Filter by products, topics, and types of content

(430 Products)

(763 Topics)

(20 Industries)

(15 Types)

1 - 100 of 11323 results | Next
Show Summaries | Hide Summaries
View Results
Title none Type none Date down
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 3: Building a disaster recovery solution with PureApplication Software
With the release of IBM PureApplication Platform and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the PureApplication Platform W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 3, you set up disaster recovery and learn how to perform three different disaster recovery procedures.
Tutorial 09 Sep 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 1: Getting started with hosted VMware environments
With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 1, you get started with creating and deploying hosted VMware environments in Bluemix Local System. Specifically, you learn how to allocate resources, configure external access to VMware components, and configure and deploy virtual machines in VMware.
Also available in: Chinese   Japanese  
Tutorial 30 Aug 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 2: Setting up a PureApplication Software workload environment
With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This tutorial series provides a step-by-step guide for users of the Bluemix Local System W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 2, you install and configure a PureApplication Software workload environment.
Tutorial 30 Aug 2018
IBM AIX application workloads on IBM Hyperconverged Systems powered by Nutanix
This article demonstrates how the advanced architecture of IBM Power can be blended with Nutanix web-scale technology, for quick and easy deploy of application workload on an AIX guest VM, through migration from an existing AIX environment or through fresh deployment.
Articles 08 Aug 2018
Performance of Scylla running on IBM Power Systems
Scylla is an open source NoSQL database that is compatible with Apache Cassandra. Scylla offers several key advantages over Cassandra such as scalability and better performance. Scylla was tested with IBM POWER8 processor-based servers and superior throughput was achieved with both database read and write operations. This article describes the tests that were done with IBM POWER processor-based servers, the performance results, and the value of IBM POWER processor-based servers for Scylla.
Also available in: Chinese  
Articles 18 Jul 2018
Deploy a sample application to the IBM Blockchain Platform Starter Plan
Step by step, see how to create a network on the IBM Blockchain Platform, install a smart contract (chaincode), and run a sample application to invoke it. You'll also see how to populate the shared ledger and communicate with it by making calls from a local client application to query and update the ledger.
Also available in: Chinese  
Tutorial 14 Jul 2018
Virtualization of NVMe adapters on IBM POWER9 processor-based systems
This article details out on the usage of a Non-Volatile Memory Enterprise (NVMe) adapter on IBM POWER9 processor-based systems.
Articles 13 Jul 2018
ISV solution ecosystem for Hortonworks on IBM Power Systems
This article provides a list of ISV solutions that can augment the capabilities of Hortonworks Data Platform (HDP) running on Linux on IBM Power Systems. Solutions cover many categories including business intelligence (BI) tools, advanced analytics, and so on.
Also available in: Chinese   Japanese  
Articles 13 Jul 2018
Unit 23: Java in the cloud
Learn the structure, syntax, and programming paradigm of the Java platform and language. Start by mastering the essentials of object-oriented programming on the Java platform, and progress incrementally to the more-sophisticated syntax and libraries that you need to develop complex, real-world Java applications.
Also available in: Chinese  
Tutorial 12 Jul 2018
On demand data in Python, Part 3: Coroutines and asyncio
Much of the data in modern big data applications comes from the web or databases. You need to write code to process this at scale, but you don't want everything to grind to a halt in the process. Python 3 introduced a system for cooperative multitasking, which alleviates this problem, using asynchronous coroutines. Asynchronous coroutines build on similar concepts to generators. They are objects created from special functions which can be suspended and resumed. They make it possible to break down complex and inefficient processing into simple tasks that cooperate to maximize trade-offs between CPU and input/output. Learn these core techniques following a simple sequence of examples.
Also available in: Chinese  
Articles 02 Jul 2018
Support for responding to RDP ELS with IBM AIX FC/FCoE device driver stack
The Read Diagnostic Parameters (RDP) Extended Link Service (ELS) is an enhanced capability that requests the Fiber Channel (FC) Host Bus Adapter (HBA) port to return the diagnostic information. In large data centers, this data is useful to identify the faulty ports quickly.
