Lotus Domino Implementation and Development: Infrastructure ? Present and Future

Domino server is a buffer between the operation system and the application. On the other hand Domino server ? consists of the services which support development processing and executing of dynamic, secure applications for Internet, Intranet, or Extranet. Domino server role is to provide functionality both: within and between Domino-applications. Domino services interpret codes and elements of application and execute them over actual operation system. Each service is specially optimized for its specific role when Domino is activated for effective functioning of the whole application.

As far as the application interacting with services, and them in their turn ? with operation system - Domino applications are transferable or platform independent. There are two categories of Domino services: applied and system. Applied services provide functional size to the application. Any application needs user authorization mechanisms, agents execution, views indexing, etc. Considering above mention, such the services are named applied services.

System services provide functionality allowing the applications work in the environment. Domino Catalog keeps information about users and dedicates paths connection between applications. Routing enables applications interconnection. Replication provides applications data synchronization. Notes Client working with local database (without Domino server) performs dedicated Domino services itself, and so brings Domino functions locally, easing up the server workload. Notes Client does not support the same level of limitation and security as the server does.

Domino applications are client-server applications. Client connects with an application using its own mechanism for procedures call - Notes Remote Procedure Call (NRPC), which transfers client request to Domino application, and returns results.

Domino also supports HTTP protocol, which allows Web browsers access to the applications located on Domino server.

Besides Notes Client and Web browsers Domino supports other clients with additional communication protocols: email clients by SMTP, POP3 and IMAP protocols; operation with news conferences by NNTP protocol; operation with catalogs services by LDAP protocol; also Domino can interact with other applications via OLE and COM technologies, playing both: client and server roles.

Domino databases exist in the form of local files and server-side. Domino database has two areas of functional facilities:

? Notes Storage Facility (NSF) ? supports data and design elements of application. Storage facility has notes, which represent data container. Different type of notes allows execute special functions inside database;

? Notes Index Facility (NIF) ? design and support lists for data location in application. These sorted lists named views. Records in Domino database can be created by users (data note type), developers (design note type), and Domino itself, which is utilized for monitoring and controlling the information in database (e.g. ACL, database header).

In principal, all database records are the same (by characteristics). They are on the same level and not divided by hierarchical or by other relation. Records are different only by keeping data and how Domino uses them. Records are kept in items. Each item is identified by name and keeps value list. Value in one item (if it is a list) is to have the same data type. Items as well keep information for kept data type. This metadata is available for applications and Domino services. Records can keep three main data types: Rich text, Text (plain text) and Number (Domino keeps value of date/time data as numbers.

Domino provides access to data note by different cases including: form fields, columns in view, program codes in @-formulas, LotusScript, JavaScript and Java. Besides mentioned above four inbuilt program languages, Domino supports extern program codes on Java, C and C++, Visual Basic.

Described here picture corresponds up to Domino R6 version. In R7, which exists now as beta-version, to keep data DB2 also may be used, as well as traditional NSF mechanism. In this case all notes of Domino database keep in relation DB2 tables which keeping scheme is optimized specially for Domino. Thus, tasks which actually can not be done or execute slowly will be available for operation. These tasks are: keeping of huge data volumes, clearance Domino data for external applications, speeding views executing (this possibility as IBM announces will be realized in the latest R7 versions).

In beta version using of DB2 is possible only for local (not server's) databases, but it is already the step ahead. Before top IBM managers said that in Domino never will be realized the block records mechanism. In R6 this mechanism is already realized. Possible in later versions of Domino R7 the two-phases transaction mechanism will be implemented, why not?

Good luck in your system setting up and contact us for any help in USA: 1-866-528-0577! help@albaspectrum.com

P.Gottmann is a technical writer in Ronix Systems ( help@albaspectrum.com ) the European branch of Alba Spectrum Technologies ( help@albaspectrum.com ), IBM and Microsoft Business Solutions Partner, serving clients in Chicago, Miami, New York, Los Angeles, San Francisco, Denver, Phoenix, Houston, Atlanta, Germany, UK, Australia, South Africa, Brazil, Moscow

shuttle from O'Hare Bingham .. Lockport Chicago limo O’Hare
In The News:

