Filter by products, topics, and types of content

(431 Products)

(765 Topics)

(20 Industries)

(15 Types)

1 - 100 of 11406 results | Next
Show Summaries | Hide Summaries
View Results
Title none Type none Date down
Optimize queries in Cloudant
This article compiles insights from multiple people in regard to methods and experiences related to optimizing queries when operating Cloudant NoSQL DB. The knowledge contained here will help you have a more in-depth understanding of the most suitable queries for each applicable scenario, to provide the most efficient data query service for your application.
Articles 11 Jun 2018
Qlik Sense integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems
Qlik Sense is a business intelligence tool that allows data to be discovered and visualized. Qlik Sense supports Hadoop environments as a data source. Read this article for details about how Qlik Sense was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.
Articles 08 Jun 2018
Class sharing in Eclipse OpenJ9
Memory footprint and startup time are important performance metrics for a Java virtual machine (JVM). The memory footprint becomes especially important in the cloud environment since you pay for the memory your application uses. This tutorial shows you how to use the shared classes feature in Eclipse OpenJ9 to reduce the memory footprint and improve your JVM startup time.
Articles 06 Jun 2018
An introduction to Kafka
An introduction to one of the most popular platforms for distributed messaging or streaming data.
Articles 05 Jun 2018
IBM Cloud for VMware Solutions: Take a look under the hood
This tutorial examines the architecture of IBM Cloud for VMware Solutions, an IBM Cloud offering that provides deployment and management of VMware virtualized environments. Take a look inside the components of the offering to see how they work together to provision and maintain the environment in the public cloud.
Also available in: Chinese   Japanese  
Articles 04 Jun 2018
Deploy a blockchain business network to the cloud using the IBM Blockchain Starter Plan
Simple steps and companion videos show you how to deploy an existing sample business network, the Car Auction network, to the cloud, specifically to the IBM Blockchain Platform Starter Plan, now free in beta. Once you deploy the sample network, you can start developing, demoing, and staging your blockchain applications on a simulated multi-organization network.
Also available in: Chinese  
Tutorial 31 May 2018
Extend your blockchain smart contracts with off-chain logic
This article presents two ways to bolster your smart contracts with logic obtained outside the typical boundaries of the blockchain, while still preserving the trust and transparency that define a blockchain network.
Articles 31 May 2018
Introduction to Android development
Android is a popular computing platform based on the Linux operating system. The initial commercial version of Android hit the market in 2008 in the form of a mobile phone platform, back when the most popular cell phone for a business user was the BlackBerry, when the iPhone was beginning to make meaningful waves across all sectors, and when the majority of phone users were still tapping out texts from a flip phone.
Also available in: Russian   Japanese   Portuguese   Spanish  
Articles 30 May 2018
Deploy a MongoDB replica set using the IBM Cloud Kubernetes Service
This article demonstrates how to deploy a MongoDB replica set in the IBM Cloud Kubernetes Service. It briefly outlines MongoDB's cluster requirements and introduces Kubernetes StatefulSets and explains how they can be deployed.
Also available in: Chinese  
Articles 28 May 2018
Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
This article is the first part of a three part series on developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR). It summarizes the GDPR and explains how the privacy regulation impacts and applies to developing and supporting applications that are intended to be used by European Union citizens.
Articles 25 May 2018
Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
Part 3 of this series provides practical application development techniques that can alleviate an application's privacy risk. These solutions include utilizing database encryption, data pseudonymization, and assuring a robust level of application security.
Articles 25 May 2018
Developing GDPR compliant applications, Part 2: Application privacy by design
This article provides guidance for integrating privacy risk evaluation and mitigation within the software development lifecycle. It is part 2 in a series of articles about developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR).
Articles 25 May 2018
IBM RFE Community, Release 22
Find out what's new in the RFE Community. With Release 22, the RFE Community provides new features that keep you up to date on the requests you're watching and are interested in.
Articles 20 May 2018
Porting and tuning applications for Linux on Power, Part 2: 15 Porting and tuning tools for Linux on Power
This article enables you to discover numerous tools for porting and tuning applications for Linux on Power: an integrated development environment (IDE), compilers and toolchains, performance and utilization analysis, emulation, instruction timing, high-performance application programming interfaces, and libraries.