Articles 26 Jun 2018
On demand data in Python, Part 2: The magic of itertools
Python's motto has always been "Batteries included," to highlight its extensive standard library. There are many well-kept secrets among the standard modules, including itertools, which is less well known in part because iterators and generators are less well known. This is a shame because the routines in itertools and related modules such as functools and operators can save developers many hours in developing big data operators. Learn by copious examples how to use itertools to address the most common MapReduce-style data science tasks.
Also available in: Chinese  
Articles 22 Jun 2018
IBM Blockchain 101: Quick-start guide for developers
Join the blockchain revolution! This developerWorks quick-start guide is for application developers who are exploring blockchain technology and want to quickly spin up a blockchain pre-production network, deploy sample applications, and develop and deploy client applications. Simple instructions show you how to activate a blockchain network based on the latest Hyperledger Fabric framework, write and install chaincode (business logic for the network), and develop client applications to streamline business processes and digital interactions.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 22 Jun 2018
On demand data in Python, Part 1: Python iterators and generators
The oldest known way to process data in Python is building up data in lists, dictionaries and other such data structures. Though such techniques work well in many cases, they cause major problems when dealing with large quantities of data. It's easy to find that your code is running painfully slowly or running out of memory. Generators and iterators help address this problem. These techniques have been around in Python for a while but are not well understood. Used properly, they can bring big data tasks down to size so that they don't require a huge hardware investment to complete.
Also available in: Chinese  
Articles 21 Jun 2018
IoT on the edge, Part 3: Integrating cloud analytics and a dashboard app into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. You learned how to get sensor readings for temperature and humidity from NodeMCU devices to the IBM Watson IoT Platform. In this article, you learn how to preserve those readings in a database, how to display them in an IoT dashboard, and how to generate alerts.
Articles 19 Jun 2018
Optimize queries in Cloudant
This article compiles insights from multiple people in regard to methods and experiences related to optimizing queries when operating Cloudant NoSQL DB. The knowledge contained here will help you have a more in-depth understanding of the most suitable queries for each applicable scenario, to provide the most efficient data query service for your application.
Also available in: Chinese  
Articles 11 Jun 2018
Qlik Sense integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems
Qlik Sense is a business intelligence tool that allows data to be discovered and visualized. Qlik Sense supports Hadoop environments as a data source. Read this article for details about how Qlik Sense was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.
Articles 08 Jun 2018
Class sharing in Eclipse OpenJ9
Memory footprint and startup time are important performance metrics for a Java virtual machine (JVM). The memory footprint becomes especially important in the cloud environment since you pay for the memory your application uses. This tutorial shows you how to use the shared classes feature in Eclipse OpenJ9 to reduce the memory footprint and improve your JVM startup time.
Also available in: Chinese  
Articles 06 Jun 2018
An introduction to Kafka
An introduction to one of the most popular platforms for distributed messaging or streaming data.
Also available in: Chinese  
Articles 05 Jun 2018
IBM Cloud for VMware Solutions: Take a look under the hood
This tutorial examines the architecture of IBM Cloud for VMware Solutions, an IBM Cloud offering that provides deployment and management of VMware virtualized environments. Take a look inside the components of the offering to see how they work together to provision and maintain the environment in the public cloud.
Also available in: Chinese   Japanese  
Articles 04 Jun 2018
Extend your blockchain smart contracts with off-chain logic
This article presents two ways to bolster your smart contracts with logic obtained outside the typical boundaries of the blockchain, while still preserving the trust and transparency that define a blockchain network.
Also available in: Chinese  
Articles 31 May 2018
Deploy a MongoDB replica set using the IBM Cloud Kubernetes Service
This article demonstrates how to deploy a MongoDB replica set in the IBM Cloud Kubernetes Service. It briefly outlines MongoDB's cluster requirements and introduces Kubernetes StatefulSets and explains how they can be deployed.
Also available in: Chinese   Japanese  
Articles 28 May 2018
Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
This article is the first part of a three part series on developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR). It summarizes the GDPR and explains how the privacy regulation impacts and applies to developing and supporting applications that are intended to be used by European Union citizens.
Also available in: Japanese  
Articles 25 May 2018
Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
Part 3 of this series provides practical application development techniques that can alleviate an application's privacy risk. These solutions include utilizing database encryption, data pseudonymization, and assuring a robust level of application security.
