Filter by products, topics, and types of content

(439 Products)

(775 Topics)

(20 Industries)

(15 Types)

1 - 100 of 13289 results | Next
Show Summaries | Hide Summaries
View Results
Title none Type none Date down
Integrating LPWAN networking into your IoT solutions
When devices and sensors are outside the range of a typical wireless network configuration, you need to adopt an architecture that uses long-range networking, such as LPWAN networking protocols. Learn how to integrate LPWAN networking into a standard wireless network architecture for a large-scale IoT solution.
Tutorial 23 Feb 2018
7 tips for getting started with R language
This article gives you 7 tips to make it easier and faster to start using the powerful R language. Learn about R packages, how to structure data in R, and the powerful RStudio IDE. Discover how the apply function can save you loads of time when running complicated scripts and how ggplot2 can really make your visuals pop. Finally, see how the Rcpp package allows you to import C++ functions into an R script.
Articles 23 Feb 2018
Build cognitive solutions for industries: Enhancing the simplicity and quality of human-computer interactions
Cognitive computing is becoming increasingly important within the enterprise. In this fourth tutorial in a series, we discuss the primary methodologies and patterns used to build cognitive solutions for the telecommunications and media and entertainment industries.
Articles 21 Feb 2018
Schedule data backups automatically on IBM Cloud
This tutorial demonstrates how to use the Workload Scheduler service on the IBM Cloud platform to automatically schedule process execution for your IBM Cloud applications. It uses a common example performing a daily database backup to walk you through the process of creating a RESTful PHP service that can be invoked to back up the database. It also demonstrates how to integrate third-party services such as Dropbox and SendGrid to store backup files and send status notifications.
Articles 19 Feb 2018
IBM AIX multipath I/O (MPIO) resiliency and problem determination
Multipath storage configurations are a key component of data centers. Problem determination of these SAN fabrics becomes more difficult due to ever increasing complexity. This article describes the recent enhancements to the IBM AIX operating system MPIO software, and describes how the IBM AIX lsmpio command can be used during problem determination.
Articles 19 Feb 2018
Deploy a Hello World webpage to IBM Cloud
Let's deploy a simple Hello World webpage using nothing but HTML and a static buildpack on IBM Cloud.
Also available in: Chinese   Russian   Japanese  
Articles 19 Feb 2018
Changing IBM Connections behavior with IBM Connections Customizer
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the behavior of Connections to suit your business processes.
Articles 15 Feb 2018
Scale single sign-on for your Node.js cloud apps
Use Redis to implement persistence for express-session to allow horizontal scaling of Node.js applications that use IBM Single Sign On.
Also available in: Chinese   Japanese   Portuguese  
Articles 15 Feb 2018
The benefits of lightweight integration, Part 1: The fate of the ESB
While many large enterprises successfully use the enterprise service bus (ESB) pattern, the term is often disparaged in the cloud-native space, and especially in relation to microservices architecture. It is seen as heavyweight and lacking in agility. What has happened to make the ESB pattern appear so outdated, and what should we use in its place? What would lightweight integration look like?
Articles 13 Feb 2018
The benefits of lightweight integration, Part 2: Moving to lightweight integration
Microservices principles are revolutionizing the way applications are built by enabling a more decoupled and decentralized approach to implementation, which leads to greater agility, scalability, and resilience. These applications still need to be connected to one another and to existing systems of record. It clearly makes sense to use microservice techniques in the integration space, too. Lightweight integration provides the benefits of cloud-ready containerization to integration architecture, and provides the opportunity to escape from the heavily centralized ESB pattern to more empowered and autonomous application teams.
Articles 13 Feb 2018
Get started with the Java EE 8 Security API, Part 1: Java enterprise security for cloud and microservices platforms
As one of the three core specifications introduced with Java EE 8, the new Java EE Security API is an essential addition to your Java EE toolkit, and thankfully not terribly difficult to learn. Find out how the Java EE Security API supports enterprise security in cloud and microservices platforms, while introducing modern capabilities such as context and dependency injection.
Also available in: English  
Articles 10 Feb 2018
Use LDAP and Active Directory to authenticate Node.js users
If you already have an internal IT infrastructure, it quite likely contains an LDAP server (possibly Active Directory, acting as an LDAP server) to serve user identities. In many cases, it is best to continue to use that directory, even when your application sits in IBM Cloud. In this tutorial, I show you how to authenticate users.
