Feeds

IBM reaches out to SAP, RIM with Notes

Things get LinkedIn

High performance access to file storage

IBM has also inked a deal with online professional networking company LinkedIn so Lotus users will be able to link to their LinkedIn networks from Lotus mail and other applications. Ditto for internet-phone provider Skype and online customer-relationship-management vendor Salesforce.com, which also have integration deals with IBM for the LotusLive product.

These three deals, IBM crowed, will deliver "integrated collaborative solutions to an audience of more than 400 million people". It is more likely the much smaller number of LotusLive users will have some features that make the services more appealing than they would be as a standalone offering. The tail is not wagging the dog here, even if the integration is useful. There is nothing compelling those 400 million souls to use LotusLive, after all.

There was mobile news, too. IBM said it has created some development tools that link the Lotus and Domino software stack to Research In Motion's (RIM's) BlackBerry smartphones. The tools allow for Lotus Symphony documents - stored in the Open Document Format - to be opened on a BlackBerry smartphone. IBM said it is working on the ability to let the smartphones do this for its Symphony spreadsheets and presentations.

Smartphones will be able to run IBM's Quickr team software for the sharing of documents, photos, and videos, and with the new IBM tools they will also be able to access Lotus Connections to participate in blogs and online communities.

IBM also previewed future support for BlackBerry smartphones for the Lotus Domino Designer application development tool and the XPages it creates. This support will be enabled by snapping the BlackBerry Java Development Environment into Domino Designer.

None of these tools are available now - they are in preview. RIM and IBM said that Symphony document viewing and Lotus Connections support is coming in the second quarter, while the Quickr and Designer support for BlackBerries are due sometime in the second half of this year. ®

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.