AcdntlPoet 2700019V2G Visits (7153)
IBM Rhapsody: Test Conductor for Systems - In this video IBM Technical Specialist Andy Lapping takes you through an introduction to Model Based Testing for Systems Engineering models using Rhapsody's Test Conductor tool
AcdntlPoet 2700019V2G Visits (8315)
Overview of Rational Publishing Engine - With IBM Rational Publishing Engine, you can generate high-fidelity documents from your systems and software engineering data in your IBM Rational and third-party tools. This video introduces the benefits of Rational Publishing Engine, the various components of RPE, and the types of artifacts that you’ll work with. This video also includes a demo of building and generating a requirements document in both the desktop Document Studio application and the web-based Document Builder.
See the full listing of videos in the playlist view here: http
RPE on Jazz.net: http
Product documentation: http
Creating doc-style report: http://goo.gl/kBDgA
You can use Rational Publishing Engine to automate the generation of documents for ad hoc use, formal reviews, contractual obligations or regulatory compliance. Built-in capabilities extract data from a range of data sources to help reduce manual work and risk of errors. Rational Publishing Engine provides:
AcdntlPoet 2700019V2G Visits (9351)
Connecting Maximo database to Watson Analytics - Part I: Overview of the steps, architecture and benefits of connecting your Maximo database to Watson Analytics. Additional steps/reference links can be found here
Creating data set from Maximo database in Watson Analytics - Part II: Details how you can create a Watson Analytics data set from a Maximo database connection. Highlights how you can cleanse the data before importing into Watson Analytics, and refresh the data after defining the data set.
AcdntlPoet 2700019V2G Visits (11676)
In this two-part blog series, Bruce Powel Douglass, Ph.D.(Chief Evangelist, IBM Analytics) discusses security in the Internet of Things world, both in terms of the connection and well as the devices themselves.
Securing the Internet of Things. Part 1 – Security in a world of connected devices: Time was when smart embedded devices needed little or no security. They were, for the vast majority, disconnected devices that performed simple dedicated functions. Now, as we hear ever more about the Internet of Things (IoT), it seems everything is connected over the web. Washing machines are connected over the web. This allows unprecedented capabilities for both consumers to connect and manage their lives and for vendors to improve services, monitor usage patterns, deliver updates, and address emerging markets. It is not, however, without risk. [Read more]
Securing the Internet of Things. Part 2 - Securing the ‘Things’ of the IoT: In my last post I discussed the overall challenges of securing the Internet of Things. In this post I focus primarily on the "Things" of the Internet of Things. Certainly securing the cloud end is important as well, but there has always been far more emphasis on cloud security than on device security. I think there are a number of essential aspects of a development environment for designing secure systems [Read more]