Filter by products, topics, and types of content

(430 Products)

(763 Topics)

(20 Industries)

(15 Types)

1 - 100 of 11239 results | Next
Show Summaries | Hide Summaries
View Results
Title none Type none Date down
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 3: Building a disaster recovery solution with PureApplication Software
With the release of IBM PureApplication Platform and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the PureApplication Platform W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 3, you set up disaster recovery and learn how to perform three different disaster recovery procedures.
Tutorial 09 Sep 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 1: Getting started with hosted VMware environments
With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 1, you get started with creating and deploying hosted VMware environments in Bluemix Local System. Specifically, you learn how to allocate resources, configure external access to VMware components, and configure and deploy virtual machines in VMware.
Also available in: Chinese   Japanese  
Tutorial 30 Aug 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 2: Setting up a PureApplication Software workload environment
With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This tutorial series provides a step-by-step guide for users of the Bluemix Local System W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 2, you install and configure a PureApplication Software workload environment.
Tutorial 30 Aug 2018
IBM AIX application workloads on IBM Hyperconverged Systems powered by Nutanix
This article demonstrates how the advanced architecture of IBM Power can be blended with Nutanix web-scale technology, for quick and easy deploy of application workload on an AIX guest VM, through migration from an existing AIX environment or through fresh deployment.
Articles 08 Aug 2018
Deploy a sample application to the IBM Blockchain Platform Starter Plan
Step by step, see how to create a network on the IBM Blockchain Platform, install a smart contract (chaincode), and run a sample application to invoke it. You'll also see how to populate the shared ledger and communicate with it by making calls from a local client application to query and update the ledger.
Also available in: Chinese  
Tutorial 14 Jul 2018
ISV solution ecosystem for Hortonworks on IBM Power Systems
This article provides a list of ISV solutions that can augment the capabilities of Hortonworks Data Platform (HDP) running on Linux on IBM Power Systems. Solutions cover many categories including business intelligence (BI) tools, advanced analytics, and so on.
Also available in: Chinese   Japanese  
Articles 13 Jul 2018
Unit 23: Java in the cloud
Learn the structure, syntax, and programming paradigm of the Java platform and language. Start by mastering the essentials of object-oriented programming on the Java platform, and progress incrementally to the more-sophisticated syntax and libraries that you need to develop complex, real-world Java applications.
Also available in: Chinese  
Tutorial 12 Jul 2018
On demand data in Python, Part 3: Coroutines and asyncio
Much of the data in modern big data applications comes from the web or databases. You need to write code to process this at scale, but you don't want everything to grind to a halt in the process. Python 3 introduced a system for cooperative multitasking, which alleviates this problem, using asynchronous coroutines. Asynchronous coroutines build on similar concepts to generators. They are objects created from special functions which can be suspended and resumed. They make it possible to break down complex and inefficient processing into simple tasks that cooperate to maximize trade-offs between CPU and input/output. Learn these core techniques following a simple sequence of examples.
Also available in: Chinese  
Articles 02 Jul 2018
On demand data in Python, Part 2: The magic of itertools
Python's motto has always been "Batteries included," to highlight its extensive standard library. There are many well-kept secrets among the standard modules, including itertools, which is less well known in part because iterators and generators are less well known. This is a shame because the routines in itertools and related modules such as functools and operators can save developers many hours in developing big data operators. Learn by copious examples how to use itertools to address the most common MapReduce-style data science tasks.
Also available in: Chinese  
Articles 22 Jun 2018
On demand data in Python, Part 1: Python iterators and generators
The oldest known way to process data in Python is building up data in lists, dictionaries and other such data structures. Though such techniques work well in many cases, they cause major problems when dealing with large quantities of data. It's easy to find that your code is running painfully slowly or running out of memory. Generators and iterators help address this problem. These techniques have been around in Python for a while but are not well understood. Used properly, they can bring big data tasks down to size so that they don't require a huge hardware investment to complete.
Also available in: Chinese  
Articles 21 Jun 2018
IoT on the edge, Part 3: Integrating cloud analytics and a dashboard app into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. You learned how to get sensor readings for temperature and humidity from NodeMCU devices to the IBM Watson IoT Platform. In this article, you learn how to preserve those readings in a database, how to display them in an IoT dashboard, and how to generate alerts.
