With so many security breaches making headlines these days, it’s obvious that security is a hot topic. In this blog, we’ll take a look at 5 things you should know about IBM Business Process Manager (BPM) security, and we’ll point you in the direction of some resources that can help you do everything you can to keep your BPM installation safe and secure.
1. Understand why BPM security is important
Consider the fundamental need for securing your BPM... [Continue Reading]
This post is contributed by Mark Simmonds, Senior Product Marketing Manager, IBM System z software.
Here are 5 things to know about Infosphere System z Connector for HaDoop. For much more, read the IBM Redbooks Solution Guid e: Simplifying Mainframe Data Access with IBM InfoSphere System z Connector for Hadoop
1. You got to Move it Move it - no programming
IBM InfoSphere System z Connector for... [Continue Reading]
Written by Dr. Lisa Sokol, a Data Scientist within the Office of the Chief Technology Officer, IBM Software Group, and US Federal Government Services.
Despite diligent creation of new electric grid standards, these standards are insufficient to address the urgent cyber threats and challenges facing critical infrastructures. The lack of electric grid standard granularity can result in a failure that can stop business, public services, and our daily lives in their tracks. Innovative analytic... [Continue Reading]
IBM Bluemix is a platform as a service (PaaS) offering from IBM, based on the Cloud Foundry open source technology. In this post, I will talk about the top five things you should know before delving into the wonderful world of Bluemix.
Bluemix offers a one stop shop for agile development. It is a developer’s heaven. Here is why?
Bluemix is a PaaS stack that offers developers to rapidly build, deploy and manage their applications. You can pick and choose... [Continue Reading]
Data security is one of the paramount requirements for organizations of all sizes today. Although many have invested heavily in protection from network based attacks and other threats, only a few effective safeguards are available to protect against potentially costly exposures of proprietary data that result from a hard drive being stolen, misplaced, retired, or redeployed.
Self-encrypting drives (SEDs) can satisfy this security deficit by providing the ultimate in security... [Continue Reading]
First, let's say a little about IBM PowerVC. PowerVC is the advanced virtualization management solution built on OpenStack to support IBM Power Systems running IBM AIX, IBM i, and Power Linux. PowerVC adopts major components of OpenStack (such as Keystone for Identity, Nova for Compute, Neutron for Network, Cinder for Storage, Glance for Image, and Ceilometer for monitoring and logging). PowerVC extends the features of these components and introduces new components for IBM... [Continue Reading]
Who said today’s mainframe can’t handle today’s workloads or is too expensive? With the new IBM z13, an 8 core, 22nm processor, the IBM z13’s 141 configurable cores (any mix of CP, IFL, zIIP, ICF, SAP) delivers a 40% total capacity improvement over the zEC12.
IBM z13 is the latest generation of the IBM mainframe to deliver substantial value to the I/O infrastructure, here are five things that you should know about the IBM z13 I/O infrastructure:
... [Continue Reading]
Written by Walid Rjaibi, Senior Technical Staff Member & Chief Security Architect, IBM Information Management
Here are 5 things to know about DB2 Native Encryption available today, January 20th, from IBM ! Read the announcement here.
1. DB2 Native Encryption is transparent to your applications and schemas
DB2 Native Encryption encrypts your data as it is written to disk. It is implemented within the DB2 kernel itself. This means that encryption... [Continue Reading]
I am used to paying my credit card statement on the due day using my online bank account. But last weekend, when I tried to access my bank account to transfer the money to the credit card account, an error message popped up saying "The system is upgrading and this function is not available until 8:00 AM tomorrow." This really upset me. It took almost half a day to finish a system upgrade. How can I pay my credit card dues before crossing the deadline? Why did it take so long for... [Continue Reading]
The latest generation of the IBM mainframe is critical for any IT infrastructure that must be efficient, secure, adaptive, and integrated. The IBM Redbooks team has brought together expertise from around the world to help you explore and realize the potential of the IBM z13. Here are 5 things to know about how IBM Redbooks can guide you through the opportunities this new technology can bring to your business:
1. Learn, adopt, deploy
Whether you need... [Continue Reading]
This blog was written by Vivian Braun , IBM Worldwide Solutions Marketing Executive for Customer Service and Marketing
We are in the age of the empowered customer that has many organizations scrambling to relate to each individual customer on their terms with customized offers that fit their needs and desires. The paper Winning over the empowered consumer by the IBM Institute for Business Value states “Trust is widely recognized as the foundation of interpersonal,... [Continue Reading]
In my long career in the IT industry I’ve been involved with architectures and technologies such as SOA working with clients to create flexible applications that enable companies to respond to rapidly changing markets. In the last few years a new era of IT computing powered by the API Economy has emerged. It allows companies to reimagine their business processes, customer experience, and introduce innovations in new products and services. In this blog post I share with you five... [Continue Reading]
I am an IBM BPM Architect in IBM Software Services and some of my clients have been asking me about the basic case management features that were added in IBM BPM V8.5.5 Advanced. My clients were not exactly sure how they might leverage this new feature in their future projects. I thought about this question and I realized that there are some core concepts about IBM BPM case management that would be good to share. So, here is what I settled upon:
How are an ECM (Enterprise Content... [Continue Reading]
IBM PureApplication System provides many capabilities that allow you to implement high availability strategies (HA) and disaster recovery scenarios (DR) for your workloads. You might consider PureApplication System as a toolbox providing you the tools to implement HA strategies and DR scenarios.
Here are 5 Things to Know about PureApplication System support for HADR, for more detailed information grab a copy of SG24-8246-00... [Continue Reading]
This blog was written by Sam Lightstone, Distinguished Engineer & Chief Architect Data Warehousing IBM Information Management
DB2 10.5 “Cancun” with BLU Acceleration takes a leap forward in simplicity, performance, availability, function, and cloud services. Here are 5 things you need to know about the enhancements to BLU Acceleration :
1. Load-and-go simplicity . Miraculously, and still unique in the industry , BLU Acceleration... [Continue Reading]