Motherhood – The world’s most beautiful feeling, and today I am one of those blessed ones who can enjoy this experience.
I am Sharvari, a Software engineer at ISL, a caring mother and a responsible wife at home.
Too many roles and only 24 hours in a day, you need to be on your toes to manage everything. This juggling act demands expertise, patience and hard work.
It’s always a difficult situation for first time mothers like me to balance both professional and personal duties. They will always end up with a feeling that they have not achieved enough.
Moreover every working mom would want to give her best to her new born when she is at home and as a responsible individual you would also want to give best at work.
The key that I found in such a situation is “Effective Time Management”.
This starts from planning, one might have to plan for every small and big thing which may include planning your day properly or even planning for future.
My experience is you have to learn the 4Ds of time management–
Do it – Get it done the sooner the better.
Delegate it – It needs to be done but someone else can take care of it
Dump it – Anything that is unimportant now and in the future dump it.
Defer it – This needs to be done but not now it can wait.
Most, if not all the activities in a day can be put in these categories.
These are just a few pointers which can help you towards effective time management.
This is a learning task, and I am still learning how I can manage my time effectively to be a better mother and a better individual.
Finally, also remember to keep some time for yourself.
It is difficult to find "me time", a necessary and needed moment to refresh and regroup, while managing other things.
Work hard and smart and the world will be yours!
KritiKamra 270004QYED 1,648 Views
Welcome note by Kalpana Margabandhu
Director, WebSphere Adapters and AIM Development, India
IBM Application & Integration Middleware Division,
IBM India Software Lab, IBM Software Group
Welcome to developerette!
developerette is a unique space for women in technology.
Through this group, our endeavor is to focus on you, the women in technology, and involve you in various activities that not only help you advance your learning and careers, but also help you integrate your professional and personal lives.
There are several activities that you can expect on this group to enable and guide you to achieve your professional goals. Read the features on women just like us, who have overcome their barriers to build successful careers in technology. There are several articles that will guide you to make progress at work and home and stay healthy on busy days! Participate in the webinars that will cover technical topics as well as discussions on topics that are special to women. Let's have healthy dialogues, share and meet on a common platform!
I welcome all the women in the developer community, in technology and in any other technical field to join this group and be a part of an empowering and uplifting program like none other.
Click on http://ibm.co/developerette to join and don't forget to bring your friends!
GlobalRationalUserCommunity 270007QH7A 898 Views
Tuesday, June 30
6:30 a.m. ET
Every line of code you create comes with a complexity cost. How can you tame this complexity for your large source base? One way is to streamline your delivery turnaround time for enhancements and fixes by visualizing your projects' source code—after all, "a picture is worth…” Some major financial systems are driven by industry standard visual representations that allow those projects to meet agile DevOps demands. Join this session to learn about productivity gains and improve your continuous delivery of software.
Roger C. Snook
Roger brings twenty five years of software product innovation and consultative engagements across several industries.
Roger is an OMG Certified UML Professional, IBM and Open Group Certified Specialist and has been a featured global speaker on Cloud Software, DevOps for Mobile, SOA, Design, and Rational software topics.
Roger is also a volunteer for the American Youth Soccer Organization that promotes a fun, family soccer experience for 1,000 kids in the Eastern Panhandle of West Virginia.
You can connect with Roger on LinkedIn at http://www.linkedin.com/in/rogersnook.
***Dial in codes will be sent a few minutes before the webcast and posted in the online meeting.
By registering for this webcast you are allowing the GRUC to provide your information to IBM and/or webcast sponsors for direct contact regarding IBM products and promotions. You will also receive a complimentary membership to the Global Rational User Community.
I have been using IBM MobileFirst (formally known as Worklight) since over a year now and have already published one hybrid app for Android and iOS platforms. I used jQuery Mobile UI Library in order to build my UI. Recently I was surfing the internet to learn about Angular JS and in process of doing so I came across Ionic framework. I read about both the frameworks and I found them much more better than jQuery Mobile. So I took a step further and thought why not leverage the features provided by these frameworks in order to build a hybrid app in MobileFirst Platform. In this post I will mention the steps required to configure MFP project to run with Ionic Framework. If you don't want to do any configuration, you can simply download AngularIonicStarterProject.zipView Details MFP project in which everything is pre-configured. So lets get started.
