IBM has made the Lotusphere podcasts available for download

by Volker Weber


I have no idea whether they do this on purpose but IBM has made the podcasts available on the internet. This is how it works:

Put it all on one line, start with sessionid 01 and then work you way to 02 and so on. I leave it as an exercise to the reader to complete the task. :-)


Well, it still doesn't work for session 2 - have tried both from your links and from the URL as shown...

But thanks for the heads up!

Nick Daisley, 2008-02-16

Well, judging from what happened to the PDF downloads, I guess they decided to get professional help this time so not just anyone could go and grab the downloads.

Better luck next time ;-)

But it seems to end at 134, with some holes inbetween.

Joerg Michael, 2008-02-16

I have created a download helper for the MP3 Podcasts.

Have a look at Lotusphere 2008 Podcasts download helper for the download and a description, how to use it.

Perhaps, this is of some use for you?


Thomas Bahn, 2008-02-16

I know my reaction is out of all proportion, but I reserve the right to have it anyway. I’ve reached my limit. We’ve seen it too many times from the company that should be leading when it comes to security… OK, here goes:

IBM is an enterprise with a phenomenal number of incredibly gifted employees, yet the company seems hell-bent on a course of stupidity. For Christ’s sake, just log your special Sametime access rights, conference presentations, session MP3s, whatever, in a simple Domino-based content management database. Then, lock down said database’s ACL to those who should have access (e.g. LS08 attendees), and be done with it.

IBM, please stop dicking around with all these silly home-grown websites that you know people like us are going to pick apart. Listen to the talent you employed from Lotus, and just do it the right way. The effort is minimal.

Argh! It could be so simple!

(I feel better now. Thank you for listening).

Ben Poole, 2008-02-17

IBM seems to use the service of If this company does not know how to run such service then they must have an excellent marketing and sales department. IBM has outsourced its Lotusphere multimedia services as long as I remember and this time at least it was not Windows Media/Internet Explorer only.

Henning Heinz, 2008-02-17

Ben, hosting the files inside an NSF would allow them to make everything available for replication. That would be way too convenient. :-)

Volker Weber, 2008-02-17


I am afraid IBM has listened to you (see download list below).

However putting huge files in a NSF is not such a great idea after all (downloading at 28k takes forever).

How about
- putting single MP3 files in the NSF and allow replication and
- storing in the ZIPs in the "Domino\HTML" directory and creating a website rule to restrict access to authoized Lotusphere users?

Download list:
Sunday's Podcast Downloads :
o ( size : 1.35 GB )
o ( size : 1.28 GB )

Monday's Podcast Download :
o ( size : 1.63 GB )

Tuesday's Podcast Downloads :
o ( size : 1.09 GB )
o ( size : 1.22 GB )
o ( size : 1.38 GB )

Wednesday's Podcast Downloads :
o ( size : 1.21 GB )
o ( size : 1.52 GB )
o ( size : 1.32 GB )

Thursday's Podcast Download :
o ( size : 1.31 GB )

Felix Binsack, 2008-02-17


I was just thinking:

Many sites today expose content on the internet by using a url that is difficult to figure out, e.g Google Picasa or

Some sites thinks this is a security as good as any, as as long as the users of these sites do not expose these url's, which probably can be controlled by terms & agreements.

I guess you are taking a risk by exposing these links, so I just want to let you know, I really appreciate it.


Thomas Adrian, 2008-02-18

Thomas, if IBM wanted to keep the files secure they would bind the key to the IP address which is requesting the files.

There is only two explanations: either IBM wants to make those files widely available or they are extremely incompetent. Since they cannot possible be that incompetent, they must want to spread the news.

Volker Weber, 2008-02-18

if IBM wants to spread the news - why the hell this way? Isn't that company big enough to do it professionally?

Steffen Pelz, 2008-02-18

They should put a lot of the Lotusphere stuff onto a BitTorrent tracker with limited registration and passkeys.

Security wise, it wouldn't really work perfectly either, but it would reduce the bandwidth requirements significantly as hundreds of people start to download the same files on the same wifi connection.

Ben Rose, 2008-02-18

How exactly would BitTorrent help people on the same WiFi connection?

Volker Weber, 2008-02-18

Steffen, why would they? No idea. They need Ben Langhinrichs to create a useful session db although they have all the same data.

Volker Weber, 2008-02-18

Following Volker's tip above I found sessions from the tracks Application Development(AD), Innovation(INV), and Infrastructure (ID), but nothing from Best Practices (BP). Has anybody found those?

Note I tried session id's up to about 150 finding nothing after 134.

Roland Reddekop, 2008-02-18

@Roland - the BP sessions were not recorded as MP3s. Some of them were videotaped, but you have to pay for the DVDs.

Rob McDonagh, 2008-02-18

@Volker - Most decent BitTorrent clients support LAN peer discovery for fast file sharing.

Ben Rose, 2008-02-18

How does that increase WiFi bandwidth?

Volker Weber, 2008-02-18

Assuming that most clients are connected on a 54Mb 11g link, it is safe to assume that downloading the files from a LAN peer would be quicker than the IBM download site.

I'm thinking of, for example, the Notes R8 Mac client download that was released during LS2008. Assuming the internet connection didn't max out the wifi connection during the download, then any bandwidth provided from a peer would signigicantly increase download speed.

Ben Rose, 2008-02-18

You talked about hundreds of people. They will always max out a "WiFi connection". How exactly would you limit availability in terms of security?

Volker Weber, 2008-02-18

It's unlikely that the IBM download site would be maxing out the bandwidth between them and the access point. This spare bandwidth could be filled from other peers.

I said in my initial post that security wouldn't be perfect, but torrent file passkey usage can easily be followed at the tracker end. This is implemented quite successfully on private torrent sites.

Without a valid passkey, you can't receive a peer list. Without a peer list, you can't download.

Ben Rose, 2008-02-19

Ben, IBM easily maxes out the bandwidth between the server and the access point. And hundreds of Wifi clients easily overpower an access point. The rest is security theater.

As stated before, BitTorrent is a good way to distribute large amounts of files. It's just your example that is completely flawed.

Volker Weber, 2008-02-19

We'll agree to disagree on this one, I just wish I had decided to do so around 3 posts ago :)

Ben Rose, 2008-02-19

Old archive pages

I explain difficult concepts in simple ways. For free, and for money. Clue procurement and bullshit detection.


Paypal vowe