ic

DEBUSSY, C.: Pelléas et Mélisande [Opera] (Zürich Opera, 2016) (NTSC) (BAC157)




ic

DEBUSSY, C.: Pelléas et Mélisande [Opera] (Zürich Opera, 2016) (Blu-ray, Full-HD) (BAC457)




ic

Young Knives - Sheep Tick

Further wails of the unexpected




ic

Brian Davidson's Every Which Way - Brian Davidson's Every Which Way

...by using musicians first and egos second Davidson really did produce something special.




ic

Eric Burdon & The Animals - When I Was Young

Overall, this is a fantastic re-issue. The remastering is brilliant, there is a superb booklet




ic

Catholic Action - Celebrated by Strangers

And on the 9th day, God created Catholic Action.




ic

Deltaphonic - The Funk, The Soul & The Holy Groove

At the heart of their music is funk: deep and fluid, soulful and raunchy and thoroughly butt-wigglingly funky




ic

Joe Bonamassa - A Conversation With Alice

...I’m surprised by just how damn good the single actually IS.




ic

Frank Turner - Wickham Festival

Music News caught up with artist Frank Turner ahead of his set at the award-winning Wickham Festival. During the chat Frank talks everything from, his upcoming new album, dealing with the stresses and strains of the work life balance, his work as an author, not to mention a very special event coming up in the 37-year-olds life.




ic

Win The Touring Musician's Survival Guide Book

Being a musician may be fun, but it isn’t easy. It’s a career of highs, lows, rags, riches and a chance to see some of the world’s most unique places.




ic

Win NOW That’s What I Call Music! 105 CDs

The UK is a nation of music lovers and now, more than ever before, music is a vital tool for keeping us entertained during lockdown




ic

Monitor mobile devices with the Geospatial Analytics service

Obtain, run, and extend a Node.js starter application that uses the IBM Cloud Geospatial Analytics service. With the Geospatial Analytics service, you can monitor moving devices from the Internet of Things. The service analyzes a device message stream from MQTT and tracks device locations in real time with respect to one or more geographic regions.




ic

Automate operational business decisions with Weather Data and Business Rules services on IBM Cloud, Part 1: Get started with a sample weather cancellation service

Businesses can make IT operations smarter by reacting to weather events and automating operational decisions that factor in weather data. This article describes the steps to combine services to automate decisions that consider weather data by running business rules. The business decisions could result in actions such as sending notifications, adjusting prices, generating promotions, triggering IoT devices, or initiating business processes.




ic

Send SMF data directly to the IBM Db2 Analytics Accelerator

If you are already using IBM Db2 Analytics Accelerator and Tivoli Decision Support for z/OS (TDSz), you can now directly load data to Db2 Analytics Accelerator with the TDSz schema, without storing data in Db2 tables. With this feature, you can save CPU and space on expensive storage and also store and query data over a longer period at a more detailed level. This tutorial shows you how.




ic

How WebSphere Application Server V8.x handles poison messages

This article describes how IBM WebSphere Application Server Version 8.x handles poison JMS messages, looks at the behaviour of both the default messaging provider and the IBM WebSphere MQ messaging provider, and provides information on how the default behaviour can be changed.




ic

Intro to IBM Bluemix Continuous Delivery, Part 2: Deploy an app that uses a Bluemix service

In this introductory series on Bluemix and Bluemix Continuous Delivery, you'll discover how using these products can prevent you from wasting time. Using the simple app created in Part 1, learn how to deploy an app that makes use of a Bluemix service in Part 2. Continue to Part 3, where you learn how to write code that uses the new Bluemix service. In Part 4, learn how to use the Delivery Pipeline service to deploy your app to Bluemix automatically whenever you or someone else on your team pushes code to your project's repository.




ic

Top 10 editor's picks for IBM Operational Decision Manager

See top 10 editor's picks of IBM Operational Decision Manager content published on developerWorks, updated to include some of the best tutorials published in the past year.




ic

Top 10 editor's picks for IBM Business Process Manager

See top 10 editor's picks of IBM Business Process Manager content published on developerWorks, updated to include some of the best tutorials published in the past year.