Articles 16 May 2018
Create and deploy a blockchain chat application on the IBM Cloud using Tendermint and Lotionjs
In this tutorial, you'll learn how to easily deploy Proof of Stake blockchain applications to an IBM Container as two validator nodes using Tendermint and LotionJs.
Tutorial 14 May 2018
Private and confidential transactions with Hyperledger Fabric
Discover the mechanisms provided by Hyperledger Fabric to accommodate different levels of privacy and confidentiality for different network needs.
Also available in: Chinese  
Articles 11 May 2018
Configuring highly available internal hardware Redundant Array of Independent Disk (RAID) volumes for Linux on IBM Power System S822LC servers
In this article, you can learn to configure Redundant Array of Independent Disks (RAID) volumes before installing Linux OS on IBM Power System S822LC servers. The article also describes how to protect data on internal disks in an enterprise deployment and achieve high availability and uninterrupted service.
Articles 11 May 2018
Get started with Servlet 4.0
Servlet 4.0 fully integrates HTTP/2's server push technology, and also enables runtime discovery of a servlet's mapping URL. With video demonstrations and code examples, this hands-on tutorial gets you started with HTTP/2 server push and the new HttpServletMapping interface in Java servlet and JSF applications.
Also available in: Chinese  
Articles 10 May 2018
IoT on the edge, Part 2: Integrating edge analytics into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. However, identification is only a partial solution. Ideally, we would want to fix those conditions automatically. Because Internet access might be slow, spotty, or even non-existent, the analytics to decide what to do should happen on the “edge” of the network, right at the barn.
Also available in: Chinese  
Tutorial 09 May 2018
Weaving patterns with artificial intelligence, Part 3: Using Markov Chains to generate language from letter correlation matrices and N-grams
Now that you have learned how to compile statistics of letter correlation and word correlation in model natural language text, put it to work having the computer generate text of its own. Learn how to write programs that create sequences of letters or words based on randomly generated transitions to complete N-grams.
Also available in: Chinese  
Articles 07 May 2018
Beginner's Guide to Rust: Start coding with the Rust language
What better way to learn a new programming language than to create a favorite old game? In this tutorial, learn how to create a simple game of Tic-Tac-Toe.
Articles 07 May 2018
Beginner's Guide to Rust: Get to know Rust
Get to know Mozilla Rust, a safe, statistically typed compiled language.
Also available in: Chinese  
Articles 07 May 2018
Convolutional neural networks
Learn about convolutional neural networks (CNN) and see how to use Python to implement a simple network that classifies handwritten digits.
Also available in: Chinese  
Articles 02 May 2018
The benefits of agile integration, Part 1: The fate of the ESB
While many large enterprises successfully use the enterprise service bus (ESB) pattern, the term is often disparaged in the cloud-native space, and especially in relation to microservices architecture. It is seen as heavyweight and lacking in agility. What has happened to make the ESB pattern appear so outdated, and what should we use in its place? What would lightweight integration look like?
Also available in: Chinese  
Articles 01 May 2018
The benefits of agile integration, Part 2: Moving to a lightweight, agile integration architecture
Microservices principles are revolutionizing the way applications are built by enabling a more decoupled and decentralized approach to implementation, which leads to greater agility, scalability, and resilience. These applications still need to be connected to one another and to existing systems of record. It clearly makes sense to use microservice techniques in the integration space, too. Lightweight integration provides the benefits of cloud-ready containerization to integration architecture, and provides the opportunity to escape from the heavily centralized ESB pattern to more empowered and autonomous application teams.
Also available in: Chinese  
Articles 01 May 2018
A hybrid approach to integrating Watson Assistant into an existing site
Hybrid search is a new way to use IBM Watson Assistant without some of the limitations of a traditional chatbot. This approach lets you have best of both worlds: a robust search engine, which is coupled with AI technology that is capable of evolving as Watson receives additional training over time.
Articles 01 May 2018
5 things you didn't know about...: MicroProfile 1.3
Eclipse MicroProfile has just delivered five new APIs for developing Java cloud-native microservices. Get the highlights of what's new in MicroProfile 1.3, with code examples that will have you up and running in no time.
