Filter by products, topics, and types of content

(430 Products)

(763 Topics)

(20 Industries)

(15 Types)

1 - 100 of 11142 results | Next
Show Summaries | Hide Summaries
View Results
Title none Type none Date down
IBM RFE Community, Release 23
Find out what's new in the RFE Community. With Release 23, the RFE Community provides new features that keep you up to date on the requests you're watching and are interested in.
Articles 06 Nov 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 3: Building a disaster recovery solution with PureApplication Software
With the release of IBM PureApplication Platform and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the PureApplication Platform W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 3, you set up disaster recovery and learn how to perform three different disaster recovery procedures.
Tutorial 09 Sep 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 1: Getting started with hosted VMware environments
With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 1, you get started with creating and deploying hosted VMware environments in Bluemix Local System. Specifically, you learn how to allocate resources, configure external access to VMware components, and configure and deploy virtual machines in VMware.
Also available in: Chinese   Japanese  
Tutorial 30 Aug 2018
Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 2: Setting up a PureApplication Software workload environment
With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This tutorial series provides a step-by-step guide for users of the Bluemix Local System W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 2, you install and configure a PureApplication Software workload environment.
Tutorial 30 Aug 2018
IBM AIX application workloads on IBM Hyperconverged Systems powered by Nutanix
This article demonstrates how the advanced architecture of IBM Power can be blended with Nutanix web-scale technology, for quick and easy deploy of application workload on an AIX guest VM, through migration from an existing AIX environment or through fresh deployment.
Articles 08 Aug 2018
Deploy a sample application to the IBM Blockchain Platform Starter Plan
Step by step, see how to create a network on the IBM Blockchain Platform, install a smart contract (chaincode), and run a sample application to invoke it. You'll also see how to populate the shared ledger and communicate with it by making calls from a local client application to query and update the ledger.
Also available in: Chinese  
Tutorial 14 Jul 2018
ISV solution ecosystem for Hortonworks on IBM Power Systems
This article provides a list of ISV solutions that can augment the capabilities of Hortonworks Data Platform (HDP) running on Linux on IBM Power Systems. Solutions cover many categories including business intelligence (BI) tools, advanced analytics, and so on.
Also available in: Chinese   Japanese  
Articles 13 Jul 2018
Unit 23: Java in the cloud
Learn the structure, syntax, and programming paradigm of the Java platform and language. Start by mastering the essentials of object-oriented programming on the Java platform, and progress incrementally to the more-sophisticated syntax and libraries that you need to develop complex, real-world Java applications.
Also available in: Chinese  
Tutorial 12 Jul 2018
On demand data in Python, Part 3: Coroutines and asyncio
Much of the data in modern big data applications comes from the web or databases. You need to write code to process this at scale, but you don't want everything to grind to a halt in the process. Python 3 introduced a system for cooperative multitasking, which alleviates this problem, using asynchronous coroutines. Asynchronous coroutines build on similar concepts to generators. They are objects created from special functions which can be suspended and resumed. They make it possible to break down complex and inefficient processing into simple tasks that cooperate to maximize trade-offs between CPU and input/output. Learn these core techniques following a simple sequence of examples.
Also available in: Chinese  
Articles 02 Jul 2018
On demand data in Python, Part 2: The magic of itertools
Python's motto has always been "Batteries included," to highlight its extensive standard library. There are many well-kept secrets among the standard modules, including itertools, which is less well known in part because iterators and generators are less well known. This is a shame because the routines in itertools and related modules such as functools and operators can save developers many hours in developing big data operators. Learn by copious examples how to use itertools to address the most common MapReduce-style data science tasks.
Also available in: Chinese  
Articles 22 Jun 2018
On demand data in Python, Part 1: Python iterators and generators
The oldest known way to process data in Python is building up data in lists, dictionaries and other such data structures. Though such techniques work well in many cases, they cause major problems when dealing with large quantities of data. It's easy to find that your code is running painfully slowly or running out of memory. Generators and iterators help address this problem. These techniques have been around in Python for a while but are not well understood. Used properly, they can bring big data tasks down to size so that they don't require a huge hardware investment to complete.
