Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the Web, and the server itself becomes a HTTP-server. The next releases of Domino Web-server add new functionality (for example servlet managers, supported JVM versions upgrade, etc). To give you general picture and abstracting from details we'll talk about two major Domino Web-server functions:

1. Domino Web-server is the full-featured HTTP-server. In other words, it can provide static (or conditionally static) files as the reply to HTTP-browser's requests (including HTML, image, JavaScript, applets, etc);

2. During the browser's requests to Domino dynamic resources by specific URL, the server can create in passing HTML-pages, making the Domino object visible.

For sure, it is reasonably simplified model (we mentioned that, for example, Domino Web-server supports servlet technology), but this model allows to discuss the major issues in creation of Web-applications based on Lotus Domino technology. Following the major problems are:

? in Domino-based Web-applications creation developer is strongly limited to use built-in program languages' possibilities. Thus, from 380 inbuilt @-commands of @-formulas language nearly 40 are supported in Web. LotusScript is supported only in three types of Web-agents, etc;

? application security problems. The standard authentication, authorization, coding, digital signatures, etc. mechanisms are simplified in Web or do not work. So SSL + x.509, etc. certificates are to be used in such cases;

? applications efficiency. HTML-pages generation in passing surely takes the server resources, so if the application is poorly constructed, it may cause the server failure. For example, if the first page of the site is generated by an agent, then concurrent request from rather big number of users may cause the service failure situation. Developers are to take care themselves for loading balance putting into different parts often changed and more static data;

? result of HTML-pages generation in passing from Domino resources is not every time obvious. Often such a procedure issues appearance in generated page ?additional? by developer point of view tags (for ex.,

,
,

    , etc). As a consequence, most developers put on Domino only those features which can not implement themselves. If look through the codes of full-blown Web-sites, designed on Domino technology, then, for example, in Domino forms we see only fields, all extern design is based on DHTML.

    It is not so bad. There are a lot of sites, supporting large number of users, accessing Domino data. Domino technology from release to release offers new possibilities for Web-design (for ex. JSP custom tag library, inbuilt HTML-editor, etc). The author himself used Domino to create portals with requests with more than 2000 visitors per a day. Summarizing the own and my colleagues experience in Domino Web-design field, I can recommend the following:

    ? Before creation of Web-project on Domino it is necessary to evaluate the whole Domino infrastructure in frame of concrete organization. If the Domino infrastructure at this company is on opening or initial stage, than Web-design based on Domino is hardly appropriated. The fact that Domino Designer is the environment for rapid application development (RAD), including Web- applications, can not be the reason to create Web-projects on Domino;

    ? as far as possible allowing to Domino transfer in passing only objects, which can not be or hardly implemented by using other Web-technologies (so-called HTML-design is to be developed by programmers). The author thinks that, if a site needs to operate with Domino data, then to view them it is necessary to avoid the use of standard URL working with Domino objects. In this case exchange of data between site and Domino can be done by using any integration technologies supported by Domino (ex., XML, CORBA, JDBC, etc). In other words, Domino will play a role of data storage and their viewing is to be done by other mechanisms. Implicitly, the issue is confirmed by IBM. In R6 Domino Don't allow URL open feature may be assigned to databases , so the usage of standard URL Domino is protected in Web-applications;

    ? attention needs to be paid to Web-application security. Even when your site does not allow non-authorized access to information via Internet, you can expect hackers out there challenging your web-site security;

    ? only the tested by loading technologies are to used in Web-applications;

    ? minimize as much as possible the traffic Web-server browser. In Web-design the issue is to be considered that Internet channels are usually narrower than local channels Domino Lotus.

    Good luck in your system setting up and contact us for any help in USA: 1-866-528-0577, Germany: (0177) 8349 806! help@albaspectrum.com

    P.Gottmann is a technical writer in Ronix Systems ( http://www.ronix-systems.com ) the European branch of Alba Spectrum Technologies ( http://www.ronix-systems.com ), IBM and Microsoft Business Solutions Partner, serving clients in Chicago, Miami, New York, Los Angeles, San Francisco, Denver, Phoenix, Houston, Atlanta, Germany, UK, Australia, South Africa, Brazil, Moscow.

    best cleaning company Highland Park ..
    In The News:

    The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
    Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
    Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
    Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
    Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
    Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
    Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
    Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
    Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
    Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
    New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
    A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
    AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
    A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
    New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
    Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
    Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.

How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

Fortunately one of the most common reasons cited for the... Read More

Importance of Coding Standards

Programming Help for BeginnersWe write programs to instruct computers. When... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Microsoft Great Plains in Construction & Building ? Implementation & Customization Highlights

Microsoft Great Plains could be tuned and setup to fit... Read More

Microsoft CRM Implementation & Remote Support

We would like to give you pluses and minuses of... Read More

Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on... Read More

Snort for Network IDS

What is Snort?Snort is an open source network intrusion detection... Read More

Lotus Domino: Application Integration ? A Programmer View

There are two approaches for application integration:? Programmer's approach ?... Read More

Lotus Notes Domino and Microsoft CRM Integration

Well, even if the combination might look very unusual, we... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Five Reasons for Using an O/R Mapping Tool

So, why should you use any O/R mapping tool? I... Read More

Mapping Software: Putting Data Visualization on the Map

Mapping Software Improves Data VisualizationFrom the outset, it is important... Read More

Putting Screensavers Under Control

No matter how much you enjoy your favorite screensavers, sometimes... Read More

Microsoft Axapta, Navision or Great Plains: ERP Selection for Large Corporation

If you would like to pick something from Microsoft, or... Read More

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

Secure File Transfer Using SSH Plus Additional Audit & Automation - FSA Reporting

In order to meet regulatory and corporate compliance requirements reporting... Read More

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

Your Computer May Be Infected, Heres How To Check (NOT about virus)

NOTE: Please take time to read on - it may... Read More

Microsoft Great Plains: Interest Calculation Example ? Stored Procedure for Crystal Report

This is intermediate level SQL scripting article for DB Administrator,... Read More

Making The Decision To Automate Your Software Testing

Not every software testing project can or should be automated.... Read More

Helping Newbies Understand Professional Software

The Windows registry is a huge database that ensures normal... Read More

Microsoft Great Plains - Typical Problems And Fixes ? Overview For IT Administrators

How to delete the user? This is the first problem... Read More

Dont Choose Adobe When Working With PDF

While Adobe is the most known maker of PDF tools,... Read More

Is Your Family Protected?

When you think... Read More

Microsoft Great Plains SOP: Sales Order Processing

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

high-end home cleaning Winnetka ..