Articles 19 Jun 2018
Optimize queries in Cloudant
This article compiles insights from multiple people in regard to methods and experiences related to optimizing queries when operating Cloudant NoSQL DB. The knowledge contained here will help you have a more in-depth understanding of the most suitable queries for each applicable scenario, to provide the most efficient data query service for your application.
Also available in: Chinese  
Articles 11 Jun 2018
Class sharing in Eclipse OpenJ9
Memory footprint and startup time are important performance metrics for a Java virtual machine (JVM). The memory footprint becomes especially important in the cloud environment since you pay for the memory your application uses. This tutorial shows you how to use the shared classes feature in Eclipse OpenJ9 to reduce the memory footprint and improve your JVM startup time.
Also available in: Chinese  
Articles 06 Jun 2018
An introduction to Kafka
An introduction to one of the most popular platforms for distributed messaging or streaming data.
Also available in: Chinese  
Articles 05 Jun 2018
IBM Cloud for VMware Solutions: Take a look under the hood
This tutorial examines the architecture of IBM Cloud for VMware Solutions, an IBM Cloud offering that provides deployment and management of VMware virtualized environments. Take a look inside the components of the offering to see how they work together to provision and maintain the environment in the public cloud.
Also available in: Chinese   Japanese  
Articles 04 Jun 2018
Extend your blockchain smart contracts with off-chain logic
This article presents two ways to bolster your smart contracts with logic obtained outside the typical boundaries of the blockchain, while still preserving the trust and transparency that define a blockchain network.
Also available in: Chinese  
Articles 31 May 2018
Deploy a MongoDB replica set using the IBM Cloud Kubernetes Service
This article demonstrates how to deploy a MongoDB replica set in the IBM Cloud Kubernetes Service. It briefly outlines MongoDB's cluster requirements and introduces Kubernetes StatefulSets and explains how they can be deployed.
Also available in: Chinese   Japanese  
Articles 28 May 2018
Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
This article is the first part of a three part series on developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR). It summarizes the GDPR and explains how the privacy regulation impacts and applies to developing and supporting applications that are intended to be used by European Union citizens.
Also available in: Japanese  
Articles 25 May 2018
Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
Part 3 of this series provides practical application development techniques that can alleviate an application's privacy risk. These solutions include utilizing database encryption, data pseudonymization, and assuring a robust level of application security.
Also available in: Japanese  
Articles 25 May 2018
Developing GDPR compliant applications, Part 2: Application privacy by design
This article provides guidance for integrating privacy risk evaluation and mitigation within the software development lifecycle. It is part 2 in a series of articles about developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR).
Also available in: Japanese  
Articles 25 May 2018
IBM RFE Community, Release 22
Find out what's new in the RFE Community. With Release 22, the RFE Community provides new features that keep you up to date on the requests you're watching and are interested in.
Articles 20 May 2018
Get started with Servlet 4.0
Servlet 4.0 fully integrates HTTP/2's server push technology, and also enables runtime discovery of a servlet's mapping URL. With video demonstrations and code examples, this hands-on tutorial gets you started with HTTP/2 server push and the new HttpServletMapping interface in Java servlet and JSF applications.
Also available in: Chinese  
Articles 10 May 2018
IoT on the edge, Part 2: Integrating edge analytics into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. However, identification is only a partial solution. Ideally, we would want to fix those conditions automatically. Because Internet access might be slow, spotty, or even non-existent, the analytics to decide what to do should happen on the “edge” of the network, right at the barn.
Also available in: Chinese  
Tutorial 09 May 2018
Beginner's Guide to Rust: Start coding with the Rust language
What better way to learn a new programming language than to create a favorite old game? In this tutorial, learn how to create a simple game of Tic-Tac-Toe.
Also available in: Chinese  
Articles 07 May 2018
Beginner's Guide to Rust: Get to know Rust
Get to know Mozilla Rust, a safe, statistically typed compiled language.
Also available in: Chinese  
Articles 07 May 2018
The benefits of agile integration, Part 1: The fate of the ESB
While many large enterprises successfully use the enterprise service bus (ESB) pattern, the term is often disparaged in the cloud-native space, and especially in relation to microservices architecture. It is seen as heavyweight and lacking in agility. What has happened to make the ESB pattern appear so outdated, and what should we use in its place? What would lightweight integration look like?