Also available in: Chinese  
Articles 30 Apr 2018
IoT Lessons Learned: Lessons learned from my first DIY IoT project
Read these lessons learned from developing a home automation system (from scratch), and save yourself some time, money, and energy.
Also available in: Chinese  
Articles 26 Apr 2018
Track time spent on projects with IBM Cloud, Part 2: Give your time-tracking app the ability to record the time spent per project
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 2 explains how to add the ability to record the time spent per project. Here I show you how to retrieve and aggregate time entries to generate reports of hours worked per project, both online and in a structured format suitable for download and further processing. Finally, I walk you through the steps to upload and deploy the application on IBM Cloud, so that it's online and always available in the cloud.
Also available in: Chinese  
Articles 24 Apr 2018
Configuring IBM DB2 with BLU Acceleration to support IBM AIX Live Update
This article helps users to understand the requirements for configuring an AIX partition with DB2 to support AIX Live Update
Articles 24 Apr 2018
An introduction to data science, Part 4: The languages of data science
Discover the languages developed and most commonly used for data science programming and applications, including C, Python, and Fortran.
Also available in: Chinese  
Articles 23 Apr 2018
Best practices for Java and IBM WebSphere Application Server (WAS) on IBM POWER9
This article discusses some of the best practices to achieve best performance from applications running in the Liberty profile of the IBM WebSphere Application Server (WAS) on the IBM Power System S9xx and L922 systems recently made available from IBM
Articles 20 Apr 2018
Weaving patterns with artificial intelligence, Part 2: Word analysis and N-grams in a variety of practical applications
Build on the concept of N-grams of sequential letters to look at N-grams of words, and the statistics that can be derived from these. Learn how to generate graphical plots of N-gram frequencies. Explore the American National Corpus as an enormous and rich source of English text suitable for general-purpose language modeling tasks.
Also available in: Chinese  
Articles 18 Apr 2018
5 things you didn't know about ...: Java 10
Hot on the heels of Java 9, Java 10 is here, with a cornucopia of cool new features for code geeks, container nerds, and garbage-collector geniuses. There's no time like the present to find out what's new in JDK 10.
Also available in: Chinese  
Articles 17 Apr 2018
Track time spent on projects with IBM Cloud, Part 1: Build a custom web application with IBM Cloud, PHP, and MySQL
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 1 covers the basics, showing you how to initialize a cloud-based database instance and connect your local PHP application to it. It also explains how to add and modify records on the cloud database instance using the Slim framework.
Also available in: Chinese  
Articles 16 Apr 2018
Create a natural language classifier that identifies spam
Watson Natural Language Classifier is part of the IBM Watson cognitive services platform on IBM Cloud. In this article, you'll use Watson Natural Language Classifier on IBM Cloud to create, train, and test the accuracy of a spam classification service.
Also available in: Chinese   Japanese   Portuguese  
Articles 16 Apr 2018
Hyperledger Composer basics, Part 1: Model and test your blockchain network
Hyperledger Composer is a tool for quickly building blockchain business networks and prototyping blockchain applications. This tutorial gets you started using it.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 2: Refine and deploy your blockchain network
This tutorial builds on the sample blockchain network introduced in Part 1 and takes you deeper into the Hyperledger Composer suite of developer tools. You'll model an IoT GPS sensor in a shipping container by adding GPS readings to the Shipment asset, and modify the smart contract (chaincode) to send an alert when the Shipment reaches its destination port.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 3: Deploy locally, interact with, and extend your blockchain network
In this tutorial, the third and final installment in this series, learn how to modify a sample blockchain network definition and transform it into a real-world blockchain application, write Cucumber feature tests, issue IDs for all participants, and execute every transaction through the CLI.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Get started with the Java EE 8 Security API, Part 3: Securely access user credentials with IdentityStore
Learn how to use the new IdentityStore interface to setup and configure RDBMS or LDAP identity storage in your Java web applications.
