If you came here and wondered about the blog title, then read on. I plan to write about a couple of mixed, seemingly random topics. Why not express that in today's blog title...? :) It is almost end of the year and here is some news I wanted to share with you before the holidays.
Henrik's thoughts on life in IT, data and information management, cloud computing, cognitive computing, covering IBM Db2, IBM Cloud, Watson, Amazon Web Services, Microsoft Azure and more.
Thursday, December 12, 2019
Friday, November 29, 2019
New Db2 Fix Packs and Mod Packs available
A quick update: Over the past few days, new fix packs and mod packs for Db2 became available. The page "Download DB2 Fix Packs by Version" lists Db2 11.1.4.5 as the most recent fix pack. The related Mod Pack and Fix Pack Updates page in the Db2 Knowledge Center for version 11.1 has details.
Although the overview page lists Db2 11.5 GA as most recent, the page Mod Pack and Fix Pack Updates for 11.5 reveals new container-only Db2 Mod Pack releases.
Although the overview page lists Db2 11.5 GA as most recent, the page Mod Pack and Fix Pack Updates for 11.5 reveals new container-only Db2 Mod Pack releases.
Tuesday, November 26, 2019
ETL in the cloud using SQL Query and Db2
From COS to Db2 using SQL |
Thursday, November 7, 2019
Control your database encryption keys for Db2 on Cloud
Db2 master key managed by IBM Cloud Key Protect |
Friday, October 18, 2019
My passwordless app on IBM Cloud thanks to FIDO2
Passwordless login for cloud app |
Monday, October 7, 2019
Quick notes on using FIDO2 security keys on Linux
Using FIDO2 keys for 2FA |
Using your FIDO2 key for 2FA on IBM Cloud apps
Architecture: End-to-end security |
Friday, October 4, 2019
New tutorial discuss how to enhance cloud app security
Recently, I wrote a new tutorial as part of the IBM Cloud solution tutorials. Have you already developed and deployed an application on IBM Cloud? Then, may be, you followed the introductory tutorial on how to apply end-to-end security to an application. Following "security by design," you are now starting to look into the
design of a new application, or perhaps you need to adapt an older
application to new security requirements. If that is the case, the new tutorial on how to enhance the security of your deployed application is exactly right for you.
In the new tutorial, you'll learn how you can isolate runtime environments, network traffic, and stored data to increase application security. Some options include the use of dedicated resources or virtual private clouds.
In the new tutorial, you learn how to control and even bring your own encryption keys. You also find out about the LinuxONE-based Hyper Protect services on IBM Cloud. They provide an extra layer of protection and the highest level of isolation.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
An existing solution is extended for enhanced security |
Isolate resources
One of the fundamental principles of cloud computing is the sharing of resources. This could be the sharing of a machine—applications from many users running on the same computer—or just sharing the data center and parts of the infrastructure.In the new tutorial, you'll learn how you can isolate runtime environments, network traffic, and stored data to increase application security. Some options include the use of dedicated resources or virtual private clouds.
Hyper-protect your data
Almost all services on IBM Cloud that store data use encryption to protect the data against unauthorized access. When using database services or object storage, by default, the encryption key is system-generated. You can increase data protection by controlling the encryption keys. IBM Key Protect and Hyper Protect Crypto Services help you provision encrypted keys for storage services as well as apps.In the new tutorial, you learn how to control and even bring your own encryption keys. You also find out about the LinuxONE-based Hyper Protect services on IBM Cloud. They provide an extra layer of protection and the highest level of isolation.
Evaluate and monitor app security
Events related to IBM Cloud account activities—such as logging in or provisioning a service—are logged to Activity Tracker with LogDNA. In the tutorial, you learn how to enhance your app to send security or audit messages and integrate them across the stack. Use security advisors and set up notifications to stay ahead and informed.Get started with the tutorial
The tutorial on how to enhance security of your deployed application is part of the IBM Cloud solution tutorials. It helps you learn about enhanced data encryption options, isolate your application runtime for extended security, and use activity logs and security advisors to evaluate app security.If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Wednesday, October 2, 2019
Trip report: Sustainability management and reporting
Last Friday, I attended the annual conference of the Bodensee Innovation Cluster for digital change (changes due to digitalization). The conference had several interesting talks and included workshops. Let me give you a quick overview of the innovation cluster, then delve into the sustainability topic which was part of the conference.
Friday, August 30, 2019
Updated: Cloud App Security - an introduction
IBM Cloud offers security services |
Happy reading! If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Monday, August 19, 2019
Track API key usage by combining IBM Cloud IAM and LogDNA search
Which key is still in use...? |
Offboarding on IBM Cloud: Considerations when removing a user
Only authorized persons have access |
Monday, August 12, 2019
Get some REST with Db2
Db2 has a REST API |
Labels:
applications,
bluemix,
cloud,
Conference,
DB2,
developer,
IBM,
ibmcloud,
idug,
IT,
performance
Wednesday, August 7, 2019
Track it from the command line: Search audit events in LogDNA using Python
Take a look at security logs |
Thursday, August 1, 2019
Use a Delivery Pipeline to rotate credentials
Job in Delivery Pipeline to rotate keys |
Thursday, July 18, 2019
Rotate service credentials for Cloud Foundry apps on IBM Cloud
Keep your cloud environment secure |
Wednesday, July 17, 2019
Rotating service credentials for IBM Cloud Functions
Keep your service keys secret |
Friday, June 28, 2019
New! Db2 11.5 is available
Db2 11.5 is available |
With a new release I typically go over the What's changed documentation to look for changes to registry variables, system views and deprecated functionality.
