7. Sametime 8.5 Web Instant Messaging Client
• User presence status message
• Contact list
• Adding contacts and groups
• Quick Find for contact list
• Business cards
• Location
• 1 to1 chat
• N-way chat with invitation
• Sending announcements
• Rich text
• Emoticons
• Public IM presence chat via Sametime Gateway
• Click to call (via 3rd party telephony partners)
• Instant Meetings
• Web application integration APIs
The need for more efficient and productive software is being driven by existing realities that we continue to come across as we talk to customers… As seen in the vignettes on this slide… A need for improved efficiency and productivity : Across an organization, there is a need to better utilize existing resources, including people, content, applications, etc… Software that’s easier to use and manage, that supports re-use of application and content/data assets, and that empowers users to work more efficiently is key to achieving such improved efficiency. And recognizing that people are key part of any ‘productivity equation’ is any organization’s first step towards achieving increased productivity. Providing collaborative tools, removing artificial bottlenecks, automating processes, enabling business users to manage processes and content themselves, all contribute towards the achievement of vital productivity increases. A need to deliver responsiveness and reliability at lower cost : The software choices any organization makes can impact the bottom line. For example, choosing software from a vendor with a focus on improved performance, or who provides tools that simply the challenge of administering your software infrastructure, all can contribute towards reduced costs. Accelerate deployments and reduce costs : Again, it’s all about efficiency and productivity. By eliminating the artificial bottlenecks that prevent people from doing their jobs, with easier to use tools that empower your business users and don’t require expensive IT intervention and support, work gets done faster and costs are reduced..
In August of 2007 we unveiled our plans to expand Lotus Sametime from a single product to a product family. IBM Lotus Sametime Standard 8.0 , slated for availability later this year, will continue to enhance the user experience introduced with Lotus Sametime 7.5 and 7.5.1, providing market leading capabilities and integration. Standard is the current Sametime product that is available today, and with the expansion of the family, it is being renamed. Features currently available in Sametime 7.5 include: VoIP Voice chat, Video – in the box – VOIP for up to 5 people and point to point video using high quality, bandwidth efficient codecs. Telephony integration – open interfaces that allow integration of 3rd party telephony, audio or video system directly into Sametime - that allow you to integrate the vendors you’re working with today, the ones strategic for you , into your environment. Dynamic Locations – dynamically view geographic location, to see where your team members, your support engineers, your emergency response technicians are located, can have a large impact on how you are able to conduct your business and the type of support and service you can provide to your customers or constituents. Web Conferencing – tightly integrated web conferencing that you manage inside your company firewall Mobile Clients – native Sametime experience on multiple devices BlackBerry, Nokia (Symbian) or Windows Mobile devices. Included in your Sametime license…no extra fees. Enterprise & Public IM Federation – AOL, Yahoo and Google. . Included in your Sametime license…no extra fees. Extensible Eclipse client & Software development kits– you can presence enable any application or integrate any application inside the Sametime client. IBM Lotus Sametime Entry 8.0 and Lotus Sametime Advanced 8.0 will both be available in first quarter 2008. IBM Lotus Sametime Entry will provide a way for companies who only need a basic set of secure , enterprise IM capabilities in a cost effective manner. The offering also supports Microsoft Outlook users. This is the current version of the product entitled with Lotus Notes. With the core instant messaging capabilities of Lotus Sametime, Sametime Entry will allow people to share presence and exchange rich text instant messages. IBM Lotus Sametime Advanced 8.0 , will break new ground in real-time expertise location, in data sharing, and in organizational collaboration, bringing new capabilities to market: · P ersistent chat will let you keep a running conversation going among a team or group of colleagues. Monitor multiple rooms at once. · Broadcast Suite – a collection of tools that reach out to a community of experts to find immediate answers, conduct instant polls, discuss topics in open, real-time forums, and importantly, automate the capture of knowledge shared on an ad-hoc basis for future searching and reference These tools can eliminate the "how do I find the answers I need in real time when I don't know who to ask?" problem, and can move help and support into the organization and out of centralized roles. Instant Share anything on your desktop in one click. Location Services take the geographic location capabilities introduced with Sametime 7.5 to the next level, allowing you to prepopulate locations across the organization, build customized aggregation with other location services, such as GPS, cell tower, etc. to be able to see not only where people are presently, but the last known location of offline contacts, and to be able to see through a Sametime plugin who else from your contact list is in the same location as you are. Radvision is one of the partners working to bring video into Sametime. They’ve built a plugin that can launch and display multi-way video directly in Sametime.
