec'05

    Top tips to control storage budgets in '06

    With capacities spiraling upward and budgets barely meeting inflation, analysts offer some tips to help storage managers stretch every dollar.

  • December 09, 2005 09 Dec'05

    Experts: Don't deploy BlackBerry

    Uncertainty about BlackBerry prompted Gartner to warn users not to deploy the technology. But alternatives could also come under fire, with RIM partners getting hit hardest.

  • December 08, 2005 08 Dec'05

    Changing access levels on your Lotus Domino server

    Learn about changing access levels on your Lotus Domino server.

  • December 08, 2005 08 Dec'05

    Implementing directories on your Lotus Domino server

    Learn about the different kinds of directories you can implement on your Lotus Domino server.

  • December 08, 2005 08 Dec'05

    Setting up authentications on your Lotus Domino server

    Learn the steps you'll need to take to authenticate your Lotus Domino server through digital certificates.

  • December 08, 2005 08 Dec'05

    Recertifying a Lotus Domino server ID

    Learn about the steps to follow and the access levels needed to recertify a Lotus Domino server ID.

-ADS BY GOOGLE

SearchWindowsServer

Search400

  • iSeries tutorials

    Search400.com's tutorials provide in-depth information on the iSeries. Our iSeries tutorials address areas you need to know about...

  • V6R1 upgrade planning checklist

    When upgrading to V6R1, make sure your software will be supported, your programs will function and the correct PTFs have been ...

  • Connecting multiple iSeries systems through DDM

    Working with databases over multiple iSeries systems can be simple when remotely connecting logical partitions with distributed ...

SearchDataCenter

SearchContentManagement

Close