NoSQL is a lie
The document discusses different types of NoSQL databases like key-value, document, column, and graph databases. It explains the CAP theorem and tradeoffs between consistency, availability, and partition tolerance. Popular databases of each type are also mentioned, along with why each type may be used and what we've learned about NoSQL databases.
Build cognitive Apps that help enhance, scale and accelerate Human ExpertiseNiklas Heidloff
Sessions at http://developerworld.heise.de / March 2015
IBM Watson represents a bold new partnership between people and computers that enhances, scales, and accelerates human expertise. Watson provides various cognitive services that can be integrated via REST APIs in your own apps, for example user modeling, questions and answers, speech recognition, concept expansion and much more. Attend this session to learn about the cognitive Watson services available on IBM Bluemix, IBM's Platform as a Service. With Bluemix developers can focus on writing code rather than setting up infrastructure and they can mix various services into their applications. In this session you'll see a live demo how to build apps leveraging these cognitive capabilities.
Do you want your administration day even easier? Are you aware of the free code snippets, tools and products you could be using in your arsenal? This session will fly through as many of them as we can in sixty minutes. Screenshots, demos and a nice bundled list of where to get them all. Just in case we can't fit them all in!
Examples are Domino server console shortcuts, Sametime buddylist management, LDAP verification, improved search tools within your Notes client and even more. I don't want to give all the hints away here.
Build cognitive Apps that help enhance, scale and accelerate Human ExpertiseNiklas Heidloff
Sessions at http://developerworld.heise.de / March 2015
IBM Watson represents a bold new partnership between people and computers that enhances, scales, and accelerates human expertise. Watson provides various cognitive services that can be integrated via REST APIs in your own apps, for example user modeling, questions and answers, speech recognition, concept expansion and much more. Attend this session to learn about the cognitive Watson services available on IBM Bluemix, IBM's Platform as a Service. With Bluemix developers can focus on writing code rather than setting up infrastructure and they can mix various services into their applications. In this session you'll see a live demo how to build apps leveraging these cognitive capabilities.
Do you want your administration day even easier? Are you aware of the free code snippets, tools and products you could be using in your arsenal? This session will fly through as many of them as we can in sixty minutes. Screenshots, demos and a nice bundled list of where to get them all. Just in case we can't fit them all in!
Examples are Domino server console shortcuts, Sametime buddylist management, LDAP verification, improved search tools within your Notes client and even more. I don't want to give all the hints away here.
Managing integration in a multi cluster world. Webinar recording link:
https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=linkedInShareFromReg&ms=1589488744528&eventid=2224596&sessionid=1&key=3ECE7F975C7141D20CAC88BAB409A245®Tag=&sourcepage=register
4515 Modernize your CICS applications for Mobile and Cloudnick_garrod
InterConnect 2015 session 4515 Modernize your CICS applications for Mobile and Cloud. There’s a lot more to mobile than JSON and REST and this session will take you on a tour of what else is needed to ensure a smooth ride when building, testing, and deploying CICS mobile workloads. Whether identifying mobile entry points, managing frequent configuration changes, planning and validating performance, or enabling mobile applications for world-wide usage, IBM z/OS Tools help all DevOps roles. You’ll also learn how the same tools can also help you to use the CICS cloud to meet the need for speed of mobile apps.
Integrate Application Security Testing into your SDLCIBM Security
Considering security early in the development stage is good and valuable, running security tests during the development life cycle is better, integrating that testing into your build system is the best approach.
Cloud and Software as a Service (SaaS) can make a huge impact on a business. Unfortunately, most start the evaluation of SaaS from an IT perspective and traditional data center advantages (i.e. on-premises costs, staffing and savings). While savings are important, cloud is about agility and speed. For these reasons, line-of-business (LOB) leaders have been more interested in SaaS solutions. Learn how Cognos Business Intelligence on Cloud and IBM dashdb make it simple to get started with collaboration, reporting and analytics.
Scalable, Available and Reliable Cloud Applications with PaaS and MicroservicesDavid Currie
Presentation given at AtTheFrontend.dk on 27 May 2015 covering an introduction to microservices and how Platform-as-a-Service helps with many of the challenges deploying microservices. Example supporting technologies include Bluemix / Cloud Foundry, Docker and Netflix OSS.
IBM Collaboration Solutions Application Development - Frequently Asked QuestionsNiklas Heidloff
IBM Collaboration Solutions Application Development: Frequently Asked Questions
Entwicklercamp, Closing Session, 19.03.2014
http://www.entwicklercamp.de/EC14/Track0Session6
Niklas Heidloff, IBM
IBM Collaboration Solutions App Dev Community Advocate
OpenNTF Director and Technical Committee Chair
@nheidloff / heidloff.net
We find ourselves in the most global and unpredictable economy in history. Customer expectations turn on a dime, and competitors emerge from the most unexpected places. Success depends on our ability to quickly form teams that can operate with agility that are empowered to make the right decisions.
Today’s teams need to collaborate across business units and timezones, quickly find and share relevant information, understand what their teammates are working on and minimize the constant distractions from tools, meetings, and co-workers. Join us to see how IBM is using a lean approach combined with Design Thinking to team with our users to solve this problem to take teamwork to the next level.