Also available in: Chinese  
Articles 01 May 2018
The benefits of agile integration, Part 2: Moving to a lightweight, agile integration architecture
Microservices principles are revolutionizing the way applications are built by enabling a more decoupled and decentralized approach to implementation, which leads to greater agility, scalability, and resilience. These applications still need to be connected to one another and to existing systems of record. It clearly makes sense to use microservice techniques in the integration space, too. Lightweight integration provides the benefits of cloud-ready containerization to integration architecture, and provides the opportunity to escape from the heavily centralized ESB pattern to more empowered and autonomous application teams.
Also available in: Chinese  
Articles 01 May 2018
5 things you didn't know about...: MicroProfile 1.3
Eclipse MicroProfile has just delivered five new APIs for developing Java cloud-native microservices. Get the highlights of what's new in MicroProfile 1.3, with code examples that will have you up and running in no time.
Also available in: Chinese   Japanese  
Articles 30 Apr 2018
IoT Lessons Learned: Lessons learned from my first DIY IoT project
Read these lessons learned from developing a home automation system (from scratch), and save yourself some time, money, and energy.
Also available in: Chinese  
Articles 26 Apr 2018
Track time spent on projects with IBM Cloud, Part 2: Give your time-tracking app the ability to record the time spent per project
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 2 explains how to add the ability to record the time spent per project. Here I show you how to retrieve and aggregate time entries to generate reports of hours worked per project, both online and in a structured format suitable for download and further processing. Finally, I walk you through the steps to upload and deploy the application on IBM Cloud, so that it's online and always available in the cloud.
Also available in: Chinese  
Articles 24 Apr 2018
An introduction to data science, Part 4: The languages of data science
Discover the languages developed and most commonly used for data science programming and applications, including C, Python, and Fortran.
Also available in: Chinese  
Articles 23 Apr 2018
5 things you didn't know about ...: Java 10
Hot on the heels of Java 9, Java 10 is here, with a cornucopia of cool new features for code geeks, container nerds, and garbage-collector geniuses. There's no time like the present to find out what's new in JDK 10.
Also available in: Chinese   Japanese  
Articles 17 Apr 2018
Track time spent on projects with IBM Cloud, Part 1: Build a custom web application with IBM Cloud, PHP, and MySQL
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 1 covers the basics, showing you how to initialize a cloud-based database instance and connect your local PHP application to it. It also explains how to add and modify records on the cloud database instance using the Slim framework.
Also available in: Chinese  
Articles 16 Apr 2018
Hyperledger Composer basics, Part 1: Model and test your blockchain network
Hyperledger Composer is a tool for quickly building blockchain business networks and prototyping blockchain applications. This tutorial gets you started using it.
Also available in: Chinese   Japanese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 2: Refine and deploy your blockchain network
This tutorial builds on the sample blockchain network introduced in Part 1 and takes you deeper into the Hyperledger Composer suite of developer tools. You'll model an IoT GPS sensor in a shipping container by adding GPS readings to the Shipment asset, and modify the smart contract (chaincode) to send an alert when the Shipment reaches its destination port.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 3: Deploy locally, interact with, and extend your blockchain network
In this tutorial, the third and final installment in this series, learn how to modify a sample blockchain network definition and transform it into a real-world blockchain application, write Cucumber feature tests, issue IDs for all participants, and execute every transaction through the CLI.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Get started with the Java EE 8 Security API, Part 3: Securely access user credentials with IdentityStore
Learn how to use the new IdentityStore interface to setup and configure RDBMS or LDAP identity storage in your Java web applications.
Also available in: English   Chinese   Japanese  
Articles 12 Apr 2018
Get started with the Java EE 8 Security API, Part 4: Interrogating caller data with SecurityContext
This final article in the Java EE Security API series introduces the SecurityContext API, which is used to interrogate caller data consistently across servlet and EJB containers. Find out how SecurityContext extends HttpAuthenticationMechanism's declarative capabilities, then put it to work testing caller data in a servlet container example.
