Technical library

  • spacer Filter by products, topics, and types of content

    (436 Products)

    (744 Topics)

    (20 Industries)

    (16 Types)

 

1 - 100 of 17057 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)

View Results
Title none Type none Date down
Trace HTTP connections on Tivoli Access Manager for e-business
Sometimes when using IBM Tivoli Access Manager for e-business, you need to be able to trace HTTP connections to solve HTTP-related problems. In this white paper, the author explains how to obtain and interpret these traces.
Articles 07 Oct 2013
Optimization in R
Many statistical techniques involve optimization. The path from a set of data to a statistical estimate often lies through a patch of code whose purpose is to find the minimum (or maximum) of a function. Likelihood-based methods (such as structural equation modeling, or logistic regression) and least squares estimates all depend on optimizers for their estimates and for certain goodness-of-fit tests. Base-R offers the optim function for general-purpose optimization. Through a conversation with John Nash, author and maintainer of optim and the newer optimx, learn about the pitfalls of optimization and some of the tools that R offers.
Articles 07 Oct 2013
Command-line interaction for IBM i Access Client Solutions
In this article, you can learn how to invoke Access Client Solutions from the command line and see the utility through functional examples.
Articles 03 Oct 2013
Using the MDM Application Toolkit to build MDM centric business processes, Part 1: Integrate BPM with MDM
This is the first article in a series that describes how to integrate IBM Business Process Manager (BPM) and master data. Specifically, this series refers to BPM 8.0.1 and the InfoSphere Master Data Management (MDM) Application Toolkit, both of which are provided with MDM 11.0. This article describes a Hello World scenario that shows you how to use the application toolkit to search for and retrieve data from MDM. This data is then displayed on a BPM Coach.
Articles 03 Oct 2013
A seamless upgrade to DB2 Text Search V10.5
IBM DB2 Text Search is integrated with DB2 V10.5 and has been available since V9.5. It is equipped with a highly sophisticated, feature-rich, full-text search server and provides powerful indexing and search capabilities. This article describes various methods of upgrading to DB2 Text search V10.5. It uses an example to walk you through an upgrade scenario. In addition, it provides troubleshooting hints to resolve common upgrade problems.
Articles 03 Oct 2013
How to write trace format entries
This article aims at equipping users with the knowledge required to write effective trace format entries. We will look at elements of the trace format entry, covering each of them with examples and situations where they can be handy. There is an example at the end of the article to give you a sense of how these pieces of a puzzle fit together.
Articles 03 Oct 2013
Command-line interaction for IBM i Access Client Solutions
In this article, you can learn how to invoke Access Client Solutions from the command line and see the utility through functional examples.
Articles 03 Oct 2013
Debugging tools and techniques for Linux on Power
Debugging is a major software development activity, which as an application developer, you cannot avoid. Effective debugging can not only shorten the software development cycle, but can also save costs. This article introduces techniques for locating bugs in user-space C/C++ and Java(TM) applications and describes some of the debugging tools available on Linux(TM) for POWER(TM) architecture.
Articles 02 Oct 2013
Verify and convert JSON payloads dynamically for cloud-based applications
This article presents a solution architecture that facilitates JavaScript Object Notation (JSON) validation and transformation for the benefit of cloud consumers and cloud service providers.
Articles 02 Oct 2013
InfoSphere Optim Performance Manager Security – Part 1: Web console access and Managing privileges
This video is the first of two-part series that discusses the security feature in version 5.3 of the InfoSphere Optim Performance Manager (OPM).
Demos 02 Oct 2013
Deploying PureApplication System middleware by using a PureScale database from PureData System for Transactions
Companies face many challenges, such as a rapidly expanding user base, continuous development of new applications, and the use of existing database systems. IBM PureApplication System and IBM PureData System for Transactions are designed to meet such needs. This article describes the options you can use in those two systems to create a scalable middleware and its applications.
Articles 02 Oct 2013
Automate cloud event management
This article shows IBM PureFlex System administrators how to use the automation manager function in Flex System Manager to automate responses to common cloud system events. Learn what the automation manager's capabilities are, how to create event automation plans with a GUI wizard, and how to reuse existing automation event plans and modify them programatically.
Articles 02 Oct 2013
Server-side mobile application development with IBM Worklight
A five-part article series that explains how to use IBM Rational Application Developer for WebSphere Software and IBM Worklight together to develop applications for mobile devices. Bhargav Perepa walks you through the entire process. He provides application and sample configuration files to guide you through the steps.
Articles 02 Oct 2013
Integrating Curam applications with legacy systems using WebSphere Message Broker
Part of the IBM Smarter Planet initiative, Curam Social Enterprise Management software provides enterprise solutions for workforce services and social security. This article shows you how to integrate Curam with external insurance company and government agency systems using WebSphere Message Broker V8.