Also available in: Chinese  
Tutorial 07 Feb 2018
Build your first IoT application
Use Node-RED and Twilio to configure your first IoT application on IBM Cloud. You'll build a complete IoT solution that monitors a remote server and then notifies a user if their computer or IT network is down.
Also available in: Chinese   Russian   Japanese  
Articles 07 Feb 2018
Learn Linux, 101: Manage printers and printing
Learn how to manage print queues and user print jobs on Linux using CUPS and the LPD compatibility interface. Use the material in this tutorial to study for the LPI 102 exam for Linux system administrator certification or to learn for fun.
Articles 06 Feb 2018
IoT solution governance, Part 2: Governing your IoT devices
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 2 of this series focuses on governing your devices. Device governance includes choosing the right device for your solution and managing the lifecycle of those devices.
Articles 06 Feb 2018
Use management APIs and Jenkins as a continuous integration engine for IBM App Connect Professional deployment automation
Check out deployment automation on IBM App Connect (formerly known as WebSphere Cast Iron) by using IBM App Connect Management APIs, the SoapUI client, and Jenkins.
Articles 05 Feb 2018
Taking control of the IBM Connections user experience
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the Connections user interface, and how you can get started using Customizer right away.
Articles 01 Feb 2018
An introduction to data science, Part 1: Data, structure, and the data science pipeline
Data is meaningless if you can't process it to gain insights. The field of data science gives you the tools and methods you need to process data sets effectively and so get the most from the data you collect. In this tutorial, you will Get the basics of machine learning, including data engineering, model learning, and operations.
Articles 01 Feb 2018
Build a simple word game app using Cloudant on IBM Cloud
IBM Cloud is an open platform for developing and deploying web and mobile applications. In this two-part tutorial, we walk you through the steps to create a simple GuesstheWord game application using IBM Cloud and its cloud-based development environment: open toolchains and the IBM Cloud Continuous Delivery service. You will start from scratch and end up with a simple game you can play in a web browser with server code running in the cloud.
Also available in: Chinese   Russian   Japanese   Spanish  
Articles 01 Feb 2018
Tuned daemon profiles in Red Hat Enterprise Linux (RHEL) 7.x and CentOS 7.x
This article describes the working of tuned daemon profiles on the Red Hat Enterprise Linux (RHEL) operating system version 7.x and CentOS version 7.x. It also describes the differences in the performance of tuned daemon profiles in the two operating systems.
Articles 31 Jan 2018
Design for cognitive experiences, Part 1: The human-to-machine communication model
Discover better insights with higher confidence faster than humanly possible. It is the key to taking a first step in the right cognitive application direction: asking not what could it do but what it should do. With artificial intelligence (AI), we have decades of data and research into human thought processes and communication to use a blueprint. To simulate human relationships, we begin by observing and better understanding ourselves.
Articles 29 Jan 2018
Learn how to bootstrap Hydra
The basic idea of OAuth 2.0 and OpenID is when a user wants to do something with an application ("Application X"). Access to the application requires access to an account of a company or business ("Service Z") that would require authorization on the user's behalf. To allow authorization in a good and secure way (without violating the users' trust to ask for the their credentials directly), you can integrate something like Hydra into Service Z so that Application X can make authorized requests on the users' behalf.
Also available in: Chinese  
Tutorial 25 Jan 2018
Lambda functions for rapid prototyping
The serverless nature of lambdas fulfills the cloud promise of having the least amount possible to manage. This new cloud paradigm makes it easier to prototype, experiment, and quickly gather feedback. This article will explore how efficient a workflow can be, what this means for early cloud projects, and how it fits in with containers.
Articles 24 Jan 2018
Achieving high performance on IBM AIX using Coherent Accelerator Processor Interface (CAPI)
This article describes the Coherent Accelerator Processor Interface (CAPI) Flash support on IBM AIX. CAPI technology has been used on AIX to accelerate I/O operations to IBM Flash storage. AIX CAPI Flash driver stack has been optimized into a monolithic driver model which further reduced the I/O code path length. CAPI Flash technology provides a superior performance advantage in terms of IOPS per processor when compared to the traditional Fibre Channel I/O. We also describe at a high level how a user can use CAPI-based flash devices on AIX.