Also available in: English   Chinese   Japanese  
Articles 12 Apr 2018
Use domain-driven design to architect your cloud apps
In this article, you will learn how to apply domain-driven design (DDD) concepts to cloud architectures, and why you should do it. This is a new paradigm, and you may be curious how to integrate it into your legacy codebase. We will cover this, showing how DDD is applicable to the cloud and why you would want it in your stack. You will also see how microservices can help, and how events and event sourcing are beneficial.
Also available in: Chinese  
Articles 11 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 2: Create a front-desk visitor log with Node.js
In the first article in this series, you learned how to build a Node.js application on the IBM Cloud. However, that application was not very responsive or visually appealing. In this article you learn how to use the Bootstrap theme for your application to look better, and how to use the AngularJS library to make it more responsive.
Also available in: Chinese   Japanese  
Articles 09 Apr 2018
Analyzing the contextual content of hierarchical data by using IBM Watson Explorer
This tutorial demonstrates how to implement a custom crawler plug-in with IBM Watson Explorer to analyze a hierarchical data structure within the context of content analytics. The strategy outlined here permits the retaining of the hierarchical structure or grains of the model being analyzed.
Also available in: Chinese  
Articles 08 Apr 2018
Metaprogramming in Python
This article explains how you can use metaprogramming in Python and how it can simplify certain tasks.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 1: Create a front-desk visitor log with Node.js
In this article, you learn how to use the IBM Cloud to write a Node.js application for an organization’s front desk, which needs to log visitors in and out. Along the way you will learn how to use Node.js, the Express HTTP server library, and a Cloudant database. You will learn how to do this in the highly available IBM Cloud. This is a basic introduction to Node.js programming on the IBM Cloud platform.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
IoT solution governance, Part 3: Governing your IoT data
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 3 of this series defines an end-to-end data governance mechanism that ensures IoT data is correctly and securely used by stakeholders to get the maximum value out of the IoT data. Part 3 describes why and how IoT data needs to be managed throughout the data lifecycle.
Also available in: Chinese  
Articles 04 Apr 2018
Top Internet of Things articles and tutorials (April 2018)
The start of 2018 is all about creating, updating, or finishing up article and tutorial series for IoT, covering IoT governance, IoT security, IoT and the smart home, IoT and Blockchain, and lastly cognitive IoT with deep learning.
Also available in: Chinese   Japanese  
Articles 04 Apr 2018
Accelerating Python for scientific research
You should be using Python for scientific computing — not as a replacement for Fortran or C/C++, but as a wrapper for or as a bridge between diverse specialized programming modules and acceleration hardware. In this article we'll show you how to speed Python up in your environments to optimize its use.
Also available in: Chinese  
Articles 04 Apr 2018
ICEC custom widgets lab
IBM Connections Engagement Center (ICEC) makes it easy to build a social intranet by creating a lightweight portal-like experience using various out-of-the-box and custom widgets. This in-depth tutorial takes you through the process of creating and deploying custom widgets for an engagement center.
Articles 04 Apr 2018
Kubernetes at the Helm, containers in the engine room
If you are following the progression of container-based development and deploymentand I hope you arethen you know that these developments have already fundamentally changed how applications are created and served, and will continue to do so. This article explores containers, container orchestration, Kubernetes, the hybrid cloud, and the tools that make all of this work.
Also available in: Chinese  
Articles 03 Apr 2018
Getting started with the IBM Cloud, Part 4: Learn how to use serverless computing with the IBM Cloud Functions platform
See how to use IBM Cloud Functions to make the most of serverless computing. Doug Tidwell shows you how to generate code that manages a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 23 Mar 2018
Coding IBM Watson Workspace Chatbots
This video shows you how to create IBM Watson Workspace chatbots, using Open Source resources and the Watson Workspace framework and SDK, which help you develop applications faster and with less code.
Videos 23 Mar 2018
IBM i Access Client Solutions: Customization and deployment questions answered
This article is a follow on to "IBM i Access Client Solutions: Customization and deployment made easy". It provides details about how to implement some of the more common deployment options when deploying IBM i Access Client Solutions to multiple users.
Articles 21 Mar 2018
An introduction to data science, Part 3: Text analytics
In this third tutorial in the "Introduction to data science" series, discover applications for simple Python-based text analytics, including Markov chains and sentiment analysis.