Articles 02 Oct 2013
Compare the Informix Version 12 editions
Get an introduction to the various editions of IBM Informix, and compare features, benefits, and licensing considerations in a side-by-side table. Regardless of which edition you choose, Informix brings you legendary ease-of-use, reliability, stability, and access to extensibility features.
Also available in: Chinese   Chinese   Russian   Portuguese  
Articles 01 Oct 2013
DevOps distilled: A new look at DevOps
In this series of articles, learn about DevOps and how it can: create a collaborative relationship between development and IT operations; enable high deployment rates; and increase the reliability, resilience, and security of your production environment.
Articles 01 Oct 2013
Use InfoSphere Streams and BigInsights for real-time Hadoop analytics at scale
Configuring effective and efficient big data analytics at scale has long been a challenge. Moreover, storing huge amounts of unstructured data presents numerous obstacles to analyzing the data on a real-time or near-real-time basis. InfoSphere BigInsights and InfoSphere Streams -- based upon Apache Hadoop -- provide a long-awaited solution to producing an optimal, decoupled computation framework for analyzing big data in real time at scale.
Articles 01 Oct 2013
Develop applications in the IBM SmartCloud Enterprise using the new Version 9 Rational IDEs
Deep dive with Jean-Yves Rigolet as he presents how the new Rational development tools residing on the cloud can help you and your teams build and maintain a wide range of quality software more quickly and with more reliability in frictionless development environments.
Articles 01 Oct 2013
Rebuild your IT operations to be application-centric
The winds of disruptive change are blowing through IT. These changes reflect the adoption of cloud computing, the new consumer paradigm for acquiring and using products and services, the expanding base of knowledge related to an increasingly mobile user, and the ingestion and digestion of big data. To adapt to this change, the IT mindset must transform. This transformation culminates in the DevOps movement, which is aligned with agile software development and facilitated by open source tools and IBM SmartCloud Orchestrator.
Articles 01 Oct 2013
Sentry 2 and PHP, Part 1: Authentication and access control for PHP
Authentication and access control are critical to keeping your web application secure. Sentry 2 is a framework-agnostic authentication and authorization system written in PHP. It provides built-in methods for many common authentication and authorization tasks, allowing you to efficiently and securely develop public-facing PHP web applications.
Articles 01 Oct 2013
System log analysis using InfoSphere BigInsights and IBM Accelerator for Machine Data Analytics
When understood, logs are a goldmine for debugging, performance analysis, root-cause analysis, and system health assessment. In this real business case, see how InfoSphere BigInsights and the IBM Accelerator for Machine Data Analytics are used to analyze system logs to help determine root causes of performance issues, and to define an action plan to solve problems and keep the project on track.
Articles 01 Oct 2013
Anomaly detection challenges in SIEM: Ask the experts
IBM SIEM experts David Druker and Rory Bray discuss the SIEM Anomaly detection challenges you face in this video roundtable discussion.
Articles 01 Oct 2013
IBM Business Analytics Proven Practices: Configuring Microsoft SharePoint 2010 for IBM Cognos BI
This document will help you to integrate IBM Cognos 10.2.1 web parts into your Microsoft SharePoint 2010 website.
Articles 30 Sep 2013
Defining the deployment deliverable in DevOps
Dan Zentgraf of Ascendent Technology, an IBM Business Partner, describes the challenges inherent in transforming from traditional development approaches to emerging DevOps practices and the changes required to do so.
Also available in: Portuguese  
Articles 30 Sep 2013
Use junctions to ID servers on Tivoli Access Manager for e-business
IBM Tivoli Access Manager for e-business uses junctions to identify web servers. The client's browser uses one set of URL links and the back-end web server uses another. In this white paper, learn how WebSEAL processes URLs from the back-end server and the client.
Articles 30 Sep 2013
DevOps for mobile development
Mobile computing is probably the hottest topic for development and operations teams right now. Employees in companies large and small have various mobile devices, many of them personal, that they are using for work. Companies all over the world want to use the mobile market by providing customers and users with apps that make mobile computing easier. So, it is important for companies to think through not just the development of a mobile capability but also how they will deploy it and how they can ensure the continuity of the capabilities as these change over time. This article covers how DevOps (development & operations) can help address the issues of deploying different versions of apps to different devices.
Also available in: Chinese   Russian   Japanese   Portuguese   Spanish  
Articles 27 Sep 2013
Informix Dynamic Server data compression and storage optimization
Starting with IBM Informix Dynamic Server (IDS) Version 11.50.xC4, you can compress data and optimize storage in IDS databases. The advantages of data compression and storage optimization include significant storage savings, reduced I/O activity, and faster backup and restore. IDS provides full online support for enabling storage optimization and compressing existing table data, while applications continue to use the table. This article provides an overview of IDS data compression and storage optimization functionality and shows you how to perform both tasks.
Articles 26 Sep 2013
System call interception using a standard public IBM AIX interface
IBM AIX® provides a standard public interface named kmod_util to support system call interception since AIX 6.1 TL06 and AIX 7.1. In this tutorial, we provide step-by-step instructions explaining how kmod_util can be used to intercept system calls under various situations.