AngularJS is a structural framework for dynamic web apps. It lets you use HTML as your template language and lets you extend HTML's syntax to express your application's components clearly and succinctly. Angular's data binding and dependency injection eliminate much of the code you would otherwise have to write. And it all happens within the browser, making it an ideal partner with any server technology. To learn more about AngularJS you can visit this website which have very good set of tutorials for it. As far as its installation is concern, AngularJS will be installed as part of Ionic Framework Dependency so that you don't have to worry about that for now.
Installing Ionic and Angular
Once Node.js is installed in the system, you can follow the following steps in order to get Ionic and Angular framework files.
Configuring Ionic and Angular into MobileFirst Project
In this post, you have successfully create a Hybrid App in IBM MobileFirst Platform by using Using Angular JS and Ionic Framework. You can easily take the attached project as your base project and start building exciting apps for the customers using Ionic and Angular.
JollyAhuja 27000464X5 2,376 Views
I am from JSS Academy of Technical Education Noida.(Engineering Institute)
My team was one among Top 20 teams selected for TGMC ( 2007-2008).
We were called at Mumbai for felicitation and round of interviews.
Post GD/PI top 9 students were selected for recruitment.
During same year IBM started hiring Fresher as Vitality Hires ,a program run by Nipun Mehrotra(V.P ,G.B ,Geo Expansion & Route to Market) .
After a year ahead I moved to SWG Group as Tivoli Seller for North and currently pursuing the same role.
So,in nutshell all my success in last 3 years goes to TGMC,else fresher like me would never have been part of Sales force of IBM ,
Here are few details of my journey in TGMC!!
Name of the Contest: TGMC 07 (The Great Minds Challenge)
Date and Venue of the Interview held: 20th March 2008, Mumbai
Name of the Institute: JSS Academy of Technical Education, Noida
Team Name: GFORCE
Project: RADAR (Real-time Allocation De-Allocation of Resources)
Candidates: Jolly Ahuja & Ankit Ruia (team member) .
In nutshell "JUST FOLLOW YOUR DREAMS ,SUCCESS WILL AUTOMATICALLY FOLLOW YOU".
Fresh out of college, after years of studying the core subjects, each one of wish to create something new and exciting. Develop that code which is highly appreciated, solves the problems, is extremely efficient etc etc.
But not all of us get to develop the main source and even be a part of that development cycle in industry. So, should you be unhappy on the testing role offered? Absolutely not!
Testing is a very responsible job. No product goes into the market unless it is thoroughly tested and gets the approval of the tester that it is good to go. This role is not easy and can be very interesting. As a tester, you know the behaviour of the software more than the developer himself. You are the first client. Testing the real time scenarios, you are a bridge between the market and the development. Trust me, it is very exciting.
So, how should you go about testing?
Here are some tips on better testing:
1. Understand what is to be tested.
Know the software thoroughly. Go through the document given by the developer.
2. Ask for more.
Discuss with developer about the software's behaviour, its implementation etc. The more you involve in it, the more bugs you can find.
3. Plan your tests.
Write down the plan of the tests. This should list all the tests. Be sure to do negative testing. Often, software works in normal cases. But goes for a toss in negative conditions. Include real time scenarios, customer situations. Think like a customer.
4. Implement your tests.
Choose an efficient testing tool or language. Plan your implementation well. Remember, tests should be as efficient as the main code you are testing. This is the most interesting part. Here, you get to do automation around the software, learn new products. Can be innovative as well!!
5. Identify the bugs.
Writing tests is not all. You need to understand the erring cases, identify the defects. Get them fixed. Critical defects are highly appreciated, because you are catching them before the software goes in market. This actually saves alot!
6. Get the bugs fixed.
Let the developer fix the defect. Re-test the fixed code. Feel free to say NO, if you are not happy.
Testing is really a responsible job role. Be proud to say you assure the quality of the software to be delivered!
I am Geetha, a final year graduate from computer science engineering, MLRIT, Andhra Pradesh.
I am girl student of more happy going and I believe in practical thesis rather on theory.
I as a tech student organize the educative events at my college. Last year I organized ZAVTRA2K11,
a national level technical fest, which was a huge success in the aspect of encouraging and leading
the students of engineering level to a new trend of technologies in the globe. The experience of
organizing the event made me to learn the aspects of being co-operative, making the best among
the choices, being patience to the vivid situations , working for late hours till 11pm in the college to
complete the tasks and more importantly following the leadership rules and qualities.