Also available in: Chinese  
Articles 19 Mar 2018
Build a connected-car IoT app with Geospatial Analytics
Deploy and extend an Internet of Things (IoT) Connected Vehicle starter kit on IBM Cloud with the Internet of Things Platform and Geospatial services. The starter kit enables you to simulate, view, and manage vehicles driving through a city and set up geofences for notification.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 19 Mar 2018
Minecraft and IBM Cloud, Part 4: Integrating Watson into Minecraft on IBM Cloud
In this tutorial series, you'll learn how to use Docker, Eclipse, and IBM Cloud to develop, extend, and host your own Minecraft servers. Find out how to use Eclipse to build Minecraft plugins, test them locally using Docker, and use IBM Cloud to host your Docker containers on the Internet. You'll also harness the power of IBM Watson from within Minecraft for more educational and interactive game play. In Part 4, you'll learn how to extend the Spigot server with a plugin that uses Watson cognitive services to add a little science to your game play.
Also available in: Chinese   Japanese  
Articles 19 Mar 2018
Top 6 technical advantages of Hyperledger Fabric for blockchain networks
Blockchain technology is already radically transforming industry operating models. When selecting a blockchain platform for your business needs, what are the most important attributes to consider? This top-6 list counts them down.
Also available in: Chinese   Japanese  
Articles 18 Mar 2018
Develop, govern, and operate your business network with the IBM Blockchain Platform
The IBM Blockchain Platform simplifies the development, governance, and operation of a decentralized network across multiple companies or institutions forming a business ecosystem. It enables all members to quickly achieve the common goal of activating and collaboratively governing their network so they can get on with conducting, innovating, and deriving value from their business transactions. Learn how to get started.
Also available in: Chinese   Portuguese   Spanish  
Articles 18 Mar 2018
Aspectos básicos de blockchain: Introducción a los controladores distribuidos
Todo el mundo apuesta en cómo la tecnología blockchain revolucionará la manera en que las organizaciones e instituciones realizan transacciones empresariales. Veamos cómo opera una red de blockchain, cómo puede sacar provecho de ella y cómo ayuda IBM a que la tecnología avance.
Articles 18 Mar 2018
Configure multifactor authentication for IBM Cloud Node.js applications
Passwords are not a complete security solution; they can be stolen or shared. In this tutorial, you learn how to use a random string delivered by email as a second authentication factor. I also discuss several methods for risk analysis, which is used by the application to decide whether a second factor is warranted.
Also available in: Chinese   Japanese  
Articles 16 Mar 2018
Getting started with the IBM Cloud, Part 3: Doug Tidwell demos how to work with containers on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 15 Mar 2018
IBM i ILE RPG cloud integration sample with IBM Cloud
In this article, you can learn how to connect your ILE RPG programs from cloud applications such as Node-RED on IBM Cloud by using the REST web service call functionality of the integrated web services server.
Articles 14 Mar 2018
Scale single sign-on with App ID for your Node.js cloud apps
In this tutorial, you will learn about implementing scalable Node.js applications when you are using the App ID service. This IBM Cloud service allows you to add authentication to your mobile and web apps and protect your APIs and back-ends running on IBM Cloud. App ID provides authentication with email/password through a scalable user registry or you can add social login, so that users can sign in with their Facebook or Google credentials. With App ID, you can also host user profile info that you can use to build engaging experiences.
Also available in: Chinese   Japanese   Portuguese  
Articles 14 Mar 2018
Get started with the Java EE 8 Security API, Part 2: Web authentication with HttpAuthenticationMechanism
HttpAuthenticationMechanism’s annotation-driven approach is a welcome departure from the tedium of manually configuring authentication for Java web applications. Learn how to setup and configure both classic Servlet 4.0-style authentication and custom solutions using HttpAuthenticationMechanism and the new Java EE 8 Security API.
Also available in: English   Chinese  
Articles 09 Mar 2018
How data becomes knowledge, Part 3: Extracting dark data
Individuals and organizations store all kinds of data. What do we do with it all? Can we call it up as we need it? Can all that data be analyzed quickly and efficiently? Or, does it tie up storage resources and languish for years because the cost of going through it and discarding what's obsolete is too high? Discover the utility and wisdom of storing dark data.