Tutorial 26 Sep 2013
Why low cardinality indexes negatively impact performance
Low cardinality indexes can be bad for performance. But, why? There are many best practices like this that DBAs hear and follow but don't always understand the reason behind. This article will empower the DBA to understand the logic behind why low cardinality indexes can be bad for performance or cause erratic performance. The topics that are covered in this article include B-tree indexes, understanding index cardinality, hypothetical examples of the effects of low cardinality indexes, a real-world example of the effects of a low cardinality index, and tips on how to identify low cardinality indexes and reduce their impact on performance.
Articles 26 Sep 2013
Automatically deactivating service level agreements in WebSphere Service Registry and Repository
Service Level Agreements (SLAs) in WebSphere Service Registry and Repository (WSRR) are agreements between service providers and consumers that can be enforced by ESBs at runtime when processing requests to ensure that the service consumer is authorised to invoke the target service. You can specify the dates between which an SLA is active, but WSRR does not automatically monitor SLAs in order to deactivate those SLAs whose termination dates have passed. This article shows you how to use a scheduled task in WSRR to monitor SLAs and automatically deactivate those that have expired.
Articles 25 Sep 2013
Application integration with WebSphere Cast Iron Cloud Integration, Part 3: Publishing a project into the Integration Appliance
Part 1 and Part 2 of this series demonstrated how to create and configure an orchestration using WebSphere Cast Iron Studio. In this last part of the series, you will learn to test an orchestration in Studio, publish a Cast Iron project, and run the project from the Integration Appliance.
Articles 25 Sep 2013
Application integration with WebSphere Cast Iron Cloud Integration, Part 2: Configuring the orchestration
Part 2 of this series explains how to configure a WebSphere Cast Iron orchestration, along with detailed procedures on configuring an MQ Poll Message activity, a Read XML activity, and a Database Insert Rows activity.
Articles 25 Sep 2013
Application integration with WebSphere Cast Iron Cloud Integration, Part 1: Creating orchestration, endpoints, and configuration properties
IBM WebSphere Cast Iron Cloud Integration is used as a middleware tool for integrating cloud applications with on-premise applications, cloud to cloud applications, and on-premise to on-premise applications. This 3-part article series demonstrates how to build and configure an orchestration using WebSphere Cast Iron Studio that polls an MQ queue for messages and inserts records in an Oracle table. Part 1 demonstrates how to create an orchestration, endpoints, and configuration properties using Studio.
Articles 25 Sep 2013
Developing a distributed WS-AT transaction using an IBM BPM Advanced Integration Service, Part 3: Defining the business process
Leveraging the capabilities of the Advanced Integration Services (AIS) in IBM Business Process Manager V8.0.1 Advanced, this series describes the implementation of a distributed WS-AT scenario involving two databases (Microsoft SQL Server and IBM DB2) installed on two different machines and accessed via two web services. The implementation illustrates the automatic rollback capabilities offered by the SCA-based management in an AIS in collaboration with the WS-AT protocol. In Part 3, you'll learn how to design and implement the business process using the BPMN notation in Process Designer.
Articles 25 Sep 2013
IBM Business Analytics Proven Practices: Installing the IBM Cognos Lifecycle Manager Tomcat Application Server as a Windows Service
This document describes how to register Lifecycle Manager as a Windows service.
Also available in: Chinese  
Articles 25 Sep 2013
Working with Big SQL extended and complex data types
Big SQL, a SQL interface introduced in InfoSphere BigInsights, offers many useful extended data types. In general, a data type defines the set of properties for values being represented and these properties dictate how the values are treated. Big SQL supports a rich set of data types, including extended data types that are not supported by Apache Hive. With data types supported by Big SQL, it's easier to represent and process semi-structured data. Using the code samples and queries included, learn how to use Big SQL complex data types in simple and nested form and how to create and implement these types in an application. As an added bones, see how to use the Serializer Deserializer (SerDe) to work with JSON data.
Articles 24 Sep 2013
SQL to Hadoop and back again, Part 1: Basic data interchange techniques
In this series of articles, we'll look at a range of different methods for integration between Hadoop and traditional SQL databases, including simple data exchange methods, live data sharing and exchange between the two systems, and the use of SQL-based layers on top of Apache Hadoop, including HBase and Hive, to act as the method of integration. Here in Part 1, we examine some of the basic architectural aspects of exchanging information and the basic techniques for performing data interchange.
Articles 24 Sep 2013
Maven integration for portlet projects with IBM Rational Application Developer
The Apache Maven framework, which helps automate the build process, has become more popular as developers focus on duplicating and reusing commands. IBM® Rational® Application Developer for WebSphere Software v9.0 introduces tooling support for Maven-based development. This article explains how Maven tooling can be integrated with Rational Application Developer's portlet tooling features to enhance both the development and the build experience.
