Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the Web, and the server itself becomes a HTTP-server. The next releases of Domino Web-server add new functionality (for example servlet managers, supported JVM versions upgrade, etc). To give you general picture and abstracting from details we'll talk about two major Domino Web-server functions:

1. Domino Web-server is the full-featured HTTP-server. In other words, it can provide static (or conditionally static) files as the reply to HTTP-browser's requests (including HTML, image, JavaScript, applets, etc);

2. During the browser's requests to Domino dynamic resources by specific URL, the server can create in passing HTML-pages, making the Domino object visible.

For sure, it is reasonably simplified model (we mentioned that, for example, Domino Web-server supports servlet technology), but this model allows to discuss the major issues in creation of Web-applications based on Lotus Domino technology. Following the major problems are:

? in Domino-based Web-applications creation developer is strongly limited to use built-in program languages' possibilities. Thus, from 380 inbuilt @-commands of @-formulas language nearly 40 are supported in Web. LotusScript is supported only in three types of Web-agents, etc;

? application security problems. The standard authentication, authorization, coding, digital signatures, etc. mechanisms are simplified in Web or do not work. So SSL + x.509, etc. certificates are to be used in such cases;

? applications efficiency. HTML-pages generation in passing surely takes the server resources, so if the application is poorly constructed, it may cause the server failure. For example, if the first page of the site is generated by an agent, then concurrent request from rather big number of users may cause the service failure situation. Developers are to take care themselves for loading balance putting into different parts often changed and more static data;

? result of HTML-pages generation in passing from Domino resources is not every time obvious. Often such a procedure issues appearance in generated page ?additional? by developer point of view tags (for ex.,

,
,

    , etc). As a consequence, most developers put on Domino only those features which can not implement themselves. If look through the codes of full-blown Web-sites, designed on Domino technology, then, for example, in Domino forms we see only fields, all extern design is based on DHTML.

    It is not so bad. There are a lot of sites, supporting large number of users, accessing Domino data. Domino technology from release to release offers new possibilities for Web-design (for ex. JSP custom tag library, inbuilt HTML-editor, etc). The author himself used Domino to create portals with requests with more than 2000 visitors per a day. Summarizing the own and my colleagues experience in Domino Web-design field, I can recommend the following:

    ? Before creation of Web-project on Domino it is necessary to evaluate the whole Domino infrastructure in frame of concrete organization. If the Domino infrastructure at this company is on opening or initial stage, than Web-design based on Domino is hardly appropriated. The fact that Domino Designer is the environment for rapid application development (RAD), including Web- applications, can not be the reason to create Web-projects on Domino;

    ? as far as possible allowing to Domino transfer in passing only objects, which can not be or hardly implemented by using other Web-technologies (so-called HTML-design is to be developed by programmers). The author thinks that, if a site needs to operate with Domino data, then to view them it is necessary to avoid the use of standard URL working with Domino objects. In this case exchange of data between site and Domino can be done by using any integration technologies supported by Domino (ex., XML, CORBA, JDBC, etc). In other words, Domino will play a role of data storage and their viewing is to be done by other mechanisms. Implicitly, the issue is confirmed by IBM. In R6 Domino Don't allow URL open feature may be assigned to databases , so the usage of standard URL Domino is protected in Web-applications;

    ? attention needs to be paid to Web-application security. Even when your site does not allow non-authorized access to information via Internet, you can expect hackers out there challenging your web-site security;

    ? only the tested by loading technologies are to used in Web-applications;

    ? minimize as much as possible the traffic Web-server browser. In Web-design the issue is to be considered that Internet channels are usually narrower than local channels Domino Lotus.

    Good luck in your system setting up and contact us for any help in USA: 1-866-528-0577, Germany: (0177) 8349 806! help@albaspectrum.com

    P.Gottmann is a technical writer in Ronix Systems ( http://www.ronix-systems.com ) the European branch of Alba Spectrum Technologies ( http://www.ronix-systems.com ), IBM and Microsoft Business Solutions Partner, serving clients in Chicago, Miami, New York, Los Angeles, San Francisco, Denver, Phoenix, Houston, Atlanta, Germany, UK, Australia, South Africa, Brazil, Moscow.

    no-contract cleaning service Mundelein ..
    In The News:

    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
    FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
    New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
    OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
    Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
    New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
    DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
    Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
    Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
    Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
    A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
    South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.

Navision Sales Module & Reporting: Jet Reports, C/ODBC, XBRL, Business Analytics ? highlights

Microsoft bought Navision, Denmark based software development company, along with... Read More

String in Java

Handling character strings in Java is supported through two final... Read More

Things You Can Do With Windows XP!

Did you ever give a thought to the number of... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Microsoft Great Plains ? Licensing & Product Versions

Current Microsoft Business Solutions Great Plains has more that 10... Read More

Create ASP in Minutes

DBxtra goes ASPGetting to the information hidden within corporate databases... Read More

Microsoft Great Plains: Service Business Customization & Integration Example

Microsoft Business Solutions Great Plains might be considered as ERP... Read More

Recent Studies Show that 9 out of 10 PCs Are Infected with Spyware

Spyware and malware are large problems for Internet users today... Read More

How to Make Attractive and Effective PowerPoint Presentations

Microsoft PowerPoint has dramatically changed the way in which academic... Read More

Great Plains Dynamics/eEnterprise Upgrade ? Things to Consider and FAQ

If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More

ERP Consulting: Microsoft Great Plains Partner Future Directions

In the Clinton era the status quo was simple: you... Read More

Ukraine IT Myths Dispersed

While Ukraine is becoming a new popular IT outsourcing destination,... Read More

Dig Out That Worm

Internet worms. Is your PC infected?If your computer has become... Read More

Microsoft Great Plains Installation ? Overview for IT Director/Controller

Microsoft Great Plains is main mid-market application from Microsoft Business... Read More

Professional Software Icons For Your Standalone Application

User interfaces and accessibility are some of the most important... Read More

How to Upgrade Dexterity Customization ? Tips for IT Manager

If you have Microsoft Great Plains and support it... Read More

Unwanted Files

A LOT OF UNWANTED FILES.When you uninstall an item of... Read More

Implementing Microsoft CRM: setup and configuration ? notes for IT specialist

Microsoft Business Solutions CRM is web-based CRM application, deploying all... Read More

Fundraising Software ? How Can That Help Me?

Fundraising software lets you connect with donors in a way... Read More

Lowering The Risks In Developing Do-It-Yourself Software Projects

Mike Dunville* had a decision to make. As the new... Read More

How To Choose A Fire Wall Software Program

In the real world a "fire wall" is a fireproof... Read More

Great Plains Custom Development: Dexterity, VBA, SQL, Crystal, eConnect ? Overview For Programmer

Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Manufacturing Outsourcing: Microsoft Great Plains Implementation, Customization & Reporting

Manufacturing in the USA is far away down from mid... Read More

Microsoft Great Plains - Microsoft RMS Integration ? overview

Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More

maid service near Glenview ..