(Henrik Loeser) Two years back, I had created two blog articles providing an introduction to cloud app security with an overview of topics, then discussing details on how to implement those security requirements with (then) Bluemix services.
This week, host Al Martin chats with Kent Collins, the solutions architect at BNSF Railway Inc. Al just did a panel with Kent in June at IDUG North America 2019, one of the premiere Db2 conferences.
(Leif Pedersen) In a series of blogs, written by Aymeric Affouard, Guillaume Arnould, Khadija Souissi and Leif Pedersen, we will provide our point of view of where the directions of Analytics are going and if IBM z has a role for Analytics in the future.
(Henrik Loeser) Recently, I blogged about tracking account activity from the command line. I showed you how to search IBM Cloud Activity Tracker with LogDNA records using a Python script.
(Letha Wicker) What differentiates IBM Planning Analytics from other planning solutions? Quite a lot, actually. But today I’d like to focus on the practical, real-world benefits of just two key functions: data analysis and reporting.
(Jim Wankowski) The idea of the traditional data center being centered on relational database technology is quickly evolving.
(Gayathiri Chandran) With many high-profile data security breaches, data encryption has become a focus item up to the CIO and CEO levels.
(VishDev2018) This article explains the steps for installing the VS Code Extension for DB2 and explains features available in the extension.
(Henrik Loeser) Over my past blog posts I have looked into how to rotate credentials in different compute environments. I looked at Cloud Foundry on IBM Cloud, Cloud Functions and Kubernetes.
(Rafael Victoria-Pereira) The prospect of “killing” those error-prone, problem-magnet Open Query File operations sounds nice, doesn’t it?