Articles 24 Jan 2018
Code pattern: Mine insights from software development artifacts
There is a lot of unstructured text content that is generated in any domain – software development lifecycle, finance, healthcare, social media, etc. Valuable insights can be generated by analyzing unstructured text content and correlating the information across various document sources. This pattern uses Watson Natural Language Understanding, Python Natural Language Toolkit, OrientDB, Node-RED, and IBM Data Science Experience to build a complete analytics solution that generates insights for informed decision-making.
Articles 24 Jan 2018
Getting started with the IBM Cloud
See how to start developing and deploying applications in the IBM Cloud. Doug Tidwell takes you through the basics of developing and deploying an app that's available worldwide.
Articles 23 Jan 2018
Digital process automation with BPM and blockchain, Part 2: Enable business processes to react to blockchain events
The combination of Business Process Management (BPM) and blockchain technology dramatically simplifies distributed, collaborative processes between multiple enterprises, through the introduction of a shared ledger used by all the participants. In this tutorial, we go beyond mere data sharing through blockchain, and include blockchain’s "active behavior": its capability to notify participants about successful completion of a transaction, by sending events.
Articles 22 Jan 2018
Temporary storage and the database, Part 2: Manage your Maintained Temporary Indexes (MTIs)
The SQL optimizer uses Maintained Temporary Indexes (MTIs) to run queries smoothly. But too many MTIs can exhaust temporary storage. With the right information and tools, you can assist the optimizer and prevent system outages.
Articles 22 Jan 2018
IoT solution governance, Part 1: Defining your IoT governance practices
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 1 of this series defines a proper governance structure for managing IoT initiatives, which includes defining a technical strategy and reference architecture. Part 1 also describes how a dedicated Center of Excellence (CoE) can help IoT organizations govern their IoT solutions.
Articles 19 Jan 2018
Build an enhanced IT help desk chatbot on IBM i with Watson Conversation
Chatbots are conversational robots that simulate conversation, and can interact with users in natural language. By harnessing both the power of the IBM Cloud Watson services and the power and openness of IBM i, you can open up your chatbot to countless creative applications (such as a virtual agent) that can understand and automatically solve password-related issues. This article guides you to implement a prototype of such a chatbot running on IBM i that links the IBM Watson Conversation service and IBM i to Slack, which is the messaging team collaboration tool.
Articles 18 Jan 2018
Analytics ecosystem, Part 1: Spatial Analytics with Db2 Warehouse
Db2 Warehouse, a massively parallel processing (MPP) architecture based data warehouse solution also has geospatial capabilities to manage spatial data. You can now store spatial data as geometries in database tables and perform spatial analytics.
Articles 18 Jan 2018
Get started with PyTorch
Originally developed as a Python wrapper for the LuaJIT-based Torch framework, PyTorch, now a native Python package, redesigns and implements Torch in Python while sharing the same core C libraries for the back-end code. Get to know PyTorch.
Articles 18 Jan 2018
Cleansing, processing, and visualizing a data set, Part 3: Visualizing data
In this tutorial, discover some of the more useful applications for visualizing data and a few of the approaches you can use to create that visualization, including the R programming language, gnuplot, and Graphviz.
Articles 17 Jan 2018
A cryptographic approach to protecting passwords in the cloud
In this article, back-end developers learn why it is important to use encryption and how to use it effectively to protect user information on the cloud, especially passwords, so that even a data leak can't be cracked in less than decades. Security is an ever important topic in the cloud that is crucial to full-stack development and is essential on all products and services.
Also available in: Chinese  
Articles 17 Jan 2018
IBM's approach to open technology
For several years, IBM has been recognized by many within the open source community as a leader in open source. However, that leadership is less well known and appreciated outside of the open source communities in which IBM engages. In this article, you’ll learn how IBM has played, and continues to play, a leading role in the evolution of open source -- an approach to software development that has nearly completely displaced proprietary software -- and how we leverage that leadership to deliver world-class offerings and solutions that benefit our customers.
Articles 17 Jan 2018
Get started with Docker and Kubernetes
Docker and Kubernetes are the building blocks of the next generation of DevOps. In this tutorial, you'll see how to build Docker images, run them locally, and then push those images to your IBM Cloud account so you can deploy them to a Kubernetes cluster running in the IBM Cloud.
