IBM Research senior software application developer Senthil Nathan joins me to talk about opening up the IBM InfoSphere Streams platform to Python code with the goal of performing analytics in InfoSphere. You can dive deeper into this topic by reading Senthil's (and Glenn Hochberg's) article, Calling Python code from IBM InfoSphere Streams.
Also among this week's valuable bits of knowledge:
Segment producer for IBM Developer Relations Steve Curtis joins me to talk about IBM SmartCloud Application Services, IBM's Platform as a Service offering. You can dive deeper into this topic by following the podcast series on it, Experts talk about cloud services.
Also among this week's valuable bits of knowledge:
In this series, examine how to build the same basic extension for Chrome, Firefox, and Safari; learn what it's like to extend each browser; discover how hard or easy it is to perform some common tasks; and realize how to distribute your extension. Bookmark the Create your own browser extension series.
WebSphere Client Technical Professional Simon Dickerson joins me to talk about how IBM can help you create rock-solid, public-facing web APIs (because they are a critical part of your organization's public image). You can dive deeper into building better web APIs by reading Simon's (and Tanmayee Potluri's) article Introduction to Cast Iron Live Web API Services.
Also among this week's valuable bits of knowledge:
Nader Nassar, an integral part of the CIO Innovation for Security team, joins me to talk about how IBM can help you with your dynamic testing of mobile apps. You can dive deeper into mobile application dynamic testing by reading Nader's (and Carlos Hoyos and Daniel Anderson's) article Secure Your Mobile applications.
Also among this week's valuable bits of knowledge:
CTO of App47 Andy Glover joins me to talk about how to design mobile applications to accommodate how we use them and how we shouldn't use them sometimes. You can dive deeper into Andy's topic in his article series, Mobile for the masses; the latest is on
Also among this week's valuable bits of knowledge:
William von Hagen from WordSmiths discusses Scribus, the open source, graphical desktop publishing (DTP) tool that focuses on layout, frames, styles, color management, and intercolumn document flow. Scribus is free software that runs on the Linux, Windows, and Mac OS X platforms, and provides most of the capabilities of traditional DTP tools at no cost.
Other news This Week On developerWorks
Lalatendu Patro is a software deveoper at IBM who's just published an article on the Net Search Extender verification tool to make sure your full text searches on DB2 databases are as accurate as possible.
Timi Ogunjobi is a software engineer and author at Xceedia Limited who is an expert at setting up Drupal multisite installs. His article will show you step by step instructions for installing Drupal so that you can run and manage multiple independent Drupal-based web sites from a single install.
Bhargav Perepa , IT Specialist at IBM, discusses his new article series on server-side app mobile app development. He explains how to use IBM® Rational® Application Developer for WebSphere® Software and IBM® Worklight together to develop applications for mobile devices, including those that run Android, iOS, BlackBerry, and Microsoft Windows Metro operating systems.
Thejaswini Ramachandra and Pradeep Bhat, Girish Dhanakshirur have published a new article called Send SMS push notifications to your mobile app using IBM Worklight. One of the key requirements for enterprise apps is the ability to send short messages (as notifications or alerts) to mobile clients. Notifications drive user engagement and can be based on events or triggered by user behavior or by some pre-condition. IBM® Worklight® V5.0.5 provides support for sending SMS/text notifications to mobile devices in addition to smart phone push notifications. This article explains how you can set up and send SMS notifications with Worklight, using a retail banking scenario as an example. Sample mobile app source is provided to illustrate how to subscribe and receive SMS notifications.
Sherif Sakr published An introduction to InfoSphere Streams to introduce the world to the IBM's architecture and offerings that can process vast amounts of generated streaming data in real time. Find out what the product is designed to do, when it can be useful, how it works, and how it can complement InfoSphere BigInsights™ to perform highly complex analytics.
Jeff Hoy talks about his article "Enabling the OAuth service provider in WebSphere Application Server." OAuth 2.0 service provider support was added as part of IBM® WebSphere® Application Server versions 22.214.171.124, 126.96.36.199, and 188.8.131.52. This article provides an overview of OAuth support highlighting architecture, new features, and the minimal configuration steps needed to enable the capability. The article also includes debugging tips, resource links, and pointers for advanced configurations.
David Jarvis, from the IBM Center for Applied Insights, discusses a new report from the Center for Applied Insights called their report, "Cybersecurity education for the next generation" He explains the three types of collaboration recommended for institutions that want to develop a cybersecurity curriculum and discusses three cases studies from the report.
Nancy Wang and Igor Todorovski have published "Using PHP and cURL for server-side caching of dynamic web pages." In this article they explain how they save a substantial amount of processing and load time by using PHP and cURL to cache dynamic web pages on the server. Their method caches session variables, as well as the HTML.
