k Offloading your Informix data in Spark, Part 3: Complex analysis By www.ibm.com Published On :: 20 Sep 2017 04:00:00 +0000 The third part of this tutorial series goes deeper into joins and more complex queries. Learn how to get data from your Informix database and dump it in Spark so you can leverage it against other data sources and compile advanced analytics all that in Java. The targeted audience is Informix and non-Informix users seeking to bring RDBMS data into Spark. Full Article data opensource
k Enabling parallel Linux operating system deployment over a network on IBM PowerVM By www.ibm.com Published On :: 21 Sep 2017 04:00:00 +0000 This article explains how you can perform or enable parallel Linux OS installation on IBM PowerVM logical partitions. Full Article linux
k Top 10 editor's picks for IBM Operational Decision Manager By www.ibm.com Published On :: 17 Oct 2017 04:00:00 +0000 See top 10 editor's picks of IBM Operational Decision Manager content published on developerWorks, updated to include some of the best tutorials published in the past year. Full Article Middleware
k Top 10 editor's picks for IBM Business Process Manager By www.ibm.com Published On :: 17 Oct 2017 04:00:00 +0000 See top 10 editor's picks of IBM Business Process Manager content published on developerWorks, updated to include some of the best tutorials published in the past year. Full Article Middleware
k Offloading your Informix data in Spark, Part 4: Leverage data against other data sources By www.ibm.com Published On :: 25 Oct 2017 04:00:00 +0000 In Part 4 of this tutorial series, you'll learn how to link external and public data to your existing data to gain insights for your sales team. In this scenario for retail sales, you'll learn how to forecast the hot sales areas for new wins. Full Article data opensource
k Manage account approval in an OpenWhisk application By www.ibm.com Published On :: 26 Oct 2017 04:00:00 +0000 This tutorial shows you how to write an application that allows users to self register, and then have their accounts approved or declined by an administrator. Full Article security
k Use Clojure to write OpenWhisk actions, Part 3: Improve your OpenWhisk Clojure applications By www.ibm.com Published On :: 30 Oct 2017 04:00:00 +0000 In the previous two tutorials, you learned how to write a basic OpenWhisk Clojure application. In Part 3, I'll show you how to improve any such application. First, you'll learn how to support arguments that include double quotes. Then you'll learn how to use a permanent database (Cloudant) instead of a variable to store the information. Full Article cloud
k Editor's picks: Top five WebSphere Liberty tutorials By www.ibm.com Published On :: 31 Oct 2017 04:00:00 +0000 If there is one thing that IBM WebSphere Liberty gives you, it's the freedom, and flexibility, to dynamically create applications both on-premises and in the cloud. This article highlights the top five tutorials in developerWorks for WebSphere Liberty. Full Article Middleware java cloud
k Reader and editor picks! Top Connect series content By www.ibm.com Published On :: 31 Oct 2017 04:00:00 +0000 Connecting to the cloud was big in 2016 for IBM middleware users and continues to be in 2017 as more environments move to the cloud. Learn which Connect series articles our readers and editor chose as their favorites from the developerWorks library. Full Article Middleware cloud
k Top 10 reasons to make IBM Cloud your platform of choice By www.ibm.com Published On :: 01 Nov 2017 04:00:00 +0000 In this Top 10 List, Carl Osipov shares his views on why developers will want to choose IBM Cloud as their cloud platform of choice. Full Article cloud
k Think your apps are secure in the cloud? By www.ibm.com Published On :: 02 Nov 2017 04:00:00 +0000 The cloud is not secure. Developers know through experience that software and servers get hacked thanks to bad code and insecure Internet connections to remote servers and data centers. You can compare using the cloud to having valuables that are locked up in a suitcase in a parking lot. By nature, both are susceptible to attacks. In this article, we explain the reasons why the cloud is not secure, but we also examine ways to mitigate any insecurities by illustrating some Django examples through the inception of BugHeist. Full Article security
k Establish an information governance policy framework in InfoSphere Information Governance Catalog By www.ibm.com Published On :: 07 Nov 2017 05:00:00 +0000 With the substantial growth in data volume, velocity, and variety comes a corresponding need to govern and manage the risk, quality, and cost of that data and provide higher confidence for its use. This is the domain of information governance, but it is a domain that many people struggle with in how to get started. This article provides a starting framework for information governance built around IBM InfoSphere Information Governance Catalog. Full Article data
k IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 1: Generating certificates in AIX and importing certificates to Windows for IKE IPsec tunnels By www.ibm.com Published On :: 29 Nov 2017 05:00:00 +0000 Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits). Full Article aix
k IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 2: IKEv1 IPsec tunnels between AIX 6.1 or later versions and Windows 2012 By www.ibm.com Published On :: 01 Dec 2017 05:00:00 +0000 Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits). Full Article aix
k Think Big with Decision Composer on IBM Cloud By www.ibm.com Published On :: 04 Dec 2017 05:00:00 +0000 Learn step-by-step how to deploy a Decision Composer application to the Business Rules service and run it within Hadoop. Access IBM Cloud Lite free. Full Article cloud data Cognitive computing
k IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 3: IKEv2 IPsec tunnels between AIX 6.1 or later versions and Windows 2012 By www.ibm.com Published On :: 04 Dec 2017 05:00:00 +0000 Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits). Full Article aix
k Think Big with Decision Composer on IBM Cloud By www.ibm.com Published On :: 05 Dec 2017 05:00:00 +0000 Learn step-by-step how to deploy a Decision Composer application to the Business Rules service and run it within Hadoop. Access IBM Cloud Lite free. Full Article cloud data Cognitive computing
k Make your websites smarter with Schema.org, Part 2: The Schema.org syntaxes By www.ibm.com Published On :: 05 Dec 2017 05:00:00 +0000 The second part of this four-part series shows you how to translate the abstract information model for data in your web pages into one of the three formats supported by Schema.org: RDFa, Microdata, and JSON-LD Full Article opensource
k Make your websites smarter with Schema.org, Part 1: Introduction to the Schema.org information model By www.ibm.com Published On :: 05 Dec 2017 05:00:00 +0000 Schema.org is an initiative originally created by search engine companies and experts to support web publishers by describing the things that web pages are actually about. This series, in which I explain the Schema.org core information model, helps you expand your web developer skills and get a head start on advances in search engine platforms and personal assistants like Siri, Google Assistant, and Alexa. Full Article web
k MicroStrategy integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems By www.ibm.com Published On :: 08 Dec 2017 05:00:00 +0000 MicroStrategy is a business intelligence tool that allows data to be explored and visualized. MicroStrategy supports Hadoop environments as a data source. Read this article for details about how MicroStrategy Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8. Full Article linux
k vStorm Enterprise integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems By www.ibm.com Published On :: 08 Dec 2017 05:00:00 +0000 Veristorm vStorm Enterprise makes data migration to Hadoop environments flexible, secure and easy. vStorm already supports data movement to Hadoop solutions running on Linux on IBM Power Systems. Read this article for details about how vStorm was tested to integrate with and move data specifically to Hortonworks Data Platform (HDP) on IBM POWER8. Full Article linux
k Tableau integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems By www.ibm.com Published On :: 09 Dec 2017 05:00:00 +0000 Tableau is a business intelligence tool that allows data to be discovered and visualized. Tableau supports Hadoop environments as a data source. Read this article for details about how Tableau Desktop was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8. Full Article linux
k QlikView integrated with Hortonworks Data Platform (HDP) running on IBM Power Systems By www.ibm.com Published On :: 10 Dec 2017 05:00:00 +0000 QlikView is a business intelligence tool that allows data to be discovered and visualized. QlikView supports Hadoop environments as a data source. Read this article for details about how QlikView was tested to integrate with and visualize data in Hortonworks Data Platform (HDP) on IBM POWER8. Full Article linux
k Know which authentication methods to use for your hybrid cloud By www.ibm.com Published On :: 12 Dec 2017 05:00:00 +0000 The different options within IBM Cloud bear diverse requirements to the authentication of users. This article explains the various possibilities on how IBM Cloud users are managed and authenticated. We focus on developers, administrators, or operators that need to log in to the IBM Cloud platform to develop and maintain their applications. Applications that run on top of IBM Cloud can use any authentication method that is appropriate for the application’s purpose. Full Article security
k Cleansing, processing, and visualizing a data set, Part 1: Working with messy data By www.ibm.com Published On :: 14 Dec 2017 05:00:00 +0000 Discover common problems associated with cleansing data for validation and processing, with solutions for dealing with them. You'll also find a custom tool to make the process of cleansing data and merging data sets for analysis. Full Article data