Also available in: English   Chinese  
Articles 12 Apr 2018
Get started with the Java EE 8 Security API, Part 4: Interrogating caller data with SecurityContext
This final article in the Java EE Security API series introduces the SecurityContext API, which is used to interrogate caller data consistently across servlet and EJB containers. Find out how SecurityContext extends HttpAuthenticationMechanism's declarative capabilities, then put it to work testing caller data in a servlet container example.
Also available in: English   Chinese  
Articles 12 Apr 2018
Use domain-driven design to architect your cloud apps
In this article, you will learn how to apply domain-driven design (DDD) concepts to cloud architectures, and why you should do it. This is a new paradigm, and you may be curious how to integrate it into your legacy codebase. We will cover this, showing how DDD is applicable to the cloud and why you would want it in your stack. You will also see how microservices can help, and how events and event sourcing are beneficial.
Also available in: Chinese  
Articles 11 Apr 2018
Temporary storage and the database, Part 3: Establish SQL temporary storage limits
Recent improvements enable limits on the amount of temporary storage a job may use to run SQL queries. This can prevent some system outages. In this article, you can learn how these limits work and put them to work for you.
Articles 11 Apr 2018
IBM Geographically Dispersed Resiliency for Power Systems solution
This article gives an overview of IBM Geographically Dispersed Resiliency for Power systems. Its virtual machine restart-based disaster recovery model provides support for data centers with IBM Power Systems infrastructure and IBM Power virtualization.
Articles 09 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 2: Create a front-desk visitor log with Node.js
In the first article in this series, you learned how to build a Node.js application on the IBM Cloud. However, that application was not very responsive or visually appealing. In this article you learn how to use the Bootstrap theme for your application to look better, and how to use the AngularJS library to make it more responsive.
Also available in: Chinese   Japanese  
Articles 09 Apr 2018
Analyzing the contextual content of hierarchical data by using IBM Watson Explorer
This tutorial demonstrates how to implement a custom crawler plug-in with IBM Watson Explorer to analyze a hierarchical data structure within the context of content analytics. The strategy outlined here permits the retaining of the hierarchical structure or grains of the model being analyzed.
Also available in: Chinese  
Articles 08 Apr 2018
Metaprogramming in Python
This article explains how you can use metaprogramming in Python and how it can simplify certain tasks.
Also available in: Chinese  
Articles 05 Apr 2018
How to set up a MegaRAID SAS 9361-8i controller card on an OpenPOWER system
The purpose of this article is to provide information about the Broadcom MegaRAID SAS 9361-8i controller card. The article outlines how to set up the controller card on an OpenPOWER system and describes the features and advantages of using this controller card.
Articles 05 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 1: Create a front-desk visitor log with Node.js
In this article, you learn how to use the IBM Cloud to write a Node.js application for an organization’s front desk, which needs to log visitors in and out. Along the way you will learn how to use Node.js, the Express HTTP server library, and a Cloudant database. You will learn how to do this in the highly available IBM Cloud. This is a basic introduction to Node.js programming on the IBM Cloud platform.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
IoT solution governance, Part 3: Governing your IoT data
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 3 of this series defines an end-to-end data governance mechanism that ensures IoT data is correctly and securely used by stakeholders to get the maximum value out of the IoT data. Part 3 describes why and how IoT data needs to be managed throughout the data lifecycle.
Also available in: Chinese  
Articles 04 Apr 2018
Top Internet of Things articles and tutorials (April 2018)
The start of 2018 is all about creating, updating, or finishing up article and tutorial series for IoT, covering IoT governance, IoT security, IoT and the smart home, IoT and Blockchain, and lastly cognitive IoT with deep learning.
Also available in: Chinese  
Articles 04 Apr 2018
Accelerating Python for scientific research
You should be using Python for scientific computing — not as a replacement for Fortran or C/C++, but as a wrapper for or as a bridge between diverse specialized programming modules and acceleration hardware. In this article we'll show you how to speed Python up in your environments to optimize its use.
Also available in: Chinese  
Articles 04 Apr 2018
ICEC custom widgets lab
IBM Connections Engagement Center (ICEC) makes it easy to build a social intranet by creating a lightweight portal-like experience using various out-of-the-box and custom widgets. This in-depth tutorial takes you through the process of creating and deploying custom widgets for an engagement center.