Cynthia M. Saracco, Gary Robinson, and Vijay Bommireddipalli have published "Analyze text from social media sites with InfoSphere BigInsights" This article introduces you to the text analytic development and runtime environments of BigInsights, highlighting how you can use Eclipse-based tools to create, test, and publish text extractors on your cluster so you can analyze content relevant to your application.
Gurudutt Kumar has published "Considerations in software design for multi-core multiprocessor architectures" Today's chip multithreaded, multi-core, multiprocessor systems provide software designers a great opportunity to achieve faster and higher throughput.However,there are a few key design considerations, if ignored, could result in hard-to-find performance issues and scalability bottlenecks.These key design considerations are discussed in this article.
Angel Diaz, Vice President, Software Standards and Cloud Labs, recaps IBM's announcement at the Pulse conference to join OpenStack, discusses IBM's participation in open cloud standards, and outlines the key points in his article, "IBM's open cloud architecture."
More items from this episode:
Jake Stoeffler and Eric Herness published an article titled "Approaching continuous availability in WebSphere Process Server V7." This article provides background, insights, and a pragmatic set of techniques for installing application updates and product fix packs in WebSphere® Process Server V7.0 environments where continuous availability is desired.
Kiran Batchu shows youhow to configure the Log4j node in a WebSphere Message Brokermessage flow. The Log4j node enables you to use different levels of logging, so that at runtime, without modifying the application code., you can enable or disable specific logging nodes in a message flow while others remain unaffected.
Oktawian Powązka has atwo part article serieson how to implement single sign-on in some of the most challenging run-time environments using IBM Security Access Manager for enterprise single sign on.
Roger Sanders has published a new guide called "DB2 10.x certification: Everything you need to know" which covers the reasons you might want to get certified as a DB2 Professional, the different types of certifications that are available, and how to prepare for certification exams.
Andrew Hoppe and Jeff Klink have published "New APIs in IBM SmartCloud Enterprise 2.2" to describe the use of the new APIs, outline their use cases, describe their functions, and show code samples. The new APIs cover user management, guest messaging, service offering management, service instance management, and storage unit provisioning
Indrani Ghatare, Matt Kalan, Sundari Voruganti, and Kathryn Zeidenstein have just published a two part article series called "InfoSphere Guardium data security and protection for MongoDB." This article series describes how to monitor and protect MongoDB data using IBM InfoSphere® Guardium®. Part 1 describes an overview of the solution, the architecture, and the benefits of using InfoSphere Guardium with MongoDB. Part 2 describes how to configure InfoSphere Guardium to collect MongoDB traffic and describes how to create security policy rules for a variety of typical data protection use cases, such as alerting on excessive failed logins, monitoring privileged users, and alerting on unauthorized access to sensitive data.
Rahul Gupta and Devipriya Selvarajan have published an article series called "Load balancing WebSphere Message Broker HTTP traffic" WebSphere Message Broker V8 lets you generate a configuration file for the WebSphere Plug-in or Apache mod_proxy modules, which are used by IBM HTTP Server and Apache HTTP Server respectively to enable HTTP load balancing. Part 1 of this two-part series shows you how to configure load balancing for WebSphere Message Broker HTTP traffic using WebSphere Plug-in and IBM HTTP Server.
Matt Lucas is the lead architect for the IBM Integration Bus. They've just released version 9 of the product and he's written an article to introduce people to the new features in this version. IBM Integration Bus is IBM's strategic integration product for Java, Microsoft .NET, and heterogeneous integration scenarios. It represents a significant evolution of the WebSphere Message Broker technology base, and includes new features such as policy-based workload management, business rules, and integration with Business Process Management (BPM) and Microsoft .NET. It also incorporates WebSphere Enterprise Service Bus (ESB) use cases, and WebSphere ESB capabilities will be folded into IBM Integration Bus over time, with conversion tools for initial use cases built-in from day one.
You can now downloadIBM InfoSphere BigInsights Quick Start Edition from the evaluation software section of developertworks. This is a free, downloadable non-production version of BigInsights that enables new solutions that cost effectively turn large, complex volumes of data into insight by combining Apache Hadoop, (including the MapReduce framework and the Hadoop Distributed File Systems), with unique, enterprise-ready technologies and capabilities from across IBM, including Big SQL, text analytics and BigSheets.
Cheryl King has a new article on developerWorks called, "Migrating from Apache Tomcat to the WebSphere Application Server Liberty Profile" This article provides instructions for migrating applications and their configuration information from Apache Tomcat to the IBM® WebSphere® Application Server V8.5.5 Liberty Profile using two utilities (one of which is new for V8.5.5) that make migrating easy and reliable.
