Technical library

  • spacer Filter by products, topics, and types of content

    (505 Products)

    (755 Topics)

    (20 Industries)

    (14 Types)

Develop and deploy your next
app on the IBM Bluemix
cloud platform.

 

1 - 100 of 15430 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)

View Results
Title none Type none Date down
Managing Vertica clusters in a SaaS environment, Part 1: Copying Vertica databases across the cluster
In the SaaS environment, data information and services are the key to customer success. HP Vertica is a critical database technology that assists customers to better manage their data in a cluster environment. This article illustrates the step-by-step approach for Vertica installation, configuration, and setup across the clusters. As a part of the setup, it is important to complete the installation and configuration and then to copy the database across the cluster. .
Articles 03 Jun 2015
Managing Vertica clusters in a SaaS environment, Part 2: Generating backup scripts for Vertica clusters
In the SaaS environment, data information and services are the key to customer success. HP Vertica is a critical database technology that assists customers to better manage their data in a cluster environment. This article illustrates the step-by-step approach for Vertica database backup across the clusters. To generate the Vertica backup script, a backup host with passwordless SSH enabled and the configuration file must be defined. The backup script is initiated by a cron job based on the backup strategy and the size of the Vertica database.
Articles 03 Jun 2015
Problem reporting for IBM PowerKVM host through IBM Electronic Service Agent for IBM PowerLinux
This article explains the use of IBM Electronic Service Agent (ESA) and the configuration that administrators must perform for reporting hardware problems for IBM PowerKVM hosts automatically.
Articles 02 Jun 2015
Cloud standards: Tools to ensure cloud application interoperability
Global consortia and working groups collaborate on development standards to build an environment of cloud systems that interoperate smoothly with the majority of applications, appliances, and platforms. But these standards are not just frameworks; they are tools for the system designer and application programmer. Here is an overview of their efforts.
Articles 02 Jun 2015
Use social media credentials for your apps using Bluemix Single Sign On
In this tutorial, learn how to secure your web applications using the IBM Single Sign On service in IBM Bluemix. Using this service, you can authenticate users to any web or mobile application. In addition, you can use multiple identity providers like Facebook, Google+, or LinkedIn, as well as any SAML identity provider. Furthermore, you can use a custom user directory directly managed in Bluemix. All identity providers can be used simultaneously so that the end users can choose among them.
Articles 02 Jun 2015
Build a self-posting Facebook application with Bluemix and the MEAN stack, Part 1: Use Facebook as a logon source
This tutorial series shows you how to use the Facebook API and permissions from your Bluemix application running in a Node.js environment. Doing so allows the application to act as a smart agent and, thus, to read and post to Facebook on the user's behalf even when the user is not available. This tutorial, part 1 of the 3-part series, explains how to use Facebook as a logon source
Articles 02 Jun 2015
Build a self-posting Facebook application with Bluemix and the MEAN stack, Part 3: Make the server act on the user's behalf
This tutorial series shows you how to use the Facebook API and permissions from your Bluemix application running in a Node.js environment. Doing so allows the application to act as a smart agent and, thus, to read and post to Facebook on the user's behalf even when the user is not available. This tutorial, part 3 of the 3-part series, provides the final piece in the puzzle: how to make the server act on the user's behalf.
Articles 02 Jun 2015
Build a self-posting Facebook application with Bluemix and the MEAN stack, Part 2: Store user information on the server
This tutorial series shows you how to use the Facebook API and permissions from your Bluemix application running in a Node.js environment. Doing so allows the application to act as a smart agent and, thus, to read and post to Facebook on the user's behalf even when the user is not available. This tutorial, part 2 of the 3-part series, explains how to store user information on the server.
Articles 02 Jun 2015
Predictive analytics using IBM SPSS Modeler in DB2 for z/OS
This tutorial focuses on predictive analytics using IBM SPSS Modeler and data stored in DB2 for z/OS. We illustrate how to use the SPSS Modeler workbench to create predictive models with in-database mining, SQL push-back, and UDF scoring. We walk through the steps for integrating real-time scoring for DB2 for z/OS into an OLTP application. We also show what needs to be done in the DB2 server and the information an application developer needs to know to create an enterprise solution for in-database transactional scoring and batch scoring.
Articles 29 May 2015
Translate your Bluemix application to access global markets
Using the Book Club application as a working example, this article explains how to use the IBM Globalization service's capabilities (service dashboard, full feature RESTful APIs, and sample SDKs) to translate your Bluemix application's static content (user interface). Also learn how to dynamically update your app even as you continue to develop, build, test, and deploy within your Bluemix DevOps environment.