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
View On Demand Webinar: https://securityintelligence.com/events/life-on-the-endpoint-edge-winning-the-battle-against-cyber-attacks/
The perimeter – the boundary that encloses what you need to protect – was once a fixed value. Now your perimeter is wherever your endpoints are—from on-site servers at your headquarters, to employee devices connecting remotely around the globe. That picture is further complicated by the increasing types of devices that comprise your perimeter: point-of-sale systems (POS), ATMs, remote servers and even that ‘yet-to-be-invented device’ (that your boss will probably want on your network the week it’s released).
With cyber-attacks and vulnerabilities increasing in number and sophistication, how do you ensure endpoints in your organization are immunized against a potential breach while dealing with reduced budgets and limited resources?
View this on-demand webinar to learn about the state of endpoint security and how it is evolving to keep pace with attackers looking to exploit any gap in your perimeter.
Connecting Devices to the IBM IoT via MQTT - Session 1231 @IBMInsight2015Markus Van Kempen
This session explains how to connect any devices to the IBM IoT Cloud. It shows how to collect the device sensor information and visualize the data using IBM Bluemix. It demonstrates the tools in Bluemix via nodes.js to issue commands via the IoT Cloud to the device. For example, you might set the temperature on your Google Nest smart thermostat via IoT or change the color of the screen on your phone. We connect the International Space Station to IOT and display the location via real time insights ....
Managing integration in a multi cluster world. Webinar recording link:
https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=linkedInShareFromReg&ms=1589488744528&eventid=2224596&sessionid=1&key=3ECE7F975C7141D20CAC88BAB409A245®Tag=&sourcepage=register
4515 Modernize your CICS applications for Mobile and Cloudnick_garrod
InterConnect 2015 session 4515 Modernize your CICS applications for Mobile and Cloud. There’s a lot more to mobile than JSON and REST and this session will take you on a tour of what else is needed to ensure a smooth ride when building, testing, and deploying CICS mobile workloads. Whether identifying mobile entry points, managing frequent configuration changes, planning and validating performance, or enabling mobile applications for world-wide usage, IBM z/OS Tools help all DevOps roles. You’ll also learn how the same tools can also help you to use the CICS cloud to meet the need for speed of mobile apps.
Integrate Application Security Testing into your SDLCIBM Security
Considering security early in the development stage is good and valuable, running security tests during the development life cycle is better, integrating that testing into your build system is the best approach.
Cloud and Software as a Service (SaaS) can make a huge impact on a business. Unfortunately, most start the evaluation of SaaS from an IT perspective and traditional data center advantages (i.e. on-premises costs, staffing and savings). While savings are important, cloud is about agility and speed. For these reasons, line-of-business (LOB) leaders have been more interested in SaaS solutions. Learn how Cognos Business Intelligence on Cloud and IBM dashdb make it simple to get started with collaboration, reporting and analytics.
Scalable, Available and Reliable Cloud Applications with PaaS and MicroservicesDavid Currie
Presentation given at AtTheFrontend.dk on 27 May 2015 covering an introduction to microservices and how Platform-as-a-Service helps with many of the challenges deploying microservices. Example supporting technologies include Bluemix / Cloud Foundry, Docker and Netflix OSS.
IBM Collaboration Solutions Application Development - Frequently Asked QuestionsNiklas Heidloff
IBM Collaboration Solutions Application Development: Frequently Asked Questions
Entwicklercamp, Closing Session, 19.03.2014
http://www.entwicklercamp.de/EC14/Track0Session6
Niklas Heidloff, IBM
IBM Collaboration Solutions App Dev Community Advocate
OpenNTF Director and Technical Committee Chair
@nheidloff / heidloff.net
We find ourselves in the most global and unpredictable economy in history. Customer expectations turn on a dime, and competitors emerge from the most unexpected places. Success depends on our ability to quickly form teams that can operate with agility that are empowered to make the right decisions.
Today’s teams need to collaborate across business units and timezones, quickly find and share relevant information, understand what their teammates are working on and minimize the constant distractions from tools, meetings, and co-workers. Join us to see how IBM is using a lean approach combined with Design Thinking to team with our users to solve this problem to take teamwork to the next level.
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
View On Demand Webinar: https://securityintelligence.com/events/life-on-the-endpoint-edge-winning-the-battle-against-cyber-attacks/
The perimeter – the boundary that encloses what you need to protect – was once a fixed value. Now your perimeter is wherever your endpoints are—from on-site servers at your headquarters, to employee devices connecting remotely around the globe. That picture is further complicated by the increasing types of devices that comprise your perimeter: point-of-sale systems (POS), ATMs, remote servers and even that ‘yet-to-be-invented device’ (that your boss will probably want on your network the week it’s released).
With cyber-attacks and vulnerabilities increasing in number and sophistication, how do you ensure endpoints in your organization are immunized against a potential breach while dealing with reduced budgets and limited resources?
View this on-demand webinar to learn about the state of endpoint security and how it is evolving to keep pace with attackers looking to exploit any gap in your perimeter.
Connecting Devices to the IBM IoT via MQTT - Session 1231 @IBMInsight2015Markus Van Kempen
This session explains how to connect any devices to the IBM IoT Cloud. It shows how to collect the device sensor information and visualize the data using IBM Bluemix. It demonstrates the tools in Bluemix via nodes.js to issue commands via the IoT Cloud to the device. For example, you might set the temperature on your Google Nest smart thermostat via IoT or change the color of the screen on your phone. We connect the International Space Station to IOT and display the location via real time insights ....