Also available in: Chinese  
Articles 08 Mar 2018
Getting started with the IBM Cloud, Part 2: Build an advanced Cloud Foundry app on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 08 Mar 2018
Why you should learn the Rust programming language
Discover Rust, a C-like language that supports imperative, functional, and object-oriented programming.
Also available in: Chinese   Portuguese   Spanish  
Articles 08 Mar 2018
Digital process automation with BPM and blockchain, Part 3: Use blockchain to manage legal documents stored in an enterprise content repository
In this tutorial, we explore a trade finance use case, a Letter of Credit transaction, that shows you how blockchain can help coordinate the payment and transfer of goods between buyer and seller banks through the use of Business Process Management and Enterprise Content Management.
Also available in: Chinese  
Tutorial 07 Mar 2018
How data becomes knowledge, Part 2: Data lakes and data swamps
Get an understanding of data lakes and data swamps in this easy to follow, yet insightful article.
Also available in: Chinese  
Articles 07 Mar 2018
How data becomes knowledge, Part 1: From data to knowledge
Trace the path from raw data to stored knowledge. Identify various data sources and the differences between structured and unstructured data. Learn what makes data valuable before applying the DIKW model to data science.
Also available in: Chinese  
Articles 06 Mar 2018
An introduction to data science, Part 2: Data and prediction through classification
Prediction and classification are two important aspects of machine learning that have a multitude of applications. In this second tutorial in "An Introduction to data science" series, discover two methods for classifying data to get the most from your data sets: probabilistic neural networks and density-based clustering.
Also available in: Chinese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 1: Securing IoT devices and gateways
In this 3 part series of developing secure IoT solutions, the authors introduce IoT vulnerabilities and design challenges for secure IoT apps and then provide tested techniques for securing devices and gateways. For example, they discuss device authentication, including certificate-based authentication, device authorization, and application ID validation.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 3: Securing IoT applications
Part 3 in this 3 part series of developing secure IoT solutions focuses on securing IoT applications. Learn how to securely store IoT data in a Cloudant database, expose that stored data through secured APIs, and invoke secured APIs from mobile and web applications.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 2: Securing IoT data over the network
Building on the techniques for securing IoT devices that the authors discussed in Part 1, Part 2 in this 3 part series of developing secure IoT solutions focuses on securing data over the network. It discusses data encryption and API security in the IBM Watson IoT Platform APIs.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Unleash the value of Guardium data by using the Guardium Big Data Intelligence solution
Organizations that use IBM Security Guardium activity monitoring for data security and compliance struggle with the quantity of collected audit data, especially if they have 10 or more Guardium collectors. IBM Security Guardium Big Data Intelligence provides the power of a big data platform that is purpose-built for data security requirements. It helps augment existing Guardium deployments with the ability to quickly create an optimized security data lake that can retain large quantities of historical data over long time horizons.
Also available in: Chinese  
Articles 27 Feb 2018
Using Kubernetes secrets to manage credentials
If you're deploying services in your Kubernetes clusters, the code behind those services most likely needs to use credentials to do its work. In this tutorial, you'll see how to use Kubernetes secrets to deliver sensitive information like usernames and passwords to your code.
Also available in: Chinese  
Articles 27 Feb 2018
Beginner's guide to Python
Are you looking for an easy-to-learn programming language to help with your scientific work? Look no further than Python. Discover resources for using this straightforward language to do everything from running algebraic calculations to generating graphical output from your data.
Also available in: Chinese   Japanese  
Articles 27 Feb 2018
IoT on the edge, Part 1: Integrating LPWAN networking and edge computing into your IoT solutions
When devices and sensors are outside the range of a typical wireless network configuration, you need to adopt an edge computing architecture that uses long-range networking, such as LPWAN networking protocols. Learn how to integrate LPWAN networking into a standard wireless network architecture for a large-scale IoT solution.
Also available in: Chinese  
Tutorial 23 Feb 2018
7 tips for getting started with R language
This article gives you 7 tips to make it easier and faster to start using the powerful R language. Learn about R packages, how to structure data in R, and the powerful RStudio IDE. Discover how the apply function can save you loads of time when running complicated scripts and how ggplot2 can really make your visuals pop. Finally, see how the Rcpp package allows you to import C++ functions into an R script.
