Академический Документы
Профессиональный Документы
Культура Документы
Session 1
Excellent Integration:
Lotus Notes has many functions including e-mail, workflow, database, web server and it integrates all of them so that very sophisticated applications can be developed. Additionally, Lotus Notes is compatible with all major architectures and standards.
Help Menu:
When the user selects "About this database" or "Using this database" options in the Help menu, he will get application specific help which could be prepared in any language.
10
11
NIF
Indexes
12
There are other types of notes created and maintained, automatically, by Domino.
ACL - The ACL stores a list of names and options for controlling access permissions to the database. Database header - Domino stores information about the database in a database header note. This note contains information about the databases name and location.
13
Types of data
Rich text - Stores complex information including text and paragraph formatting, file attachments, images and more. Text - Store alpha numeric strings Number - Stores value indicating a quantity or a range. Dates and times are stored as numbers.
Tata Consultancy Services Internal 14
Domino Server
Lotus Domino Servers offer a wide range of services. The most important ones are Object Store
Documents in a Domino database can contain any number of objects and data types, including text, rich text, numerical data, structured data, images, graphics, sound, video, file attachments, embedded objects, and Java and ActiveX applets. A built-in Full text search engine makes it easy to index and search documents.
15
Domino Server
Directory
A single directory manages all resource directory information for server and network configuration, application management, and security. Domino includes user account synchronization between NT and Domino and is Light Weight Directory Access Protocol (LDAP) compliant. The directory is the foundation for easily managing and securing your Internet and intranet applications.
Security
The Domino security model provides user authentication, digital signatures, flexible access control, and encryption. Domino security enables you to extend your intranet applications to customers and business partners.
16
Domino Server
Replication
Bi-directional replication automatically distributes and synchronizes information and applications across geographically dispersed sites. Replication makes your business applications available to users around your company or around the world, regardless of time or location.
Messaging
An advanced client/server messaging system with built-in calendaring and scheduling enables individuals and groups to send and share information easily. Message transfer agents (MTAs) seamlessly extend the system to Simple Mail Transfer Protocol (SMTP)/Multipurpose Internet Mail Extension (MIME), x.400, and cc:Mail messaging environments.
17
Domino Server
Workflow
A workflow engine distributes, routes, and tracks documents according to a process defined in your applications. Workflow enables you to coordinate and streamline critical business activities across an organization, and with customers, partners, and suppliers.
Agents
Agents enable you to automate frequently performed processes, eliminating tedious administration tasks, and speeding your business applications. Agents can be triggered by time or events in a business application. Agents can be run on Domino servers or Lotus Notes clients.
18
Domino Server
Development Environment
Domino Designer is general-purpose client software featuring an integrated development environment (IDE) that provides easy access to all features of the Domino server.
19
Domino Server
Live Integration with Enterprise Data
DECS (Domino Enterprise Connection Services) is part of the Domino Server. This allows developers to map fields in forms directly to fields in relational database tables, without storing any data within the Domino database.
20
Security
Lotus Notes uses two different strategies to implement security:
Name lists RSA (Public Key/Private Key) algorithms A name list is typically the list of people authorized to see or edit a given document. When a user attempts to access a document, the computer checks to see if this user's name is in the list. If it is, then the user can go ahead, otherwise he will be stopped. Name lists are also used to determine which users can connect to a given server or access a given database.
21
Security
The RSA algorithm itself has two different uses:
Digital signatures Encryption of documents and network communications Digital signatures are typically used in electronic forms or at the end of letters. The RSA algorithm comes with two keys, a public one and a private one. Only one person has the private key which he uses to sign his name. The others have access to the public key used to verify the authenticity of that signature. Another use of the RSA algorithm is encryption. Encryption can be used to protect sensitive documents and network communications (over LAN or phone lines) from unauthorized access.
22
Security
North American licenses for Lotus Notes come with 64-bit encryption keys. Due to US export regulations, the rest of the world must contend with 32-bit keys. Even the 'short' key has been proven to be very difficult to break, to the order of several hundred thousand US dollars and several months of work. In Lotus Notes, encryption is the surest way to protect sensitive information. Even the computer administrators have no access to information encrypted in this way
23
24