Also available in: Chinese  
Articles 21 Jun 2018
IoT on the edge, Part 3: Integrating cloud analytics and a dashboard app into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. You learned how to get sensor readings for temperature and humidity from NodeMCU devices to the IBM Watson IoT Platform. In this article, you learn how to preserve those readings in a database, how to display them in an IoT dashboard, and how to generate alerts.
Articles 19 Jun 2018
Optimize queries in Cloudant
This article compiles insights from multiple people in regard to methods and experiences related to optimizing queries when operating Cloudant NoSQL DB. The knowledge contained here will help you have a more in-depth understanding of the most suitable queries for each applicable scenario, to provide the most efficient data query service for your application.
Also available in: Chinese  
Articles 11 Jun 2018
An introduction to Kafka
An introduction to one of the most popular platforms for distributed messaging or streaming data.
Also available in: Chinese  
Articles 05 Jun 2018
IBM Cloud for VMware Solutions: Take a look under the hood
This tutorial examines the architecture of IBM Cloud for VMware Solutions, an IBM Cloud offering that provides deployment and management of VMware virtualized environments. Take a look inside the components of the offering to see how they work together to provision and maintain the environment in the public cloud.
Also available in: Chinese   Japanese  
Articles 04 Jun 2018
Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
This article is the first part of a three part series on developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR). It summarizes the GDPR and explains how the privacy regulation impacts and applies to developing and supporting applications that are intended to be used by European Union citizens.
Also available in: Japanese  
Articles 25 May 2018
Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
Part 3 of this series provides practical application development techniques that can alleviate an application's privacy risk. These solutions include utilizing database encryption, data pseudonymization, and assuring a robust level of application security.
Also available in: Japanese  
Articles 25 May 2018
Developing GDPR compliant applications, Part 2: Application privacy by design
This article provides guidance for integrating privacy risk evaluation and mitigation within the software development lifecycle. It is part 2 in a series of articles about developing applications that are compliant with the European Union’s General Data Protection Regulation (GDPR).
Also available in: Japanese  
Articles 25 May 2018
IBM RFE Community, Release 22
Find out what's new in the RFE Community. With Release 22, the RFE Community provides new features that keep you up to date on the requests you're watching and are interested in.
Articles 20 May 2018
Get started with Servlet 4.0
Servlet 4.0 fully integrates HTTP/2's server push technology, and also enables runtime discovery of a servlet's mapping URL. With video demonstrations and code examples, this hands-on tutorial gets you started with HTTP/2 server push and the new HttpServletMapping interface in Java servlet and JSF applications.
Also available in: Chinese  
Articles 10 May 2018
IoT on the edge, Part 2: Integrating edge analytics into your IoT solutions
In the first article in this series, you learned how to monitor hay barns for humidity and temperature to identify dangerous conditions. However, identification is only a partial solution. Ideally, we would want to fix those conditions automatically. Because Internet access might be slow, spotty, or even non-existent, the analytics to decide what to do should happen on the “edge” of the network, right at the barn.
Also available in: Chinese  
Tutorial 09 May 2018
Beginner's Guide to Rust: Start coding with the Rust language
What better way to learn a new programming language than to create a favorite old game? In this tutorial, learn how to create a simple game of Tic-Tac-Toe.
Also available in: Chinese  
Articles 07 May 2018
Beginner's Guide to Rust: Get to know Rust
Get to know Mozilla Rust, a safe, statistically typed compiled language.
Also available in: Chinese  
Articles 07 May 2018
5 things you didn't know about...: MicroProfile 1.3
Eclipse MicroProfile has just delivered five new APIs for developing Java cloud-native microservices. Get the highlights of what's new in MicroProfile 1.3, with code examples that will have you up and running in no time.
Also available in: Chinese   Japanese  
Articles 30 Apr 2018
Track time spent on projects with IBM Cloud, Part 2: Give your time-tracking app the ability to record the time spent per project
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 2 explains how to add the ability to record the time spent per project. Here I show you how to retrieve and aggregate time entries to generate reports of hours worked per project, both online and in a structured format suitable for download and further processing. Finally, I walk you through the steps to upload and deploy the application on IBM Cloud, so that it's online and always available in the cloud.