Articles 16 Jan 2018
Coffee with Blockchain: Filtering out the hype
Blockchain is a secure way to exchange goods, services, and information. This article uses a tangible example to explain the core concepts of blockchain, including smart contracts that automatically execute business logic that the participants agree upon, and a shared ledger that guarantees the quality and lineage of goods or services. It also describes the way that blockchain enables collaboration and encourages new business models to emerge.
Articles 16 Jan 2018
IBM Connections Customizer Tutorial, Part 5
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The fifth video in the series shows how to use Customizer design properties to make sophisticated modifications to the Customizer user interface.
Videos 15 Jan 2018
Introduction to IBM Connections Customizer
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The second video in the series shows you how to use the Firefox Grease Monkey scripting extension and takes you through creating a Hello World customization.
Videos 15 Jan 2018
IBM Connections Customizer Tutorial, Part 3
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The third video in the series shows you how to get set up on IBM Connections Cloud, how to enable Customizer, and how to share your customizations with IBM.
Videos 15 Jan 2018
IBM Connections Customizer Tutorial, Part 1
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The first video in the series introduces the concepts behind Customizer, how it works, and what it can do for you.
Videos 15 Jan 2018
IBM Connections Customizer Tutorial, Part 4
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The fourth video in the series shows how three sample customizations were created, to showcase the range of customization possibilities the new feature makes available.
Videos 15 Jan 2018
IBM Connections Customizer is available! What's New?
The formal release of IBM Connections Customizer on IBM Connections Cloud took place on Friday, December 8th 2017. This means that any tenant organization of IBM Connections Cloud on the North America or Europe data centres can now sign up for this new production offering and use it to modify the out-of-the-box IBM Connections user experience.
Articles 15 Jan 2018
IoT Lessons Learned: Lessons learned while building a closed-loop, full-stack cognitive IoT application
In this lessons learned article, discover how this lifetime hacker hacked together emerging IoT and cognitive technologies to create a proof-of-concept for an age-in-place healthcare scenario. The lessons included: cognitive IoT apps must be learning systems; context defines success; and you don't always know what you don't know.
Articles 15 Jan 2018
Making the cut: Top Java content from developerWorks
A quick rundown of the top content published in the Java hub in 2017.
Also available in: Chinese  
Articles 15 Jan 2018
IBM Lotus Domino 8.0.1 for 64-bit server performance
Learn how the 64-bit IBM® Lotus® Domino® 8.0.1 server performs against 32-bit Lotus Domino 8.0.1 using the N8Mail workload.
Articles 11 Jan 2018
Analyze crime data with Apache Spark and Hive ETL, Part 2: Explore the analyses
In this second part of the "Analyze crime data with Apache Spark and Hive ETL" tutorial series, you will learn how to integrate data from different sources. You will also see the computation of normalized statistics for crime rates enabling easy comparison of crime rates across different geographic areas.
Articles 10 Jan 2018
10 steps to set up a multi-data center Cassandra cluster on a Kubernetes platform
Learn how to deploy an Apache Cassandra NoSQL database on a Kubernetes cluster that spans multiple data centers across many regions. The benefits of such a setup are automatic live backups to protect the cluster from node- and site-level disasters, and location-aware access to Cassandra nodes for better performance.
Articles 09 Jan 2018
Deploy a sample application to the IBM Blockchain Platform
In this tutorial, see how to create a network on the IBM Blockchain Platform (Enterprise Membership Plan), install a smart contract (chaincode) in a channel on the network, and deploy a sample application to the network. You'll then see how to populate, query, and update the shared ledger.
Also available in: Chinese   Portuguese   Spanish  
Articles 08 Jan 2018
Create an artificial neural network using the Neuroph Java framework
Build an artificial neural network (ANN) using the Java language and Neuroph open source framework.
Also available in: Chinese  
Articles 08 Jan 2018
Using N_Port ID Virtualization (NPIV) with kernel-based virtual machine (KVM) guests on IBM Power servers
This article provides the basic steps to use N-Port ID Virtualization (NPIV) technology in a kernel-based virtual machine (KVM) guest. Additionally, the article also provides the significance of NPIV allowing multiple guests to make use of a single physical host bus adapter (HBA) to access multiple storage devices.