Articles 04 Apr 2018
Connect your Docker container to enterprise services with the IBM Cloud Secure Gateway
The IBM Cloud Secure Gateway service offers a flexible means to securely expose back-end enterprise services to your IBM Cloud applications. Creating the Secure Gateway is relatively straightforward through the IBM Cloud user interface. Ensuring that the gateway is secure and then leveraging the gateway require some additional steps. This tutorial shows you how to configure the gateway, how to add destinations to local enterprise services, how to leverage a Docker container to establish the connection from your enterprise, and how to access the service from your applications.
Also available in: Chinese   Japanese  
Articles 04 Apr 2018
Develop a blockchain application from scratch in Python
This tutorial introduces Python developers, of any programming skill level, to blockchain. You'll discover exactly what a blockchain is by implementing a public blockchain from scratch and building a simple application to leverage it. Python is an easy programming language to understand, and so I've chosen it for this tutorial.
Also available in: Chinese  
Tutorial 03 Apr 2018
Kubernetes at the Helm, containers in the engine room
If you are following the progression of container-based development and deploymentand I hope you arethen you know that these developments have already fundamentally changed how applications are created and served, and will continue to do so. This article explores containers, container orchestration, Kubernetes, the hybrid cloud, and the tools that make all of this work.
Also available in: Chinese  
Articles 03 Apr 2018
Porting and tuning applications for Linux on Power, Part 1: Porting to Linux on Power: 5 tips that could turn a good port into a great port
Porting from Linux on x86 to Linux on Power is usually easy, but developers should be aware of differences that may manifest as compilation, linking, or run-time errors, or performance issues. This article lists those differences, and describes approaches for fixing, improving, or working around them. Awareness of these differences and mitigation techniques can aid in getting the best results from a porting effort as quickly as possible.
Articles 03 Apr 2018
IoT and the Smart Home, Part 3: Develop the IoT apps for a home automation system
In this series, you will learn how to build a simple - but complete - home automation system. In doing so, you'll work with 433-MHz hardware components, software that runs on the Raspberry Pi, and the Watson IoT Platform in the IBM Cloud. In this part of the series, I'll show you how to build the IoT and mobile apps to control your home automation system.
Also available in: Chinese  
Tutorial 28 Mar 2018
IoT and the Smart Home, Part 2: Setting up the system software for a home automation system
In this series, you will learn how to build a simple - but complete - home automation system. In doing so, you'll work with 433-MHz hardware components, software that runs on the Raspberry Pi, and the Watson IoT Platform in the IBM Cloud. In this part of the series, I'll show you the software that I used to build the home automation system and run it to control the 433-MHz devices that you set up in Part 1.
Also available in: Chinese  
Tutorial 28 Mar 2018
Security and the IoT ecosystem
Security in systems design and development tends to be an afterthought, but it should be considered throughout the product lifecycle. One area where the number of exploits is exploding is in the quickly growing market of the Internet of Things (IoT). This article explores the spectrum of security in the context of IoT, including access security (authentication), data security (encryption), and security analytics (policy-based controls).
Also available in: Chinese  
Articles 26 Mar 2018
Getting started with the IBM Cloud, Part 4: Learn how to use serverless computing with the IBM Cloud Functions platform
See how to use IBM Cloud Functions to make the most of serverless computing. Doug Tidwell shows you how to generate code that manages a cloud-hosted NoSQL database.
Articles 23 Mar 2018
Coding IBM Watson Workspace Chatbots
This video shows you how to create IBM Watson Workspace chatbots, using Open Source resources and the Watson Workspace framework and SDK, which help you develop applications faster and with less code.
Videos 23 Mar 2018
Supporting protected computing on IBM Power Architecture
This article describes the changes to the IBM Power Architecture that can be used to provide enhanced protection of virtual machines from other software running on the same system. A new higher privilege mode called Ultravisor mode is being introduced, along with the concept of secure virtual machines (SVMs). This mode is supported by the Protected Execution Ultravisor which will be open sourced. An SVM is protected at rest, when transmitted over a network as a file, and while executing. In this article, we discuss the impact of this new architecture for SVMs. There is near-zero impact on VMs.