Articles 24 Sep 2013
Michael Hamelin on the IBM X-Force 2013 Mid-Year Trend and Risk Report
Michael Hamelin discusses the findings in the IBM X-Force 2013 Mid-Year Risk and Trends Report. Learn about the "what's old is new" trends as well as the emerging trends in reputation stealing attacks and Android malware.
Articles 24 Sep 2013
Unlock Big Value in Big Data with Analytics
In this IBM Redbooks publication, read how big data expands and evolves analytics that were not previously possible because of lack of available information, technology limitation, or prohibitive cost. Learn how big data can deliver more complete answers and new insights, improve processes and performance, and create new business models and differentiated services. Use this book to help you move beyond the hype to realize the value of big data.
Redbooks 24 Sep 2013
Get started with CARLa on IBM Security zSecure
CARLa is IBM Security zSecure's main reporting engine. In this white paper, learn how to customize reports within IBM Security zSecure to ease auditing and administration for central security personnel.
Articles 24 Sep 2013
System security and practical penetration testing
Evolving vulnerabilities in web-facing applications are a growing and troublesome trend. This fact, coupled with a growing community of cybercriminals and hacktivists, means that your applications could be the next new example of a high-profile breach. Discover some of the tools the hacking community uses, and learn how you can protect yourself against them.
Articles 24 Sep 2013
Big Data Networked Storage Solution for Hadoop
In this IBM Redpaper, you'll find a reference architecture, based on Apache Hadoop, to help businesses gain control over their data, meet tight service-level agreements (SLAs) around data applications, and turn data-driven insight into effective action. With the Big Data Networked Storage Solution for Hadoop, get the ability to ingest, store, and manage large data sets with high reliability. The paper also touches on IBM InfoSphere BigInsights, which provides an innovative analytics platform that processes and analyzes all types of data to turn large complex data into insight.
Redbooks 24 Sep 2013
Enable FIPS 140-2 HTTPS encryption for IBM Worklight mobile apps
IBM Research has created application-level HTTP/HTTPS client libraries that you can use to make FIPS 140-2 encrypted HTTP/HTTPS requests directly within mobile applications. In this article, get step-by-step instructions for integrating the HTTP/HTTPS client libraries into your hybrid and native iOS and Android apps built with IBM Worklight Studio. You'll then be able to invoke the library APIs to create FIPS 140-2 encrypted network requests and transmit them to FIPS 140-2 certified SSL termination points both inside the firewall of private enterprise networks (through a reverse proxy architecture) and outside of them.
Articles 24 Sep 2013
Context-Based Analytics in a Big Data World: Better Decisions
This IBM Redbooks publication explores context, the cumulative history derived from data observations about entities (people, places, things). Context is a critical component of analytic decision process. Without context, business conclusions might be flawed. By using context analytics with big data, organizations can derive trends, patterns, and relationships from unstructured data and related structured data. These insights can help an organization to make fact-based decisions to anticipate and shape business outcomes.
Redbooks 24 Sep 2013
Explore the advanced analytics platform, Part 2: Explore use cases that cross multiple industries using the advanced analytics platform
An analytics platform requires investment of products and sourcing of data from multiple sources. By its very nature, big data leads to extreme requirements in data volumes and velocity that make it hard to replicate data across organizational silos. The platform must support multiple use cases for an organizational data lake (a common big data store across many divisions of the organization) to justify such investment. Explore multiple successful big data use cases and the flow of one use case to learn how the architecture supports the use cases.
Articles 24 Sep 2013
Better Business Decisions at a Lower Cost with InfoSphere BigInsights
As the rate of data growth increases exponentially, current data management methods are rendered inadequate. InfoSphere BigInsights, based on the open source computing framework Apache Hadoop, is designed to manage big data sources and help organizations manage the data and analytics required.
Redbooks 24 Sep 2013
Harness the power of big data: The IBM big data platform
Big data represents a new era of computing -- an inflection point of opportunity where data in any format may be explored and utilized for breakthrough insights -- whether that data is in place, in motion, or at rest. Boost your big data IQ by reading this new book from the authors of Understanding Big Data.
Books 24 Sep 2013
Explore the advanced analytics platform, Part 1: Support your business requirements using big data and advanced analytics
Analytics platforms are increasingly important with the growth of big data. Learn about the key characteristics of the platforms and the underlying components. This article is the first of a series that will help you design and implement such a platform.
Articles 24 Sep 2013
IBM@JavaOne 2013: The IBM sessions
IBM is a regular supporter of the JavaOne conference, both as a sponsor and as a source of technical presenters. If you plan to attend JavaOne 2013, don't miss your opportunity to glean invaluable knowledge from IBM's Java experts and to learn about their vital contributions to the Java ecosystem. This article gives you an overview of the activities that the IBM team is involved in during the week of JavaOne in 2013.