Articles 08 Jan 2018
ISV solution ecosystem for Hortonworks on IBM Power Systems
This article provides a list of ISV solutions that can augment the capabilities of Hortonworks Data Platform (HDP) running on Linux on IBM Power Systems. Solutions cover many categories including business intelligence (BI) tools, advanced analytics, and so on.
Also available in: Chinese   Japanese  
Articles 05 Jan 2018
Java 8 idioms: Functional purity
Functional pipelines can greatly increase the efficiency and performance of your code, especially when combined with lazy evaluation and parallelization. In this article you'll learn the rules of functional purity, and why you should always strive to keep lambda expressions pure in your functional pipelines.
Also available in: Chinese  
Articles 05 Jan 2018
Cleansing, processing, and visualizing a data set, Part 2: Gaining invaluable insight from clean data sets
Learn about VQ and ART algorithms. VQ quickly and efficiently clusters a data set; ART adapts the number of clusters based on the data set.
Also available in: Chinese  
Articles 04 Jan 2018
Analyze crime data with Apache Spark and Hive ETL, Part 1: Learn about Extract, Transform, and Load (ETL)
In this tutorial, you learn to analyze U.K. crime data from inception to final results, covering data download, data transformation and loading into a distributed data warehouse, Apache Hive, then subsequent analysis using Apache Spark. Part 1 describes the Extract, Transform and Load (ETL) activities.
Articles 04 Jan 2018
Create unit tests for pure OpenWhisk actions
The modular nature of OpenWhisk applications makes it easy to create unit tests for actions that are purely functionalmeaning they have no side effects and do not rely on external state. In this tutorial, you'll learn how to create these unit tests semi-automatically, and how to run the tests to verify that code changes do not break anything.
Articles 04 Jan 2018
Building connected cities with new and existing IoT technologies
Many cities and towns around the world are turning to IoT to solve urban problems, such as traffic congestion, and to improve the safety and quality-of-life of their citizens. This article explores connected cities and some of the challenges that are involved in developing city-wide IoT solutions.
Also available in: Chinese   Portuguese   Spanish  
Articles 03 Jan 2018
Connecting all the things in the Internet of Things
In this guide for IoT connectivity, learn about widely adopted technologies and standards for IoT networking and why you might choose one network protocol over another. Also, learn about the key considerations and challenges related to networking in IoT.
Also available in: Chinese   Japanese  
Articles 03 Jan 2018
Streamlining the development of your IoT applications by using an IoT platform
This article explores the key capabilities of IoT platforms and considers the top general-purpose end-to-end IoT platforms. You'll learn why you should adopt an IoT platform to rapidly develop your IoT solutions and quickly get the most value from your IoT data.
Also available in: Chinese   Japanese  
Articles 03 Jan 2018
Choosing the best hardware for your next IoT project
This article provides a balanced overview of different types of hardware that are commonly adopted for IoT, including micro controllers (for example, Arduino), single board computers (for example, Raspberry Pi), and embedded devices. The article describes the high-level building blocks and key characteristics of hardware, including an overview of needed security features and firmware capabilities, in the context of IoT. The article also provides guidance for when, where and why a developer might choose one type of hardware over another for an IoT project, and examples of use across a range of industries.
Also available in: Chinese   Japanese  
Articles 03 Jan 2018
Get started developing IoT solutions by building a simple home automation system
Get started developing IoT solutions quickly and easily. In just four steps, learn how you can build a simple home automation IoT solution. After you connect the sensors to the Raspberry Pi, you learn how to set up and configure the Pi. Then, you learn how to create Node-RED flows to set up the logic for the home automation system. Lastly, you learn how to install your prototyped system and begin using it.
Also available in: Chinese  
Articles 03 Jan 2018
IoT 101: Getting started with IoT development
Get started developing IoT solutions with this developerWorks quick-start guide. IoT 101 is for application developers who are new to Internet of Things technologies and who need a way to get up and running quickly.
Also available in: Chinese   Japanese  
Articles 03 Jan 2018
Build your skills in IoT development by developing a Healthy Habits Tracker
Build your IoT development skills quickly and easily. In just four steps, learn how you can build a healthy habits tracker system. You learn how to assemble the IoT device, connecting several components from an IoT developer kit, and then you learn how to configure the ESP8266 microcontroller. After getting your IoT device connected to an IoT Platform, you get your Java IoT app running locally and in the cloud.