Also available in: Japanese  
Articles 25 May 2018
Developing GDPR compliant applications, Part 2: Application privacy by design
This article provides guidance for integrating privacy risk evaluation and mitigation within the software development lifecycle. It is part 2 in a series of articles about developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR).
Also available in: Japanese  
Articles 25 May 2018
IBM RFE Community, Release 22
Find out what's new in the RFE Community. With Release 22, the RFE Community provides new features that keep you up to date on the requests you're watching and are interested in.
Articles 20 May 2018
Porting and tuning applications for Linux on Power, Part 2: 15 Porting and tuning tools for Linux on Power
This article enables you to discover numerous tools for porting and tuning applications for Linux on Power: an integrated development environment (IDE), compilers and toolchains, performance and utilization analysis, emulation, instruction timing, high-performance application programming interfaces, and libraries.
Articles 16 May 2018
Configuring highly available internal hardware Redundant Array of Independent Disk (RAID) volumes for Linux on IBM Power System S822LC servers
In this article, you can learn to configure Redundant Array of Independent Disks (RAID) volumes before installing Linux OS on IBM Power System S822LC servers. The article also describes how to protect data on internal disks in an enterprise deployment and achieve high availability and uninterrupted service.
Articles 11 May 2018
Get started with Servlet 4.0
Servlet 4.0 fully integrates HTTP/2's server push technology, and also enables runtime discovery of a servlet's mapping URL. With video demonstrations and code examples, this hands-on tutorial gets you started with HTTP/2 server push and the new HttpServletMapping interface in Java servlet and JSF applications.
Also available in: Chinese  
Articles 10 May 2018
IoT on the edge, Part 2: Integrating edge analytics into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. However, identification is only a partial solution. Ideally, we would want to fix those conditions automatically. Because Internet access might be slow, spotty, or even non-existent, the analytics to decide what to do should happen on the “edge” of the network, right at the barn.
Also available in: Chinese  
Tutorial 09 May 2018
Beginner's Guide to Rust: Start coding with the Rust language
What better way to learn a new programming language than to create a favorite old game? In this tutorial, learn how to create a simple game of Tic-Tac-Toe.
Also available in: Chinese  
Articles 07 May 2018
Beginner's Guide to Rust: Get to know Rust
Get to know Mozilla Rust, a safe, statistically typed compiled language.
Also available in: Chinese  
Articles 07 May 2018
The benefits of agile integration, Part 1: The fate of the ESB
While many large enterprises successfully use the enterprise service bus (ESB) pattern, the term is often disparaged in the cloud-native space, and especially in relation to microservices architecture. It is seen as heavyweight and lacking in agility. What has happened to make the ESB pattern appear so outdated, and what should we use in its place? What would lightweight integration look like?
Also available in: Chinese  
Articles 01 May 2018
The benefits of agile integration, Part 2: Moving to a lightweight, agile integration architecture
Microservices principles are revolutionizing the way applications are built by enabling a more decoupled and decentralized approach to implementation, which leads to greater agility, scalability, and resilience. These applications still need to be connected to one another and to existing systems of record. It clearly makes sense to use microservice techniques in the integration space, too. Lightweight integration provides the benefits of cloud-ready containerization to integration architecture, and provides the opportunity to escape from the heavily centralized ESB pattern to more empowered and autonomous application teams.
Also available in: Chinese  
Articles 01 May 2018
5 things you didn't know about...: MicroProfile 1.3
Eclipse MicroProfile has just delivered five new APIs for developing Java cloud-native microservices. Get the highlights of what's new in MicroProfile 1.3, with code examples that will have you up and running in no time.
Also available in: Chinese   Japanese  
Articles 30 Apr 2018
IoT Lessons Learned: Lessons learned from my first DIY IoT project
Read these lessons learned from developing a home automation system (from scratch), and save yourself some time, money, and energy.
Also available in: Chinese  
Articles 26 Apr 2018
Track time spent on projects with IBM Cloud, Part 2: Give your time-tracking app the ability to record the time spent per project
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 2 explains how to add the ability to record the time spent per project. Here I show you how to retrieve and aggregate time entries to generate reports of hours worked per project, both online and in a structured format suitable for download and further processing. Finally, I walk you through the steps to upload and deploy the application on IBM Cloud, so that it's online and always available in the cloud.