My voice on student role in present society in Hyderabad, to ABN Andhra Jyothi( a news channel),
had given me a confidence of speaking and communicating with officials. I was from then recognized
as a fire brand with good communication and voice of convincing.
And the great moments of my life had just took place in the month of February. I was selected as one
among the six students from INDIA, more precisely I am one among the two girl students to attend the
IBM-IDEA Innovation Workshop at Goa. I am glad to be a part of the event, and as a unique user of IDEA
among the students, and I was recognized and it helped me to be picked as one among the three students to
choose the best innovative idea to be developed by IBM-IDEA. I was appreciated for the best
performance at the event by
Mr.Tejasvi Bishnoi, Asst. Vice President, Information Technology(IDEA),
Mr.Deepak Rao, Asst. Vice President, Marketing(IDEA),
Mr. Sudhanshu Rawat, Project Executive & Vice President (IBM).
The delegates in the event asked us questions on IDEA in 3G network,how students are getting connected to 3G networks,
limit of student data packages, tarrifs and few more questions by the speaker Mr.Jaison, like
- Give an innnovative idea for $1000 to make IDEA grow
- Why IDEA and why only IDEA in 3G?
- Give ideas to reach students on 3G network
and few more.
My thought on GPS positioning Application on IDEA 3G mobile was an applauded answer along with query
solution application on Maps.
Later 3among the 6 six students were called to choose the innovative Ideas listed by the delegates.
I was one among the three and then was asked to vote for the best among the list of ideas
1. Customized bundled solution for women
2. Create an application mall
3. Communication bundled solution
As we the students were a bit in confusion,Mr.Jaison asked us to share $100 to each of the idea, in which the best
idea would be picked. I being a girl student know how much women are passionate towards their professional and
personal career and allotted more on the best idea of customized bundled solution for Women, which was later chosen
as the best idea to be implemented by the IBM-IDEA as an Innovative Idea.
I am very happy and delighted to be a part of the conference. I am very thankful to the IBM Academic Initiative and very precisely
I am thankful to IBM Academic Initiative,Mr. Lawrence Mohanraj , Regional Manager,South-west,Mr.Yuktesh,IT Specialisit-Andhra Pradesh
for giving me an opportunity to attend a great event.
I am really happy for my friends. Their hard work was won and recognized.
IBM CoE Community Academia for Ambassador Association listed students that play a vital support role since the day of launch of program.
I am proud of my friends Pooja, Karthik, Virendra, Dharma Teja . Have a great life with exceptionally fantastic work.
All the best and congrats to all other splendid students.
This section demonstrates how TAMOS can help you deal with two real-world issues faced by DB2 customers.
Some DB2 customers have reported experiencing an instance crash due to a
Assume that you have a DB2 instance named
Listing 6. List DB2 instance processes
Next, connect users to SAMPLE database, as shown in Listing 7.
Listing 7. Connect users to SAMPLE database
Listing 8 shows
Listing 9 is an example of the resulting entries in the db2diag.log file after the instance crash. These entries indicate that the instance crash occurred due to
Listing 9. Sample db2diag.log entries
Now you will see how TAMOS can help you prevent the scenario described above.
First, create an object for the
Listing 10. Create object
Next, as shown in Listing 11, create a policy that does not give DB2 instance user db2ins95 and root user permission to kill the process.
Listing 11. Create policy
Now the ACL is defined not to give DB2 instance user db2ins95 and root user the kill (that is, the "k") permission bit. The last step is to enforce the policy on the object, as shown in Listing 12.
Listing 12. Enforce the policy on the object
Listing 13. List DB2 instance processes
Now, as shown in Listing 14, when the db2ins95 or root user tries to kill the
Listing 14. kill -9 not permitted
TAMOS can also help you track who actually issued the kill command, which can lead to you identifying the real culprit. This tracking functionality is discussed later in the article.
DB2 support has also documented several problem reports where a customer has accidentally deleted tablespace containers while performing operating system maintenance activities. In some cases, this has resulted in the loss of a significant amount of data. This type of scenario also results in the tablespace becoming inaccessible. The example described in this section illustrates this type of scenario.
As in Case 1, for this example assume that you have a DB2 instance named
Listing 15. Connect users to SAMPLE database
As shown in Listing 16, create a tablespace with one container named
Listing 16. Create a tablespace
Create a table named
Listing 17. Create tables
Then, as shown in Listing 18, insert some sample data into the table.