Articles 28 May 2015
Instant web applications with Meteor
With the Meteor web development platform, JavaScript developers can design and build highly interactive and responsive rich-client web applications easily and rapidly. Gain hands-on experience building Meteor apps that take advantage of industry-standard JavaScript libraries. Sing Li goes beyond the hype and explores the promise of Meteor with nontrivial, functional application examples. Ed note: This tutorial has been updated to reflect changes in the Meteor framework, from early beta in 2013 to the current version, 1.1.x.
Also available in: Chinese   Russian   Japanese  
Articles 27 May 2015
Implementing web services security using user name tokens with policy sets in IBM Integration Bus
This tutorial describes how to configure policy sets, policy set bindings, and security profile services while using IBM Integration Bus as a web service consumer to invoke web services secured by Web Services Security (WS-Security) user name tokens.
Articles 27 May 2015
Build a mobile soccer notifications app on IBM Bluemix
Follow along as Joe Lennon exlains how he built the "Occer" application and deployed it on IBM's Bluemix platform. The back-end API layer is built using Ruby, Sinatra, and MongoDB. It uses the freely available football-data.co.uk data feeds to get the latest results. The application itself is an iOS application written in Swift and uses the IBM Bluemix Mobile SDK to handle push notifications.
Articles 26 May 2015
Installing IBM SPSS C&DS Server and other product adapters in a single installation session
The IBM SPSS Collaboration and Deployment Services product (IBM SPSS C&DS) is an application that other IBM SPSS products (Modeler, Statistics, Analytical Decision Management, and so on) use to provide enhanced capabilities. The integration between these IBM SPSS products is achieved by installing product adapters on the base C&DS Server. You can save time and effort by installing the C&DS Server and the adapters together in a single installation session by using IBM Installation Manager.
Articles 22 May 2015
Protecting mobile applications with the IBM Security Access Manager module for IBM DataPower Gateway
The IBM Security Access Manager module for IBM DataPower Gateway delivers strong authentication capabilities to protect mobile applications with multi-factor authentication based on contextual data and enforcement using one-time passwords. Enterprises must protect both consumer and employee mobile applications from malicious attackers to avoid data exposures and unauthorized access to mobile applications. Stronger security can be enforced using multiple authentication factors, often based on "something you know", such as a password, and "something you have", such as a mobile device. In this tutorial, you will learn how to use the ISAM module multi-factor security framework to protect applications based on user credentials.
Articles 22 May 2015
Remote Exploitation of the Cordova Framework
In this report, the authors explain how they have discovered vulnerabilities in at least some versions of Apache Cordova.
Articles 21 May 2015
Improve performance for IBM Operational Decision Manager, Part 3: Reduce response times for hosted transparent decision services
IBM® Operational Decision Manager (ODM) offers a variety of options for optimal performance. Each organization's environment and needs are unique, so guidance about settings to increase performance and to streamline resource management is essential. As part 3 in a series, this tutorial provides recommended settings for addressing performance issues encountered when working with hosted transparent decision services.
Articles 20 May 2015
Use Maven with the Bluemix DevOps Services delivery pipeline
Learn how to integrate existing Apache Maven projects into the delivery pipeline in Bluemix DevOps Services and how to set up Maven projects to make them available as Bluemix DevOps Services projects.
Articles 20 May 2015
IBM Security Trusteer Apex Advanced Malware Protection
This tutorial shows four videos that demonstrate the features of IBM Security Trusteer Apex Advanced Malware Protection.
Articles 20 May 2015
Develop secure cloud-aware applications
Cloud-aware application architectures and designs are becoming increasingly prevalent as developers and organizations recognize their increasing value. Cloud-aware applications tend to be very elastic and easy to scale, faster to develop, and more affordable. Yet while cloud-aware applications have numerous benefits, their architectures can create numerous security challenges for the unaware. This article describes some of the security challenges created by cloud-aware applications and how you can address some of them by following various best practices.
Articles 20 May 2015
Rational Integration Tester in 9 minutes flat
Learn how to record a simple test, play it back, and view the results in under ten minutes.
Videos 19 May 2015
Migrate an app from Heroku to Bluemix
With all of the cloud platforms currently on the market, migrating applications from one to another can present challenges. This tutorial provides a step-by-step method of migrating a sample app from Heroku to IBM Bluemix.
Articles 18 May 2015
Configure IBM Cloud Orchestrator to provision to SoftLayer
Follow the steps in this article to configure IBM Cloud Orchestrator to provision to SoftLayer. IBM Cloud Orchestrator gives you access to ready-to-use patterns and content packs – helping to speed configuration, provisioning and deployment. It integrates management tools such as metering, usage, accounting, monitoring and capacity management into your cloud services. Go live as quickly as you develop and test applications.