Rene Luiz – fyi - this is the ‘Home Page’ screen shot I mentioned yesterday when we talked.
This more graphically appealing slide gives us the opportunity to talk about the main messages for Protector for Mail Security. In the first box, our unique advantage is our position within the core Notes/Domino family. We work directly with the Lotus Westford architects and development teams. We’re implementing numerous integration points in support of the Protector ideals around integration and targeted value. In the second box, we talk about how we’re delivering world class technology – a sixth generation spam filtering technology -- that is 100% proprietary (in the good way) to IBM. The IBM Proventia technology, which has its roots in Cobion Software’s advanced spam identification products, matches up very well for efficacy (quality of spam blocking) and throughput (volume of mail handled) against incumbent vendors who attack this, typically, from a security perspective. We look at it from an operational and e-mail perspective, which is closer to how Domino customers view it when we talk to them. Also in the second box, we’ve earned ICSA Labs certification on spam filtering, which requires a 95% “trap” rate for spam (Protector typically achieves 98%+), with a .001% “false positive” rate (which we typically better as well). In the third box, we call out deployment flexibility as an important differentiator. Protector for Mail Security is sold as a per-user license, like Notes or Sametime or Quickr or Connections. And like many Lotus licenses, it includes all the server software you need, so it scales cost-effectively from one user to infinity. But ultimately this is an edge server application, because that’s where the spam is coming in. Here it’s important to understand that Protector for Mail Security is different from other Lotus products in that it’s a complete server solution, containing the (Linux) OS as well as the filter application, and is designed to run all by itself on a computer. In fact, in this model it serves as an “appliance” due to that plug’n’play kind of design. We’re one of a few vendors in the market who offer both software and hardware deployment licenses – and we do it with the same per-user software license. Smaller organizations or branch offices can deploy the VMware version on standard x86 hardware, while larger organizations will order the specialized hardware version, which comes preloaded with the server software. Both contain the same filtering software, and can be mixed and matched – e.g., hardware appliance in headquarters and VMware versions at branch offices.
Last year Protector built an ICAP interface for integration with any product that supports ICAP like Portal & Connections to support virus scanning on files – Q3 Worked with IBM CIO to do full content inspection of anything that Connections, Quickr & Portal. Pre-content posted. User session connected to Connections / Quickr – traffic proxy over to protector RegEX's, custom keywords, SPAM keywords for blog/wiki spam Runs on a separate server Focus on filtering where actiance is more business controls logic
This build slide shows how the encryption works for the sender and recipient. The main point is that Protector for Mail Encryption extends Notes encryption without replacing it. If Notes-to-Notes encryption is available, it's always used; only when Internet encryption is required does Protector step in. If a user of the Protector for Mail Encryption client wants to send an encrypted (and/or signed) note, he just uses the appropriate UI as shown. (If the user only has a Gateway license, the Notes encryption UI only works for internal users, although the inclusion of a policy trigger would still invoke encryption for external users at the Gateway.) <click> Upon the “send” event, the Protector client creates two copies of the Note. The version sent to Notes recipients uses Notes RSA-based keys, and proceeds as usual. <click> The version destined for external recipients goes to the Protector for Mail Encryption Gateway for processing. This is where the Gateway's intelligence comes into play. It will look at the destination for each external address, and try to find a public key for it. If the sender encrypted with the recipient's public key from his local keyring, it's just sent along. If the Gateway already has knowledge of the key (from a prior transaction), it's encrypted to that key and sent. Depending on configuration, the Gateway can also query for the key at the recipients “keys.