Listing 18. Insert sample data
To simulate what would happen if the tablespace were accidentally deleted, issue an
Listing 19. Delete the tablespace container
Now, as shown in Listing 20, when users reconnect to the database and try to access the table, they receive an error.
Listing 20. Access attempt returns error
The tablespace has become inaccessible because its container was deleted, and all the data you inserted in the table is lost!
Now you will see how TAMOS can help you in the type of situation outlined above by preventing users from removing the containers, and thereby securing your system against potential data loss.
In this example, the container, which is simply a file resource on the operating system, is in the /test directory. As shown in Listing 21, create an object for /test/cont1 under the file resource.
Listing 21. Create an object
Next, create a policy to protect against users being able to remove this object, as shown in Listing 22.
Listing 22. Create a policy
Now, the ACL is defined to give the root user read, write, and execute permissions, but not the deletion (that is, the "d") permission bit. The last step is to enforce the policy on the object, as shown in Listing 23.
Listing 23. Enforce the policy on the object
Now, as shown in Listing 24, when the root user tries to remove the container, he is not allowed to do so. TAMOS has just prevented accidental data loss due to deletion of the container.
Listing 24. Container deletion not permitted
This section describes how you can use TAMOS to monitor or track operations performed against DB2 processes and resources.
For example, in the scenario described in Case 1 above, a
TAMOS provides three levels of auditing:
The following example illustrates resource level auditing. Assume that as described in Case 1, the policies shown in Listing 25 are in place for your system.
Listing 25. Case 1 policies
With the above policies, the ACL
Now, as shown in Listing 26, create a POP with a specification that all actions on the protected object will be audited. This tells TAMOS to track when a
Listing 26. Create a POP to audit all actions
Enforce the policy on the object by attaching the POP to the object, as shown in Listing 27.
Listing 27. Enforce the policy on the object
Listing 28. List DB2 instance processes
Now, as shown in Listing 29, a user attempts to kill the
Listing 30 is an example of the resulting entries in the audit.log file after the attempt to issue the
Listing 30. Snapshot from the audit.log
The above record shows that a
This article introduced you to the IBM Tivoli Access Manager for Operating Systems (TAMOS) solution. It provided an overview of how you can install and configure TAMOS, and showed how it can be used to protect DB2 processes and resources on UNIX and Linux operating systems. Once you understand the concepts of TAMOS, you will be in a better position to provide security to your system resources on top of that provided by the native operating system.
Every database management system must be able to protect data against unauthorized access and modification. This also holds true for IBM DB2 Database for Linux, UNIX, and Windows® (DB2). DB2 uses several mechanisms, such as authentications, authorizations, and privileges, to meet this need. However, to protect its resources (such as processes, containers, system files), DB2 mostly relies on the native operating system.
Tivoli Access Manager for Operating System (TAMOS) is an IBM solution that uses a centralized policy management approach to protect resources on UNIX or Linux operating systems. Therefore, you can use it to provide an extra layer of security in addition to that provided by the native operating system.
Following is an overview of the topics covered by the article:
The UNIX and Linux operating systems pose several security concerns from an enterprise perspective. TAMOS addresses these concerns by providing operating system-level access control for UNIX and Linux operating systems. The TAMOS centralized policy management technique prevents unauthorized access, and monitors accesses to sensitive data and resources.
TAMOS is implemented as a series of daemons, kernel extensions, and control files for either the UNIX or Linux operating system. The TAMOS kernel extensions intercept all the system calls. The centralized authorization daemon named
The flow chart in Figure 1 demonstrates how TAMOS implements the security layer by intercepting the system calls at the kernel level.
Figure 1. Sample flowchart to illustrate TAMOS kernel interception
There are several prerequisite system requirements that must be met before you can begin to install and configure IBM TAMOS. However, a detailed description of these prerequisites is beyond the scope of this article.
You can install TAMOS in one of four ways:
The example in this section describes the first type of installation — how to perform a GUI mode installation of TAMOS, and specifically on a Linux server. The examples in later sections of the article also assume use of the Linux operating system.
To begin an interactive GUI-mode installation, locate your TAMOS CD and run the program with the name:
Figures 2 and 3 show sample screenshots from the TAMOS installation wizard.