Also available in: Chinese   Japanese  
Articles 24 Apr 2018
An introduction to data science, Part 4: The languages of data science
Discover the languages developed and most commonly used for data science programming and applications, including C, Python, and Fortran.
Also available in: Chinese  
Articles 23 Apr 2018
5 things you didn't know about ...: Java 10
Hot on the heels of Java 9, Java 10 is here, with a cornucopia of cool new features for code geeks, container nerds, and garbage-collector geniuses. There's no time like the present to find out what's new in JDK 10.
Also available in: Chinese   Japanese  
Articles 17 Apr 2018
Track time spent on projects with IBM Cloud, Part 1: Build a custom web application with IBM Cloud, PHP, and MySQL
This two-part series demonstrates how to create a browser-based time-tracking tool that professionals can use to record the time they spend on customer projects. It uses IBM Cloud services to host the application and its data, and the Slim PHP micro-framework for the application's business logic. Part 1 covers the basics, showing you how to initialize a cloud-based database instance and connect your local PHP application to it. It also explains how to add and modify records on the cloud database instance using the Slim framework.
Also available in: Chinese   Japanese  
Articles 16 Apr 2018
Hyperledger Composer basics, Part 1: Model and test your blockchain network
Hyperledger Composer is a tool for quickly building blockchain business networks and prototyping blockchain applications. This tutorial gets you started using it.
Also available in: Chinese   Japanese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 2: Refine and deploy your blockchain network
This tutorial builds on the sample blockchain network introduced in Part 1 and takes you deeper into the Hyperledger Composer suite of developer tools. You'll model an IoT GPS sensor in a shipping container by adding GPS readings to the Shipment asset, and modify the smart contract (chaincode) to send an alert when the Shipment reaches its destination port.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Hyperledger Composer basics, Part 3: Deploy locally, interact with, and extend your blockchain network
In this tutorial, the third and final installment in this series, learn how to modify a sample blockchain network definition and transform it into a real-world blockchain application, write Cucumber feature tests, issue IDs for all participants, and execute every transaction through the CLI.
Also available in: Chinese   Portuguese   Spanish  
Articles 13 Apr 2018
Get started with the Java EE 8 Security API, Part 3: Securely access user credentials with IdentityStore
Learn how to use the new IdentityStore interface to setup and configure RDBMS or LDAP identity storage in your Java web applications.
Also available in: English   Chinese   Japanese  
Articles 12 Apr 2018
Get started with the Java EE 8 Security API, Part 4: Interrogating caller data with SecurityContext
This final article in the Java EE Security API series introduces the SecurityContext API, which is used to interrogate caller data consistently across servlet and EJB containers. Find out how SecurityContext extends HttpAuthenticationMechanism's declarative capabilities, then put it to work testing caller data in a servlet container example.
Also available in: English   Chinese   Japanese  
Articles 12 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 2: Create a front-desk visitor log with Node.js
In the first article in this series, you learned how to build a Node.js application on the IBM Cloud. However, that application was not very responsive or visually appealing. In this article you learn how to use the Bootstrap theme for your application to look better, and how to use the AngularJS library to make it more responsive.
Also available in: Chinese   Japanese  
Articles 09 Apr 2018
Analyzing the contextual content of hierarchical data by using IBM Watson Explorer
This tutorial demonstrates how to implement a custom crawler plug-in with IBM Watson Explorer to analyze a hierarchical data structure within the context of content analytics. The strategy outlined here permits the retaining of the hierarchical structure or grains of the model being analyzed.
Also available in: Chinese  
Articles 08 Apr 2018
Metaprogramming in Python
This article explains how you can use metaprogramming in Python and how it can simplify certain tasks.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
Getting started with IBM Cloud Node.js applications, Part 1: Create a front-desk visitor log with Node.js
In this article, you learn how to use the IBM Cloud to write a Node.js application for an organization’s front desk, which needs to log visitors in and out. Along the way you will learn how to use Node.js, the Express HTTP server library, and a Cloudant database. You will learn how to do this in the highly available IBM Cloud. This is a basic introduction to Node.js programming on the IBM Cloud platform.
