*Spool File Mapping to Full Color PDF* KeyesOverlay rapidly converts standard *SCS printer files into PDF documents, in either black and white or full color. Individual documents, such as invoices or Purchase Orders, can be prepared with overlays, and can include things like Barcodes or MICR fonts. KeyesOverlay can also be used to prepare large reports complete with Bookmarks to aid the user in navigating sections. Learn more at Computer Keyes or call 800 356 0203.
IBM rebrands one of its most revered products, and we take a good, hard look at COMMON Europe's Top Concerns survey. Plus, IBM i gets native support for the product formerly known as Lotus Notes Traveler: IBM Traveler.
Written by Steve Pitcher
Lotus Notes is dead. Long live IBM Notes!
With most other Lotus products slowly getting "bluewashed" in recent years, it made sense that IBM would eventually rebrand Lotus Notes and Domino as IBM Notes and Domino. Even the icons are changing from the familiar Lotus yellow to IBM blue. Pushing aside 20+ years of Lotus brand equity, the move to the second most popular brand in the world (along with the 100+ years of brand equity) is much needed; it's the right thing to do.
Whether just for use in-house, or destined for sale, software apps must be tested before being put into production environments. Testing tools can help significantly.
Written by John Ghrist
There's pretty much no getting around it: New software applications have to be tested before putting them into general use. However, unless producing software for sale is your primary line of business and you already have a testing process in place, the odds are that your enterprise could use some help in this area. Fortunately, there are some software solutions available that can facilitate this process.
Discover the euphoria of self-service password reset.
Written by Robin Tatam
Since the dawn of the technological age, stories have abounded of users writing passwords on Post-It notes and in logbooks. That's because good passwords are hard to devise and even harder to remember. When we concoct one, we hang on to it. What's worse, we use the same username and password everywhere. Many experts believe passwords represent one of the greatest security vulnerabilities; however, they remain a necessary evil. The reality is that passwords will be around for the foreseeable future. And for every password that exists, there's a user who will forget it.