Also available in: Chinese  
Articles 24 Apr 2018
Configuring IBM DB2 with BLU Acceleration to support IBM AIX Live Update
This article helps users to understand the requirements for configuring an AIX partition with DB2 to support AIX Live Update
Articles 24 Apr 2018
An introduction to data science, Part 4: The languages of data science
Discover the languages developed and most commonly used for data science programming and applications, including C, Python, and Fortran.
Also available in: Chinese  
Articles 23 Apr 2018
Best practices for Java and IBM WebSphere Application Server on IBM POWER9
This article discusses some of the best practices to achieve best performance from applications running in the Liberty profile of the IBM WebSphere Application Server on the IBM Power System S9xx and L922 systems recently made available from IBM
Articles 20 Apr 2018
5 things you didn't know about ...: Java 10
Hot on the heels of Java 9, Java 10 is here, with a cornucopia of cool new features for code geeks, container nerds, and garbage-collector geniuses. There's no time like the present to find out what's new in JDK 10.
Also available in: Chinese   Japanese  
Articles 17 Apr 2018
Track time spent on projects with IBM Cloud, Part 1: Build a custom web application with IBM Cloud, PHP, and MySQL
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 1 covers the basics, showing you how to initialize a cloud-based database instance and connect your local PHP application to it. It also explains how to add and modify records on the cloud database instance using the Slim framework.
Also available in: Chinese  
Articles 16 Apr 2018
Hyperledger Composer basics, Part 1: Model and test your blockchain network
Hyperledger Composer is a tool for quickly building blockchain business networks and prototyping blockchain applications. This tutorial gets you started using it.
Also available in: Chinese   Japanese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 2: Refine and deploy your blockchain network
This tutorial builds on the sample blockchain network introduced in Part 1 and takes you deeper into the Hyperledger Composer suite of developer tools. You'll model an IoT GPS sensor in a shipping container by adding GPS readings to the Shipment asset, and modify the smart contract (chaincode) to send an alert when the Shipment reaches its destination port.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 3: Deploy locally, interact with, and extend your blockchain network
In this tutorial, the third and final installment in this series, learn how to modify a sample blockchain network definition and transform it into a real-world blockchain application, write Cucumber feature tests, issue IDs for all participants, and execute every transaction through the CLI.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Get started with the Java EE 8 Security API, Part 3: Securely access user credentials with IdentityStore
Learn how to use the new IdentityStore interface to setup and configure RDBMS or LDAP identity storage in your Java web applications.
Also available in: English   Chinese  
Articles 12 Apr 2018
Get started with the Java EE 8 Security API, Part 4: Interrogating caller data with SecurityContext
This final article in the Java EE Security API series introduces the SecurityContext API, which is used to interrogate caller data consistently across servlet and EJB containers. Find out how SecurityContext extends HttpAuthenticationMechanism's declarative capabilities, then put it to work testing caller data in a servlet container example.
Also available in: English   Chinese  
Articles 12 Apr 2018
Use domain-driven design to architect your cloud apps
In this article, you will learn how to apply domain-driven design (DDD) concepts to cloud architectures, and why you should do it. This is a new paradigm, and you may be curious how to integrate it into your legacy codebase. We will cover this, showing how DDD is applicable to the cloud and why you would want it in your stack. You will also see how microservices can help, and how events and event sourcing are beneficial.
Also available in: Chinese  
Articles 11 Apr 2018
Temporary storage and the database, Part 3: Establish SQL temporary storage limits
Recent improvements enable limits on the amount of temporary storage a job may use to run SQL queries. This can prevent some system outages. In this article, you can learn how these limits work and put them to work for you.
Articles 11 Apr 2018
IBM Geographically Dispersed Resiliency for Power Systems solution
This article gives an overview of IBM Geographically Dispersed Resiliency for Power systems. Its virtual machine restart-based disaster recovery model provides support for data centers with IBM Power Systems infrastructure and IBM Power virtualization.
Articles 09 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 2: Create a front-desk visitor log with Node.js
In the first article in this series, you learned how to build a Node.js application on the IBM Cloud. However, that application was not very responsive or visually appealing. In this article you learn how to use the Bootstrap theme for your application to look better, and how to use the AngularJS library to make it more responsive.