Also available in: Chinese   Japanese  
Articles 05 Apr 2018
ICEC custom widgets lab
IBM Connections Engagement Center (ICEC) makes it easy to build a social intranet by creating a lightweight portal-like experience using various out-of-the-box and custom widgets. This in-depth tutorial takes you through the process of creating and deploying custom widgets for an engagement center.
Articles 04 Apr 2018
Top Internet of Things articles and tutorials (April 2018)
The start of 2018 is all about creating, updating, or finishing up article and tutorial series for IoT, covering IoT governance, IoT security, IoT and the smart home, IoT and Blockchain, and lastly cognitive IoT with deep learning.
Also available in: Chinese   Japanese  
Articles 04 Apr 2018
Accelerating Python for scientific research
You should be using Python for scientific computing — not as a replacement for Fortran or C/C++, but as a wrapper for or as a bridge between diverse specialized programming modules and acceleration hardware. In this article we'll show you how to speed Python up in your environments to optimize its use.
Also available in: Chinese  
Articles 04 Apr 2018
Getting started with the IBM Cloud, Part 4: Learn how to use serverless computing with the IBM Cloud Functions platform
See how to use IBM Cloud Functions to make the most of serverless computing. Doug Tidwell shows you how to generate code that manages a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 23 Mar 2018
Coding IBM Watson Workspace Chatbots
This video shows you how to create IBM Watson Workspace chatbots, using Open Source resources and the Watson Workspace framework and SDK, which help you develop applications faster and with less code.
Videos 23 Mar 2018
IBM i Access Client Solutions: Customization and deployment questions answered
This article is a follow on to "IBM i Access Client Solutions: Customization and deployment made easy". It provides details about how to implement some of the more common deployment options when deploying IBM i Access Client Solutions to multiple users.
Articles 21 Mar 2018
An introduction to data science, Part 3: Text analytics
In this third tutorial in the "Introduction to data science" series, discover applications for simple Python-based text analytics, including Markov chains and sentiment analysis.
Also available in: Chinese  
Articles 19 Mar 2018
Build a connected-car IoT app with Geospatial Analytics
Deploy and extend an Internet of Things (IoT) Connected Vehicle starter kit on IBM Cloud with the Internet of Things Platform and Geospatial services. The starter kit enables you to simulate, view, and manage vehicles driving through a city and set up geofences for notification.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 19 Mar 2018
Aspectos básicos de blockchain: Introducción a los controladores distribuidos
Todo el mundo apuesta en cómo la tecnología blockchain revolucionará la manera en que las organizaciones e instituciones realizan transacciones empresariales. Veamos cómo opera una red de blockchain, cómo puede sacar provecho de ella y cómo ayuda IBM a que la tecnología avance.
Articles 18 Mar 2018
Configure multifactor authentication for IBM Cloud Node.js applications
Passwords are not a complete security solution; they can be stolen or shared. In this tutorial, you learn how to use a random string delivered by email as a second authentication factor. I also discuss several methods for risk analysis, which is used by the application to decide whether a second factor is warranted.
Also available in: Chinese   Japanese  
Articles 16 Mar 2018
Getting started with the IBM Cloud, Part 3: Doug Tidwell demos how to work with containers on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 15 Mar 2018
IBM i ILE RPG cloud integration sample with IBM Cloud
In this article, you can learn how to connect your ILE RPG programs from cloud applications such as Node-RED on IBM Cloud by using the REST web service call functionality of the integrated web services server.
Articles 14 Mar 2018
Scale single sign-on with App ID for your Node.js cloud apps
In this tutorial, you will learn about implementing scalable Node.js applications when you are using the App ID service. This IBM Cloud service allows you to add authentication to your mobile and web apps and protect your APIs and back-ends running on IBM Cloud. App ID provides authentication with email/password through a scalable user registry or you can add social login, so that users can sign in with their Facebook or Google credentials. With App ID, you can also host user profile info that you can use to build engaging experiences.
Also available in: Chinese   Japanese   Portuguese  
Articles 14 Mar 2018
Get started with the Java EE 8 Security API, Part 2: Web authentication with HttpAuthenticationMechanism
HttpAuthenticationMechanism’s annotation-driven approach is a welcome departure from the tedium of manually configuring authentication for Java web applications. Learn how to setup and configure both classic Servlet 4.0-style authentication and custom solutions using HttpAuthenticationMechanism and the new Java EE 8 Security API.