Articles 22 Mar 2018
IBM i Access Client Solutions: Customization and deployment questions answered
This article is a follow on to "IBM i Access Client Solutions: Customization and deployment made easy". It provides details about how to implement some of the more common deployment options when deploying IBM i Access Client Solutions to multiple users.
Articles 21 Mar 2018
Weaving patterns with artificial intelligence, Part 1: Letter correlation and simple language statistics for AI
AI is more than pattern recognition. It can also build on patterns to generate expression. This is increasingly important in the world of intelligent agents. Learn about generative AI, an important class of techniques to the modern developer. As a first step, consider the patterns in natural language and how these can be modeled to prepare machines to generate their own expressions of familiar language. Discover how to go from basic letter frequency statistics to correlation between letters by using matrix-based models.
Also available in: Chinese  
Articles 20 Mar 2018
An introduction to data science, Part 3: Text analytics
In this third tutorial in the "Introduction to data science" series, discover applications for simple Python-based text analytics, including Markov chains and sentiment analysis.
Also available in: Chinese  
Articles 19 Mar 2018
Build a connected-car IoT app with Geospatial Analytics
Deploy and extend an Internet of Things (IoT) Connected Vehicle starter kit on IBM Cloud with the Internet of Things Platform and Geospatial services. The starter kit enables you to simulate, view, and manage vehicles driving through a city and set up geofences for notification.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 19 Mar 2018
Minecraft and IBM Cloud, Part 4: Integrating Watson into Minecraft on IBM Cloud
In this tutorial series, you'll learn how to use Docker, Eclipse, and IBM Cloud to develop, extend, and host your own Minecraft servers. Find out how to use Eclipse to build Minecraft plugins, test them locally using Docker, and use IBM Cloud to host your Docker containers on the Internet. You'll also harness the power of IBM Watson from within Minecraft for more educational and interactive game play. In Part 4, you'll learn how to extend the Spigot server with a plugin that uses Watson cognitive services to add a little science to your game play.
Also available in: Chinese   Japanese  
Articles 19 Mar 2018
Top 6 technical advantages of Hyperledger Fabric for blockchain networks
Blockchain technology is already radically transforming industry operating models. When selecting a blockchain platform for your business needs, what are the most important attributes to consider? This top-6 list counts them down.
Also available in: Chinese   Japanese  
Articles 18 Mar 2018
Develop, govern, and operate your business network with the IBM Blockchain Platform
The IBM Blockchain Platform simplifies the development, governance, and operation of a decentralized network across multiple companies or institutions forming a business ecosystem. It enables all members to quickly achieve the common goal of activating and collaboratively governing their network so they can get on with conducting, innovating, and deriving value from their business transactions. Learn how to get started.
Also available in: Chinese   Portuguese   Spanish  
Articles 18 Mar 2018
Blockchain basics: Introduction to distributed ledgers
Everyone is placing bets on how the blockchain technology will revolutionize the way organizations and institutions transact business. Let's look at how a blockchain network operates, how you can take advantage of it, and how IBM is helping to advance the technology.
Also available in: English   Chinese   Japanese   Portuguese  
Articles 18 Mar 2018
Aspectos básicos de blockchain: Introducción a los controladores distribuidos
Todo el mundo apuesta en cómo la tecnología blockchain revolucionará la manera en que las organizaciones e instituciones realizan transacciones empresariales. Veamos cómo opera una red de blockchain, cómo puede sacar provecho de ella y cómo ayuda IBM a que la tecnología avance.
Articles 18 Mar 2018
IBM Blockchain 101: Quick-start guide for developers
Join the blockchain revolution! This developerWorks quick-start guide is for application developers who are exploring blockchain technology and want to quickly spin up a blockchain pre-production network, deploy sample applications, and develop and deploy client applications. Simple instructions show you how to activate a blockchain network based on the latest Hyperledger Fabric framework, write and install chaincode (business logic for the network), and develop client applications to streamline business processes and digital interactions.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 18 Mar 2018
Port a business chatbot to Watson Assistant
Follow along as a member of the Watson Applied Research team explains how they helped a client improve their chatbot by using Watson Conversation.