Articles 19 Sep 2013
Java.next: Mixins and traits
The Java language's primary paradigm, object orientation with single inheritance, effectively models most but not all programming problems. The Java.next languages extend this paradigm in various ways, including mixins and traits. This Java.next installment defines the mechanisms that mixins and traits share, and it delves into the subtle differences between mixins in Groovy and traits in Scala.
Articles 19 Sep 2013
DB2 with BLU Acceleration: A rapid adoption guide
You have probably heard how DB2 with BLU Acceleration can provide performance improvements ranging from 10x to 25x and beyond for analytical queries with minimal tuning. You are probably eager to understand how your business can leverage this cool technology for your warehouse or data mart. The goal of this article is to provide you with a quick and easy way to get started with BLU. We present a few scenarios to illustrate the key setup requirements to start leveraging BLU technology for your workload.
Articles 19 Sep 2013
Strengthening the SSH configuration used in GPFS installations to make them more secure
Currently, a prerequisite of any IBM General Parallel File System (IBM GPFS) installation is that all the nodes on the cluster must be able to communicate with each other using the root user ID and that this is done without a password in order to facilitate automated tasks. But this configuration represents a security exposure, because security best practices forbid that the root user can log in remotely. The configuration presented in this article resolves this dilemma by allowing the GPFS cluster nodes to continue communicating with each other using the root ID and at the same time blocking this type of connection to other users and nodes.
Articles 19 Sep 2013
Developing a distributed WS-AT transaction using an IBM BPM Advanced Integration Service, Part 2: Configuring the transaction support
Leveraging the capabilities of the Advanced Integration Services (AIS) in IBM Business Process Manager V8.0.1 Advanced, this series describes the implementation of a distributed WS-AT scenario involving two databases (Microsoft SQL Server and IBM DB2) installed on two different machines and accessed via two web services. The implementation illustrates the automatic rollback capabilities offered by the SCA-based management in an AIS in collaboration with the WS-AT protocol. In Part 2, you'll configure the transactional support and implement the two transactional web services for the Credit and Charge operations in the example scenario, one in .NET and the other in JEE.
Articles 18 Sep 2013
Using workload management, service discovery, and the Integration Registry in IBM Integration Bus V9
This article shows you how to use new service discovery and workload management features in IBM Integration Bus V9 to discover services by interrogating WebSphere MQ or a database, use the discovered service to configure integration flows, and control application behavior at runtime. You will also learn how to use the Integration Registry to store and manage the discovered services and workload management policies.
Articles 18 Sep 2013
Complete tracing of JDBC calls for WebSphere Adapter when interacting with a DB2 database
Learn to configure WebSphere Adapter for JDBC to get complete tracing information for each JDBC call while interacting with a DB2 database, which results in faster problem analysis and resolution.
Articles 18 Sep 2013
Securing web service message flows using WebSphere DataPower, Part 3: Exchanging messages
This article series discusses securing web service message flows with the WS security policy to enforce and filter WSDL-defined WS policies using WebSphere DataPower SOA Appliance with firmware 5.0.0.8 or later. The last part of this article series, Part 3, dives into the encryption and signature part of the security policy and explains how to configure the appliance to enforce and filter encryption and signature requirements.
Articles 18 Sep 2013
Securing web service message flows using WebSphere DataPower, Part 2: Encrypting the security policy
This article series discusses securing web service message flows with the WS security policy to enforce and filter WSDL-defined WS policies using WebSphere DataPower SOA Appliance with firmware 5.0.0.8 or later. Part 2 of this 3-part article series dives into the encryption part of the security policy and explains how to configure the appliance to enforce and filter encryption requirements.
Articles 18 Sep 2013
Securing web service message flows using WebSphere DataPower, Part 1: Configuring the DataPower settings
This article series discusses securing web service message flows with the WS security policy to enforce and filter WSDL-defined WS policies using WebSphere DataPower SOA Appliance with firmware 5.0.0.8 or later. Part 1 of this 3-part series presents the DataPower approach and explains high-level configuration steps.
Articles 18 Sep 2013
Building a large scale WebSphere Application Server Liberty collective topology
This article describes how you can build and manage a large scale Liberty collective topology with IBM WebSphere Application Server Network Deployment V8.5.5, focusing on the procedures and techniques for building a replica set, building up collective members, and managing the collective.
Articles 18 Sep 2013
Get to know the R-project Toolkit in InfoSphere Streams
InfoSphere Streams addresses a crucial emerging need for platforms and architectures that can process vast amounts of generated streaming data in real time. The R language is popular and widely used among statisticians and data miners for developing statistical software for data manipulation, statistical computations, and graphical displays. Learn about the InfoSphere Streams R-project Toolkit that integrates with the powerful R suite of software facilities and packages.
Articles 17 Sep 2013
Enable the Keystone LDAP back end in OpenStack
OpenStack is open source software for building public and private clouds that provide an Infrastructure as a Service (IaaS) platform. Keystone is an OpenStack subproject that provides identity services, including user authentication and authorization, for the OpenStack family of projects. This article shows how to configure Keystone to use a Lightweight Directory Access Protocol (LDAP) server as its back end for identity services, instead of the default SQL back end.