Articles 18 May 2015
IBM RFE Community, Release 16
Find out what's new in the RFE Community. With Release 16, the RFE Community provides new features that keep you up to date on the requests you're watching and are interested in.
Articles 15 May 2015
Build a managed API with IBM Bluemix
Use the API Management service in Bluemix to create and publish your own APIs in the cloud. This tutorial helps you explore how API Management and Bluemix can help you participate in the API economy.
Articles 13 May 2015
PHP renewed: Composer for PHP dependency handling
Today's complex PHP projects often use multiple third-party libraries that in turn have their own dependencies. Find out how Composer, an open source project built in PHP for the PHP community, takes the pain out of dependency handling for your modern PHP applications.
Articles 13 May 2015
Improve performance for IBM Operational Decision Manager, Part 2: Reduce rule execution resource consumption
IBM® Operational Decision Manager (ODM) offers a variety of options for optimal performance. Each organization's environment and needs are unique, so guidance about settings to increase performance and to streamline resource management is essential. As part 2 in a series, this tutorial provides recommended settings for addressing performance issues encountered when working with the Rule Execution Server.
Articles 13 May 2015
Working with the JMS Connector in WebSphere Cast Iron, Part 1: Configuring JMS in WebSphere Application Server
Part 1 of this 2-part tutorial series explains how to configure Java Messaging Service in WebSphere Application Server when connecting from WebSphere Cast Iron Studio to the JMS Connector. This tutorial also addresses configuration issues when connecting to the JMS Connector.
Articles 13 May 2015
Implementing Salesforce federated single sign-on with WebSphere DataPower, Part 2: Identity provider initiated SSO using an encrypted and signed SAML assertion
This four-part tutorial series describes a Salesforce federated single sign-on solution using WebSphere DataPower as an identity provider. Part 2 describes how to implement an identity provider initiated single sign-on to Salesforce using an encrypted and signed SAML assertion.
Articles 13 May 2015
Implementing Salesforce federated single sign-on with WebSphere DataPower, Part 1: Implementing an identity provider initiated SSO using a signed SAML assertion
This four-part tutorial series describes a Salesforce federated single sign-on solution using WebSphere DataPower as an identity provider. Part 1 of this series discusses how to implement an identity provider initiated single sign-on to Salesforce using a signed SAML assertion.
Articles 13 May 2015
Implementing Salesforce federated single sign-on with WebSphere DataPower, Part 3: Implementing a service provider initiated SSO using a signed SAML assertion
This four-part tutorial series describes a Salesforce federated single sign-on solution using WebSphere DataPower as an identity provider. Part 3 discusses how to implement the service provider initiated single sign-on to Salesforce using a signed SAML assertion.
Articles 13 May 2015
Implementing Salesforce federated single sign-on with WebSphere DataPower, Part 4: Service provider initiated single sign-on using an encrypted and signed SAML assertion
This four-part tutorial series describes a Salesforce federated single sign-on solution using WebSphere DataPower as an identity provider. This last part of the tutorial series, Part 4, discusses how to implement the service provider initiated single sign-on to Salesforce using an encrypted and signed SAML assertion.
Articles 13 May 2015
IBM Security Services 2014 Cyber Security Intelligence Index
IBM Managed Security Services publishes an annual Cyber Security Intelligence Index, summarizing security "events" experienced the previous year by its clients worldwide. The 2014 Index reports that in 2013, more than half a billion records—including names, emails, credit card numbers, and passwords—were stolen. It is estimated that each lost data record costs companies an average of $145. Learn more in this white paper.
Articles 12 May 2015
Introduction to IBM Datacap Taskmaster Capture 8.1 Development Kit
Learn about the cross-industry and industry specific sample applications and tools available in the IBM Datacap Taskmaster Capture Development Kit (DDK), and find links to each of the components.
Also available in: Chinese   Russian   Portuguese  
Articles 12 May 2015
Develop mobile apps with IBM MobileFirst Object Store Adapter and backend IBM Spectrum Scale Object
Explore the need for easy integration of mobile applications with data stored on object stores. Cloud storage enables users and applications to store data remotely and access it from anywhere, at any time, and from any device. In this article, we review IBM Spectrum Scale Object, a state-of-the-art object store offering, and IBM MobileFirst, a popular platform for developing multi-platform mobile applications. We then show you a custom-built MobileFirst adapter that can be used to develop mobile apps with easy access and integration with the data stored on the IBM Spectrum Scale Object store.