Also available in: Chinese  
Articles 16 Mar 2018
Configure multifactor authentication for IBM Cloud Node.js applications
Passwords are not a complete security solution; they can be stolen or shared. In this tutorial, you learn how to use a random string delivered by email as a second authentication factor. I also discuss several methods for risk analysis, which is used by the application to decide whether a second factor is warranted.
Also available in: Chinese   Japanese  
Articles 16 Mar 2018
Getting started with the IBM Cloud, Part 3: Doug Tidwell demos how to work with containers on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Articles 15 Mar 2018
Create a fun, simple IoT accelerometer game
In just six steps, you can create an IoT game for your smartphone using the IBM Watson IoT Platform services in the IBM Cloud.
Also available in: Chinese   Japanese   Portuguese   Spanish  
Articles 14 Mar 2018
Build a cognitive IoT app in just 7 steps
Build a cognitive IoT solution, following an edge computing architecture. Push your analytics out to the gateway, and use advanced machine learning to detect anomalies.
Also available in: Chinese   Japanese  
Tutorial 14 Mar 2018
IBM i ILE RPG cloud integration sample with IBM Cloud
In this article, you can learn how to connect your ILE RPG programs from cloud applications such as Node-RED on IBM Cloud by using the REST web service call functionality of the integrated web services server.
Articles 14 Mar 2018
Scale single sign-on with App ID for your Node.js cloud apps
In this tutorial, you will learn about implementing scalable Node.js applications when you are using the App ID service. This IBM Cloud service allows you to add authentication to your mobile and web apps and protect your APIs and back-ends running on IBM Cloud. App ID provides authentication with email/password through a scalable user registry or you can add social login, so that users can sign in with their Facebook or Google credentials. With App ID, you can also host user profile info that you can use to build engaging experiences.
Also available in: Chinese   Japanese   Portuguese  
Articles 14 Mar 2018
Get started with the Java EE 8 Security API, Part 2: Web authentication with HttpAuthenticationMechanism
HttpAuthenticationMechanism’s annotation-driven approach is a welcome departure from the tedium of manually configuring authentication for Java web applications. Learn how to setup and configure both classic Servlet 4.0-style authentication and custom solutions using HttpAuthenticationMechanism and the new Java EE 8 Security API.
Also available in: English   Chinese  
Articles 09 Mar 2018
How data becomes knowledge, Part 3: Extracting dark data
Individuals and organizations store all kinds of data. What do we do with it all? Can we call it up as we need it? Can all that data be analyzed quickly and efficiently? Or, does it tie up storage resources and languish for years because the cost of going through it and discarding what's obsolete is too high? Discover the utility and wisdom of storing dark data.
Also available in: Chinese  
Articles 08 Mar 2018
Getting started with the IBM Cloud, Part 2: Build an advanced Cloud Foundry app on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Articles 08 Mar 2018
Why you should learn the Rust programming language
Discover Rust, a C-like language that supports imperative, functional, and object-oriented programming.
Also available in: Chinese  
Articles 08 Mar 2018
Digital process automation with BPM and blockchain, Part 3: Use blockchain to manage legal documents stored in an enterprise content repository
In this tutorial, we explore a trade finance use case, a Letter of Credit transaction, that shows you how blockchain can help coordinate the payment and transfer of goods between buyer and seller banks through the use of Business Process Management and Enterprise Content Management.
Also available in: Chinese  
Tutorial 07 Mar 2018
How data becomes knowledge, Part 2: Data lakes and data swamps
Get an understanding of data lakes and data swamps in this easy to follow, yet insightful article.
Also available in: Chinese  
Articles 07 Mar 2018
How data becomes knowledge, Part 1: From data to knowledge
Trace the path from raw data to stored knowledge. Identify various data sources and the differences between structured and unstructured data. Learn what makes data valuable before applying the DIKW model to data science.
Also available in: Chinese  
Articles 06 Mar 2018
Make your websites smarter with Schema.org, Part 3: Understand and use the Schema.org vocabularies
When you use Schema.org vocabularies and metadata to describe your content, it makes the content more useful and findable to search engines. In part 3 of this series, I introduce you to the vocabularies used in Schema.org and give you the tools to use them yourself.