Articles 17 Sep 2013
Introduction to Java multitenancy
The IBM Multitenant JVM recently became available as part of the IBM Java 8 beta. By running multiple applications within a single multitenant JVM, a cloud system can speed applications' start times and reduce their memory footprint. This article introduces the technology behind multitenant cloud JVM and discusses the main costs and benefits.
Articles 17 Sep 2013
Leverage the OSLC service provider capabilities of IBM Rational Focal Point 6.6
IBM Rational Focal Point had been only a consumer of Open Services Lifecycle Collaboration (OSLC) services. With the release of Rational Focal Point 6.6, however, Focal Point now offers OSLC service provider capabilities for the Rational solution for Collaborative Lifecycle Management (CLM) and other OSLC consumer applications. This article demonstrates how to leverage the new OSLC service provider capabilities of Focal Point.
Articles 17 Sep 2013
Best practices for systems and software development
Authors Graham Bleakley, Keith Collyer, and Joanne Scouler present an easy-to-understand explanation of the best practices for the IBM Rational Solutions for Systems and Software Engineering. The article describes the purpose, outlines the content, and explains how they support regulatory standards.
Articles 17 Sep 2013
Use Access Manager credentials in IBM Security Policy Manager 7.1
Learn how to transfer credential information from Access Manager for eBusiness to IBM WebSphere Application Server using TAI++. From IBM WebSphere Application Server, you then transfer the credential information to IBM Security Policy Manager.
Articles 17 Sep 2013
Moving your WebSphere Portal theme to mobile, Part 1: Make your WebSphere Portal 6.1.x or 7.x theme modular
IBM WebSphere Portal 8.0 introduced a modular architecture that makes theme development easier. Once you complete your migration to Portal 8.0, modularizing your custom theme is usually the first task in adding new features to your Portal site. This article walks you through the steps to convert a Portal 6.1.5 theme to the modular architecture. Included are tips and time estimates to help you plan your theme conversion.
Articles 17 Sep 2013
Big data architecture and patterns, Part 1: Introduction to big data classification and architecture
Big data problems are often complex to analyze and solve. The sheer volume, velocity, and variety of the data make it difficult to extract information and business insight. A good first step is to classify the big data problem according to the format of the data that must be processed, the type of analysis to be applied, the processing techniques at work, and the data sources for the data that the target system is required to acquire, load, process, analyze and store.
Articles 17 Sep 2013
IBM Security XGS and network access control
Discover the basics of the IBM Security Next Generation Intrusion Prevention System's (NGIPS) XGS 5100 appliance, and learn how it uses a Network Access Control policy (NAC), a type of Access Control List policy that helps administrators decide what to do when potentially threatening traffic has been detected. Explore NAC rules, deployment parameters, and objects definitions, and examine a simple, conceptual, high-level information flow model that consists of three major elementswho, what, and when.
Articles 17 Sep 2013
Create a KVM backup in IBM PureFlex System
IBM PureFlex System with integrated network and storage virtualization and an open hypervisor provide an open and cost-effective solution to customers. This article shows how to create a backup of KVM (Kernel-based Virtual Machine) virtual machines in a PureFlex System environment.
Articles 13 Sep 2013
Migrate terabytes of data from IBM Balanced Warehouse to IBM Smart Analytics System
In the current, ever-demanding world, data warehouse environments are continuing to grow exponentially both in terms of data and real-time data processing requirements. To meet these demanding needs, organizations have to make right decisions to move the applications to the right platform, and more importantly, at the right time. Reckitt Benckiser Group plc. was an early adopter of the IBM Balanced Configuration Unit (BCU) Warehouse and recently upgraded to the next generation IBM Smart Analytics System (ISAS) to help financial customers with a better user experience, while providing higher data capacity.
Articles 12 Sep 2013
Creating a WebSphere MQ File Transfer Edition (FTE) bridge agent to a mainframe
This article shows you how to create a WebSphere MQ FTE bridge agent to communicate from a WebSphere MQ FTE server to a mainframe. It also provides a sample Create Transfer command to test the agent.
Articles 11 Sep 2013
Integrating PureData System for Transactions with PureApplication System
In a few short steps, this article shows how you can integrate IBM PureData System for Transactions with PureApplication System. You will learn to use a database from PureData for existing or new patterns of PureApplication.
Articles 11 Sep 2013
Connecting JMS applications with WebSphere MQ using Tivoli Directory Server
This article shows you how to connect JMS applications to WebSphere MQ using IBM Tivoli Directory Server for authentication and lookup. It includes configuration steps for WebSphere MQ and Tivoli Directory Server.
Articles 11 Sep 2013
Getting started with real-time stream computing
Use InfoSphere Streams to turn volumes of data into information that helps predict trends, gain competitive advantage, gauge customer sentiment, monitor energy consumption, and more. InfoSphere Streams acts on data in motion for real-time analytics. Get familiar with the product and find out where to go for tips and tricks that speed implementation.