Articles 11 May 2015
Build a data mining app using Java, Weka, and the dashDB service
The dashDB (formerly known as Analytics Warehouse and BLU Acceleration) service provides data warehousing and analytics as a service on IBM Bluemix. Developers can develop and deploy a heavy-duty analytic application using blazing-fast IBM BLU database technology offered in the cloud. Learn how to develop a data mining application using the Weka statistical analysis tool and leveraging the IBM BLU columnar database.
Also available in: Chinese   Russian   Japanese  
Articles 08 May 2015
Create a business intelligence and analytics service in Ruby with the dashDB service
The dashDB Service available in IBM Bluemix provides a powerful, easy-to-use, and agile platform for business intelligence and analytics. It is an enterprise-class managed service that is powered by the in-memory optimized, column-organized BLU Acceleration data warehouse technology. This article demonstrates how easy it is to incorporate the dashDB service into your application so that you can focus on your application.
Also available in: Chinese   Russian   Japanese   Spanish   Spanish  
Articles 08 May 2015
Develop a public transportation system simulator with Node.js and the dashDB service
This article shows you how to develop a simulator of public transportation system using cloud services such as IBM DevOps Services, IBM Bluemix, and dashDB (formerly known as Analytics Warehouse and BLU Acceleration). Developers with intermediate knowledge of JavaScript and those who want to get started with cloud services can learn how to develop a simple but useful application for data analysis and streams.
Also available in: Chinese   Russian   Japanese  
Articles 08 May 2015
Analytics for Hadoop on Bluemix, Part 1: Analytics for Hadoop on Bluemix: Sign in and access the service
Sign up for a free IBM Bluemix account, log in to Bluemix, and start the Hadoop for Analytics service.
Also available in: Chinese   Japanese   Portuguese  
Articles 08 May 2015
Move a toy car with your mind
Learn how to extract brain wave data from the Muse wearable device to perform an action in the real world: in this case, move a toy car. The article explains how to work with the Arduino and the toy car remote control from the hardware side; and from the software side, how to work with Bluemix to create a Node.js web application to see real-time brain wave activity.
Also available in: Chinese   Russian   Portuguese   Spanish  
Articles 08 May 2015
Build a Big SQL app using the IBM Analytics for Hadoop Service
Build a sample application that uses the IBM Analytics for Hadoop Service, which runs on a cloud-based instance of IBM InfoSphere BigInsights Enterprise Edition, to explore social media data for global coverage of the IBM Watson brand. Query the data by using Big SQL (IBM's SQL interface to its Hadoop-based platform, InfoSphere BigInsights) and deploy a WAR file that contains a Java application that reads the data. The sample application that you create for your users can dynamically run queries on the data.
Also available in: Chinese   Japanese   Portuguese  
Tutorial 08 May 2015
Process home monitoring data using the Time Series Database in Bluemix
Learn how to create, store, and analyze sensor data using a Time Series Database on Bluemix.
Also available in: Chinese   Japanese  
Articles 08 May 2015
Building a REST service with integrated web services server for IBM i: Part 2
Rapidly changing application environments require a flexible mechanism to exchange data between different application tiers. Representational State Transfer (REST) has gained widespread acceptance across the web as the interface of choice for mobile and interactive applications. You might already be using integrated web services server to expose ILE programs and service programs as SOAP-based web services. This series of articles introduces a powerful new feature of the integrated web services server – the ability to deploy ILE programs and services programs as RESTful web services. In this second part, you will learn how to deploy a simple application as a RESTful web service.
Articles 08 May 2015
Building a REST service with integrated web services server for IBM i, Part 3
Rapidly changing application environments require a flexible mechanism to exchange data between different application tiers. Representational State Transfer (REST) has gained widespread acceptance across the web as the interface of choice for mobile and interactive applications. You might already be using integrated web services server to expose ILE programs and service programs as SOAP-based web services. This series of articles introduces a powerful new feature of the integrated web services server – the ability to deploy ILE programs and services programs as RESTful web services. In this third part, you will learn how to deploy an application as a RESTful web service using multiple Hypertext Transfer Protocol (HTTP) methods.
Articles 08 May 2015
Building a REST service with integrated web services server for IBM i: Part 1
Rapidly changing application environments require a flexible mechanism to exchange data between different application tiers. Representational State Transfer (REST) has gained widespread acceptance across the web as the interface of choice for mobile and interactive applications. You might already be using integrated web services server to expose ILE programs and service programs as SOAP-based web services. This series of articles introduces a powerful new feature of the integrated web services server – the ability to deploy ILE programs and services programs as RESTful web services. In this first part, you will learn the basic REST concepts and how integrated web services server supports REST services.
Articles 08 May 2015
The SQL reference for cross-platform development
Great news for people who want to write portable applications! This reference makes it easy for you to develop applications using SQL that is portable across the DB2 database family, including DB2 for z/OS Version 11, DB2 for i Version 7.2, and DB2 for Linux, UNIX, and Windows Version 10.5.