Also available in: Chinese  
Articles 23 Feb 2018
Build cognitive solutions for industries, Part 4: Enhancing the simplicity and quality of human-computer interactions
Cognitive computing is becoming increasingly important within the enterprise. In this fourth tutorial in a series, we discuss the primary methodologies and patterns used to build cognitive solutions for the telecommunications and media and entertainment industries.
Also available in: Chinese  
Articles 21 Feb 2018
Schedule data backups automatically on IBM Cloud
This tutorial demonstrates how to use the Workload Scheduler service on the IBM Cloud platform to automatically schedule process execution for your IBM Cloud applications. It uses a common example performing a daily database backup to walk you through the process of creating a RESTful PHP service that can be invoked to back up the database. It also demonstrates how to integrate third-party services such as Dropbox and SendGrid to store backup files and send status notifications.
Also available in: Chinese  
Articles 19 Feb 2018
IBM AIX multipath I/O (MPIO) resiliency and problem determination
Multipath storage configurations are a key component of data centers. Problem determination of these SAN fabrics becomes more difficult due to ever increasing complexity. This article describes the recent enhancements to the IBM AIX operating system MPIO software, and describes how the IBM AIX lsmpio command can be used during problem determination.
Articles 19 Feb 2018
Deploy a Hello World webpage to IBM Cloud
Let's deploy a simple Hello World webpage using nothing but HTML and a static buildpack on IBM Cloud.
Also available in: Chinese   Russian   Japanese  
Articles 19 Feb 2018
Changing IBM Connections behavior with IBM Connections Customizer
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the behavior of Connections to suit your business processes.
Articles 15 Feb 2018
Get started with the Java EE 8 Security API, Part 1: Java enterprise security for cloud and microservices platforms
As one of the three core specifications introduced with Java EE 8, the new Java EE Security API is an essential addition to your Java EE toolkit, and thankfully not terribly difficult to learn. Find out how the Java EE Security API supports enterprise security in cloud and microservices platforms, while introducing modern capabilities such as context and dependency injection.
Also available in: English   Chinese  
Articles 10 Feb 2018
Use LDAP and Active Directory to authenticate Node.js users
If you already have an internal IT infrastructure, it quite likely contains an LDAP server (possibly Active Directory, acting as an LDAP server) to serve user identities. In many cases, it is best to continue to use that directory, even when your application sits in IBM Cloud. In this tutorial, I show you how to authenticate users.
Also available in: Chinese  
Tutorial 07 Feb 2018
Build your first IoT application
Use Node-RED and Twilio to configure your first IoT application on IBM Cloud. You'll build a complete IoT solution that monitors a remote server and then notifies a user if their computer or IT network is down.
Also available in: Chinese   Russian   Japanese  
Articles 07 Feb 2018
IoT solution governance, Part 2: Governing your IoT devices
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 2 of this series focuses on governing your devices. Device governance includes choosing the right device for your solution and managing the lifecycle of those devices.
Also available in: Chinese  
Articles 06 Feb 2018
Use management APIs and Jenkins as a continuous integration engine for IBM App Connect Professional deployment automation
Check out deployment automation on IBM App Connect (formerly known as WebSphere Cast Iron) by using IBM App Connect Management APIs, the SoapUI client, and Jenkins.
Also available in: Chinese  
Articles 05 Feb 2018
Taking control of the IBM Connections user experience
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the Connections user interface, and how you can get started using Customizer right away.
Articles 01 Feb 2018
Build a simple word game app using Cloudant on IBM Cloud
IBM Cloud is an open platform for developing and deploying web and mobile applications. In this two-part tutorial, we walk you through the steps to create a simple GuesstheWord game application using IBM Cloud and its cloud-based development environment: open toolchains and the IBM Cloud Continuous Delivery service. You will start from scratch and end up with a simple game you can play in a web browser with server code running in the cloud.
Also available in: Chinese   Russian   Japanese   Portuguese   Spanish  
Articles 01 Feb 2018
An introduction to data science, Part 1: Data, structure, and the data science pipeline
Data is meaningless if you can't process it to gain insights. The field of data science gives you the tools and methods you need to process data sets effectively and so get the most from the data you collect. In this tutorial, you will Get the basics of machine learning, including data engineering, model learning, and operations.