<domain>.com” URL, or in the Global PGP Gateway that many companies federate with. In some countries (Denmark for example), special public key servers can also be used. In all these “key found” cases, it's a regular S/MIME or OpenPGP communication, and for both sender and recipient it feels like a regular e-mail transaction, inbox-to-inbox. If the recipient's key is not available – a “key not found” or KNF state – then the system has a couple of options, according to how it's configured. In a “push” model, it can send an e-mail with an encrypted PDF attached, for which the recipient will need a password; this can either be pre-established or provided separately. <click> Otherwise, the recipient will be sent a link message (“pull” model), directing him back to the Gateway server via a Web URL. In many cases the sending company already has established a username/password for the recipient (e.g., a bank or utility relationship with a customer); the Protector for Mail Encryption Gateway can be tied to that system. Otherwise the user can create an account for himself, generating a second e-mail for two-factor authentication just like creating a Gmail or other account. Once authenticated, the recipient can view and reply to the message using a standard Webmail UI. The mail can be stored on the server for a configurable interval, or kept indefinitely. Here is where Protector for Mail Encryption offers capabilities beyond many competitors. If the recipient is a sophisticated end user and already has his own S/MIME or OpenPGP key, he can upload the public key using the Web UI, and establish a "key found" state for all future communications. If the user is less sophisticated but wants that integrated experience, he can download the Satellite plug-in and do it that way (the Satellite code is essentially a local keyring without the complexity of knowing/caring what a keyring is). The bottom line is that the system supports whatever mode the recipient prefers; it's not a "one size fits all" solution like many gateway vendors.
This build slide shows how the encryption works for the sender and recipient. The main point is that Protector for Mail Encryption extends Notes encryption without replacing it. If Notes-to-Notes encryption is available, it's always used; only when Internet encryption is required does Protector step in. If a user of the Protector for Mail Encryption client wants to send an encrypted (and/or signed) note, he just uses the appropriate UI as shown. (If the user only has a Gateway license, the Notes encryption UI only works for internal users, although the inclusion of a policy trigger would still invoke encryption for external users at the Gateway.) <click> Upon the “send” event, the Protector client creates two copies of the Note. The version sent to Notes recipients uses Notes RSA-based keys, and proceeds as usual. <click> The version destined for external recipients goes to the Protector for Mail Encryption Gateway for processing. This is where the Gateway's intelligence comes into play. It will look at the destination for each external address, and try to find a public key for it. If the sender encrypted with the recipient's public key from his local keyring, it's just sent along. If the Gateway already has knowledge of the key (from a prior transaction), it's encrypted to that key and sent. Depending on configuration, the Gateway can also query for the key at the recipients “keys.<domain>.com” URL, or in the Global PGP Gateway that many companies federate with. In some countries (Denmark for example), special public key servers can also be used. In all these “key found” cases, it's a regular S/MIME or OpenPGP communication, and for both sender and recipient it feels like a regular e-mail transaction, inbox-to-inbox. If the recipient's key is not available – a “key not found” or KNF state – then the system has a couple of options, according to how it's configured. In a “push” model, it can send an e-mail with an encrypted PDF attached, for which the recipient will need a password; this can either be pre-established or provided separately. <click> Otherwise, the recipient will be sent a link message (“pull” model), directing him back to the Gateway server via a Web URL. In many cases the sending company already has established a username/password for the recipient (e.g., a bank or utility relationship with a customer); the Protector for Mail Encryption Gateway can be tied to that system. Otherwise the user can create an account for himself, generating a second e-mail for two-factor authentication just like creating a Gmail or other account. Once authenticated, the recipient can view and reply to the message using a standard Webmail UI. The mail can be stored on the server for a configurable interval, or kept indefinitely. Here is where Protector for Mail Encryption offers capabilities beyond many competitors. If the recipient is a sophisticated end user and already has his own S/MIME or OpenPGP key, he can upload the public key using the Web UI, and establish a "key found" state for all future communications. If the user is less sophisticated but wants that integrated experience, he can download the Satellite plug-in and do it that way (the Satellite code is essentially a local keyring without the complexity of knowing/caring what a keyring is). The bottom line is that the system supports whatever mode the recipient prefers; it's not a "one size fits all" solution like many gateway vendors.