Articles 10 Sep 2013
Vice partition virtualization for IBM AFS
IBM® AFS™ storage area network (SAN) storage virtualization provides the mechanism to migrate the existing vice partitions from one file server to another file server without restarting the file server or terminating the client processes. This article explains the problem with the existing IBM AFS file server setup in migrating the vice partitions from one file server to another and the steps to resolve the same using IBM AFS SAN storage virtualization.
Articles 10 Sep 2013
Operator commands for IBM Security Key Lifecycle Manager for z/OS 1.1
Learn how to implement operator commands to control IBM Security Key Lifecycle Manager (ISKLM) for z/OS from the console of a mainframe. The goal is to centralize and automate the encryption key-management process, reduce the number of encryption keys, and consolidate encryption key management while facilitating compliance for regulatory standards that require strong hardware encryption.
Articles 10 Sep 2013
Smarter Analytics: Driving Customer Interactions with the IBM Next Best Action Solution (IBM Redbooks)
What if your organization could increase customer satisfaction with every customer interaction? What if your customer-facing teams had the information and insight necessary to delight your customers every time they made contact? What if you could proactively provide service to your customers before they even know that they need it?
Redbooks 10 Sep 2013
Deploy IBM Rational Insight 1.1.1.2 for the enterprise
Are you thinking about deploying an IBM Rational Insight in your large enterprise? This article shows, step-by-step, how to install Rational Insight components across three separate workstations to allow certain functions of Rational Insight to benefit from exclusive use and specialization of hardware resources.
Articles 10 Sep 2013
Test cloud-based applications with Apache JMeter
JMeter is a powerful testing tool that you can use to test applications that run in the cloud. But managing and maintaining JMeter scripts can be challenging if you don't know how to use JMeter effectively. This article presents techniques that can help you implement well-designed, automated JMeter tasks in your cloud-based application testing.
Articles 09 Sep 2013
Provision virtual machines with vSphere APIs
In a virtualized VMware cloud computing environment, you can provision different types of image templates for your unique requirements. VMware provides provisioning techniques for different needs. Two of these techniques, inflate and eagerzero, are described in this article. Learn how to use these methods to manipulate virtual disk and storage size in your VMware environment.
Also available in: Japanese  
Articles 06 Sep 2013
IBM Business Analytics Proven Practices: Case Study - Migrating BO Reports to IBM Cognos BI without Universe Files
A process to help migrating Business Objects reports into an IBM Cognos BI environment when the Business Objects universe file does not exist.
Articles 06 Sep 2013
Developing mobile apps with Node.js and MongoDB, Part 1: A team's methods and results
Explore the advantages of using Node.js (server-side JavaScript), rather than Java technology, to develop systems of engagement. In this article, see the results achieved by an IBM Extreme Blue team who used an alternative technology stack (Node and MongoDB) with IBM Passes as a test case. Their experience may help you decide whether such a stack is suited to your development needs.
Also available in: Japanese  
Articles 05 Sep 2013
IBM Database Conversion Workbench, Part 1: Overview
The IBM Database Conversion Workbench (DCW) is a no-charge plug-in that adds database migration capabilities to IBM Data Studio. DCW integrates many of the tools used for database conversion into a single integrated environment, following an easy-to-use framework that is based on best practices from IBM migration consultants. This first article in the series provides an overview of conversion methodology and the various functions in DCW 2.0.
Articles 05 Sep 2013
Achieving business continuity in IBM PureApplication System
This article surveys the different ways in which business continuity can be maintained using IBM PureApplication System, and how these strategies meet different recovery objectives. The features of PureApplication System for backup and recovery will be discussed, along with the details of a major new feature for simplified disaster recovery and how you can put it to work in your environment. Also discussed is a look at how to achieve business continuity even when you are unable to take advantage of the new features in PureApplication System.
Articles 04 Sep 2013
Explore IBM BlueMix
Join IBM's David Barnes as he details IBM BlueMix, an in-the-cloud platform that provides the cloud application capabilities that will power the next generation of cloud applications and services.
Also available in: Japanese  
Articles 04 Sep 2013
IBM Image Construction and Composition Tool: Creating Windows images for use in IBM PureApplication System
This article describes how to use the IBM Image Construction and Composition Tool to capture an image of a Windows virtual machine running on a VMware ESX hypervisor external to IBM PureApplication System. Then, after capturing the base image, you will see how you can use the tool to configure your Windows image for use in virtual system and virtual application patterns within PureApplication System.
Articles 04 Sep 2013
Comment lines: Pattern deployment lease policies for IBM Workload Deployer and IBM PureApplication System
Discover the reasons for introducing lease policies into large cloud environments. This article elaborates on one specific pattern deployment lease policy tailored for IBM PureApplication System, IBM SmartCloud Provisioning, and IBM Workload Deployer. The design and implementation described here is a proven example of building lease policies for a cloud environment.