Also available in: Chinese   Japanese  
Articles 09 Apr 2018
Analyzing the contextual content of hierarchical data by using IBM Watson Explorer
This tutorial demonstrates how to implement a custom crawler plug-in with IBM Watson Explorer to analyze a hierarchical data structure within the context of content analytics. The strategy outlined here permits the retaining of the hierarchical structure or grains of the model being analyzed.
Also available in: Chinese  
Articles 08 Apr 2018
Metaprogramming in Python
This article explains how you can use metaprogramming in Python and how it can simplify certain tasks.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
How to set up a MegaRAID SAS 9361-8i controller card on an OpenPOWER system
The purpose of this article is to provide information about the Broadcom MegaRAID SAS 9361-8i controller card. The article outlines how to set up the controller card on an OpenPOWER system and describes the features and advantages of using this controller card.
Articles 05 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 1: Create a front-desk visitor log with Node.js
In this article, you learn how to use the IBM Cloud to write a Node.js application for an organization’s front desk, which needs to log visitors in and out. Along the way you will learn how to use Node.js, the Express HTTP server library, and a Cloudant database. You will learn how to do this in the highly available IBM Cloud. This is a basic introduction to Node.js programming on the IBM Cloud platform.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
IoT solution governance, Part 3: Governing your IoT data
To address the challenges inherent in planning and implementing complex IoT solutions, teams need a governance model. This article series provides an end-to-end approach to IoT solution governance – from defining governance practices, to governing your IoT devices, to governing your IoT data. Part 3 of this series defines an end-to-end data governance mechanism that ensures IoT data is correctly and securely used by stakeholders to get the maximum value out of the IoT data. Part 3 describes why and how IoT data needs to be managed throughout the data lifecycle.
Also available in: Chinese  
Articles 04 Apr 2018
Top Internet of Things articles and tutorials (April 2018)
The start of 2018 is all about creating, updating, or finishing up article and tutorial series for IoT, covering IoT governance, IoT security, IoT and the smart home, IoT and Blockchain, and lastly cognitive IoT with deep learning.
Also available in: Chinese   Japanese  
Articles 04 Apr 2018
Accelerating Python for scientific research
You should be using Python for scientific computing — not as a replacement for Fortran or C/C++, but as a wrapper for or as a bridge between diverse specialized programming modules and acceleration hardware. In this article we'll show you how to speed Python up in your environments to optimize its use.
Also available in: Chinese  
Articles 04 Apr 2018
ICEC custom widgets lab
IBM Connections Engagement Center (ICEC) makes it easy to build a social intranet by creating a lightweight portal-like experience using various out-of-the-box and custom widgets. This in-depth tutorial takes you through the process of creating and deploying custom widgets for an engagement center.
Articles 04 Apr 2018
Porting and tuning applications for Linux on Power, Part 1: Porting to Linux on Power: 5 tips that could turn a good port into a great port
Porting from Linux on x86 to Linux on Power is usually easy, but developers should be aware of differences that may manifest as compilation, linking, or run-time errors, or performance issues. This article lists those differences, and describes approaches for fixing, improving, or working around them. Awareness of these differences and mitigation techniques can aid in getting the best results from a porting effort as quickly as possible.
Articles 03 Apr 2018
Kubernetes at the Helm, containers in the engine room
If you are following the progression of container-based development and deploymentand I hope you arethen you know that these developments have already fundamentally changed how applications are created and served, and will continue to do so. This article explores containers, container orchestration, Kubernetes, the hybrid cloud, and the tools that make all of this work.
Also available in: Chinese  
Articles 03 Apr 2018
Security and the IoT ecosystem
Security in systems design and development tends to be an afterthought, but it should be considered throughout the product lifecycle. One area where the number of exploits is exploding is in the quickly growing market of the Internet of Things (IoT). This article explores the spectrum of security in the context of IoT, including access security (authentication), data security (encryption), and security analytics (policy-based controls).
Also available in: Chinese  
Articles 26 Mar 2018
Getting started with the IBM Cloud, Part 4: Learn how to use serverless computing with the IBM Cloud Functions platform
See how to use IBM Cloud Functions to make the most of serverless computing. Doug Tidwell shows you how to generate code that manages a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 23 Mar 2018
Coding IBM Watson Workspace Chatbots
This video shows you how to create IBM Watson Workspace chatbots, using Open Source resources and the Watson Workspace framework and SDK, which help you develop applications faster and with less code.