ic

Manage account approval in an OpenWhisk application

This tutorial shows you how to write an application that allows users to self register, and then have their accounts approved or declined by an administrator.




ic

The top ten security articles you need to read

In this article, I write about great resources that you should keep in your arsenal. I tried to get something for everyone, so whether you're a developer, an administrator, or even just someone who's interested in how security vulnerabilities occur and what can be done about it, this list covers all of this and more.




ic

Use Clojure to write OpenWhisk actions, Part 3: Improve your OpenWhisk Clojure applications

In the previous two tutorials, you learned how to write a basic OpenWhisk Clojure application. In Part 3, I'll show you how to improve any such application. First, you'll learn how to support arguments that include double quotes. Then you'll learn how to use a permanent database (Cloudant) instead of a variable to store the information.




ic

Editor's picks: Top five WebSphere Liberty tutorials

If there is one thing that IBM WebSphere Liberty gives you, it's the freedom, and flexibility, to dynamically create applications both on-premises and in the cloud. This article highlights the top five tutorials in developerWorks for WebSphere Liberty.




ic

Reader and editor picks! Top Connect series content

Connecting to the cloud was big in 2016 for IBM middleware users and continues to be in 2017 as more environments move to the cloud. Learn which Connect series articles our readers and editor chose as their favorites from the developerWorks library.




ic

Top 10 reasons to make IBM Cloud your platform of choice

In this Top 10 List, Carl Osipov shares his views on why developers will want to choose IBM Cloud as their cloud platform of choice.




ic

Establish an information governance policy framework in InfoSphere Information Governance Catalog

With the substantial growth in data volume, velocity, and variety comes a corresponding need to govern and manage the risk, quality, and cost of that data and provide higher confidence for its use. This is the domain of information governance, but it is a domain that many people struggle with in how to get started. This article provides a starting framework for information governance built around IBM InfoSphere Information Governance Catalog.




ic

IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 1: Generating certificates in AIX and importing certificates to Windows for IKE IPsec tunnels

Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).




ic

IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 2: IKEv1 IPsec tunnels between AIX 6.1 or later versions and Windows 2012

Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).




ic

IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 3: IKEv2 IPsec tunnels between AIX 6.1 or later versions and Windows 2012

Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).




ic

MicroStrategy integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems

MicroStrategy is a business intelligence tool that allows data to be explored and visualized. MicroStrategy supports Hadoop environments as a data source. Read this article for details about how MicroStrategy Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.




ic

Automate operational business decisions with Weather Data and Business Rules services on IBM Cloud, Part 2: Complete your sample weather cancellation service

In this second installment of a two-part tutorial on how to combine Weather Data and Business Rules IBM Cloud services to automate operational business decisions based on weather conditions, you will take a closer look at the decision operation created in Part 1, learn how to create simple business rules that use weather data and a rule flow that includes these rules, and deploy the decision operation to IBM Cloud. A Node-RED flow will orchestrate a call to the weather data, the Business Rules service, and take action based on the outcome executing business rules.




ic

Know which authentication methods to use for your hybrid cloud

The different options within IBM Cloud bear diverse requirements to the authentication of users. This article explains the various possibilities on how IBM Cloud users are managed and authenticated. We focus on developers, administrators, or operators that need to log in to the IBM Cloud platform to develop and maintain their applications. Applications that run on top of IBM Cloud can use any authentication method that is appropriate for the application’s purpose.




ic

Top Internet of Things articles and tutorials

This article compiles all of the previous top tutorials lists.



  • Internet of Things

ic

Top Internet of Things articles and tutorials (December 2017)

The most popular articles for 2017 on the Internet of Things are highlighted in this article for your convenience.



  • Internet of Things

ic

A cryptographic approach to protecting passwords in the cloud

In this article, back-end developers learn why it is important to use encryption and how to use it effectively to protect user information on the cloud, especially passwords, so that even a data leak can't be cracked in less than decades. Security is an ever important topic in the cloud that is crucial to full-stack development and is essential on all products and services.




ic

Configure multifactor authentication for IBM Cloud Node.js applications

Passwords are not a complete security solution; they can be stolen or shared. In this tutorial, you learn how to use a random string delivered by email as a second authentication factor. I also discuss several methods for risk analysis, which is used by the application to decide whether a second factor is warranted.




ic

Build a connected-car IoT app with Geospatial Analytics

Deploy and extend an Internet of Things (IoT) Connected Vehicle starter kit on IBM Cloud with the Internet of Things Platform and Geospatial services. The starter kit enables you to simulate, view, and manage vehicles driving through a city and set up geofences for notification.