Attackers use caller ID spoofing and AI voices to steal money. Tech expert Kurt “CyberGuy" Knutsson provides seven ways to protect yourself.
Tech expert Kurt “CyberGuy" Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions.
Tech expert Kurt “CyberGuy" Knutsson helps you ensure a smooth online experience with a reliable, secure home network setup.
Kurt “CyberGuy" Knutsson talks about Vollebak’s Shielding Suit, which blocks EM radiation, infrared and tracking for privacy.
Even Apple products are vulnerable to cybercriminals, and a new report suggests the owners of Mac products will have to be more vigilant this year.
An inflatable six-person tiny house from a firm called 2001 looks like a space station with its inflatable dome that is transportable and eco-friendly.
Scams cost Americans an estimated $159 billion every year and average about $3,500 in losses per victim. The CyberGuy has advice to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Zeekr and Waymo are joining forces for the world's first mass-produced autonomous vehicle, combining an electric vehicle with self-driving technology.
A humanoid robot training center has opened in Shanghai, a big step in China's efforts to become a global leader in robotics and artificial intelligence.
Security experts have discovered that hackers are targeting apps on the App Store to spread malware that steals information from saved screenshots.
A new luxury SUV combines military-inspired design and high-end luxury transportation and includes two military-grade gas masks to protect against chemical warfare.
80% of stalking victims are tracked using tech. GPS trackers, like AirTags, are among the most popular ways to do it. Here's how to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains how to protect yourself against artificial intelligence-fueled romance scams, which have become the most common type of fraud in 2025.
Kurt "CyberGuy" Knutsson explains the steps to declutter text messages on a Mac or iPad. Apple offers ways to do this more efficiently.
Here's how to take control of the algorithms on Facebook, YouTube, Instagram and TikTok if your social media feeds aren't showing you content you want to see.
Beware of iCloud scams using urgent messages. Tech expert Kurt “CyberGuy" Knutsson helps you spot the red flags to protect yourself.
Travel abroad worry-free with these top translation apps for travelers. Tech expert Kurt “CyberGuy" Knutsson highlights some favorites.
The European Space Agency's Euclid space telescope was going through preliminary tests in September 2023 when it captured images of an Einstein Ring in a nearby galaxy.
Tech expert Kurt “CyberGuy" Knutsson says hackers are using Microsoft Teams for phishing, vishing and quishing via social engineering.
Red light camera tickets: Not liable to ID the driver; some are fishing expeditions. Tech expert Kurt “CyberGuy" Knutsson helps you fight back against tricky fake tickets.
The apps collecting the most data about you are among the most widely used. Kurt the CyberGuy takes a look at 20 of these apps and how you can protect personal information.
AST SpaceMobile of Texas is developing the world's first global cellular broadband network that can connect directly to your smartphone without special equipment.
Community Health Center, a Connecticut-based healthcare provider, has disclosed a recent data breach affecting over 1 million people in the U.S.

Corporate Accounting System: Microsoft Great Plains ? Overview

Corporate ERP/MRP selection might be tough one, especially considering very... Read More

5 Time-Saving Tips in Microsoft Word

Whether you have used Microsoft Word for years, have just... Read More

Should I Use Windows Update?

Should one use Windows Update?This topic has good and valid... Read More

Selecting Corporate ERP: Microsoft Business Solutions Great Plains ? Estimation Parameters

As we could imagine, if you are reading this article... Read More

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

Programming Language Migration Path

While I was preparing some personal background information for a... Read More

Microsoft Business Solutions Customization Options - Overview for Programmer

Several years ago Microsoft purchased Great Plains Software, then Navision... Read More

Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of... Read More

Great Plains Customization Upgrade? Overview For CIO/IT Director

Around the same time Microsoft made its move with .Net... Read More

Microsoft Great Plains Distribution, Barcoding, Consignment ? overview for consultant

Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

Do You Know These Facts About Spyware ?

Imagine something that follows you home and sets itself up... Read More

Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

Software Tools To Help Your Business Sell More

Sales are all about leverage, because there is only so... Read More

5 Easy File Management Tips in Microsoft Word

How many steps does it take you to locate and... Read More

ERP Remote Support: Microsoft Great Plains Analysis ? Pluses & Minuses

Former Great Plains Software Dynamics/eEnterprise and currently Microsoft Business Solutions... Read More

Artificial Intelligence And Intuition

The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More

Software Piracy - Global Increase

Pirated software is on the increase and now accounts for... Read More

Where to Find Free Fleet Maintenance Software

Costs of fleet maintenance software can vary widely. It is... Read More

Microsoft Great Plains SOP: Sales Order Processing

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

Crystal Reports For Microsoft Navision - Overview For Programmer/IT Specialist

Let us give you - developer some hints in the... Read More

Causes of ERP Failures

ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More

Implementing Microsoft CRM: setup and configuration ? notes for IT specialist

Microsoft Business Solutions CRM is web-based CRM application, deploying all... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Programming Environments And The Software Production Process

Introduction: The creating of a computer program involves a number... Read More

Mishawaka limo O'Hare ..