Figure 2. Tamos Installation screen
Figure 3. Recommended System Settings
As you proceed through the wizard, it guides you through the installation and configuration of TAM Runtime, using the appropriate LDAP server.
The silent mode of installation uses response files to install silently. The native installation uses the native software installation utility provided by the operating system.
This section explains how to configure TAMOS on a UNIX or Linux operating system after you perform a native installation. When you use Installshield multiplatform to install, TAMOS is already configured as part of the installation process. However, if you perform a native installation, you still need to configure TAMOS after the installation.
The command you use to configure TAMOS after a native installation is
Listing 1. Sample command for configuration of TAMOS
The term DB2 resources refers to DB2 processes, containers, system files, etc. that are present on the operating system where DB2 is installed. TAMOS uses various access controls such as Access Control Lists (ACLs) and Protected Object Policies (POPs) to protect these resources. It uses the static mode of creating objects in a policy database to protect them. Every DB2 resource that has to be protected must be explicitly created as an object in the policy database and must have an ACL/POP attached to it.
A root user who has all permissions on a UNIX or Linux machine tries to switch his identity to a DB2 instance user (for example, db2ins95) and tamper with some DB2 processes. This is where TAMOS would step in to provide protection. TAMOS provides a way you can protect surrogate operations by using surrogate resources. You start by creating an object.
Listing 2. Sample command for creating an object
You could then use a command like the one in Listing 3 to create a policy to prohibit root from switching user identity to db2ins95.
Listing 3. Sample command for creating an ACL
The above ACL shows the root user is not given the surrogate permission bit "G". Now you can use a command like the one in Listing 4 to attach the policy to the object for enforcement.
Listing 4. Sample command for attaching a policy to an object for enforcement
Now, as shown in Listing 5, if the root user tries to change identity to a DB2 instance user, he is not allowed to do so.
Listing 5. Identity change to DB2 instance user not allowed
The example in this section has shown you how to create objects and apply policies to them. Specifically, it showed you how to protect DB2 resources by controlling whether a root user can switch to a DB2 instance user. This ability to control root account use is one of the key features of TAMOS.
KritiKamra 270004QYED 1,437 Views
I don't know from where shall i begin ,OK let me begin right from the day 1 ,Initially i got the mail stating "Present your ideas for the superstar idea contest",for the first few days i ignored the mail thinking that it would be a spam or bogus mail then i thought ,"OK,let me reply to this mail "and just sent my idea after proper registration in the mentioned website of IBM ,even after registration i did not have the belief that this is the real contest and i ll get a response for the registration .To my surprise after a couple of months i got many calls from the representatives of the company stating that "My idea submission has been accepted and i need to give the details of the project in the form of presentation and it should be like a real presentation for which of course i can send it thru mail within the stipulated date .i have been given ample of time for submitting my presentation because of which i was able to submit it .i never thought that the process of evaluation will be transparent and all the people who presented their ideas will be organised in to virtual groups in which they will be given opportunity to learn new technologies thru webinars and they can also share their opinion about various concepts .
After some months i again got a call from the team stating that my idea has been selected for the next round of evaluation for which i have to prepare the prototype and they even gave me the freedom of choosing the location and time for the prototype presentation to the panel of their executives .i opted chennai and went to the mentioned branch in chennai on time ,i got good hospitality from the team because of which i was able to do the prototype presentation in a satisfiable manner in spite of fever i had on that day. Unfortunately my idea was not selected for the final presentation but i am happy about the opportunity given to me and the time ,resources and technology the company spared for me .
IBM Developer Superstar contest 2011, Participant
An Indian way to say Hello with dignity, respect and love to everyone.
This is my first post here at developerette and I am quite excited about it. I really hope that typing here is completely a unique experience and more exposure to learn more. So am here.. doing some shadow postings here & there as well as writing something unique here & there.
Hope to have a good learning experience here :)
I am Tulika Garg and I joined IBM India Software Labs in Jan 2011. I completed my Bachelors of Computers Sc. & Engg in 2009 . It was during my schooldays when the "IT" bug caught me and I was determined to become a software engineer. I have worked with a telecommunications based company for an year ,before joining IBM. When I joined IBM, with just an year's experience I realized there was so much more to learn. Its altogether a different feeling of working in a firm like that of IBM,and when you are referred to as an “IBMer”. I am a part of The Information Management group and I closely work with DB2-CLP and DB2-LDAP components .I am a part of the L3 continuing engineering(CE) and new development team(ND).I have presented a poster in the internal conferences like WIT(Women in Technology) that was conducted by IBM last year. I don't have any list of achievements as such in my name,but then I marvel each working day of mine with a sense of devotion,commitment,and my effort.