Also available in: Russian  
Articles 07 May 2015
DB2 with BLU Acceleration: A rapid adoption guide
You have probably heard how DB2 with BLU Acceleration can provide performance improvements ranging from 10x to 25x and beyond for analytical queries with minimal tuning. You are probably eager to understand how your business can leverage this cool technology for your warehouse or data mart. The goal of this article is to provide you with a quick and easy way to get started with BLU. We present a few scenarios to illustrate the key setup requirements to start leveraging BLU technology for your workload.
Also available in: Chinese   Russian  
Articles 07 May 2015
Build an enterprise-scale database of SEC financial data with Bluemix and Cloudant
A huge amount of unstructured or semi-structured data is available on the Internet today. NoSQL databases able to dynamically load content in nearly any shape have made putting this data into an accessible form much easier. This tutorial explains how to build or replicate a data set in the eXtensible Business Reporting Language (XBRL) format, the type used by the U.S. Securities and Exchange Commission.
Articles 06 May 2015
Find cross-site scripting errors in your Bluemix application with AppScan Dynamic Analyzer
In this short demo video, Ori Pomerantz shows a Bluemix application that has a cross-site scripting error in it. Then he shows how to add the AppScan Dynamic Analyzer service to the application and run a scan. He shows that the scan report detects the cross-site scripting error and provides guidance on how to fix it.
Articles 06 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 9: Customization scenario for scope and identity support
Part 9 of this multi-part series describes how you can customize WebSphere DataPower's native OAuth scope and identity support.
Articles 06 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 10: Customization scenario for additional extension points
The final part of this multi-part series describes how you can use extension points for fine-grained control of WebSphere DataPower's native OAuth support.
Articles 06 May 2015
Collect and analyze social data without writing a single line of code
Do you think about how much you might learn from analyzing social data, but don't act because you don't have enough time or resource to build what you need? In this tutorial, we show you how easy it is to use the Node-RED workflow editor in IBM Bluemix to capture a social data feed (a Twitter feed) and then build a Hadoop Distributed File System (HDFS) file from that data. We also show you how to use the IBM Analytics for Hadoop service to analyze the data and produce summary charts. You’ll be amazed at how easy it is to turn an unknown data set into information you can use.
Articles 06 May 2015
Add language translation to your apps with IBM Watson
Add machine translation to your Bluemix apps. Use Node-RED and the Machine Translation service to create an app that translates text that the user enters and performs sentiment analysis on that text.
Articles 06 May 2015
4 experimental Bluemix services you'll want to try
Check out the latest almost-ready-for-prime-time boilerplates and services on IBM Bluemix, including selections from integration testing, data management, content management, application quality, and application infrastructure.
Also available in: Chinese   Japanese  
Articles 05 May 2015
Enhance storefront applications with IBM Sterling Order Management System (OMS)
You can integrate your e-commerce storefront with the industry-leading order management and inventory visibility capabilities of Sterling Order Management System (OMS) by using the IBM Sterling Service Definition Framework (SDF). SDF provides out-of-box services that you can build into a communications pathway between OMS and an external system. Sterling services provide two integration models: order capture and inventory availability. You can implement these integration models or build your own integration by modifying the Sterling services or by creating your own services.
Articles 05 May 2015
Examine different types of cross-site scripting attacks
Cross-site scripting (XSS) occurs when a browser renders user input as a script. Any website accepting user input without validation is vulnerable to XSS attacks. In this report, Nikita Gupta explains more about XSS and provides ways to deter them.
Articles 05 May 2015
Enable social network logins by using the Bluemix Single Sign On service
This tutorial shows you how to add user authentication to your IBM Bluemix applications by using Single Sign On services. Learn how to create and deploy a Node.js application, bind the Single Sign On service to the application, and add popular identity sources such as LinkedIn, Facebook, and Google+, or a custom Cloud Directory to your application.
Articles 04 May 2015
Strengthen application protection from design to deployment
Discover how effective application security programs can help organizations protect their priceless digital assets in the cloud with this "Securing Applications for a Safe Cloud Environment" paper.
Articles 04 May 2015
From manual to continuous automated deployment of IBM MobileFirst mobile applications
This article describes how to use IBM UrbanCode Deploy to define a DevOps deployment solution for IBM MobileFirst Platform Foundation (formerly Worklight) mobile artifacts. By defining a deployment using UrbanCode Deploy with the IBM MobileFirst Platform plugin, mobile teams can respond to feedback faster and have a repeatable process with reduced risk.