Also available in: Chinese   Portuguese   Spanish  
Tutorial 03 Jan 2018
IoT 201: Building skills in IoT development
Continue building your skills in developing IoT solutions with this developerWorks next-steps developer guide. IoT 201 is for application developers who are taking the next steps in using Internet of Things technologies to build new and innovative apps.
Also available in: Chinese   Portuguese   Spanish  
Articles 03 Jan 2018
Managing your IoT devices
In this article, discover how the IoT device management protocols and features help you address many IoT device management challenges, including scalability and availability among others.
Also available in: Chinese  
Articles 03 Jan 2018
Making sense of IoT data
IoT solutions are most successful when they do something with all that data that is generated, when they make sense of all that data. In this article, learn best practices in storing, analyzing, and applying rules to take action on your IoT data.
Also available in: Chinese  
Articles 03 Jan 2018
Master your IoT development skills by extending an IoT system
In this tutorial, master your IoT development skills by extending an existing IoT system. In just 3 steps you explore the device management, visualization, and analytics capabilities of Watson IoT Platform.
Tutorial 03 Jan 2018
IoT 301: Mastering IoT development
Master your IoT development skills with this developerWorks advanced developer guide. IoT 301 is for application developers who are using Internet of Things technologies to extend and enhance their innovative IoT apps.
Articles 03 Jan 2018
Use Eclipse Oxygen and WebSphere Liberty for rapid JPA Enterprise development
Learn how to create Java Persistence Architecture (JPA) entities.
Articles 03 Jan 2018
Installation and configuration of Apache Subversion on IBM AIX 7.1 with LDAP and SSL
Apache Subversion installation particularly on IBM AIX can be tricky because of Subversion's dependencies on many other packages. Traditional installation using RPM Package Manager (RPM) packages by resolving dependencies of Subversion on AIX is quite complex. Resolving dependencies also involves installing particular versions of dependent packages. This article describes how to install and configure Subversion on AIX 7.1 using yum configuration. This method makes the Subversion installation easier on AIX 7.1 and also enables to configure Subversion with Apache using SSL and LDAP.
Articles 03 Jan 2018
Get started with the JSON Binding API, Part 2: Default mapping with JSON-B
The new JSON Binding API binds Java and JSON seamlessly, and its default mappings satisfy many simple use cases. JSON-B's default configurations will be intuitive for most developers, and cover a wide range of serialization and deserialization options and scenarios.
Also available in: Chinese  
Articles 03 Jan 2018
Accelerate the path to PCI DSS data compliance using IBM Guardium
This article gives you a step-by-step overview of using the Payment Card Industry (PCI) Data Security Standard (DSS) accelerator that is included with the standard IBM Guardium data security and protection solution. The PCI DSS is a set of technical and operational requirements designed to protect cardholder data and applies to all organizations who store, process, use, or transmit cardholder data. Failure to comply can mean loss of privileges, stiff fines, and, in the case of a data breach, severe loss of consumer confidence in your brand or services. The IBM Guardium accelerator helps guide you through the process of complying with parts of the standard using predefined policies, reports, group definitions, and more.
Articles 01 Jan 2018
Top Internet of Things articles and tutorials (December 2017)
The most popular articles for 2017 on the Internet of Things are highlighted in this article for your convenience.
Also available in: Chinese   Japanese  
Articles 31 Dec 2017
Top Internet of Things articles and tutorials
This article compiles all of the previous top tutorials lists.
Also available in: Japanese  
Articles 31 Dec 2017
Learn Linux, 101: Mail transfer agent (MTA) basics
Learn how to configure mail aliases and mail forwarding for the sendmail program on Linux. Learn about some alternative mail transfer agents. Use the material in this tutorial to study for the LPI 102 exam for Linux system administrator certification or to learn for fun.