  • Internet of Things
  • cloud

ic

ICEC custom widgets lab

IBM Connections Engagement Center (ICEC) makes it easy to build a social intranet by creating a lightweight portal-like experience using various out-of-the-box and custom widgets. This in-depth tutorial takes you through the process of creating and deploying custom widgets for an engagement center.




ic

Getting started with IBM Cloud Node.js applications, Part 1: Create a front-desk visitor log with Node.js

In this article, you learn how to use the IBM Cloud to write a Node.js application for an organization’s front desk, which needs to log visitors in and out. Along the way you will learn how to use Node.js, the Express HTTP server library, and a Cloudant database. You will learn how to do this in the highly available IBM Cloud. This is a basic introduction to Node.js programming on the IBM Cloud platform.




ic

Analyzing the contextual content of hierarchical data by using IBM Watson Explorer

This tutorial demonstrates how to implement a custom crawler plug-in with IBM Watson Explorer to analyze a hierarchical data structure within the context of content analytics. The strategy outlined here permits the retaining of the hierarchical structure or grains of the model being analyzed.




ic

Getting started with IBM Cloud Node.js applications, Part 2: Create a front-desk visitor log with Node.js

In the first article in this series, you learned how to build a Node.js application on the IBM Cloud. However, that application was not very responsive or visually appealing. In this article you learn how to use the Bootstrap theme for your application to look better, and how to use the AngularJS library to make it more responsive.




ic

On demand data in Python, Part 2: The magic of itertools

Python's motto has always been "Batteries included," to highlight its extensive standard library. There are many well-kept secrets among the standard modules, including itertools, which is less well known in part because iterators and generators are less well known. This is a shame because the routines in itertools and related modules such as functools and operators can save developers many hours in developing big data operators. Learn by copious examples how to use itertools to address the most common MapReduce-style data science tasks.




ic

Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 2: Setting up a PureApplication Software workload environment

With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This tutorial series provides a step-by-step guide for users of the Bluemix Local System W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 2, you install and configure a PureApplication Software workload environment.




ic

Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 1: Getting started with hosted VMware environments

With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 1, you get started with creating and deploying hosted VMware environments in Bluemix Local System. Specifically, you learn how to allocate resources, configure external access to VMware components, and configure and deploy virtual machines in VMware.




ic

Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 3: Building a disaster recovery solution with PureApplication Software

With the release of IBM PureApplication Platform and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This series of articles provides a step-by-step guide for users of the PureApplication Platform W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 3, you set up disaster recovery and learn how to perform three different disaster recovery procedures.




ic

Vic premier considers COVID-19 changes

As Victorians wait to learn what freedoms will return after the weekend, the state's number of confirmed coronavirus cases has risen again.




ic

Zero cases as Qld eases virus restrictions

Queensland has recorded its third day of zero cases this week but authorities warn the virus has not been eradicated and more cases are expected.




ic

Pandemic to hasten digital disruption: QBE

QBE's chief executive says the eventual recovery from COVID-19 will hasten the trend of digital disruption that was underway before the pandemic began.




ic

Aussies most screwed by pandemic

Hoping your boss quits to play golf and you get their job? Not going to happen. Promotions at work will be few and far between for millennials as older workers refuse to vacate their positions, gumming up the job market.




ic

Bike-stunt internet star Fabio Webner’s lockdown antics go viral

Bike stunts, pet birthdays and a baby names which stumped the world are some of the trending topics on social media in Australia.




ic

Melbourne shops packed despite government restrictions

The Victorian government’s refusal to ease restrictions immediately, hasn't stopped thousands of people packing the shops of Melbourne. While hospitality businesses have been promised they can open soon, there's still a fear it might be too late for many. Image: News Corp Australia