Also available in: Chinese   Portuguese  
Articles 01 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 1: Introducing OAuth 2.0 support in DataPower
This article is the first in a multi-part series of articles describing OAuth support on WebSphere DataPower Appliances. Part 1 starts with an overview of OAuth and then describes DataPower support for OAuth roles. The rest of the article series will go into detail on several aspects of OAuth and DataPower usage and configuration.
Also available in: Portuguese  
Articles 01 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 6: Grant type scenario for authorization codes
Part 6 of this multi-part series describes WebSphere DataPower Appliance support for the OAuth 2.0 authorization code grant type. It covers configuration for both the authorization server and the enforcement point.
Articles 01 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 5: Grant type scenario for client credentials
Part 5 of this multi-part series describes WebSphere DataPower Appliance support for the OAuth 2.0 client credential grant type. It covers configuration of both the authorization server and the enforcement point.
Articles 01 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 4: Grant type scenario for resource owner password credentials
Part 4 of this multi-part series describes WebSphere DataPower Appliance support for the OAuth 2.0 resource owner password credential grant type. It covers configuration for both the authorization server and the resource server.
Also available in: Portuguese  
Articles 01 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 3: Form login policies and the role of AAA
Part 3 of this multi-part article series discusses DataPower AAA policies, form login policies, and their role in supporting the OAuth 2.0 protocol. Since the form login policy provides value beyond its OAuth role, a form-based authentication service proxy is implemented with a multi-protocol gateway to demonstrate how the AAA policies and form login polices work together. As mentioned in Part 2, the WTS wizard is employed in a form-based OAuth scenario to demonstrate the automation of many of the manual MPGW steps.
Articles 01 May 2015
Implementing OAuth on IBM WebSphere DataPower Appliances, Part 2: Introducing the Web Token Service
Part 2 of this multi-part article series provides an introduction to the WebSphere DataPower Web Token Service (WTS). The WTS is an authentication and token mediation service used to implement the authorization server role within an OAuth scenario. We’ll demonstrate how to configure and debug a WTS. We’ll also provide an introduction to the forms-based login policy that can be used within Authentication, Authorization, and Auditing (AAA) policies associated with the WTS to produce login and associated forms.
Also available in: Portuguese  
Articles 01 May 2015
Configuring InfoSphere Data Replication CDC on Microsoft cluster services with failover capability
InfoSphere Data Replication (IIDR) CDC supports data replication from databases running on Windows Cluster services. Follow the step-by-step process that outlines all the required tasks to configure IIDR CDC on MSCS with failover capability.
Articles 30 Apr 2015
Disaster recovery guidance for IBM Business Process Manager
IBM Business Process Manager (BPM) is a powerful tool for modeling and running an organization's most critical business processes. Over the past several years, features have been developed and verified to enable cross-site replication and recovery, achieving very sophisticated disaster-recovery objectives. Learn about the core principles that guide an infrastructure architect to design a successful disaster-recovery strategy.
Articles 30 Apr 2015
Integrating WebSphere Portal and Commerce via REST Services
Demonstrating example business-to-customer scenarios, you can learn how to use WebSphere Commerce REST services to integrate WebSphere Portal and WebSphere Commerce.
Also available in: Chinese  
Articles 30 Apr 2015
Build and deploy a scalable contacts application in the cloud, Part 2
Leverage MongoDB features to build powerful, scalable MongoDB-powered cloud applications. To show how easy it is, Part 1 takes you through the process by building a PHP/jQuery address book application that lets you store and manage contacts using a MongoDB database hosted in the IBM Bluemix cloud. Part 2 shows how to add multiple users and deploy your application to Bluemix. Needless to say, it's all mobile-friendly too, so you can deploy your application to Bluemix and immediately start using it on a tablet or smartphone.
Articles 30 Apr 2015
Build and deploy a scalable contacts application in the cloud, Part 1
Leverage MongoDB features to build powerful, scalable MongoDB-powered cloud applications. To show how easy it is, Part 1 takes you through the process by building a PHP/jQuery address book application that lets you store and manage contacts, using a MongoDB database hosted in the IBM Bluemix cloud. Part 2 shows how to add multiple users and deploy your application to Bluemix. Needless to say, it's all mobile-friendly too, so you can deploy your application to Bluemix and immediately start using it on a tablet or smartphone.