So much for the quick update. If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Wednesday, June 12, 2019
After IDUG is before IDUG: Back from Db2 conference in Charlotte, NC
Last week the IDUG NA 2019 was held in Charlotte, NC. It featured 8 parallel tracks dedicated to Db2 for z/OS and Db2 for LUW and emerging technologies. In addition, two tracks for hands-on labs and workshops were offered. Personally, I delivered three presentations, moderated and attended sessions, and was active on Twitter. So what was on? Continue after the snap of Twitter photos from last week.
Twitter photo feed from IDUG NA 2019 |
Tuesday, May 7, 2019
Cloud-based FIPS 140-2 Level 4 crypto service
Locks, keys, and data security |
Friday, May 3, 2019
Your chatbot with Watson Discovery News
Some months back I introduced you to a barebone news chatbot. Today, with the updated tutorial to build a database-driven chatbot in place, I want to show you how to easily combine Watson Assistant with Watson Discovery. Watson Assistant already provides steps to deploy an integrated search skill which is based on Watson Discovery. My approach is similar to the database integration: Deploy a cloud function and invoke it from the dialog.
Saturday, April 27, 2019
Db2: SQL-based explain and printed acccess plan
Vote for this Db2 idea |
Wednesday, April 24, 2019
Updated tutorial: Database-driven chatbot
If you want to build a chatbot that gets its content from a database, there is a good news. The existing tutorial “Build a database-driven Slackbot”
was just updated to adapt to latest features of IBM Watson Assistant.
First, define a skill that reaches out to a database service like Db2.
Thereafter, use the built-in integrations to easily tie in the assistant
with Slack, Facebook Messenger, embed the chatbot into your
own application or use the WordPress plugin.
Architecture of database-driven chatbot |
Labels:
chatbot,
cloud,
data in action,
database,
DB2,
IBM,
postgresql,
tutorial,
watson
Monday, March 25, 2019
Running Db2 Developer-C as Docker container
Container: Db2 the easy way |
Db2 Developer-C Edition as Docker Image
IBM provides a free Db2 edition, Db2 Developer-C Edition. It can be installed and used as Docker container, see here the Db2 Developer-C Edition in the Docker store. Once you have added it to your basket and checked out, you can download it and get information about how to configure it. Basically, only few values need to be set in an environment file (see db2_env_list below).After adapting the environment file, I invoke the script (with a single command) to run Db2 on docker. If not downloaded yet, it obtains the container image, starts it, sets it up:
docker run -h db2server_ --name db2server --detach \
--privileged=true \
-p 50000:50000 -p 55000:55000 \
--env-file db2_env_list \
-v /home/hloeser/progs/db2:/database \
store/ibmcorp/db2_developer_c:11.1.4.4-x86_64
Thereafter, I can connect to Db2 using the usual tools and SDKs.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Monday, February 25, 2019
Digital ethics, trusted AI and IBM
Last week I gave a talk followed by a discussion at a university. The presentation was about the current state of Artificial Intelligence (AI) and AI research topics. A good chunk of the discussion was dedicated to fairness, trust and digital ethics. In the following, I am sharing some of the related links.
IBM Research has a site dedicated to AI. On that, a section provides insight into topics on what they call Trusted AI. On the main IBM site is also a portal Trusted AI for Business, providing an introduction and overview for the non-research crowd. If you are interested and want to try out and learn about few problems hands-on, I recommend these links:
Finally, as a showcase of current AI capabilities, I recommend this video of IBM Project Debater and the live debate at Think 2019. A short video explains how Project Debater works:
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
IBM Research has a site dedicated to AI. On that, a section provides insight into topics on what they call Trusted AI. On the main IBM site is also a portal Trusted AI for Business, providing an introduction and overview for the non-research crowd. If you are interested and want to try out and learn about few problems hands-on, I recommend these links:
- AI Fairness 360 Open Source Toolkit: http://aif360.mybluemix.net/
- Detect the bias - a game and survey: http://biasreduction.mybluemix.net/
- Old, but still great: MIT Moral Machine: http://moralmachine.mit.edu/
Finally, as a showcase of current AI capabilities, I recommend this video of IBM Project Debater and the live debate at Think 2019. A short video explains how Project Debater works:
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Friday, February 8, 2019
Startup lessons from a Fuckup Night
Last Wednesday, I attended the Fuckup Night Friedrichshafen Vol. II. If you don't know, Fuckup Nights is a global movement and event series dedicated to professional failures. That is, usually founders of failed startups tell their stories. Typically, it is a mix of funny adventures into the world of business, some sad parts and most importantly some lessons learned. So what were the lessons I took away? Read on...
Thursday, January 31, 2019
Enterprise digitalization and cybersecurity: How companies struggle
Cybersecurity Workshop at Zeppelin University |
Last Friday, 25.01.2019, I attended the Cybersecurity workshop of the "Bodensee Innovationscluster Digitaler Wandel" (digitalization). The innovation cluster is organized by the Zeppelin University in Friedrichshafen. It tries to bring together companies from the wider Lake Constance region that are impacted by digitalization. The researchers have identified four topics that will be addressed:
Monday, January 21, 2019
Hello again, Davos, AI ethics, cybersecurity, Db2 events and IBM Cloud
Hello, here I am again after a while. I hope you had a good start into 2019. I enjoyed being offline for a while, then got busy with not much time to blog. So, here is a roundup of things going on.
Subscribe to:
Posts (Atom)