IBM has released anevaluation version of its latest IBM Rational Software Architectproduct. Rational Software Architect is a comprehensive application design, modeling and development tool for end-to-end software delivery. The latest version provides comprehensive support for emerging technologies such as Business Process Modeling Notation version 2, Service Oriented Architecture, and Java Enterprise Edition version 5. Stop by the Evaluation Software area of developerWorks to download an evaluation copy of this product.
IBM has released anevaluation version of its IBM DB2 Merge Backup product for Linux, Unix, and Windows. As application databases increase in size and number, so does the amount of time required to complete backup procedures. But the IBM DB2 Merge Backup for Linux, Unix and Windows lets database administrators perform backups without taking databases offline or disrupting applications. Database backups are completely transparent to end users. Visit the developerWorks evaluation software area to download an evaluation copy of the product.
Craig Statchuk has published a how-to guide on developerworks that walks you through the the steps required to implement an interactive map widget for use with IBM Cognos 10.1.1 Business Insight. The interactive map widget implemented in this tutorial can utilize online maps from popular vendors such as ESRI Maps, Google Maps, and Bing Maps. The tutorial provides example code that you can use as the starting point for your own interactive map widget in IBM Cognos.
Sundari Voruganti and Kathryn Zeidenstein have updated their developerWorks article onhow InfoSphere® Guardium® can integrated Hadoop-based environments into Guardium's activity monitoring and auditing policies. They also show how to tailor Guardium's reporting capabilities to specific Hadoop environmanes such as IBM Big Insights, Cloudera, Hortonworks Data Platform, and Greenplum Hadoop.. In their article, you will also learn about a quick start monitoring implementation available only with IBM InfoSphere BigInsights.
IBM Distinguished Engineer, Kyle Brown discusses best practices forpatterns adoption with IBM PureApplication System. He recently published an article that outlines six important best practices to help clients be successful integrating IBM PureApplication System into their IT governance policies and data center management strategies.
Other items in this episode:
Derek Chowanec has published anew training video for IBM Security AppScan Source edition. In this video will show you how to configure the tool to scan application source code, how to use the integrated tools to build a report on its findings, and how to conduct triage on the findings. Also in this video, Tom Mulvehill shows you how to hunt down vulnerabilities in Android applications.
Matthew Hatem, Ethan Burns, and Wheeler Ruml, have published a tutorial on developerworks to show youhow to implement the most widely used heuristic search algorithm in Java. Their step by step article shows you how to improve the performance of heuristic searches by avoiding expensive garbage collection and exploiting a high-performance alternative to the Java Collections Framework. If you want to incorporate this fundamental artificial intelligence search algorithm in your applications, this tutorial will help you get started with sample code that's available for download.
Benny Halberstadt and Nancy Navarro have produced ahow to guide for using the IBM InfoSphere Business Glossary REST API to find terms, examine the term's details and contact term's the steward. Their example code show you how to develop an Android application to call the REST APIs and invoke the phone's native phone and email applications to contact the data stewards found in the Business Glossary. You'll learn a lot about the InfoSphere Business Glossary, REST programming, and Android application development all in this single article.
Uche Ogbuji has published a tutorial on how to use theopen source CSS preprocessor, LESS, to write readable and maintainable Cascading Style Sheets (CSS) for modern websites. CSS makes the terrible old days of layout tricks with tables and invisible images a dim memory. But CSS is still unfriendly, and several initiatives tried to tame it for developers. One of the best is LESS, which extends CSS with dynamic behavior such as variables, mixins, operations, and functions. LESS is a CSS-like language that compiles seamlessly into CSS either on the client side or through server-side preprocessing.
More items from this episode:
Start learning how to effectivelymanage privileged user security threats with a new quick-read guide about the capabilities of IBM Security Privileged Identity Manager. This article explains the basics of how IBM® Security Privileged Identity Manager centralizes the management of privileged and shared accounts and helps you track and audit the activities of privileged users so you can provide effective security and authentication governance.
Supal Chowdhury and Rohit Sahai have published a tutorial onhow to use the IBM® Worklight®’s optimization framework. They show a step by step use case for developing a mobile application using the optimization framework that lets the application developer share code across multiple mobile application environments without sacrificing function or the user experience. They also show the return on investment benefits that come from this approach to mobile application development.
Reggie Barosa describes how tomodernize an existing IBM® z/OS® applicationby using service-oriented architecture (SOA) to move it to a smartphone. Without making changes in the existing IBM® CICS® application, he shows how to create and deploy CICS web services that a smartphone can invoke.