Also available in: Chinese  
Articles 01 Feb 2018
Learn how to bootstrap Hydra
The basic idea of OAuth 2.0 and OpenID is when a user wants to do something with an application ("Application X"). Access to the application requires access to an account of a company or business ("Service Z") that would require authorization on the user's behalf. To allow authorization in a good and secure way (without violating the users' trust to ask for the their credentials directly), you can integrate something like Hydra into Service Z so that Application X can make authorized requests on the users' behalf.
Also available in: Chinese   Japanese  
Tutorial 25 Jan 2018
Lambda functions for rapid prototyping
The serverless nature of lambdas fulfills the cloud promise of having the least amount possible to manage. This new cloud paradigm makes it easier to prototype, experiment, and quickly gather feedback. This article will explore how efficient a workflow can be, what this means for early cloud projects, and how it fits in with containers.
Also available in: Japanese  
Articles 24 Jan 2018
Achieving high performance on IBM AIX using Coherent Accelerator Processor Interface (CAPI)
This article describes the Coherent Accelerator Processor Interface (CAPI) Flash support on IBM AIX. CAPI technology has been used on AIX to accelerate I/O operations to IBM Flash storage. AIX CAPI Flash driver stack has been optimized into a monolithic driver model which further reduced the I/O code path length. CAPI Flash technology provides a superior performance advantage in terms of IOPS per processor when compared to the traditional Fibre Channel I/O. We also describe at a high level how a user can use CAPI-based flash devices on AIX.
Articles 24 Jan 2018
Code pattern: Mine insights from software development artifacts
There is a lot of unstructured text content that is generated in any domain – software development lifecycle, finance, healthcare, social media, etc. Valuable insights can be generated by analyzing unstructured text content and correlating the information across various document sources. This pattern uses Watson Natural Language Understanding, Python Natural Language Toolkit, OrientDB, Node-RED, and IBM Data Science Experience to build a complete analytics solution that generates insights for informed decision-making.
Articles 24 Jan 2018
Getting started with the IBM Cloud, Part 1: Start developing and deploying apps on IBM's cloud platform
See how to start developing and deploying applications in the IBM Cloud. Doug Tidwell takes you through the basics of developing and deploying an app that's available worldwide.
Also available in: Chinese   Japanese  
Articles 23 Jan 2018
Digital process automation with BPM and blockchain, Part 2: Enable business processes to react to blockchain events
The combination of Business Process Management (BPM) and blockchain technology dramatically simplifies distributed, collaborative processes between multiple enterprises, through the introduction of a shared ledger used by all the participants. In this tutorial, we go beyond mere data sharing through blockchain, and include blockchain’s "active behavior": its capability to notify participants about successful completion of a transaction, by sending events.
Also available in: Chinese  
Articles 22 Jan 2018
Temporary storage and the database, Part 2: Manage your Maintained Temporary Indexes (MTIs)
The SQL optimizer uses Maintained Temporary Indexes (MTIs) to run queries smoothly. But too many MTIs can exhaust temporary storage. With the right information and tools, you can assist the optimizer and prevent system outages.
Articles 22 Jan 2018
IoT solution governance, Part 1: Defining your IoT governance practices
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 1 of this series defines a proper governance structure for managing IoT initiatives, which includes defining a technical strategy and reference architecture. Part 1 also describes how a dedicated Center of Excellence (CoE) can help IoT organizations govern their IoT solutions.
Also available in: Chinese  
Articles 19 Jan 2018
Build an enhanced IT help desk chatbot on IBM i with Watson Assistant
Chatbots are conversational robots that simulate conversation, and can interact with users in natural language. By harnessing both the power of the IBM Cloud Watson services and the power and openness of IBM i, you can open up your chatbot to countless creative applications (such as a virtual agent) that can understand and automatically solve password-related issues. This article guides you to implement a prototype of such a chatbot running on IBM i that links the IBM Watson Assistant service and IBM i to Slack, which is the messaging team collaboration tool.
Articles 18 Jan 2018
Analytics ecosystem, Part 1: Spatial Analytics with Db2 Warehouse
Db2 Warehouse, a massively parallel processing (MPP) architecture based data warehouse solution also has geospatial capabilities to manage spatial data. You can now store spatial data as geometries in database tables and perform spatial analytics.
Articles 18 Jan 2018
1 - 100 of 11239 results | Next
Show Summaries | Hide Summaries