Search

1 to 10 of 12
Sort by


Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image


Blog Entry
View IBM Redbooks about SAP on IBM Power - published in 2020

The following Redbooks for SAP related topics have been published by different IBM teams (OM, Storage and SAP HANA on Power) in 2020 till Dec 15th: SUSE and IBM Power Systems for SAP HANA IBM Power Systems H922 and H924 Technical Overview and Introduction IBM Power Systems Planning and...

Wera Stoeckel's profile image

Blog Entry
Cloud and Cloud-Native Security (Part 1): Security Advantages of Container Orchestration Platforms

It’s safe to say that many long-time IBM Aspera customers look at our transport technology as more than just the fastest way to move data over commodity IP networks. Security is in our DNA, as the fasp (Fast Adaptive Secure Protocol) implies. From the lowest level, Aspera ensures the...

James Wilson's profile image

Library Entry
Featured Presentation from IBM VP & CTO Sridhar Muppidi: Continuous Security for Hybrid Multicloud

Organizations must adopt the cloud to drive digital transformation but this presents some new challenges and concerns for IT leaders, that must operate and maintain business as usual, even with more complex, hybrid and multi-cloud environments. Take a look at this presentation and learn how to...

Continuous Security for Hybrid Multi Cloud.pptx


Library Entry
Webex on Security Hardening - How to lock down DataPower so that it is secure from hacking

Here are the WebEx Recording and the Presentation from the Webex on Security Hardening - How to lock down DataPower so that it is secure from hacking presentation. #security #DataPowerGateways

2 attachments


Library Entry
Hiding sections of the user interface

This details how to customize headers with corporate colors and logos A best practice of User Interface (UI) design is to show only the information that a end user requires Showing only the information that your users care about can greatly increase their productivity and reduce your support...

Pam Denny's profile image

Blog Entry
Federated Learning - Part 2

1. Introduction In the first of our blog series on federated learning in partnership with IBM Research, we wrote about the mechanism for federated learning as well as the technology behind the paper that won the Best Paper Award 2019 at AISec 2019. It is very helpful to start with that blog...

NATHALIE BARACALDO's profile image