Henrik Loeser

Cloud App Security – What makes a secure app

Providing a secure app or application is a fundamental requirement. This is especially true in a cloud environment. In my post "Cloud Security and IBM Bluemix - get started" I discussed the various layers that realize secure cloud computing. Today, I want to focus solely on apps that are built for deployment in the IBM Cloud. What makes up a secure app? What cloud services help establishing app security? Let's take a look together.

Continue reading

Lively chatbots: Best Practices

More and more chatbots are being developed and there are good reasons for it. Not all chatbot projects succeed. Often, missing user acceptance is stated. The dialog system might not have hit the nerve, might not have fitted into the target environment. Would you talk with a friend who does not remember your name is repeating the same five phrases over and over again? I would not. So what can be done to make chatbots more lively, more human-like? Here are some best practices and ideas on how to implement them.

Continue reading

Building chatbots: more tips and tricks

You build your first chatbot and it is working ok. Did you know that you can make chatbots even more interactive? That you can access conversation metadata and application variables inside the dialog nodes? You can even use predicates to tailor output to the usage scenario. As a follow up from our "Lessons and Tips from a Chatbot Hackathon", let's dig deeper into important features of the IBM Watson Conversation service on the IBM Cloud with Bluemix.

Continue reading

How to Manage Bluemix Service Keys via CLI

Did you know that you can manage service keys from the command line? Adding new credentials, obtaining keys, and deleting service entries is really simple and fast. In the following, I will show you the commands and use my chatbot project and the IBM Watson Conversation service on Bluemix as example. And I will be using Bluemix in Frankfurt, Germany. So brace yourself for a quick tour through managing service keys from the command line.

Continue reading

Lessons and Tips from a Chatbot Hackathon

Recently, I was a coach at a hackathon in Germany. Students were tasked to build solutions for a given topic and the solution had to include a chatbot based on the IBM Watson Conversation service. It was impressive how broad the solutions were, what other services were integrated with a chatbot and how easy it was to build a solution using IBM Bluemix. Here are some lesson learned and resources to get you started with your own chatbot

Continue reading

Interested in drones and visual recognition tech? 6 Resources to get you up to speed

The Aero Expo, the Global Show for General Aviation, is running in my hometown Friedrichshafen from today until the weekend. One of the expo and conference topics is drones of the future (AERODrones UAS Expo). Drones or UAV (Unmanned Aerial Vehicles) have been and are a hot topic for IBM and its customers. Let me give a brief overview of some interesting work where drones, artificial intelligence, analytics, database systems, Internet of Things (IoT) and the IBM Cloud come together.

Continue reading

Watson Conversation: How to Manage Workspaces

I am a big fan of using the command line as most of you know by now. This applies to interacting with IBM Bluemix cloud and its services and for database systems like DB2 or dashDB. Thus, I was excited when the IBM Watson Conversation service added API functions to manage workspaces for the chatbots.

Continue reading

“Hallo Deutschland” – Getting Started with Bluemix in Germany

"Hallo Deutschland" or "Hello Germany" is an app I recently deployed. I didn't want to push a simple "hello world". The reason is that Bluemix Public is now available in Frankfurt, Germany!

Continue reading

Cloud security and IBM Bluemix – get started

I want to take a broader view and point you to some good introductory material on security for cloud-based workloads ("cloud security"). It consists of an overview of different cloud deployment models and their components, including using IBM Bluemix. Thereafter, it digs into each of those categories and takes a look at how to secure those components and the data.

Continue reading