Welcome to the IBM TechXchange Community, a place to collaborate, share knowledge, & support one another in everyday challenges. Connect with your fellow members through forums, blogs, files, & face-to-face networking.
Join / sign up
The definition of “API” (Application Programming Interface) has changed yet again! In January 2018 I wrote “ What is an API? And What is the API Economy? ”, introducing a new definition for API. That definition while still true has become incomplete. But I’ve jumped ahead. So, let’s...
In part 1 of this series, “ Good Integration Patterns Never Die – You Just Add More ”, I described several challenges and identified a set of integration capabilities that solved these challenges. Toward the end of the article, this question was posed: …we identified the following...
IT history can be told as a story of overcoming challenges. A constraint limits IT capability (e.g. processor speed, memory, storage, network, etc.) and then there is a step forward in IT technology to break through the constraint and move forward. Until we hit the next constraint. Then –...
Speakers: James Wilson - Head of Aspera Engineering & Operations Jay Migliaccio - Offering Manager Aspera has a long history of providing solutions on cloud platforms. We have embraced and adopted new cloud technologies. As you modernize your infrastructure to the latest cloud native...
Aspera on Cloud now allows you to bring your own key to enable server-side encryption-at-rest for your content in all major cloud storage platforms. You can now integrate your IBM Key Protect key-management service (KMS) to protect your content in the Microsoft Azure and Google Cloud Storage...
Managing your Aspera on Cloud subscription just got easier with the "Subscription Management" page. This summarizes the features and volume allowances of your AoC plan. Depending on your AoC edition, you can also view historical and current monthly usage. You can track and monitor usage across 4...
Forensic watermarking protects the interests of content creators and copyright holders to detect illegal use and distribution of digital work and to identify people who engage in it. A forensic watermark can alert honest users when they have received illegitimate documents or programs. You...