i

IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 1: Generating certificates in AIX and importing certificates to Windows for IKE IPsec tunnels

Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).




i

Resolving symbol information into meaningful function names in tprof

In scenerios where tprof utility fails to resolve the addresses of the symbols, instead reports the symbols in hexadecimal format. This makes perfomance analysis difficult, since the symbols would not have resolved into meaningful function names. This article explains the way in which users can translate the unresolved address in a tprof profile report to meaningful function address using gensyms and dbx commands.




i

New and enhanced Guardium Outlier Detection

Learn how Guardium database monitoring is extended with enhanced security intelligenceknown as outlier detectionto detect potential threats based on relative changes in behavior. Use cases, configuration guidance, and operational considerations are covered.




i

IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 2: IKEv1 IPsec tunnels between AIX 6.1 or later versions and Windows 2012

Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).




i

Think Big with Decision Composer on IBM Cloud

Learn step-by-step how to deploy a Decision Composer application to the Business Rules service and run it within Hadoop. Access IBM Cloud Lite free.




i

IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 3: IKEv2 IPsec tunnels between AIX 6.1 or later versions and Windows 2012

Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits).




i

Think Big with Decision Composer on IBM Cloud

Learn step-by-step how to deploy a Decision Composer application to the Business Rules service and run it within Hadoop. Access IBM Cloud Lite free.




i

Make your websites smarter with Schema.org, Part 2: The Schema.org syntaxes

The second part of this four-part series shows you how to translate the abstract information model for data in your web pages into one of the three formats supported by Schema.org: RDFa, Microdata, and JSON-LD




i

Make your websites smarter with Schema.org, Part 1: Introduction to the Schema.org information model

Schema.org is an initiative originally created by search engine companies and experts to support web publishers by describing the things that web pages are actually about. This series, in which I explain the Schema.org core information model, helps you expand your web developer skills and get a head start on advances in search engine platforms and personal assistants like Siri, Google Assistant, and Alexa.




i

Authorize with a Cloudant proxy

It is sometimes useful to have more granular access controls on a database than the controls that are provided by Cloudant. In this tutorial, you learn how to create a Cloudant proxy that is under your control. Using such a proxy, you can implement the appropriate authorization model to the system.




i

MicroStrategy integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems

MicroStrategy is a business intelligence tool that allows data to be explored and visualized. MicroStrategy supports Hadoop environments as a data source. Read this article for details about how MicroStrategy Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.




i

vStorm Enterprise integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems

Veristorm vStorm Enterprise makes data migration to Hadoop environments flexible, secure and easy. vStorm already supports data movement to Hadoop solutions running on Linux on IBM Power Systems. Read this article for details about how vStorm was tested to integrate with and move data specifically to Hortonworks Data Platform (HDP) on IBM POWER8.




i

Tableau integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems

Tableau is a business intelligence tool that allows data to be discovered and visualized. Tableau supports Hadoop environments as a data source. Read this article for details about how Tableau Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.




i

QlikView integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems

QlikView is a business intelligence tool that allows data to be discovered and visualized. QlikView supports Hadoop environments as a data source. Read this article for details about how QlikView was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8.




i

Automate operational business decisions with Weather Data and Business Rules services on IBM Cloud, Part 2: Complete your sample weather cancellation service

In this second installment of a two-part tutorial on how to combine Weather Data and Business Rules IBM Cloud services to automate operational business decisions based on weather conditions, you will take a closer look at the decision operation created in Part 1, learn how to create simple business rules that use weather data and a rule flow that includes these rules, and deploy the decision operation to IBM Cloud. A Node-RED flow will orchestrate a call to the weather data, the Business Rules service, and take action based on the outcome executing business rules.




i

Know which authentication methods to use for your hybrid cloud

The different options within IBM Cloud bear diverse requirements to the authentication of users. This article explains the various possibilities on how IBM Cloud users are managed and authenticated. We focus on developers, administrators, or operators that need to log in to the IBM Cloud platform to develop and maintain their applications. Applications that run on top of IBM Cloud can use any authentication method that is appropriate for the application’s purpose.




i

Cleansing, processing, and visualizing a data set, Part 1: Working with messy data

Discover common problems associated with cleansing data for validation and processing, with solutions for dealing with them. You'll also find a custom tool to make the process of cleansing data and merging data sets for analysis.




i

IBM Datacap Desktop custom panels

User interaction with IBM Datacap can occur when physically scanning pages or when reviewing problems found while processing pages. Here, you can find the information to create your own panels to be used within an IBM Datacap application. Custom panels present alternative layouts and manipulation of fields and data.




i

Offloading your Informix data in Spark, Part 5: Machine Learning will help you extrapolate future orders

Part 5 of this tutorial series teaches you how to add machine learning to your data to help you extrapolate future orders.




i

Top Internet of Things articles and tutorials

This article compiles all of the previous top tutorials lists.