Articles 21 Dec 2017
IBM Blockchain 101: Quick-start guide for developers
Join the blockchain revolution! This developerWorks quick-start guide is for application developers who are exploring blockchain technology and want to quickly develop a blockchain network and deploy applications. Simple instructions show you how to activate a blockchain network based on the latest Hyperledger Fabric framework, write and install chaincode (business logic for the network), and develop client applications to streamline business processes and digital interactions.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 21 Dec 2017
Turn your smartphone into an IoT device
Learn how to turn your smartphone into a sensor device, send sensor data to IBM Watson IoT Platform in the cloud, and create IBM Cloud applications that process and visualize the data. You create an Android app and two IBM Cloud apps that use the Internet of Things and Node-RED services.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 18 Dec 2017
Model-first microservices with Scala and Cats
Find out how Scala's powerful type-system and its capabilities for functional programming can provide an excellent canvas for dealing with microservice composition and the problems that can arise from it. This article will also focus on a model-driven development style. Microservices often implement a Bounded Context, a concept from domain-driven design that maps a specialized subset of the domain model. It's important to ensure that domain concepts continue to stand out clearly and don't get compromised in the presence of concurrency and error-handling routines.
Articles 18 Dec 2017
Get started with Keras
This article gives you a quick overview of Keras, a Python-based, deep-learning library. Learn about the framework's benefits, supported platforms, installation considerations, and supported back ends.
Articles 18 Dec 2017
Get started with Deeplearning4j
Eclipse Deeplearning4j (DL4j) is a framework of deep learning tools and libraries that take advantage of the Java Virtual Machine, making it easier to deploy deep learning in enterprise big data applications.
Also available in: Chinese  
Articles 18 Dec 2017
Get started with the JSON Binding API, Part 4: Is it time for a JSON binding standard?
Comparing Gson, Jackson, and JSON-B highlights inconsistencies in basic features and behaviorand demonstrates the potential for a new JSON binding standard.
Also available in: Chinese  
Articles 15 Dec 2017
Offloading your Informix data in Spark, Part 5: Machine Learning will help you extrapolate future orders
Part 5 of this tutorial series teaches you how to add machine learning to your data to help you extrapolate future orders.
Articles 15 Dec 2017
Hyperledger Composer basics, Part 3: Deploy locally, interact with, and extend your blockchain network
In this tutorial, the third and final installment in this series, learn how to modify a sample blockchain network definition and transform it into a real-world blockchain application, write Cucumber feature tests, issue IDs for all participants, and execute every transaction through the CLI.
Also available in: Portuguese   Spanish  
Articles 14 Dec 2017
Getting started with IBM Connections Engagement Center
IBM Connections Engagement Center (ICEC) provides an easy way to build a social intranet by creating a portal-like experience using various out-of-the-box and custom widgets.
Articles 14 Dec 2017
Cleansing, processing, and visualizing a data set, Part 1: Working with messy data
Discover common problems associated with cleansing data for validation and processing, with solutions for dealing with them. You'll also find a custom tool to make the process of cleansing data and merging data sets for analysis.
Also available in: Chinese  
Articles 14 Dec 2017
IBM Datacap 9.0, 9.0.1, 9.1.0, 9.1.1 and 9.1.3 DDK Datacap Desktop Custom Panels
User interaction with IBM Datacap can occur when physically scanning pages or when reviewing problems found while processing pages. Here, you can find the information to create your own panels to be used within an IBM Datacap application. Custom panels present alternative layouts and manipulation of fields and data.
Also available in: Chinese   Russian  
Articles 14 Dec 2017
Get started with the JSON Binding API, Part 3: Custom binding with JSON-B
The JSON Binding API makes customizing data serialization and deserialization easy and intuitive, and it puts a lot of power in your hands. Learn how to use and combine annotations and runtime configuration to control the binding and appearance of properties, fields, date and time formats, and more. Then get started using JSON-B adapters and low-level serializers and deserializers to change the logic of operations in JSON-B.
Also available in: English  
Articles 13 Dec 2017
Know which authentication methods to use for your hybrid cloud
The different options within IBM Cloud bear diverse requirements to the authentication of users. This article explains the various possibilities on how IBM Cloud users are managed and authenticated. We focus on developers, administrators, or operators that need to log in to the IBM Cloud platform to develop and maintain their applications. Applications that run on top of IBM Cloud can use any authentication method that is appropriate for the application’s purpose.