Articles 30 Apr 2015
Enabling license scanning with IBM Endpoint Manager and IBM PureApplication Software on Microsoft Azure
In IBM PureApplication Software on Microsoft Azure, administrators are responsible for tracking and reporting the use of IBM licensed products installed on deployed virtual machines. This tutorial shows you how to set up the software to collect this information
Also available in: Chinese  
Articles 29 Apr 2015
Build an iOS app using the IBM Mobile Data for Bluemix service
Build an iOS application using the IBM Mobile Data for Bluemix service available on IBM Bluemix. This multi-part series will gradually build, with each part introducing you to new services. This tutorial includes a demo, sample code, and complete instructions for creating the BlueList iOS application. You can apply what you've learned to integrate IBM Mobile Data for Bluemix, IBM CloudCode for Bluemix, and IBM Push for Bluemix services into your own applications.
Also available in: Chinese   Russian   Japanese   Portuguese   Spanish  
Articles 28 Apr 2015
Women in technology: Making an impact
In this video, first in a series from IBM developerWorks, some of IBM's prominent female technical leaders share their experience and insight on various technical topics.
Articles 28 Apr 2015
Install Rational License Server on AIX for UrbanCode Deploy
This article teaches you how to set up a Rational License Server on an AIX system and configure a license key for IBM UrbanCode Deploy.
Articles 28 Apr 2015
See IBM Bluemix in action
Watch as David Barnes demos Bluemix, IBM's platform as a service offering, and the centerpiece of its cloud strategy, to the NYTECH Meetup using a Sphero.
Articles 28 Apr 2015
6 design principles for great Apple Watch apps
Following a few guiding principles will help you design your Apple Watch app for great results. This article summarizes the Apple Human Interface Guidelines, which focus on scannable apps and quick user-centric interactions. Designing for a small screen, optimizing for minimal power use, and ensuring app accessibility also present unique challenges.
Articles 28 Apr 2015
Build a remote-controlled Raspberry Pi 2 monitor for your IBM Bluemix apps
Demystify the Internet of Things with a hands-on project that uses the IBM Internet of Things Foundation to interconnect your devices and apps. Set up a Raspberry Pi 2 to monitor uptime and access time for a running IBM Bluemix app, capturing the results in a graphing app that you can deploy to Bluemix. And code a desktop application that controls the Raspberry Pi 2 monitor remotely.
Articles 28 Apr 2015
What is IBM Bluemix?
IBM Bluemix is the newest cloud offering from IBM. Bluemix is a platform as a service (PaaS) offering based on the Cloud Foundry open source project that delivers enterprise-level features and services that are easy to integrate into cloud applications. This article provides a high-level overview of Bluemix and Cloud Foundry and the differences between the two. It also lists some of the Bluemix services available in the Bluemix Catalog.
Also available in: Chinese   Russian   Japanese   Portuguese   Spanish  
Articles 27 Apr 2015
Mail-E-Vent
Mail-E-Vent adds the ability of sending email notifications to Security AppScan. Users can configure which events will trigger an email, as well the ability to send a PDF report at the end of the scan.
Downloads 27 Apr 2015
Speak and Scan
This eXtension uses the Microsoft Win32 Speech API (SAPI) to make IBM Security AppScan speak in human voice when certain events occur during scan. You can configure what voices will be used through the Windows text-to-speech (TTS) engine.
Downloads 27 Apr 2015
Improve IBM QRadar LDAP authentication
The IBM QRadar platform supports various authentication types, enabling you to configure different authentication mechanisms to validate users and passwords. The most widely used authentication source in today's dynamic infrastructure is LDAP (Lightweight Directory Access Protocol). While IBM QRadar supports LDAP as an authentication type, the supported integration can be less than satisfactory. This article explains a solution that uses Tivoli Directory Integrator, which works as a "man-in-the-middle" to receive secure anonymous requests from QRadar and send authenticated requests to the LDAP Authentication Server.
Articles 27 Apr 2015
Explore IBM Bluemix
Join IBM's David Barnes as he demonstrates IBM Bluemix, an in-the-cloud platform that provides the cloud application capabilities that will power the next generation of cloud applications and services.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 27 Apr 2015
Improve ETL performance in BLU Acceleration
IBM DB2 with BLU Acceleration is a leap forward in database technology to improve query performance, particularly in the data warehouse (DWH) and decision support system (DSS) environments. It leverages dynamic in-memory, actionable compression, parallel vector processing, and data-skipping innovations from IBM Research to deliver a unique combination of performance, ease of use, and cost efficiency. In real-time reporting systems where the ETL process needs to update/delete data frequently from column-organized tables, it usually takes more time, resulting in performance issues for reports and dashboards. Learn how to improve these functions.
Articles 23 Apr 2015
IBM RFE Community
Servers and Systems Software now supports several products that enhance your ability to enter Requests for Enhancements.
Articles 23 Apr 2015
Develop a Xamarin.Forms app for the IBM MobileFirst Platform
See how to develop an Android and iOS Xamarin.Forms app and integrate it with the IBM MobileFirst Platform in this instructional video.