Videos 23 Mar 2018
Supporting protected computing on IBM Power Architecture
This article describes the changes to the IBM Power Architecture that can be used to provide enhanced protection of virtual machines from other software running on the same system. A new higher privilege mode called Ultravisor mode is being introduced, along with the concept of secure virtual machines (SVMs). This mode is supported by the Protected Execution Ultravisor which will be open sourced. An SVM is protected at rest, when transmitted over a network as a file, and while executing. In this article, we discuss the impact of this new architecture for SVMs. There is near-zero impact on VMs.
Articles 22 Mar 2018
IBM i Access Client Solutions: Customization and deployment questions answered
This article is a follow on to "IBM i Access Client Solutions: Customization and deployment made easy". It provides details about how to implement some of the more common deployment options when deploying IBM i Access Client Solutions to multiple users.
Articles 21 Mar 2018
An introduction to data science, Part 3: Text analytics
In this third tutorial in the "Introduction to data science" series, discover applications for simple Python-based text analytics, including Markov chains and sentiment analysis.
Also available in: Chinese  
Articles 19 Mar 2018
Build a connected-car IoT app with Geospatial Analytics
Deploy and extend an Internet of Things (IoT) Connected Vehicle starter kit on IBM Cloud with the Internet of Things Platform and Geospatial services. The starter kit enables you to simulate, view, and manage vehicles driving through a city and set up geofences for notification.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 19 Mar 2018
Minecraft and IBM Cloud, Part 4: Integrating Watson into Minecraft on IBM Cloud
In this tutorial series, you'll learn how to use Docker, Eclipse, and IBM Cloud to develop, extend, and host your own Minecraft servers. Find out how to use Eclipse to build Minecraft plugins, test them locally using Docker, and use IBM Cloud to host your Docker containers on the Internet. You'll also harness the power of IBM Watson from within Minecraft for more educational and interactive game play. In Part 4, you'll learn how to extend the Spigot server with a plugin that uses Watson cognitive services to add a little science to your game play.
Also available in: Chinese   Japanese  
Articles 19 Mar 2018
Top 6 technical advantages of Hyperledger Fabric for blockchain networks
Blockchain technology is already radically transforming industry operating models. When selecting a blockchain platform for your business needs, what are the most important attributes to consider? This top-6 list counts them down.
Also available in: Chinese   Japanese  
Articles 18 Mar 2018
Develop, govern, and operate your business network with the IBM Blockchain Platform
The IBM Blockchain Platform simplifies the development, governance, and operation of a decentralized network across multiple companies or institutions forming a business ecosystem. It enables all members to quickly achieve the common goal of activating and collaboratively governing their network so they can get on with conducting, innovating, and deriving value from their business transactions. Learn how to get started.
Also available in: Chinese   Portuguese   Spanish  
Articles 18 Mar 2018
Aspectos básicos de blockchain: Introducción a los controladores distribuidos
Todo el mundo apuesta en cómo la tecnología blockchain revolucionará la manera en que las organizaciones e instituciones realizan transacciones empresariales. Veamos cómo opera una red de blockchain, cómo puede sacar provecho de ella y cómo ayuda IBM a que la tecnología avance.
Articles 18 Mar 2018
Configure multifactor authentication for IBM Cloud Node.js applications
Passwords are not a complete security solution; they can be stolen or shared. In this tutorial, you learn how to use a random string delivered by email as a second authentication factor. I also discuss several methods for risk analysis, which is used by the application to decide whether a second factor is warranted.
Also available in: Chinese   Japanese  
Articles 16 Mar 2018
Getting started with the IBM Cloud, Part 3: Doug Tidwell demos how to work with containers on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 15 Mar 2018
IBM i ILE RPG cloud integration sample with IBM Cloud
In this article, you can learn how to connect your ILE RPG programs from cloud applications such as Node-RED on IBM Cloud by using the REST web service call functionality of the integrated web services server.