10/19/10
Evolution of Social Search in Lotus Connections Lotus Connections 2.0 introduced “Social Search” Innovation from IBM Research Lab in Haifa, Israel System wide search infrastructure based on open standards Social search introduced concept of 'facets' weaving additional connections between results Lotus Connections 2.5 expanded on “Social Search” User Interface become more intuitive Consistency through provision of single search engine across the product Added additional services, Files and Wikis Document Conversion services, advanced language analytics Lotus Connections “Next” Adds Analytics Enhance with 'Social and Network Discovery' (SaND) technology Analytics leveraging the Social Search Information (indexes+facets) to discover and present relationships
10/19/10
Portal is the intigrate the content, processes, people, the applications,
Offlibe capabilities, for expiditar
Oracle: customer portal for ERP system MS : users internally
WWCM 6.0 starts by adding a new user friendly “Welcome Page” entry point for content authors, editors and managers. This new design provides a simplified authoring environment with access to templates, search, libraries, personalization, task bar and help information.
New authoring tool element that defines the controls shown to authors (links or icons) to do functions like add new, edit current oar approve /deline current On available for content (ie not SA or Menu design components.
Scenario – WebSphere Portal is being used to be the single interface into three back end applications. 1. A J2EE WebSphere application. 2. A legacy Inventory application and 3. A Legacy Budget application. WebSphere portal uses a LDAP for authentication. You login to the portal with a userid and password and it is authenticated against the ldap. Then WPS uses the user and group info stored in the LDAP to map resources to the roles to find out what the user has access to.
What if the back end system can not use the websphere userid and password because it has its own authentication. WPS provides the Credential Vault to facilitate SSO to the back end system. In this example the back end system is an Inventory application. It is expecting mark to look in with a userid of mark and a password of inventory. The WPS does this is that it will store the Inventory credentials in the WPS credential Vault and when the person access the Inventory portlet WPS will pass Marks Inventory ID and Password to the back end system on his behalf.
Customization: The ability of the portal end user to change the portal experience for their purposes. Example: Edit a stock portlet with your stocks “ what if” preview based on pseudo-users, portlet settings, session/request attributes, request parameters and date/time Collaborative Filtering engine adds statistical matching Email Campaigns Send personalized, targeted e-mail to a set of users Targeted by a selection rule Personalized by a JSP email body with embedded rules Send email once or on a recurring basis
We are quickly coming to realize that Forms creation is taking a large amount of our developers time. They need to create complex JSPs that handle layout of fields, logic, initialization of fields… With workplace forms we can quickly create forms without as much development effort. Forms can come prefilled so that end users no longer need to type in all their data repeatedly. Forms can be signed digitally as well. Best of all Forms are created as standard web services documents – this way forms can be passed around to different organizations and consumed by the different applications of these organizations. Take the example of a mortgage company – where a mortgage application may need to be passed to several banks/credit agencies for approval. A workplace form can easily be passed to these disparate applications as these applications just need to be able to absorb and XML document.
Rich Presentation With a user-friendly wizard-based interface, Workplace Forms prompt the user through the form filling process enabling the user to easily complete the required sections of the form. Wizard Pages can be added to the paper-like pages to allow a user to easily complete the form and ensure that all required sections are completed. Data/rules driven form displays only the relevant sections of the form applicable to the specified user. For example a banking loan application form may require a guarantor when the loan amount is over a certain amount. Workplace Forms enable a more complex level of dynamic behavior without requiring a deep level of programming.
Advanced Business Logic Workplace Forms e-forms have powerful business logic that can drive an intelligent e-form and streamline the process of filling the form; they also integrate with server-based workflow logic. Forms are “state-aware”, and behave according to pre-defined user permissions &/or business process requirements. For example, a government employee will only be presented with fields applicable to them for required data entry. Once received by their manager – the form may show additional fields and signature options applicable only to management. The presence of such advanced business logic enables Workplace Forms to fully capture and integrate business processes throughout the workflow and provides a high level of flexibility to ensure that client or server side application of forms “logic” fits the business requirements of the form.