  • Internet of Things

i

Top Internet of Things articles and tutorials (December 2017)

The most popular articles for 2017 on the Internet of Things are highlighted in this article for your convenience.



  • Internet of Things

i

Accelerate the path to PCI DSS data compliance using IBM Guardium

This article gives you a step-by-step overview of using the Payment Card Industry (PCI) Data Security Standard (DSS) accelerator that is included with the standard IBM Guardium data security and protection solution. The PCI DSS is a set of technical and operational requirements designed to protect cardholder data and applies to all organizations who store, process, use, or transmit cardholder data. Failure to comply can mean loss of privileges, stiff fines, and, in the case of a data breach, severe loss of consumer confidence in your brand or services. The IBM Guardium accelerator helps guide you through the process of complying with parts of the standard using predefined policies, reports, group definitions, and more.




i

Cleansing, processing, and visualizing a data set, Part 2: Gaining invaluable insight from clean data sets

Learn about VQ and ART algorithms. VQ quickly and efficiently clusters a data set; ART adapts the number of clusters based on the data set.




i

Using N_Port ID Virtualization (NPIV) with kernel-based virtual machine (KVM) guests on IBM Power servers

This article provides the basic steps to use N-Port ID Virtualization (NPIV) technology in a kernel-based virtual machine (KVM) guest. Additionally, the article also provides the significance of NPIV allowing multiple guests to make use of a single physical host bus adapter (HBA) to access multiple storage devices.




i

10 steps to set up a multi-data center Cassandra cluster on a Kubernetes platform

Learn how to deploy an Apache Cassandra NoSQL database on a Kubernetes cluster that spans multiple data centers across many regions. The benefits of such a setup are automatic live backups to protect the cluster from node- and site-level disasters, and location-aware access to Cassandra nodes for better performance.




i

IBM Lotus Domino 8.0.1 for 64-bit server performance

Learn how the 64-bit IBM® Lotus® Domino® 8.0.1 server performs against 32-bit Lotus Domino 8.0.1 using the N8Mail workload.




i

IBM Connections Customizer Tutorial, Part 5

IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The fifth video in the series shows how to use Customizer design properties to make sophisticated modifications to the Customizer user interface.




i

IBM Connections Customizer Tutorial, Part 3

IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The third video in the series shows you how to get set up on IBM Connections Cloud, how to enable Customizer, and how to share your customizations with IBM.




i

IBM Connections Customizer Tutorial, Part 4

IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The fourth video in the series shows how three sample customizations were created, to showcase the range of customization possibilities the new feature makes available.




i

IBM Connections Customizer Tutorial, Part 1

IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The first video in the series introduces the concepts behind Customizer, how it works, and what it can do for you.




i

IBM Connections Customizer Tutorial, Part 2

IBM Connections Customizer lets developers modify the look and behavior of Connections easily and comprehensively. The Introduction to Connections Customizer tutorial series is a quick way learn about Customizer. The second video in the series shows you how to use the Firefox Grease Monkey scripting extension and takes you through creating a Hello World customization.




i

IBM Connections Customizer is available! What's New?

The formal release of IBM Connections Customizer on IBM Connections Cloud took place on Friday, December 8th 2017. This means that any tenant organization of IBM Connections Cloud on the North America or Europe data centres can now sign up for this new production offering and use it to modify the out-of-the-box IBM Connections user experience.




i

Making the cut: Top Java content from developerWorks

A quick rundown of the top content published in the Java hub in 2017.




i

Get started with Docker and Kubernetes

Docker and Kubernetes are the building blocks of the next generation of DevOps. In this tutorial, you'll see how to build Docker images, run them locally, and then push those images to your IBM Cloud account so you can deploy them to a Kubernetes cluster running in the IBM Cloud.




i

A cryptographic approach to protecting passwords in the cloud

In this article, back-end developers learn why it is important to use encryption and how to use it effectively to protect user information on the cloud, especially passwords, so that even a data leak can't be cracked in less than decades. Security is an ever important topic in the cloud that is crucial to full-stack development and is essential on all products and services.