When we are fresh out of college,we have a mixed bag of feelings. We have zeal to do whatever task is assigned to us,we have new hopes but yes along with that , some apprehension does exist. Performing in the corporate world,competition ,work pressures and various other things start creating a tornado of professional chaos in our minds. I think it is important to just maintain the momentum with which we start and learn from our experiences which we gain with time.After all women possess the innate qualities of patience and perseverance ,and we being the 'women in technology' just need to make use of it.
My work here is related to supporting the customers that use our products,along with improving and enhancing the efficiency of our existing components. Resolving the customer issues,providing them solutions in a timely manner ,fixing defects ,enhancing the code to meet the new requirements comes as a part of my job. Sometimes people don't see support jobs in a very good light but nevertheless they are very crucial and important. Ultimately it is the customer experience of a product that speaks for a company. And I trust my acumen and feel good at the end of the day having done my job and feel pride in it.
The job I do is action-packed. Its never monotonous. If there is anything typical about a working day here, it is nothing short of exciting,rewarding and at times even challenging when we have to meet the deadlines.
Achieving a work/life balance is equally important and it is so good to read how my fellow bloggers , the 'women in technology',take out time from their strenuous routine and pursue their passions. They are definitely a source of inspiration for all the budding engineers as well as those who are still struggling to achieve this balance. With all my work underway,my distress routine includes spending time with my family and friends,taking out time for myself and indulging in my hobby activities like dancing and cooking. Just trying to remain calm and composed ,not getting bewildered with the veritable storm of work related questions going on in our minds is the key I guess. The answers to these can be found only with a peaceful state of mind,which can be achieved by maintain a proper balance. So don't get swayed with the hurling wind but stand strong and just be yourself!!!
harika01 27000547T0 2,350 Views
This is Harika, a pre-final student from Information Technology, Vishnu Institute of Technology (VIT), Andhrapradesh .Like all people, I too have a lot of enthusiasm at learning new trends in technology, and is more interested to be aware of everything.
Recently, in the month of February we went to a country level technical symposium conducted in SVECW, Andhrapradesh. There, I along with my co-partner Santhoshi Swapna gave a paper presentation on the topic “HADOOP”.
Hadoop is a flexible infrastructure for large scale computation and data processing on a network of commodity hardware. The industry is trending towards distributed systems, and Hadoop is a major player.
Luckily, we are recognized by Chief guest, Mr.
With such an encouragement, even a novice can anticipate amendment in the latest technologies. We came to know that IBM is using the Hadoop tool. An also “The Forrester Research Company” appreciated IBM Company for using HADOOP Tool.
It is vivid that IBM is encouraging the students to explore their knowledge. We are the best example.
I am thankful to IBM Academic Initiative Mr. Lawrence Mohanrai, Regional Manager, South-west and also to developerette for supporting me in sharing my experience and gratitude.
While Portal offers interactive business capabilities vs. a static web site..there is also a need to provide social collaboration capabilities within the portal environment for an effective business. As with a business portal, users can interact with the enterprise, such as to obtain valuable information, assistance, or download documents... with a social portal they can ask questions, discuss various subjects, make suggestions/recommendations, find people in their network with similar interests and much more.
While IBM Connections brings in these social collaboraton capablities for any enterprise.. when integrated with portal helps develop a social portal solution. This integration is achieved by developing a set of portlets for various IBM Connections services such as profiles (Directory of colleagues you can use to build a network and locate expertise), bookmarks (Social bookmarking tool that you can use to save, organize, and share Internet and intranet bookmarks), blogs (Online journals you can use to deliver timely information with a personal touch), activities (Collaboration tool for collecting, organizing, sharing, and reusing work related to a project goal), wikis (Repository for sharing and collaborating on pages of interest to your group) and forums (View and contribute to discussion topics). These portlets offer personalized social content to the user and allow read/write capabilities. They offer similar user experience as the native IBM Connections application. These portlets offer various configurations and customization capabilities to suit various customer requirements. Existing customers for Portal and Connections benefit with this solution and have the business portal to be social by bringing in social content from social repository like IBM Connections into portal.
Download these portlets from catalog