Articles 14 Mar 2018
Scale single sign-on with App ID for your Node.js cloud apps
In this tutorial, you will learn about implementing scalable Node.js applications when you are using the App ID service. This IBM Cloud service allows you to add authentication to your mobile and web apps and protect your APIs and back-ends running on IBM Cloud. App ID provides authentication with email/password through a scalable user registry or you can add social login, so that users can sign in with their Facebook or Google credentials. With App ID, you can also host user profile info that you can use to build engaging experiences.
Also available in: Chinese   Japanese   Portuguese  
Articles 14 Mar 2018
Get started with the Java EE 8 Security API, Part 2: Web authentication with HttpAuthenticationMechanism
HttpAuthenticationMechanism’s annotation-driven approach is a welcome departure from the tedium of manually configuring authentication for Java web applications. Learn how to setup and configure both classic Servlet 4.0-style authentication and custom solutions using HttpAuthenticationMechanism and the new Java EE 8 Security API.
Also available in: English   Chinese  
Articles 09 Mar 2018
How data becomes knowledge, Part 3: Extracting dark data
Individuals and organizations store all kinds of data. What do we do with it all? Can we call it up as we need it? Can all that data be analyzed quickly and efficiently? Or, does it tie up storage resources and languish for years because the cost of going through it and discarding what's obsolete is too high? Discover the utility and wisdom of storing dark data.
Also available in: Chinese  
Articles 08 Mar 2018
Getting started with the IBM Cloud, Part 2: Build an advanced Cloud Foundry app on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 08 Mar 2018
Why you should learn the Rust programming language
Discover Rust, a C-like language that supports imperative, functional, and object-oriented programming.
Also available in: Chinese   Portuguese   Spanish  
Articles 08 Mar 2018
Digital process automation with BPM and blockchain, Part 3: Use blockchain to manage legal documents stored in an enterprise content repository
In this tutorial, we explore a trade finance use case, a Letter of Credit transaction, that shows you how blockchain can help coordinate the payment and transfer of goods between buyer and seller banks through the use of Business Process Management and Enterprise Content Management.
Also available in: Chinese  
Tutorial 07 Mar 2018
How data becomes knowledge, Part 2: Data lakes and data swamps
Get an understanding of data lakes and data swamps in this easy to follow, yet insightful article.
Also available in: Chinese  
Articles 07 Mar 2018
How data becomes knowledge, Part 1: From data to knowledge
Trace the path from raw data to stored knowledge. Identify various data sources and the differences between structured and unstructured data. Learn what makes data valuable before applying the DIKW model to data science.
Also available in: Chinese  
Articles 06 Mar 2018
Developing cognitive IoT solutions for anomaly detection by using deep learning, Part 5: Using Keras and TensorFlow for anomaly detection
This article is the fifth in a five-part series, "Developing cognitive IoT solutions for anomaly detection by using deep learning." This article demonstrates a deep learning solution using Keras and TensorFlow and how it is used to analyze the large amount of data that IoT sensors gather.
Also available in: Chinese  
Tutorial 02 Mar 2018
An introduction to data science, Part 2: Data and prediction through classification
Prediction and classification are two important aspects of machine learning that have a multitude of applications. In this second tutorial in "An Introduction to data science" series, discover two methods for classifying data to get the most from your data sets: probabilistic neural networks and density-based clustering.
Also available in: Chinese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 1: Securing IoT devices and gateways
In this 3 part series of developing secure IoT solutions, the authors introduce IoT vulnerabilities and design challenges for secure IoT apps and then provide tested techniques for securing devices and gateways. For example, they discuss device authentication, including certificate-based authentication, device authorization, and application ID validation.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 3: Securing IoT applications
Part 3 in this 3 part series of developing secure IoT solutions focuses on securing IoT applications. Learn how to securely store IoT data in a Cloudant database, expose that stored data through secured APIs, and invoke secured APIs from mobile and web applications.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 2: Securing IoT data over the network
Building on the techniques for securing IoT devices that the authors discussed in Part 1, Part 2 in this 3 part series of developing secure IoT solutions focuses on securing data over the network. It discusses data encryption and API security in the IBM Watson IoT Platform APIs.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Unleash the value of Guardium data by using the Guardium Big Data Intelligence solution
Organizations that use IBM Security Guardium activity monitoring for data security and compliance struggle with the quantity of collected audit data, especially if they have 10 or more Guardium collectors. IBM Security Guardium Big Data Intelligence provides the power of a big data platform that is purpose-built for data security requirements. It helps augment existing Guardium deployments with the ability to quickly create an optimized security data lake that can retain large quantities of historical data over long time horizons.
