IBM Watson Analytics delivers a unified analytics experience on the cloud and helps you focus on the drivers that matter most in your business

IBM United States Software Announcement 214-475
December 16, 2014

Table of contents
 Overview Overview  Publications Publications
 Key prerequisites Key prerequisites  Technical information Technical information
 Planned availability date Planned availability date  Ordering information Ordering information
 Description Description  Terms and conditions Terms and conditions
 Program number Program number  Prices Prices


Top rule
At a glance
Bottom rule

The key capabilities of Watson™ Analytics include:



Back to topBack to top
 
Top rule
Overview
Bottom rule

IBM Watson™ Analytics delivers a unified analytics experience on the cloud and helps you focus on the drivers that matter most in your business. By automating the steps of data access and refinement, predictive analysis, and visual storytelling, Watson Analytics immediately identifies and explains hidden patterns and relationships to accelerate your understanding of why things happened and what is likely to happen.

Watson Analytics lets you ask the right questions and get results in the familiar terms of your business. Just as the first spreadsheet program made financial calculations easier for anyone with a PC, Watson Analytics opens up the world of advanced analytics to all business users on the cloud.



Back to topBack to top
 
Top rule
Key prerequisites
Bottom rule

Watson Analytics requires a supported browser.



Back to topBack to top
 
Top rule
Planned availability date
Bottom rule

December 16, 2014



Back to topBack to top
 
Top rule
Description
Bottom rule

Watson Analytics key capabilities:



Back to topBack to top
 
Top rule
Program number
Bottom rule

Program       Program
number        name
 
5725-R69      IBM Watson Analytics


Back to topBack to top
 
Top rule
Offering Information
Bottom rule

Product information is available via the Offering Information website

http://www.ibm.com/common/ssi

Also, visit the IBM® Cloud Marketplace website

http://www.ibm.com/cloud-computing/us/en/products/Watson-Analytics.html


Back to topBack to top
 
Top rule
Publications
Bottom rule

No publications are shipped with this product.



Back to topBack to top
 
Top rule
Technical information
Bottom rule

Specified operating environment

Hardware requirements

None

Software requirements

Supported browsers:

Security, auditability, and control

IBM maintains privacy and security policies that are communicated to IBM employees. IBM requires privacy and security education training to individuals worldwide who support IBM data centers. Access to client data is allowed only by authorized IBM support representatives. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. Termination and employment change procedures are in place and include return of assets and access right removal.

IBM data center resources are monitored 24x7 by IBM staff. Internal and external vulnerability scanning is regularly conducted by authorized administrators to help detect and resolve potential system security exposures. IBM's data center services support a variety of information delivery protocols for transmission of data over public networks. Examples include HTTPS, SFTP, FTPS, S/MIME, and site-to-site VPN. Backup data intended for off-site storage is encrypted prior to transport.

IBM maintains physical security standards designed to restrict unauthorized physical access to data center resources. Only limited access points exist into the IBM data centers, which are controlled by two factor authentication and monitored by surveillance cameras. Access is allowed only to authorized staff who have approved access. Operations staff verifies the approval and issues an access badge granting the necessary access.

IBM's team reviews security and privacy-related activities for compliance with IBM's business activities. Workforce security education and awareness training is completed by IBM's employees and vendor employees on an annual basis. The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.



Back to topBack to top
 
Top rule
Ordering information
Bottom rule

Charge metric

Authorized User

Authorized User is a unit of measure by which the program can be licensed. An Authorized User is a unique person who is given access to the program. The program may be installed on any number of computers or servers and each Authorized User may have simultaneous access to any number of instances of the program at one time. Licensee must obtain separate, dedicated entitlements for each Authorized User given access to the program in any manner directly or indirectly (for example, via a multiplexing program, device, or application server) through any means. An entitlement for an Authorized User is unique to that Authorized User and may not be shared, nor may it be reassigned other than for the permanent transfer of the Authorized User entitlement to another person.

Note: Some programs may be licensed where devices are considered users. In that case, the following applies. Any computing device that requests the execution of or receives for execution a set of commands, procedures, or applications from the program or that is otherwise managed by the program is considered a separate user of the program and requires an entitlement as if that device were a person.



Back to topBack to top
 
Top rule
Terms and conditions
Bottom rule

The information provided in this announcement letter is for reference and convenience purposes only. The terms and conditions that govern any transaction with IBM are contained in the applicable contract documents such as the Cloud Services Agreement and associated Service Descriptions.

Subscription

The IBM Cloud Services Agreement (CSA) and the Service Description govern your use of this offering.

Technical support

Technical support is provided for IBM SaaS and enabling software, as applicable, during the subscription period. Any enhancements, updates, and other materials provided by IBM as part of any such technical support are considered to be part of IBM SaaS or enabling software, as applicable, and therefore governed by the Cloud Service Agreement and associated Service Description. Technical support is included with IBM SaaS and is not available as a separate offering.

Terms of use

The program's CSA Service Description is available on the IBM Software as a Service Agreements website

http://www.ibm.com/software/sla/sladb.nsf/sla/saas/

Limited warranty

If warranted, refer to the warranty as stated in the Cloud Services Agreement for this offering.

Money-back guarantee

No

Other terms

Volume orders (IVO)

No

IBM International Passport Advantage® Agreement

Passport Advantage applies

No

Software Subscription and Support applies

No

System i® Software Maintenance applies

No

Variable charges apply

No

Educational allowance available

Not applicable



Back to topBack to top
 
Top rule
Statement of good security practices
Bottom rule

IT system security involves protecting systems and information through prevention, detection, and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, or misappropriated or can result in misuse of your systems to attack others. Without a comprehensive approach to security, no IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products, or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party.



Back to topBack to top
 
Top rule
Prices
Bottom rule

For all local charges, contact your IBM representative.

Trademarks

Watson and IBM Watson are trademarks of IBM Corporation in the United States, other countries, or both.

IBM, Passport Advantage and System i are registered trademarks of IBM Corporation in the United States, other countries, or both.

Other company, product, and service names may be trademarks or service marks of others.

Terms of use

IBM products and services which are announced and available in your country can be ordered under the applicable standard agreements, terms, conditions, and prices in effect at the time. IBM reserves the right to modify or withdraw this announcement at any time without notice. This announcement is provided for your information only. Additional terms of use are located at

http://www.ibm.com/legal/us/en/

For the most current information regarding IBM products, consult your IBM representative or reseller, or visit the IBM worldwide contacts page

http://www.ibm.com/planetwide/us/