k IBM Datacap Desktop custom panels By www.ibm.com Published On :: 14 Dec 2017 05:00:00 +0000 User interaction with IBM Datacap can occur when physically scanning pages or when reviewing problems found while processing pages. Here, you can find the information to create your own panels to be used within an IBM Datacap application. Custom panels present alternative layouts and manipulation of fields and data. Full Article data
k Offloading your Informix data in Spark, Part 5: Machine Learning will help you extrapolate future orders By www.ibm.com Published On :: 15 Dec 2017 05:00:00 +0000 Part 5 of this tutorial series teaches you how to add machine learning to your data to help you extrapolate future orders. Full Article data opensource
k Using N_Port ID Virtualization (NPIV) with kernel-based virtual machine (KVM) guests on IBM Power servers By www.ibm.com Published On :: 08 Jan 2018 05:00:00 +0000 This article provides the basic steps to use N-Port ID Virtualization (NPIV) technology in a kernel-based virtual machine (KVM) guest. Additionally, the article also provides the significance of NPIV allowing multiple guests to make use of a single physical host bus adapter (HBA) to access multiple storage devices. Full Article linux
k 10 steps to set up a multi-data center Cassandra cluster on a Kubernetes platform By www.ibm.com Published On :: 09 Jan 2018 05:00:00 +0000 Learn how to deploy an Apache Cassandra NoSQL database on a Kubernetes cluster that spans multiple data centers across many regions. The benefits of such a setup are automatic live backups to protect the cluster from node- and site-level disasters, and location-aware access to Cassandra nodes for better performance. Full Article data opensource
k Making the cut: Top Java content from developerWorks By www.ibm.com Published On :: 15 Jan 2018 05:00:00 +0000 A quick rundown of the top content published in the Java hub in 2017. Full Article java
k Get started with Docker and Kubernetes By www.ibm.com Published On :: 16 Jan 2018 05:00:00 +0000 Docker and Kubernetes are the building blocks of the next generation of DevOps. In this tutorial, you'll see how to build Docker images, run them locally, and then push those images to your IBM Cloud account so you can deploy them to a Kubernetes cluster running in the IBM Cloud. Full Article cloud Agile
k Taking control of the IBM Connections user experience By www.ibm.com Published On :: 01 Feb 2018 05:00:00 +0000 If you’ve ever wanted to change the way IBM Connections looks or behaves, the new IBM Connections Customizer gives you the control you’ve been looking for. In this article, you’ll learn how Customizer lets you change the Connections user interface, and how you can get started using Customizer right away. Full Article Collaboration
k Use management APIs and Jenkins as a continuous integration engine for IBM App Connect Professional deployment automation By www.ibm.com Published On :: 05 Feb 2018 05:00:00 +0000 Check out deployment automation on IBM App Connect (formerly known as WebSphere Cast Iron) by using IBM App Connect Management APIs, the SoapUI client, and Jenkins. Full Article Agile opensource
k How data becomes knowledge, Part 1: From data to knowledge By www.ibm.com Published On :: 06 Mar 2018 05:00:00 +0000 Trace the path from raw data to stored knowledge. Identify various data sources and the differences between structured and unstructured data. Learn what makes data valuable before applying the DIKW model to data science. Full Article data
k How data becomes knowledge, Part 3: Extracting dark data By www.ibm.com Published On :: 08 Mar 2018 05:00:00 +0000 Individuals and organizations store all kinds of data. What do we do with it all? Can we call it up as we need it? Can all that data be analyzed quickly and efficiently? Or, does it tie up storage resources and languish for years because the cost of going through it and discarding what's obsolete is too high? Discover the utility and wisdom of storing dark data. Full Article data
k Getting started with the IBM Cloud, Part 3: Doug Tidwell demos how to work with containers on the IBM Cloud platform By www.ibm.com Published On :: 15 Mar 2018 04:00:00 +0000 See how to develop and deploy advanced Cloud Foundry applications in the IBM Cloud. Doug Tidwell shows you how to create a globally available app that uses a cloud-hosted NoSQL database. Full Article cloud
k Coding IBM Watson Workspace Chatbots By www.ibm.com Published On :: 23 Mar 2018 04:00:00 +0000 This video shows you how to create IBM Watson Workspace chatbots, using Open Source resources and the Watson Workspace framework and SDK, which help you develop applications faster and with less code. Full Article Collaboration