Also available in: Chinese  
Articles 05 Mar 2018
Make your websites smarter with Schema.org, Part 4: Structured data tools
Using Schema.org to describe the content on your webpages enables search engines and machines to more easily find and index your pages. There are a number of tools that you can use to implement structured data on your pages. In the final part of this series, we'll look at examples of tools that help you add structured data to plain HTML, validate the structured data on your page, and parse the structured data from a page.
Also available in: Chinese  
Articles 05 Mar 2018
Build a chatbot in the IBM Cloud
If you're looking to get started with chatbots, Watson services in IBM Cloud make it easy. In this tutorial, you'll learn both basic and advanced techniques for building chatbots that respond intelligently to your users.
Also available in: Chinese  
Articles 04 Mar 2018
Developing cognitive IoT solutions for anomaly detection by using deep learning, Part 5: Using Keras and TensorFlow for anomaly detection
This article is the fifth in a five-part series, "Developing cognitive IoT solutions for anomaly detection by using deep learning." This article demonstrates a deep learning solution using Keras and TensorFlow and how it is used to analyze the large amount of data that IoT sensors gather.
Also available in: Chinese  
Tutorial 02 Mar 2018
An introduction to data science, Part 2: Data and prediction through classification
Prediction and classification are two important aspects of machine learning that have a multitude of applications. In this second tutorial in "An Introduction to data science" series, discover two methods for classifying data to get the most from your data sets: probabilistic neural networks and density-based clustering.
Also available in: Chinese  
Articles 28 Feb 2018
IoT and the Smart Home, Part 1: Setting up the hardware for a home automation system
In this series, you will learn how to build a simple - but complete - home automation system. In doing so, you'll work with 433 MHz hardware components, software that runs on the Raspberry Pi, and the Watson IoT Platform in the IBM Cloud. In this part of the series, you will learn about how 433-MHz hardware works, how to use a breadboard, and how to set up the hardware for the home automation project that you'll build in this series.
Also available in: Chinese  
Tutorial 28 Feb 2018
Design and build secure IoT solutions, Part 1: Securing IoT devices and gateways
In this 3 part series of developing secure IoT solutions, the authors introduce IoT vulnerabilities and design challenges for secure IoT apps and then provide tested techniques for securing devices and gateways. For example, they discuss device authentication, including certificate-based authentication, device authorization, and application ID validation.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 3: Securing IoT applications
Part 3 in this 3 part series of developing secure IoT solutions focuses on securing IoT applications. Learn how to securely store IoT data in a Cloudant database, expose that stored data through secured APIs, and invoke secured APIs from mobile and web applications.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 2: Securing IoT data over the network
Building on the techniques for securing IoT devices that the authors discussed in Part 1, Part 2 in this 3 part series of developing secure IoT solutions focuses on securing data over the network. It discusses data encryption and API security in the IBM Watson IoT Platform APIs.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Unleash the value of Guardium data by using the Guardium Big Data Intelligence solution
Organizations that use IBM Security Guardium activity monitoring for data security and compliance struggle with the quantity of collected audit data, especially if they have 10 or more Guardium collectors. IBM Security Guardium Big Data Intelligence provides the power of a big data platform that is purpose-built for data security requirements. It helps augment existing Guardium deployments with the ability to quickly create an optimized security data lake that can retain large quantities of historical data over long time horizons.
Also available in: Chinese  
Articles 27 Feb 2018
Using Kubernetes secrets to manage credentials
If you're deploying services in your Kubernetes clusters, the code behind those services most likely needs to use credentials to do its work. In this tutorial, you'll see how to use Kubernetes secrets to deliver sensitive information like usernames and passwords to your code.
Also available in: Chinese  
Articles 27 Feb 2018
Beginner's guide to Python
Are you looking for an easy-to-learn programming language to help with your scientific work? Look no further than Python. Discover resources for using this straightforward language to do everything from running algebraic calculations to generating graphical output from your data.
Also available in: Chinese  
Articles 27 Feb 2018
Supervised learning models
Examine the theory and ideas behind supervised learning and its application in exploring data and data sets and calculating probability.
Also available in: Chinese  
Articles 26 Feb 2018
1 - 100 of 11406 results | Next
Show Summaries | Hide Summaries