More items in this episode:
Arup Pal has published a how-to guide on developerWorks called "Using the global cache in WebSphere Message Broker." The new global cache feature in WebSphere Message Broker V184.108.40.206 enables you to store and reference data in an embedded memory cache or an external WebSphere eXtreme Scale grid. This article shows you how to implement a global cache to store and access reference data for use by message flows.
Zafar Gilani and Salman Ul Haq have published a how-to guide on developerworks to show developershow to analyze large datasets with Hive. The big data industry has mastered the art of gathering and logging terabytes of data, but the challenge is to base forecasts and make decisions derived from this real data. This article presents a use case for analyzing Call Data Records with Hive to gain insights into customer usage patterns.
IBM has announced a90-day trial of IBM SmartCloud Services. IBM SmartCloud Services, lets you develop, test, and quickly deploy applications to the cloud with minimal resources. IBM SmartCloud Services helps you build innovative solutions quicker by using patterns of expertise that automate many tasks and gives you access to many pre-built virtual machine images for you to use. After August 30th 2013 IBM will no longer accept requests for this trial, so sign up today to get started.
Pietro Marella and Torsten Schlegel have published an extensive guide to managing test assets in a cloud environment. The guide is called "Using Rational Quality Manager to manage lab assets in virtual environments" and is based on a pilot project at the IBM Tivoli Lab in Rome. This guide show how to extend the IBM Rational Test Lab Manager component of IBM Rational Quality Manager to import up to date definitions of virtual images and machines that are available for use in testing fom IBM Tivoli Service Automation Manager. The techniques outline in this guide can help test teams speed up their test cycles and manage complex test environments.
Rajalakshmi Srinivasaraghavan has published an article on developerWorks that explores theformat and features of the DWARF debug file structure. This standard for including source level debug information in object files is widely used by many compilers and tool chains, This article explores the details of this file format so that you can make the best use of your debugging tools and reduce the amount of time you spend tracking down bugs.
Mark Connell and Shili Yang have demonstrated how to integrate IBM Business Process Manager with an external LDAP user directory. Their work is documented in a new article they have recently published on developerWorks called "Securely integrate an LDAP user registry with IBM Business Process Manager". This article will show you how to replace the product's default security provider and instead use your enterprise directory for authentication and authorization in Business Process Manager.
Surajit Paul has published ahow-to guide for Hadoops' Sqoopthat focuses on the Java APIs. Sqoop is an integral part of a Hadoop ecosystem, helping transfer data between NoSQL data storage and the traditional RDBMS. Numerous technical articles have been published featuring the Sqoop command-line interface (CLI) usage. However, as of Sqoop 1.4.3, there is not much insight publicly available about the usage of the Sqoop Java API. This article covers the usage of the Sqoop CLI, with additional emphasis on the Sqoop Java API, using an example of data from the Bombay Stock Exchange. The article is intended to provide preliminary exposure to technical architects, solution architects, technical managers, consultants, data scientists, technical leads, and developers interested in and working in the big data space.
Additional items in this episode:
Joern Klauke, and Martin Jungfer have published a new how-to guide forusing the new scripted interface for DB2 Advanced Copy Services. This new feature introduced in DB2 10.5 allows administrators to invoked the Advanced Copy Services from shell scripts instead of native code. This new feature enables IT shops to incorporate new storage hardware into their back up infrastructure more quickly and consistently. This how to guide will be useful for anyone managing a DB2 backup environment.
Enzo Cialini, Ian D. M. Hakes, Ian D. M. Hakes, Richard Lubell, and Paul McInerney have published a new how to guide on Implementing disaster recovery in IBM PureData System for Transactions. This article outlines the setup and operation of a disaster recovery solution for DB2 V10.5 databases on the IBM PureData System for Transactions, Fix Pack 3 or later. The solution is based on the DB2 High Availability and Disaster Recovery feature, and includes additional elements that are not handled directly by the product. This article will be of interest to anyone who needs to make sure their mission critical data can always be restored.
Neal Ford has published part 2 in hisJava.next series. In this latest installment, he discusses Java's lack of inheritance mechanisms that are commonly found in Groovy, Scala, and Clojure. This installment further explores Clojure's use of protocols as an extension mechanism. If you're interested in the evolution of Java, you'll want to read about these extension mechanisms.
Ton Ngo has published an article titled "Prototype mobile applications built with IBM Worklight for IBM Watson. " This article is for architects and developers who are interested in building advanced mobile applications either in general or within the IBM Watson context. It describes the design and implementation of a sophisticated mobile application prototype for oncologists that interfaces with IBM Watson and with a hospital's back-end systems. A member of the IBM team that built the prototype explains how the team used IBM Worklight, with help from Dojo Mobile and Apache Cordova, to address the project's technical challenges.