k Getting started with IBM Cloud Node.js applications, Part 1: Create a front-desk visitor log with Node.js By www.ibm.com Published On :: 05 Apr 2018 04:00:00 +0000 In this article, you learn how to use the IBM Cloud to write a Node.js application for an organization’s front desk, which needs to log visitors in and out. Along the way you will learn how to use Node.js, the Express HTTP server library, and a Cloudant database. You will learn how to do this in the highly available IBM Cloud. This is a basic introduction to Node.js programming on the IBM Cloud platform. Full Article cloud security
k Getting started with IBM Cloud Node.js applications, Part 2: Create a front-desk visitor log with Node.js By www.ibm.com Published On :: 09 Apr 2018 04:00:00 +0000 In the first article in this series, you learned how to build a Node.js application on the IBM Cloud. However, that application was not very responsive or visually appealing. In this article you learn how to use the Bootstrap theme for your application to look better, and how to use the AngularJS library to make it more responsive. Full Article cloud security
k An introduction to Kafka By www.ibm.com Published On :: 05 Jun 2018 04:00:00 +0000 An introduction to one of the most popular platforms for distributed messaging or streaming data. Full Article Analytics opensource
k ISV solution ecosystem for Hortonworks on IBM Power Systems By www.ibm.com Published On :: 13 Jul 2018 04:00:00 +0000 This article provides a list of ISV solutions that can augment the capabilities of Hortonworks Data Platform (HDP) running on Linux on IBM Power Systems. Solutions cover many categories including business intelligence (BI) tools, advanced analytics, and so on. Full Article linux
k Hosted VMware environments and recovery solutions in IBM PureApplication Platform, Part 2: Setting up a PureApplication Software workload environment By www.ibm.com Published On :: 30 Aug 2018 04:00:00 +0000 With the release of IBM Bluemix Local System and PureApplication System firmware V2.2.3, you can create automatically configured hosted VMware environments for more flexibility on how you run and manage your workloads. This tutorial series provides a step-by-step guide for users of the Bluemix Local System W1500, W2500, W3500, and W3550 models to work with these advanced capabilities. In Part 2, you install and configure a PureApplication Software workload environment. Full Article Middleware cloud
k Take care with mum on Mother’s Day By www.dailytelegraph.com.au Published On :: Australians are being warned to take care when visiting their mums on Mother's Day, particularly if they are elderly. Full Article
k UK to quarantine travellers for 14 days By www.dailytelegraph.com.au Published On :: The British government has told airlines it will introduce a 14-day quarantine period for most people arriving from abroad to try to avoid a second peak of the coronavirus pandemic, an association representing the airlines said on Saturday. Full Article
k Retail spending jumped before lockdown By www.dailytelegraph.com.au Published On :: Retail spending across Australia jumped by a record 8.5 per cent in March as consumers stockpiled food, home and office supplies in anticipation of coronavirus lockdown measures. Full Article
k JC Penney to file for bankruptcy: sources By www.dailytelegraph.com.au Published On :: JC Penney Co Inc is preparing to file for bankruptcy protection as soon as next week with plans to permanently close about a quarter of its roughly 850 stores, becoming the latest major US retailer to succumb to fallout from the coronavirus outbreak, according to people familiar with the matter. Full Article
k US unemployment rate skyrockets to 14.7% By www.dailytelegraph.com.au Published On :: The coronavirus crisis has sent US unemployment surging to 14.7 per cent, a level last seen when the country was in the throes of the Depression and President Franklin D. Roosevelt was assuring Americans that the only thing to fear was fear itself. Full Article
k Why JobKeeper could wrap up early By www.dailytelegraph.com.au Published On :: The federal government’s wage subsidy scheme may be wound back before its promised six month life span. Full Article
k AMP shareholders block the 2019 remuneration report By www.dailytelegraph.com.au Published On :: AMP has been forced to defend its plans for executive pay after frustrated shareholders moved to block the company’s 2019 renumeration report. The Finance Giant’s report has been voted down by a 67 percent majority at the company’s annual general meeting. The report stated the AMP’s Chief executive officer had been paid approximately four million dollars in 2019, despite the bank recording a four year net loss of 2.5 billion dollars in February. Full Article
k Bike-stunt internet star Fabio Webner’s lockdown antics go viral By www.dailytelegraph.com.au Published On :: Bike stunts, pet birthdays and a baby names which stumped the world are some of the trending topics on social media in Australia. Full Article