Also available in: Japanese  
Articles 12 Dec 2017
Adapt DevOps to cognitive and artificial intelligence systems
Explore an outline of a "cognitive DevOps" process that refines and adapts the best parts of DevOps for new cognitive or artificial intelligence applications. Specifically, the tutorial covers applying DevOps to the training process of cognitive systems including training data, modeling, and performance evaluation.
Articles 12 Dec 2017
Automate operational business decisions with Weather Data and Business Rules services on IBM Cloud, Part 2: Complete your sample weather cancellation service
In this second installment of a two-part tutorial on how to combine Weather Data and Business Rules IBM Cloud services to automate operational business decisions based on weather conditions, you will take a closer look at the decision operation created in Part 1, learn how to create simple business rules that use weather data and a rule flow that includes these rules, and deploy the decision operation to IBM Cloud. A Node-RED flow will orchestrate a call to the weather data, the Business Rules service, and take action based on the outcome executing business rules.
Also available in: Chinese  
Articles 12 Dec 2017
Migrating from Watson Retrieve and Rank to Discovery, Part 2: Add your data to Watson Discovery
The first part of this series introduced how to migrate from Watson Retrieve and Rank to Watson Discovery service using original source data. In this part, we'll look at how to migrate applications by taking data directly from Watson Retrieve and Rank and adding it to Watson Discovery.
Also available in: Chinese  
Articles 12 Dec 2017
Scan your app to find and fix OWASP Top 10 - 2017 vulnerabilities
Today's modern web applications are more than a match for most desktop PC applications and continue to push boundaries by taking advantage of limitless cloud services. But more powerful web applications means more complicated code, and the more complicated the code, the greater the risk of coding flawswhich can lead to serious security vulnerabilities within the application. Web application vulnerabilities face exploitation by relentless malicious actors, bent on profiteering from data theft, or gaining online notoriety by causing mischief. This article looks at securing web applications by adopting industry best application development practices, such as the OWASP Top 10 and using web application vulnerability scanning tools, like IBM Rational AppScan.
Also available in: Russian  
Articles 12 Dec 2017
Introducing JUnit 5, Part 1: The JUnit 5 Jupiter API
If you've been on the fence about upgrading to the new JUnit 5, this tutorial should convince you. Get started with the JUnit Jupiter API and the new annotations, assertions, and assumptions that are about to rock your world.
Tutorial 11 Dec 2017
Introducing JUnit 5, Part 2: JUnit 5 Vintage and the JUnit Jupiter Extension Model
Find out how JUnit Vintage has you covered for backward compatibility with older versions of JUnit, then get started with JUnit Jupiter extensions for parameter injection, paramaterized tests, dynamic tests, and custom annotations in the new JUnit 5.
Articles 11 Dec 2017
QlikView integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems
QlikView is a business intelligence tool that allows data to be discovered and visualized. QlikView supports Hadoop environments as a data source. Read this article for details about how QlikView was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.
Articles 10 Dec 2017
Tableau integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems
Tableau is a business intelligence tool that allows data to be discovered and visualized. Tableau supports Hadoop environments as a data source. Read this article for details about how Tableau Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.
Articles 09 Dec 2017
MicroStrategy integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems
MicroStrategy is a business intelligence tool that allows data to be explored and visualized. MicroStrategy supports Hadoop environments as a data source. Read this article for details about how MicroStrategy Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.
Also available in: Chinese  
Articles 08 Dec 2017
vStorm Enterprise integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems
Veristorm vStorm Enterprise makes data migration to Hadoop environments flexible, secure and easy. vStorm already supports data movement to Hadoop solutions running on Linux on IBM Power Systems. Read this article for details about how vStorm was tested to integrate with and move data specifically to Hortonworks Data Platform (HDP) on IBM POWER8.
Articles 08 Dec 2017
Authorize with a Cloudant proxy
It is sometimes useful to have more granular access controls on a database than the controls that are provided by Cloudant. In this tutorial, you learn how to create a Cloudant proxy that is under your control. Using such a proxy, you can implement the appropriate authorization model to the system.
Also available in: Chinese  
Tutorial 06 Dec 2017
Java 8 idioms: Using closures to capture state
Whereas lambda expressions rely on internal parameters and constants, closures look to variables for additional information. Find out how to use closures to carry state from a defining context to the point of execution in your programs.
Articles 06 Dec 2017
1 - 100 of 13289 results | Next
Show Summaries | Hide Summaries