i

Code pattern: Mine insights from software development artifacts

There is a lot of unstructured text content that is generated in any domain – software development lifecycle, finance, healthcare, social media, etc. Valuable insights can be generated by analyzing unstructured text content and correlating the information across various document sources. This pattern uses Watson Natural Language Understanding, Python Natural Language Toolkit, OrientDB, Node-RED, and IBM Data Science Experience to build a complete analytics solution that generates insights for informed decision-making.




i

Achieving high performance on IBM AIX using Coherent Accelerator Processor Interface (CAPI)

This article describes the Coherent Accelerator Processor Interface (CAPI) Flash support on IBM AIX. CAPI technology has been used on AIX to accelerate I/O operations to IBM Flash storage. AIX CAPI Flash driver stack has been optimized into a monolithic driver model which further reduced the I/O code path length. CAPI Flash technology provides a superior performance advantage in terms of IOPS per processor when compared to the traditional Fibre Channel I/O. We also describe at a high level how a user can use CAPI-based flash devices on AIX.




i

Build a simple word game app using Cloudant on IBM Cloud

IBM Cloud is an open platform for developing and deploying web and mobile applications. In this two-part tutorial, we walk you through the steps to create a simple GuesstheWord game application using IBM Cloud and its cloud-based development environment: open toolchains and the IBM Cloud Continuous Delivery service. You will start from scratch and end up with a simple game you can play in a web browser with server code running in the cloud.




i

An introduction to data science, Part 1: Data, structure, and the data science pipeline

Data is meaningless if you can't process it to gain insights. The field of data science gives you the tools and methods you need to process data sets effectively and so get the most from the data you collect. In this tutorial, you will Get the basics of machine learning, including data engineering, model learning, and operations.




i

Taking control of the IBM Connections user experience

If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the Connections user interface, and how you can get started using Customizer right away.




i

Use management APIs and Jenkins as a continuous integration engine for IBM App Connect Professional deployment automation

Check out deployment automation on IBM App Connect (formerly known as WebSphere Cast Iron) by using IBM App Connect Management APIs, the SoapUI client, and Jenkins.




i

Changing IBM Connections behavior with IBM Connections Customizer

If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the behavior of Connections to suit your business processes.




i

Unleash the value of Guardium data by using the Guardium Big Data Intelligence solution

Organizations that use IBM Security Guardium activity monitoring for data security and compliance struggle with the quantity of collected audit data, especially if they have 10 or more Guardium collectors. IBM Security Guardium Big Data Intelligence provides the power of a big data platform that is purpose-built for data security requirements. It helps augment existing Guardium deployments with the ability to quickly create an optimized security data lake that can retain large quantities of historical data over long time horizons.




i

How data becomes knowledge, Part 3: Extracting dark data

Individuals and organizations store all kinds of data. What do we do with it all? Can we call it up as we need it? Can all that data be analyzed quickly and efficiently? Or, does it tie up storage resources and languish for years because the cost of going through it and discarding what's obsolete is too high? Discover the utility and wisdom of storing dark data.




i

Getting started with the IBM Cloud, Part 2: Build an advanced Cloud Foundry app on the IBM Cloud platform

See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.




i

Scale single sign-on with App ID for your Node.js cloud apps

In this tutorial, you will learn about implementing scalable Node.js applications when you are using the App ID service. This IBM Cloud service allows you to add authentication to your mobile and web apps and protect your APIs and back-ends running on IBM Cloud. App ID provides authentication with email/password through a scalable user registry or you can add social login, so that users can sign in with their Facebook or Google credentials. With App ID, you can also host user profile info that you can use to build engaging experiences.




i

IBM i ILE RPG cloud integration sample with IBM Cloud

In this article, you can learn how to connect your ILE RPG programs from cloud applications such as Node-RED on IBM Cloud by using the REST web service call functionality of the integrated web services server.




i

Getting started with the IBM Cloud, Part 3: Doug Tidwell demos how to work with containers on the IBM Cloud platform

See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database.




i

Configure multifactor authentication for IBM Cloud Node.js applications

Passwords are not a complete security solution; they can be stolen or shared. In this tutorial, you learn how to use a random string delivered by email as a second authentication factor. I also discuss several methods for risk analysis, which is used by the application to decide whether a second factor is warranted.




i

Build a connected-car IoT app with Geospatial Analytics

Deploy and extend an Internet of Things (IoT) Connected Vehicle starter kit on IBM Cloud with the Internet of Things Platform and Geospatial services. The starter kit enables you to simulate, view, and manage vehicles driving through a city and set up geofences for notification.



  • Internet of Things
  • cloud