Articles 04 Sep 2013
Scalability and elasticity for virtual application patterns in IBM PureApplication System
IBM PureApplication System is an integrated system that combines hardware resources (compute nodes, storage, and networking) with software resources, using virtualization to maximize the utilization of the system. Workloads (for example, transactional applications, web applications, or data-centric applications) are supported via the use of patterns, which offer abstract views of the software components of a solution; for example, web applications, or databases. This article describes the various options that exist in IBM PureApplication System and IBM Workload Deployer for the creation of scalable middleware deployments using virtual application patterns.
Articles 04 Sep 2013
Introducing the Liberty collective: A cloud-enabled application server management foundation
Evolutionary forces driving the IT industry toward cloud computing increase the pressure on application server management solutions to both accommodate traditional infrastructure deployments and enable cloud-based deployments. Lightweight, standards-based, flexible scalability are among the necessary hallmarks of an architecture that embraces this duality. Liberty collectives deliver next generation application server management for the IBM WebSphere Application Server Liberty profile both inside and outside the cloud.
Articles 04 Sep 2013
IBM PowerHA SystemMirror cluster migration
IBM® PowerHA® SystemMirror is an application that makes a system fault resilient and reduces downtime of applications or databases. This article helps customers to plan for and successfully accomplish cluster migration.
Articles 04 Sep 2013
Backup and recovery in IBM PureApplication System
One of the most frequently asked questions about how to "operationalize" IBM PureApplication System is how you perform backups, and what you should backup. There are essentially two things built into PureApplication System that require backup and for which it allows backup. The first is the system configuration, and the second is the contents of the customer databases that are stored on PureApplication System. This article examines the support that PureApplication System provides for both of these scenarios.
Articles 04 Sep 2013
Access Rational Team Concert with OSLC: a quick start guide
This article is a quick guide to using Open Services for Lifecycle Collaboration (OSLC) for reading and writing information to work items in IBM Rational Team Concert using Java. The examples demonstrate how to connect, retrieve, and store information in Rational Team Concert in a practical way.
Articles 03 Sep 2013
Mobile for the masses: Sign, seal, and deliver your Android app
By web logic, content is king; but for mobile users, interaction rules. Static information design is out for mobile apps, and gamification is in. This month Andrew Glover concludes his introduction to Android mobile development by adding a multiple-choice quiz feature to the example app, Overheard Word, introduced in a previous article. Then he shows you how to generate a digital signature and publish and promote your signed app on Google Play or Amazon Appstore for Android.
Also available in: Japanese  
Articles 03 Sep 2013
Java.next: Extension without inheritance, Part 3
The Java.next languages Groovy, Scala, and Clojure remedy the Java language's extension limitations in numerous ways. This Java.next installment covers the astounding extension capabilities that are available through Groovy's metaprogramming facilities.
Also available in: Japanese  
Articles 03 Sep 2013
Do I need to learn R?
R is a flexible programming language designed to facilitate exploratory data analysis, classical statistical tests, and high-level graphics. With its rich and ever-expanding library of packages, R is on the leading edge of development in statistics, data analytics, and data mining. R has proven itself a useful tool within the growing field of big data and has been integrated into several commercial packages, such as IBM SPSS and InfoSphere, as well as Mathematica. This article offers a statistician's perspective on the value of R.
Articles 03 Sep 2013
IBM Global Security Kit 7.0: Managing certificates
Explore digital security certificates, their purpose, and how to establish and manage them correctly. This white paper will employ the IBM Global Security Kit (GSKit).
Articles 03 Sep 2013
Access OSLC services from IBM Rational DOORS
This article explains how other applications can access OSLC Requirements Management V2 Services from IBM Rational DOORS. It covers the basics of services offered for creating, updating, querying requirements and Delegated UIs provided by IBM Rational DOORS as per OSLC RM V2 specification. The article assumes reader has basic understanding of OSLC.
Articles 03 Sep 2013
BPM lifecycle for ARIS models in IBM Business Process Manager V8.0, Part 1: Importing ARIS models into IBM Process Designer
This two-part article series focuses on a practical approach for a standard-based, cross-tooling, and cross-vendor business process management lifecycle that implements ARIS Event-driven Process Chains models in the IBM Business Process Manager suite, as they were created within its own repository. Part 1 describes two ways of importing process models from ARIS into IBM Process Designer via a standard BPMN2.0 import as as well as in the ARIS XML format. Part 2 shows how to merge a newly imported ARIS model version with the already extended and executed process in Process Designer.
Also available in: Chinese  
Articles 01 Sep 2013
IBM Rational Solution for Systems and Software Engineering Demo Part 4: Architecture Management
In this demonstration in the life cycle walk through we will show you the use of standards based modeling techniques to capture, analyze and design complex systems.
Demos 30 Aug 2013

1 - 100 of 17057 results | Next Show Summaries | Hide Summaries Subscribe to search results (RSS)