Also available in: English   Chinese  
Articles 09 Mar 2018
How data becomes knowledge, Part 3: Extracting dark data
Individuals and organizations store all kinds of data. What do we do with it all? Can we call it up as we need it? Can all that data be analyzed quickly and efficiently? Or, does it tie up storage resources and languish for years because the cost of going through it and discarding what's obsolete is too high? Discover the utility and wisdom of storing dark data.
Also available in: Chinese  
Articles 08 Mar 2018
Getting started with the IBM Cloud, Part 2: Build an advanced Cloud Foundry app on the IBM Cloud platform
See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.
Also available in: Chinese  
Articles 08 Mar 2018
Digital process automation with BPM and blockchain, Part 3: Use blockchain to manage legal documents stored in an enterprise content repository
In this tutorial, we explore a trade finance use case, a Letter of Credit transaction, that shows you how blockchain can help coordinate the payment and transfer of goods between buyer and seller banks through the use of Business Process Management and Enterprise Content Management.
Also available in: Chinese  
Tutorial 07 Mar 2018
How data becomes knowledge, Part 2: Data lakes and data swamps
Get an understanding of data lakes and data swamps in this easy to follow, yet insightful article.
Also available in: Chinese  
Articles 07 Mar 2018
How data becomes knowledge, Part 1: From data to knowledge
Trace the path from raw data to stored knowledge. Identify various data sources and the differences between structured and unstructured data. Learn what makes data valuable before applying the DIKW model to data science.
Also available in: Chinese  
Articles 06 Mar 2018
An introduction to data science, Part 2: Data and prediction through classification
Prediction and classification are two important aspects of machine learning that have a multitude of applications. In this second tutorial in "An Introduction to data science" series, discover two methods for classifying data to get the most from your data sets: probabilistic neural networks and density-based clustering.
Also available in: Chinese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 1: Securing IoT devices and gateways
In this 3 part series of developing secure IoT solutions, the authors introduce IoT vulnerabilities and design challenges for secure IoT apps and then provide tested techniques for securing devices and gateways. For example, they discuss device authentication, including certificate-based authentication, device authorization, and application ID validation.
Also available in: Chinese   Russian   Japanese   Portuguese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 3: Securing IoT applications
Part 3 in this 3 part series of developing secure IoT solutions focuses on securing IoT applications. Learn how to securely store IoT data in a Cloudant database, expose that stored data through secured APIs, and invoke secured APIs from mobile and web applications.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Design and build secure IoT solutions, Part 2: Securing IoT data over the network
Building on the techniques for securing IoT devices that the authors discussed in Part 1, Part 2 in this 3 part series of developing secure IoT solutions focuses on securing data over the network. It discusses data encryption and API security in the IBM Watson IoT Platform APIs.
Also available in: Chinese   Russian   Japanese  
Articles 28 Feb 2018
Unleash the value of Guardium data by using the Guardium Big Data Intelligence solution
Organizations that use IBM Security Guardium activity monitoring for data security and compliance struggle with the quantity of collected audit data, especially if they have 10 or more Guardium collectors. IBM Security Guardium Big Data Intelligence provides the power of a big data platform that is purpose-built for data security requirements. It helps augment existing Guardium deployments with the ability to quickly create an optimized security data lake that can retain large quantities of historical data over long time horizons.
Also available in: Chinese  
Articles 27 Feb 2018
Beginner's guide to Python
Are you looking for an easy-to-learn programming language to help with your scientific work? Look no further than Python. Discover resources for using this straightforward language to do everything from running algebraic calculations to generating graphical output from your data.
Also available in: Chinese   Japanese  
Articles 27 Feb 2018
IoT on the edge, Part 1: Integrating LPWAN networking and edge computing into your IoT solutions
When devices and sensors are outside the range of a typical wireless network configuration, you need to adopt an edge computing architecture that uses long-range networking, such as LPWAN networking protocols. Learn how to integrate LPWAN networking into a standard wireless network architecture for a large-scale IoT solution.