Also available in: Chinese  
Articles 27 Feb 2018
Using Kubernetes secrets to manage credentials
If you're deploying services in your Kubernetes clusters, the code behind those services most likely needs to use credentials to do its work. In this tutorial, you'll see how to use Kubernetes secrets to deliver sensitive information like usernames and passwords to your code.
Also available in: Chinese  
Articles 27 Feb 2018
Beginner's guide to Python
Are you looking for an easy-to-learn programming language to help with your scientific work? Look no further than Python. Discover resources for using this straightforward language to do everything from running algebraic calculations to generating graphical output from your data.
Also available in: Chinese   Japanese  
Articles 27 Feb 2018
IoT on the edge, Part 1: Integrating LPWAN networking and edge computing into your IoT solutions
When devices and sensors are outside the range of a typical wireless network configuration, you need to adopt an edge computing architecture that uses long-range networking, such as LPWAN networking protocols. Learn how to integrate LPWAN networking into a standard wireless network architecture for a large-scale IoT solution.
Also available in: Chinese  
Tutorial 23 Feb 2018
7 tips for getting started with R language
This article gives you 7 tips to make it easier and faster to start using the powerful R language. Learn about R packages, how to structure data in R, and the powerful RStudio IDE. Discover how the apply function can save you loads of time when running complicated scripts and how ggplot2 can really make your visuals pop. Finally, see how the Rcpp package allows you to import C++ functions into an R script.
Also available in: Chinese  
Articles 23 Feb 2018
Build cognitive solutions for industries, Part 4: Enhancing the simplicity and quality of human-computer interactions
Cognitive computing is becoming increasingly important within the enterprise. In this fourth tutorial in a series, we discuss the primary methodologies and patterns used to build cognitive solutions for the telecommunications and media and entertainment industries.
Also available in: Chinese  
Articles 21 Feb 2018
Schedule data backups automatically on IBM Cloud
This tutorial demonstrates how to use the Workload Scheduler service on the IBM Cloud platform to automatically schedule process execution for your IBM Cloud applications. It uses a common example performing a daily database backup to walk you through the process of creating a RESTful PHP service that can be invoked to back up the database. It also demonstrates how to integrate third-party services such as Dropbox and SendGrid to store backup files and send status notifications.
Also available in: Chinese  
Articles 19 Feb 2018
IBM AIX multipath I/O (MPIO) resiliency and problem determination
Multipath storage configurations are a key component of data centers. Problem determination of these SAN fabrics becomes more difficult due to ever increasing complexity. This article describes the recent enhancements to the IBM AIX operating system MPIO software, and describes how the IBM AIX lsmpio command can be used during problem determination.
Articles 19 Feb 2018
Deploy a Hello World webpage to IBM Cloud
Let's deploy a simple Hello World webpage using nothing but HTML and a static buildpack on IBM Cloud.
Also available in: Chinese   Russian   Japanese  
Articles 19 Feb 2018
Changing IBM Connections behavior with IBM Connections Customizer
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the behavior of Connections to suit your business processes.
Articles 15 Feb 2018
Get started with the Java EE 8 Security API, Part 1: Java enterprise security for cloud and microservices platforms
As one of the three core specifications introduced with Java EE 8, the new Java EE Security API is an essential addition to your Java EE toolkit, and thankfully not terribly difficult to learn. Find out how the Java EE Security API supports enterprise security in cloud and microservices platforms, while introducing modern capabilities such as context and dependency injection.
Also available in: English   Chinese  
Articles 10 Feb 2018
Use LDAP and Active Directory to authenticate Node.js users
If you already have an internal IT infrastructure, it quite likely contains an LDAP server (possibly Active Directory, acting as an LDAP server) to serve user identities. In many cases, it is best to continue to use that directory, even when your application sits in IBM Cloud. In this tutorial, I show you how to authenticate users.
Also available in: Chinese  
Tutorial 07 Feb 2018
1 - 100 of 11323 results | Next
Show Summaries | Hide Summaries