Data Instances Another key feature of IBM Workplace Forms is the fact that they are based on W3C standards including XForms specifications Workplace Forms can contain multiple XML data payloads – ACORD XML, your CRM’s XML, transit and integration XML – and cross reference them to ensure data integrity. This means that all processing work is done on the client, so server transformations are minimized. Workplace Forms support client-side XML schema validation All XML data instances may be validated against their schemas on the client, ensuring data quality. Workplace Forms is the only production ready product to support the W3C XForms standard.
Attached Files Workplace Forms enable the attachment of multiple documents to an e-form. Any file type may be attached, including other e-forms and supporting documents. These files may be pulled from or pushed to a Content Management System. Attachments may be signed along with other parts of the form, enabling Workplace Forms a complete business record of a transaction. As a result, Workplace Forms provides the organization with the ability to capture all related files into one comprehensive, auditable transaction record.
Digital Signatures and E-Form Security IBM is the recognized leader in digital signatures and e-forms, and wrote part of the W3C XML Digital Signature specification. The digital signature capabilities of Workplace Forms enable secure, multi-person approval processes with overlapping digital and electronic signatures. As well, the open architecture of Workplace Forms enables the efficient integration into enterprise security architectures. As a result of the key features discussed - Workplace Forms provide a comprehensive electronic envelope for transaction data and all related files.
IBM Workplace Forms Viewer feature-rich desktop application used to view, fill, sign, submit, and route eforms able to function on the desktop or within a browser Enables full connectivity with real-time integration using Web Services Based on open standards to enable Viewer to operate in portal or stand-alone environments IBM Workplace Forms Server – (API, WebForm Server, Deployment Server) enables the creation and delivery of XML forms applications provides a common, open interface to enable integration of eforms data with server-side applications delivers a true zero-footprint solution provides eforms to external users quickly and efficiently within a browser IBM Workplace Forms Viewer 2.6 - A rich client viewer that automates multi-person workflows by providing role-based signing authority and access to specific form sections. Role-based wizards enable users to efficiently move through the form- filling process, helping increase accuracy and improve efficiency. IBM Workplace Forms Server 2.6 - Delivers a true zero-footprint solution, providing eforms to external users quickly and efficiently within a browser, without requiring additional downloads or plug-ins. Workplace Forms Server software also provides a mechanism to automatically distribute client-side software such as IBM Workplace Forms Viewer software. By leveraging open standards to integrate an intelligent user interface with high value back-end systems, IBM Workplace Forms products provide public and private sector organizations with security-rich forms that leverage existing sources and systems to help better serve customers and increase operational efficiency. IBM Workplace Forms utilizes and extends existing IT architectures. Rather that including dedicated, proprietary software for e-form management and delivery, IBM Workplace Forms creates an open standards, intelligent message that flows through and leverages IT components dedicated to content management, collaboration, e-mail, messaging, workflow, portals, web serving, and more. New Benefits in IBM Workplace Forms 2.6 Extend automated forms-based processes to more countries and cultures with eforms built in 26 different languages. First enterprise class product to market that supports W3C XForms standard that enables forms data and business rules interoperability across different environments enabling standard forms processing from multiple channels (voice, PDA, tablet, cell phone). Increased developer productivity with reusable form components that include sophisticated presentation, business rules and data model through new Eclipse-based form designer. Expanded IBM Workplace Viewer functionality options to allow per-user or per-forms page pack purchase. IBM Express offerings that extend eforms process capabilities to the small and medium businesses. Increased deployment options for IBM Workplace Forms Server 2.6 with support for the IBM AIX, Red Hat Linux, and Sun Solaris platforms. Deliver zero-footprint, browser-based eforms to Apple MacOS clients.
While this slide is only showing IBM solutions at the application integration layer and back end data integration layer, the standards based open architecture provided by IBM Forms allows for easy integration to many application and backend systems industry wide.
The text on the card is editable so you can click on the slide and enter your own contact information.