Also available in: Chinese  
Tutorial 23 Feb 2018
7 tips for getting started with R language
This article gives you 7 tips to make it easier and faster to start using the powerful R language. Learn about R packages, how to structure data in R, and the powerful RStudio IDE. Discover how the apply function can save you loads of time when running complicated scripts and how ggplot2 can really make your visuals pop. Finally, see how the Rcpp package allows you to import C++ functions into an R script.
Also available in: Chinese  
Articles 23 Feb 2018
Build cognitive solutions for industries, Part 4: Enhancing the simplicity and quality of human-computer interactions
Cognitive computing is becoming increasingly important within the enterprise. In this fourth tutorial in a series, we discuss the primary methodologies and patterns used to build cognitive solutions for the telecommunications and media and entertainment industries.
Also available in: Chinese  
Articles 21 Feb 2018
IBM AIX multipath I/O (MPIO) resiliency and problem determination
Multipath storage configurations are a key component of data centers. Problem determination of these SAN fabrics becomes more difficult due to ever increasing complexity. This article describes the recent enhancements to the IBM AIX operating system MPIO software, and describes how the IBM AIX lsmpio command can be used during problem determination.
Articles 19 Feb 2018
Deploy a Hello World webpage to IBM Cloud
Let's deploy a simple Hello World webpage using nothing but HTML and a static buildpack on IBM Cloud.
Also available in: Chinese   Russian   Japanese  
Articles 19 Feb 2018
Changing IBM Connections behavior with IBM Connections Customizer
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the behavior of Connections to suit your business processes.
Articles 15 Feb 2018
Get started with the Java EE 8 Security API, Part 1: Java enterprise security for cloud and microservices platforms
As one of the three core specifications introduced with Java EE 8, the new Java EE Security API is an essential addition to your Java EE toolkit, and thankfully not terribly difficult to learn. Find out how the Java EE Security API supports enterprise security in cloud and microservices platforms, while introducing modern capabilities such as context and dependency injection.
Also available in: English   Chinese  
Articles 10 Feb 2018
Use LDAP and Active Directory to authenticate Node.js users
If you already have an internal IT infrastructure, it quite likely contains an LDAP server (possibly Active Directory, acting as an LDAP server) to serve user identities. In many cases, it is best to continue to use that directory, even when your application sits in IBM Cloud. In this tutorial, I show you how to authenticate users.
Also available in: Chinese  
Tutorial 07 Feb 2018
Use management APIs and Jenkins as a continuous integration engine for IBM App Connect Professional deployment automation
Check out deployment automation on IBM App Connect (formerly known as WebSphere Cast Iron) by using IBM App Connect Management APIs, the SoapUI client, and Jenkins.
Also available in: Chinese  
Articles 05 Feb 2018
Taking control of the IBM Connections user experience
If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the Connections user interface, and how you can get started using Customizer right away.
Articles 01 Feb 2018
Build a simple word game app using Cloudant on IBM Cloud
IBM Cloud is an open platform for developing and deploying web and mobile applications. In this two-part tutorial, we walk you through the steps to create a simple GuesstheWord game application using IBM Cloud and its cloud-based development environment: open toolchains and the IBM Cloud Continuous Delivery service. You will start from scratch and end up with a simple game you can play in a web browser with server code running in the cloud.
Also available in: Chinese   Russian   Japanese   Portuguese   Spanish  
Articles 01 Feb 2018
An introduction to data science, Part 1: Data, structure, and the data science pipeline
Data is meaningless if you can't process it to gain insights. The field of data science gives you the tools and methods you need to process data sets effectively and so get the most from the data you collect. In this tutorial, you will Get the basics of machine learning, including data engineering, model learning, and operations.
Also available in: Chinese  
Articles 01 Feb 2018
Learn how to bootstrap Hydra
The basic idea of OAuth 2.0 and OpenID is when a user wants to do something with an application ("Application X"). Access to the application requires access to an account of a company or business ("Service Z") that would require authorization on the user's behalf. To allow authorization in a good and secure way (without violating the users' trust to ask for the their credentials directly), you can integrate something like Hydra into Service Z so that Application X can make authorized requests on the users' behalf.