Other items from this episode:
Apache ZooKeeper is a high-performance coordination server for distributed applications. It exposes common services -- such as naming and configuration management, synchronization, and group services -- in a simple interface, relieving the user from the need to program from scratch. It comes with off-the-shelf support for implementing consensus, group management, leader election, and presence protocols. Mark Grover from Cloudera has published "ZooKeeper fundamentals, deployment, and applications" to show how to set up and deploy a ZooKeeper cluster in a simulated miniature distributed environment. You can use this step-by-step article to plan your ZooKeeper environment.
Mario E. De Armas and Joel Gauci have published updates to their three part series called "Enforcing Service Level Agreements using WebSphere DataPower" shows how common policies are governed, enforced, and monitored using IBM® WebSphere® DataPower® XI50 SOA Appliance, WebSphere Service Registry and Repository, and IBM Tivoli® Composite Application Manager for SOA. This series is a must read for organizations that have service level agreement commitments with their internal and external customers.
Advanced persistent threats, the evolution of IT infrastructures, and compliance complacency can stymie security vulnerability monitoring. IBM® Security QRadar® Vulnerability Manager is a new product from IBM that is helping to redefine how IT security teams collect and use vulnerability assessment data. This member of the QRadar product family helps identify an organization's largest exposures and build a smarter remediation and mitigation action plan. By correlating scan results with the security intelligence data of QRadar SIEM, you can quickly prioritize the vulnerabilities that present the greatest potential dangers and avoid false positives or those already classified as non-threatening. developerWorks has published "An architectural view of QRadar Vulnerability Manager" to introduce the capabilities of this new product to IT security practitioners.
Rajath Ramesh and Manjunatha D have published a three part series onUsing JSON in WebSphere Cast Iron. Part 1 of this article series shows how to configure JSON handling activities to invoke JSON-based REST APIs and to create your own JSON-based REST APIs. Part 2 shows how to build an orchestration that invokes JSON-based REST APIs exposed by Salesforce.com® to create an account. Part 3 shows how to design an orchestration that is exposed as a JSON-based API. This series will show you everything you need to know to get started using JSON activities in your Cast Iron orchestrations.
IBM's X-Force research team has released theIBM X-Force 2013 Mid-Year Trend and Risk Reportto summarize their latest IT security findings. Michael Hamelin is a security architect on the X-Force team and in this interview he discusses some of highlight trends in the report. He discusses the "what's old is new" trends, the new type of "reputation stealing" attacks, and the latest technology based attacks on mobile platforms. In the first six months of 2013, the X-Force team researched 4100 new vulnerabilities, investigated 900 million web pages, created 27 million new entries in its web filter database, and managed 180 million malware signatures. You can download theIBM X-Force 2013 Mid-Year Trend and Risk Reportfor free and read all the details of their findings.
Stephanie Trunzo is the Chief Creative Officer for PointSource, which is an early adopter of theJazzHub platform. In this interview, she talks about how her company's usage of JazzHub goes way beyond the development phases of a project to encompass every interaction with its clients. You canregister for an account on JazzHuband start hosting your projects immediately.
Chris Hockings and Jenny Wong discuss the rising need for "Bring Your Own Identity" in corporate web applications as a follow on to "Bring Your Own Device." They discuss the challenges and standards that can help make Bring Your Own Identity a reality. They also discuss their how-to guide, "Enable bring-your-own-identity authentication" and their demonstration video, "Self-registration and bring-your-own-identity using "Tivoli Federated Identity Manager."
Sanjeev Sharma discusses his new Book,DevOps For Dummies. He also discusses how DevOps relates to Continuous Delivery of software and how it benefits an organizations core line of business. He also offers some guidance on how companies can get started with DevOps.
Senthil Nathan and Bugra Gedik have published "Using InfoSphere Streams with memcached and Redis" to show how to externalize the Streams application state using a Distributed Process Store (DPS). They demonstrate with two popular NoSQL key-value data stores, memcached and redis.
Getting Started With InfoSphere Streams.
InfoSphere® Streams Quick Start Edition is a free, downloadable, non-production version of InfoSphere Streams, a high-performance analytics platform that allows user-developed applications to rapidly ingest, analyze, and correlate information as it arrives from thousands of real-time sources. With no data or time limits, InfoSphere Streams Quick Start Edition allows you to experiment with stream computing in your own unique environment. Build a powerful analytics platform that can handle incredibility high data throughput, up to millions of events or messages per second.