If you read some of my earlier blog posts, you know that I automated the setup (onboarding) for workshops and hackathons. Thus far, running my Terraform scripts to deploy resources and privileges meant allowing access to them. Thanks to a (relatively) new IBM Cloud security feature called time-based restrictions, I can decouple the deployment process […]
Category Archives: Blog
Starting today, Amazon Route 53 Resolver is now available on AWS Outposts rack, providing your on-premises services and applications with local DNS resolution directly from Outposts. Local Route 53 Resolver endpoints also enable DNS resolution between Outposts and your on-premises DNS server. Route 53 Resolver on Outposts helps to improve your on-premises applications availability and […]
When businesses need industry-leading performance scalability and reliability for their SAP ERP landscape, they turn to IBM® Power® for their compute infrastructure. I can pull a list of benchmarks that highlight why over 4,500 customers run SAP HANA on Power—highest SAP-certified memory scalability, leadership in SAPS performance benchmarks, ranked most reliable among SAP-certified infrastructure platforms, […]
The digital economy, powered by sophisticated technologies like the Internet, mobile devices, cloud computing, and more, is experiencing a substantial shift due to the emergence of Artificial Intelligence (AI). These digital technologies have fueled the inception and growth of numerous economic activities. AI, with its capacity to analyze vast data sets, automate complex tasks, and […]
In the context of cloud computing, fostering a positive home-school relationship remains as crucial as ever for your child’s educational success. Just as cloud computing relies on collaboration and interconnectedness, children learn best when the significant adults in their lives, including parents and teachers, work together to encourage and support them in their educational journey. […]
This blog post is part of the “All You Need to Know About Red Teaming” series by the IBM Security Randori team. The Randori platform combines attack surface management (ASM) and continuous automated red teaming (CART) to improve your security posture. “No battle plan survives contact with the enemy,” wrote military theorist, Helmuth von Moltke, […]
July 19, 2023: Post updated with an animated image to show Amazon CodeWhisperer in action. In the few months since Amazon CodeWhisperer became generally available, many customers have used it to simplify and streamline the way they develop software. CodeWhisperer uses generative AI powered by a foundational model to understand the semantics and context of your […]
The exponential leap in generative AI is already transforming many industries: optimizing workflows, helping human teams focus on value added tasks and accelerating time to market. Life sciences industry is beginning to take notice and aims to leapfrog the technological advances. Life sciences industry has—for decades now—moved from the traditional discovery-based drug development to target […]
In this blog post, we explore the practical implementation of utilizing Terraform on IBM Cloud to create and manage secrets by seamlessly integrating your IBM Cloud Kubernetes Service with IBM Cloud Secrets Manager. Previously, this functionality to manage TLS and non-TLS certificates and secrets was primarily accessed through the CLI using the namespace ibmcloud ks […]
Application security testing, or AST, is a crucial component of software development. It involves the use of techniques and tools to identify, analyze and mitigate potential vulnerabilities in an application. The goal of AST is to ensure that an application is robust enough to withstand any potential security threats and that it performs its intended […]