Also available in: Chinese   Japanese  
Tutorial 25 Jan 2018
Code pattern: Mine insights from software development artifacts
There is a lot of unstructured text content that is generated in any domain – software development lifecycle, finance, healthcare, social media, etc. Valuable insights can be generated by analyzing unstructured text content and correlating the information across various document sources. This pattern uses Watson Natural Language Understanding, Python Natural Language Toolkit, OrientDB, Node-RED, and IBM Data Science Experience to build a complete analytics solution that generates insights for informed decision-making.
Articles 24 Jan 2018
Achieving high performance on IBM AIX using Coherent Accelerator Processor Interface (CAPI)
This article describes the Coherent Accelerator Processor Interface (CAPI) Flash support on IBM AIX. CAPI technology has been used on AIX to accelerate I/O operations to IBM Flash storage. AIX CAPI Flash driver stack has been optimized into a monolithic driver model which further reduced the I/O code path length. CAPI Flash technology provides a superior performance advantage in terms of IOPS per processor when compared to the traditional Fibre Channel I/O. We also describe at a high level how a user can use CAPI-based flash devices on AIX.
Articles 24 Jan 2018
Digital process automation with BPM and blockchain, Part 2: Enable business processes to react to blockchain events
The combination of Business Process Management (BPM) and blockchain technology dramatically simplifies distributed, collaborative processes between multiple enterprises, through the introduction of a shared ledger used by all the participants. In this tutorial, we go beyond mere data sharing through blockchain, and include blockchain’s "active behavior": its capability to notify participants about successful completion of a transaction, by sending events.
Also available in: Chinese  
Articles 22 Jan 2018
Temporary storage and the database, Part 2: Manage your Maintained Temporary Indexes (MTIs)
The SQL optimizer uses Maintained Temporary Indexes (MTIs) to run queries smoothly. But too many MTIs can exhaust temporary storage. With the right information and tools, you can assist the optimizer and prevent system outages.
Articles 22 Jan 2018
Build an enhanced IT help desk chatbot on IBM i with Watson Assistant
Chatbots are conversational robots that simulate conversation, and can interact with users in natural language. By harnessing both the power of the IBM Cloud Watson services and the power and openness of IBM i, you can open up your chatbot to countless creative applications (such as a virtual agent) that can understand and automatically solve password-related issues. This article guides you to implement a prototype of such a chatbot running on IBM i that links the IBM Watson Assistant service and IBM i to Slack, which is the messaging team collaboration tool.
Articles 18 Jan 2018
Analytics ecosystem, Part 1: Spatial Analytics with Db2 Warehouse
Db2 Warehouse, a massively parallel processing (MPP) architecture based data warehouse solution also has geospatial capabilities to manage spatial data. You can now store spatial data as geometries in database tables and perform spatial analytics.
Articles 18 Jan 2018
Cleansing, processing, and visualizing a data set, Part 3: Visualizing data
In this tutorial, discover some of the more useful applications for visualizing data and a few of the approaches you can use to create that visualization, including the R programming language, gnuplot, and Graphviz.
Also available in: Chinese  
Articles 17 Jan 2018
A cryptographic approach to protecting passwords in the cloud
In this article, back-end developers learn why it is important to use encryption and how to use it effectively to protect user information on the cloud, especially passwords, so that even a data leak can't be cracked in less than decades. Security is an ever important topic in the cloud that is crucial to full-stack development and is essential on all products and services.
Also available in: Chinese  
Articles 17 Jan 2018
IBM Connections Customizer Tutorial, Part 5
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The fifth video in the series shows how to use Customizer design properties to make sophisticated modifications to the Customizer user interface.
Videos 15 Jan 2018
Introduction to IBM Connections Customizer
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The second video in the series shows you how to use the Firefox Grease Monkey scripting extension and takes you through creating a Hello World customization.
Videos 15 Jan 2018
IBM Connections Customizer Tutorial, Part 3
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The third video in the series shows you how to get set up on IBM Connections Cloud, how to enable Customizer, and how to share your customizations with IBM.
Videos 15 Jan 2018
IBM Connections Customizer Tutorial, Part 1
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The first video in the series introduces the concepts behind Customizer, how it works, and what it can do for you.
