Petya-Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware

Petya Cyberattacks: How to Avoid and Defeat Ransomware Don’t let your guard down just yet. While the threat of last month’s WannaCry ransomware has just about disappeared, a new threat is already on the rise. The cyberattack is believed to have hit its first targets in Ukraine. Going after the central bank, main airport as well as the Chernobyl nuclear Read More

square spamsentinel

IBM Connections: 20 New Use Cases

IBM Connections: 20 New Use Cases Internal Communications 1) Engage Employees: Turn the typical one-way communication into a real dialog by listening to and responding to employees. 2) Branding & Design: Customize the user interface by adding personalized layouts or company watermarks to maintain the corporate identity. 3) Business Units: Easily create and manage content across the various communities for Read More

big-data-lock

Make Use of Existing Lotus Domino Investments to Gain Business Intelligence

The Problem with Lotus Domino While the Lotus Domino server is a highly capable, standards-based platform, it is largely under-utilized and misunderstood.  Data goes into Notes applications with little to no hope of getting it out, and more often than not applications are not meaningfully exposed to thin clients, existing only in the isolation of the Notes client. Over the Read More

square spamsentinel

Essential Tools – Patrolling IBM Domino Environments for Over a Decade

Essential Tools (ET) is an robust, Beacon award-winning server-based IBM Domino Administration tool designed to assist Domino administrators perform their tasks significantly more efficiently and also allow them to fulfill certain tasks that the infrastructure did not allow them to do so before. The robustness of ET stems from the basic architectural fact that the Domino Infrastructure information (Database, ACL, Read More

square spamsentinel

Exception Reporting with Essential Agent Master

If you think Domino Domain Management in ND9 is the answer… think again Essential Agent Master goes beyond DDM to build a complete picture of agent performance, with the ability to correct errors on-the-spot, by gathering extensive agent information from four disparate locations: + Server Settings + Agent Settings + Agent Run Log + Notes Log Exception reporting is a Read More

ibm connections

IBM Connections 6.0 is here!

IBM Connections 6.0 is now available to download IBM Connections 6.0 brings new potential to the end-user by empowering them to thrive with a richer, more focused and more effective experience. In Connections 6.0 IBM added new functionality across the board, enhancing multiple aspects of the collaborative landscape. New functionalities can be seen in the following areas: Communities, Files, Search, Read More

notes

Feature Pack 8 Summary for Notes and Domino

Feature Pack 8 (FP8) was released yesterday and is available for download from IBM’s Fix Central . IBM has ensured that the upcoming feature packs will still have a high focus on addressing high impacting defects. Also, they will have the same packaging, architecture and install kits used in previous fix packs. IBM has released a Preliminary Fix/Feature List with Read More

internet-security

Managing Access Control Lists to Improve Domino Security

An Access Control List is the front door of a Domino database.  It controls whether access to the database is allowed or denied.  After a user or server is able to access the database the Access Control List further dictates what actions may be taken, i.e. the ability to read particular documents, create documents, modify documents, tweak the database design and Read More

square spamsentinel

Domino Security Enhancement

Secure your Domino Environment with these quick and easy tips! With the New Year many of us are creating both professional and personal goals. Consider making a goal to fortify your Domino servers. There are some steps you can take to quickly and easily increase the security of your infrastructure. One setting that has baffled me over the years is Read More

supportblogpic

Domino Replication Troubleshooting Tip

The other day I had a client request assistance with determining why mail file data was not replicating between cluster members. We started by reviewing the usual suspects – ACL enforcement, replication disabled, and log file data. In the end we discovered the problem was due to the deletion stub purge interval being a 0 value and PIRC being enabled. Read More