Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the Web, and the server itself becomes a HTTP-server. The next releases of Domino Web-server add new functionality (for example servlet managers, supported JVM versions upgrade, etc). To give you general picture and abstracting from details we'll talk about two major Domino Web-server functions:

1. Domino Web-server is the full-featured HTTP-server. In other words, it can provide static (or conditionally static) files as the reply to HTTP-browser's requests (including HTML, image, JavaScript, applets, etc);

2. During the browser's requests to Domino dynamic resources by specific URL, the server can create in passing HTML-pages, making the Domino object visible.

For sure, it is reasonably simplified model (we mentioned that, for example, Domino Web-server supports servlet technology), but this model allows to discuss the major issues in creation of Web-applications based on Lotus Domino technology. Following the major problems are:

? in Domino-based Web-applications creation developer is strongly limited to use built-in program languages' possibilities. Thus, from 380 inbuilt @-commands of @-formulas language nearly 40 are supported in Web. LotusScript is supported only in three types of Web-agents, etc;

? application security problems. The standard authentication, authorization, coding, digital signatures, etc. mechanisms are simplified in Web or do not work. So SSL + x.509, etc. certificates are to be used in such cases;

? applications efficiency. HTML-pages generation in passing surely takes the server resources, so if the application is poorly constructed, it may cause the server failure. For example, if the first page of the site is generated by an agent, then concurrent request from rather big number of users may cause the service failure situation. Developers are to take care themselves for loading balance putting into different parts often changed and more static data;

? result of HTML-pages generation in passing from Domino resources is not every time obvious. Often such a procedure issues appearance in generated page ?additional? by developer point of view tags (for ex.,

,
,

    , etc). As a consequence, most developers put on Domino only those features which can not implement themselves. If look through the codes of full-blown Web-sites, designed on Domino technology, then, for example, in Domino forms we see only fields, all extern design is based on DHTML.

    It is not so bad. There are a lot of sites, supporting large number of users, accessing Domino data. Domino technology from release to release offers new possibilities for Web-design (for ex. JSP custom tag library, inbuilt HTML-editor, etc). The author himself used Domino to create portals with requests with more than 2000 visitors per a day. Summarizing the own and my colleagues experience in Domino Web-design field, I can recommend the following:

    ? Before creation of Web-project on Domino it is necessary to evaluate the whole Domino infrastructure in frame of concrete organization. If the Domino infrastructure at this company is on opening or initial stage, than Web-design based on Domino is hardly appropriated. The fact that Domino Designer is the environment for rapid application development (RAD), including Web- applications, can not be the reason to create Web-projects on Domino;

    ? as far as possible allowing to Domino transfer in passing only objects, which can not be or hardly implemented by using other Web-technologies (so-called HTML-design is to be developed by programmers). The author thinks that, if a site needs to operate with Domino data, then to view them it is necessary to avoid the use of standard URL working with Domino objects. In this case exchange of data between site and Domino can be done by using any integration technologies supported by Domino (ex., XML, CORBA, JDBC, etc). In other words, Domino will play a role of data storage and their viewing is to be done by other mechanisms. Implicitly, the issue is confirmed by IBM. In R6 Domino Don't allow URL open feature may be assigned to databases , so the usage of standard URL Domino is protected in Web-applications;

    ? attention needs to be paid to Web-application security. Even when your site does not allow non-authorized access to information via Internet, you can expect hackers out there challenging your web-site security;

    ? only the tested by loading technologies are to used in Web-applications;

    ? minimize as much as possible the traffic Web-server browser. In Web-design the issue is to be considered that Internet channels are usually narrower than local channels Domino Lotus.

    Good luck in your system setting up and contact us for any help in USA: 1-866-528-0577, Germany: (0177) 8349 806! help@albaspectrum.com

    P.Gottmann is a technical writer in Ronix Systems ( http://www.ronix-systems.com ) the European branch of Alba Spectrum Technologies ( http://www.ronix-systems.com ), IBM and Microsoft Business Solutions Partner, serving clients in Chicago, Miami, New York, Los Angeles, San Francisco, Denver, Phoenix, Houston, Atlanta, Germany, UK, Australia, South Africa, Brazil, Moscow.

    trusted cleaning company Lake Forest ..
    In The News:

    Mac malware campaign uses fake AI chat results to deliver AMOS through terminal commands, security researchers report. Attackers exploit trust in AI-generated cleanup guides.
    States require AI disclosure in healthcare as California, Colorado and Utah implement laws mandating transparency when artificial intelligence influences patient care decisions.
    ETA sharing on Apple Maps and Google Maps keeps contacts updated automatically while you drive safely. Learn step-by-step instructions for iPhone and Android.
    Data removal from brokers protects against AI-powered scams and deepfake threats in 2026. Learn how data brokers sell your personal information to scammers.
    Learn how to act against cybercriminals in 2026 with essential security steps like two-factor authentication, software updates and credit freezing.
    Choose between OpenAI releasing Sora text-to-video model, the AI race heating up, or Waymo driverless cars launching in cities across the country
    Learn how to set up Google Maps and Apple Maps on your phone to automatically remember where you parked. Step-by-step instructions for enabling location services and parking detection.
    Phishing scammers use rnicrosoft.com domain to impersonate Microsoft by replacing "m" with "rn" in typosquatting attacks that steal login credentials.
    OpenAI announces new teen safety rules for ChatGPT users under 18, blocking romantic roleplay and requiring extra caution on body image topics.
    A 2025 data breach at fintech company 700Credit exposes personal information of more than 5.8 million people through compromised third-party integration partner.
    Retailers lose $76.5 billion annually to return fraud as nearly 10% of U.S. retail returns involve fraudulent activity, with $850 billion in returns expected in 2025.
    ShinyHunters claims responsibility for stealing 94GB of Pornhub user data affecting over 200 million records and demands Bitcoin ransom.
    ChatGPT 2025 now connects to Apple Music, Canva, Expedia, TripAdvisor and OpenTable through built-in apps that help users create playlists, design graphics and more.
    Apple releases emergency patches for two zero-day vulnerabilities actively exploited in attacks. iPhone and iPad users urged to update immediately.
    DoorDash launches Zesty, an AI-powered social app that recommends restaurants through conversational search, now testing in San Francisco and New York.
    Cybersecurity firm Infoblox reveals that over 90 percent of parked domains now redirect visitors to scams and malware, making simple typos extremely dangerous.
    The Fox News AI Newsletter covers the latest artificial intelligence technology advancements, including the challenges and opportunities AI presents now and for the future.
    GPT-5.2 is now live for all ChatGPT users with improved coding, writing and image interpretation, with Kurt Knutsson offering his review.
    New iPhone replacement scam uses pressure tactics and fake carrier calls to steal devices from buyers. Criminals claim shipping errors and demand urgent returns.
    Amazon Ring's new facial recognition feature sparks privacy controversy as Electronic Frontier Foundation critics argue the AI upgrade expands surveillance risks.
    New Android banking trojan Sturnus steals credentials, reads encrypted messages and controls devices.
    Denmark's 3D-printed student village proves automation builds 36 apartments faster than traditional methods. Skovsporet project shows housing future.
    Discover Android's new Sound Notifications feature that alerts you to smoke alarms, doorbells, and baby cries even when wearing headphones.
    New SantaStealer malware reportedly threatens holiday shoppers with password theft. This Christmas-themed info-stealer targets browsers and crypto wallets.
    The Christmas season brings a surge in Netflix phishing scams targeting shoppers with fake emails. Stacey P received convincing scam but verified account first.

Database Guru James F. Koopmann Reviews DBxtra Reporting and Query Tool

DBxtra is a powerful query and reporting tool that hides... Read More

How To Avoid Getting Hooked By Pfishing

"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More

Intro to UNIX Shells

A UNIX Shell is in simplest terms, a command line... Read More

Causes of ERP Failures

ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More

Corporate Accounting System: Microsoft Great Plains ? Overview

Corporate ERP/MRP selection might be tough one, especially considering very... Read More

Explore the Internet in a Whole New Way

For a long time now Microsoft's Internet Explorer has ruled... Read More

Healthcare Preventive Maintenance Software

Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More

New Web-Based HR Tool is Max From NAS, Hannibal, and InfoLink

Three highly respected names in Human Resources have joined forces... Read More

Lowering The Risks In Developing Do-It-Yourself Software Projects

Mike Dunville* had a decision to make. As the new... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

5 Mac Security Tips You Can?t Live Without

So, you've bought a new Macintosh, and now you may... Read More

Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of... Read More

Marketing Your WinRunner Team

It won't matter how effective your WinRunner Team is if... Read More

Microsoft Great Plains SOP: Sales Order Processing

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

QuarkXpress Tips: How to Move Content Between Print and Web Layouts

Since its release in 1987, QuarkXpress had made an immediate... Read More

Mapping Software: Putting Data Visualization on the Map

Mapping Software Improves Data VisualizationFrom the outset, it is important... Read More

10 Things You Can Do With Photoshop CS2 That You Couldnt Do Before Now

Is Photoshop CS2 worth the upgrade? You bet it is!... Read More

Anti-Virus Software

Anti-virus software is used to find, remove or fix files... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Great Plains Dexterity Programming ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Great Plains Dynamics/eEnterprise Upgrade ? Things to Consider and FAQ

If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More

Why Java RDBMS?

It is a well known fact that Java as a... Read More

Making The Decision To Automate Your Software Testing

Not every software testing project can or should be automated.... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

How to Make Attractive and Effective PowerPoint Presentations

Microsoft PowerPoint has dramatically changed the way in which academic... Read More

pet-friendly home cleaners Lincolnshire ..