Videos 15 Jan 2018
IBM Connections Customizer Tutorial, Part 4
IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The fourth video in the series shows how three sample customizations were created, to showcase the range of customization possibilities the new feature makes available.
Videos 15 Jan 2018
IBM Connections Customizer is available! What's New?
The formal release of IBM Connections Customizer on IBM Connections Cloud took place on Friday, December 8th 2017. This means that any tenant organization of IBM Connections Cloud on the North America or Europe data centres can now sign up for this new production offering and use it to modify the out-of-the-box IBM Connections user experience.
Articles 15 Jan 2018
Making the cut: Top Java content from developerWorks
A quick rundown of the top content published in the Java hub in 2017.
Also available in: Chinese  
Articles 15 Jan 2018
IBM Lotus Domino 8.0.1 for 64-bit server performance
Learn how the 64-bit IBM® Lotus® Domino® 8.0.1 server performs against 32-bit Lotus Domino 8.0.1 using the N8Mail workload.
Articles 11 Jan 2018
Analyze crime data with Apache Spark and Hive ETL, Part 2: Explore the analyses
In this second part of the "Analyze crime data with Apache Spark and Hive ETL" tutorial series, you will learn how to integrate data from different sources. You will also see the computation of normalized statistics for crime rates enabling easy comparison of crime rates across different geographic areas.
Also available in: Chinese  
Articles 10 Jan 2018
10 steps to set up a multi-data center Cassandra cluster on a Kubernetes platform
Learn how to deploy an Apache Cassandra NoSQL database on a Kubernetes cluster that spans multiple data centers across many regions. The benefits of such a setup are automatic live backups to protect the cluster from node- and site-level disasters, and location-aware access to Cassandra nodes for better performance.
Also available in: Chinese  
Articles 09 Jan 2018
Create an artificial neural network using the Neuroph Java framework
Build an artificial neural network (ANN) using the Java language and Neuroph open source framework.
Also available in: Chinese  
Articles 08 Jan 2018
Using N_Port ID Virtualization (NPIV) with kernel-based virtual machine (KVM) guests on IBM Power servers
This article provides the basic steps to use N-Port ID Virtualization (NPIV) technology in a kernel-based virtual machine (KVM) guest. Additionally, the article also provides the significance of NPIV allowing multiple guests to make use of a single physical host bus adapter (HBA) to access multiple storage devices.
Articles 08 Jan 2018
Analyze crime data with Apache Spark and Hive ETL, Part 1: Learn about Extract, Transform, and Load (ETL)
In this tutorial, you learn to analyze U.K. crime data from inception to final results, covering data download, data transformation and loading into a distributed data warehouse, Apache Hive, then subsequent analysis using Apache Spark. Part 1 describes the Extract, Transform and Load (ETL) activities.
Also available in: Chinese  
Articles 04 Jan 2018
Cleansing, processing, and visualizing a data set, Part 2: Gaining invaluable insight from clean data sets
Learn about VQ and ART algorithms. VQ quickly and efficiently clusters a data set; ART adapts the number of clusters based on the data set.
Also available in: Chinese  
Articles 04 Jan 2018
Building connected cities with new and existing IoT technologies
Many cities and towns around the world are turning to IoT to solve urban problems, such as traffic congestion, and to improve the safety and quality-of-life of their citizens. This article explores connected cities and some of the challenges that are involved in developing city-wide IoT solutions.
Also available in: Chinese   Japanese   Portuguese   Spanish  
Articles 03 Jan 2018
Connecting all the things in the Internet of Things
In this guide for IoT connectivity, learn about widely adopted technologies and standards for IoT networking and why you might choose one network protocol over another. Also, learn about the key considerations and challenges related to networking in IoT.
Also available in: Chinese   Japanese  
Articles 03 Jan 2018
Streamlining the development of your IoT applications by using an IoT platform
This article explores the key capabilities of IoT platforms and considers the top general-purpose end-to-end IoT platforms. You'll learn why you should adopt an IoT platform to rapidly develop your IoT solutions and quickly get the most value from your IoT data.
Also available in: Chinese   Japanese  
Articles 03 Jan 2018
1 - 100 of 11142 results | Next
Show Summaries | Hide Summaries