Articles 22 Apr 2015
Create an Apple Watch application with the IBM MobileFirst Platform, Part 1
See how to use the IBM MobileFirst native iOS SDK to develop Apple Watch applications in this instructional video.
Articles 22 Apr 2015
Create an Apple Watch application with the IBM MobileFirst Platform, Part 2
See how to use the IBM MobileFirst native iOS SDK to develop Apple Watch applications in this instructional video.
Articles 22 Apr 2015
Data integration at scale: Query RDF data with SPARQL
Now that you understand the Resource Description Framework (RDF) data model, learn ways to use the SPARQL Protocol and RDF Query Language (SPARQL) to get answers from RDF data sets. Later in this five-part series on data-integration standards and technologies, you'll put your SPARQL knowledge to work by querying Open Services for Lifecycle Collaboration (OSLC) data.
Articles 22 Apr 2015
Continuous Engineering: Work Smarter With Configuration Management - Part 1
Video 1: Configuration Management in and across the Engineering Lifecycle. Get the big picture in this gentle introduction to the basic concepts that will be demonstrated in the other videos in the series.
Videos 21 Apr 2015
Continuous Engineering: Work Smarter With Configuration Management - Part 2
Video 2: Configuration Management in and across the Engineering Lifecycle. See how teams can use configuration management to make their work easier.
Videos 21 Apr 2015
Continuous Engineering: Work Smarter With Configuration Management - Part 3
Video 3: Configuration Management in and across the Engineering Lifecycle. See how teams can use linking to create traceability in configurations.
Videos 21 Apr 2015
Continuous Engineering: Work Smarter With Configuration Management - Part 4
Video 4: Configuration Management in and across the Engineering Lifecycle. See how teams can work in parallel and deliver changes to other development streams representing product variants or releases.
Videos 21 Apr 2015
Build a graphical KPI dashboard app with Dojo Mobile
Dojo Mobile can greatly reduce your mobile development time while creating intuitive, rich visuals that scale well across the more popular mobile devices. In this tutorial, learn how to use Dojo Mobile's charting and gauging libraries to deliver your organization's key performance indicators to business users and managers via a mobile KPI app.
Articles 20 Apr 2015
Cyber-physical systems and smart cities
Today’s urban environments present many challenges for cyber-physical systems (CPSs) and smart cities. This article introduces CPSs and provides real-world use cases for this technology. This article also describes the social and technical challenges that smart cities will face in the near future.
Articles 20 Apr 2015
OWASP top 10 vulnerabilities
Look at the top 10 web application security risks worldwide as determined by the Open Web Application Security Project. Then discover how IBM Security AppScan helps website administrators find, correct, and avoid these and other web security threats.
Articles 20 Apr 2015
Mobile DevOps, Part 1: Implement enterprise-scale iOS continuous builds with UrbanCode Deploy
Implement an enterprise-scale continuous-build system for iOS apps. See how the IBM Apple Solutions Team uses IBM UrbanCode Deploy to customize its continuous-build capability.
Articles 20 Apr 2015
IBM Business Analytics Proven Practices: Configure Microsoft Internet Information Services 7.x for IBM Cognos 10
How to set up IBM Cognos 10 with Internet Information Services (IIS) 7.x. This document applies to IIS 7.x installed on a Windows 2008 Server (GA or R2) and all versions of IBM Cognos 10 Business Intelligence and/or Enterprise Planning. The only gateway implementations covered in this document are ISAPI and CGI as those are the only ones supported by IIS.
Also available in: Chinese  
Articles 16 Apr 2015
The WebSphere Contrarian: Are you getting the most out of virtualization?
Much has happened in the area of virtualization since the topic was first discussed in this column, so this is a good time to revisit (or re-introduce) virtualization and all its flavors to help you determine which type of virtualization could benefit your organization the most, and how to make it the most effective.
Also available in: Chinese  
Articles 16 Apr 2015
Pull into the Bluemix Garage
The IBM Bluemix Garage is exactly that: a garage environment that fosters unbridled innovation between startups and enterprises, with IBM Bluemix as the centerpiece that makes it all possible.
Articles 16 Apr 2015
Explore the OpenStack REST APIs for PowerVC
IBM Power Virtualization Center Express Edition (PowerVC) is an IaaS cloud solution designed to make it easier to build and manage virtual resources in a Power Systems Software Defined Environment or a cloud infrastructure. It is primarily based on OpenStack and includes OpenStack industry-standard application programming interfaces. Learn about the APIs for each OpenStack component and the tasks the APIs can help you complete.
Also available in: Russian   Japanese  
Articles 16 Apr 2015

1 - 100 of 15430 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)