![]() |
Restore IBM Cloud Code Engine projects |
Showing posts with label best practices. Show all posts
Showing posts with label best practices. Show all posts
Wednesday, April 3, 2024
Follow-up on resource reclamation: Search resources and Code Engine commands
Thursday, January 25, 2024
Tutorial on cloud end-to-end security - an overview
![]() |
Cloud solution architecture |
Recently, my team updated our tutorial on applying end-to-end security to a cloud application. The tutorial features a typical app with an attached NoSQL database and object storage. Moreover, it leverages other services for increased security and to provide observability. Even better, all components can be automatically deployed, including a Tekton-based delivery pipeline. In this blog post, I am going to provide an overview and discuss some implementation details.
Monday, April 25, 2022
Best practices for successful support cases
![]() |
Successful support cases |
Labels:
administration,
best practices,
beta,
documentation,
IBM,
ibmcloud,
informix,
IT,
Oracle,
support,
Upgrade
Friday, February 19, 2021
Great chatbots in no time
![]() |
Chatbots take over customer service |
Tuesday, April 14, 2020
Home office and rubber duck debugging, 5 levels
![]() |
Rubber duck debugging at home |
Wednesday, April 8, 2020
Key Protect as vault for multi-cloud setup
![]() |
Guard credentials in a vault |
Tuesday, March 24, 2020
My best practices for 2FA and FIDO2 security keys
![]() |
Some of my FIDO2 security keys |
Wednesday, March 18, 2020
My best practices for home office - Corona edition
![]() |
Take some rest |
Friday, February 8, 2019
Startup lessons from a Fuckup Night
Last Wednesday, I attended the Fuckup Night Friedrichshafen Vol. II. If you don't know, Fuckup Nights is a global movement and event series dedicated to professional failures. That is, usually founders of failed startups tell their stories. Typically, it is a mix of funny adventures into the world of business, some sad parts and most importantly some lessons learned. So what were the lessons I took away? Read on...
Friday, July 13, 2018
How to: Enable Let's Encrypt SSL wildcard certificates for your IBM Cloud apps
![]() |
Private data - secured |
Wednesday, June 13, 2018
Securing your Python app with OpenID Connect (OIDC)
![]() |
Authorized access only using OpenID Connect |
Labels:
administration,
analytics,
applications,
best practices,
cloud,
cloudfoundry,
DB2,
IBM,
IT,
Python,
security
Thursday, May 24, 2018
How to pack serverless Python actions
![]() |
Serverless access to Db2 and GitHub |
Friday, April 13, 2018
IBM Cloud and Watson security questionnaires

The three available security documents cover IBM Cloud Infrastructure (IaaS), IBM Cloud Platform (PaaS), and the IBM Watson Services with their cognitive / AI capabilities. Using the provided material, you can learn about application security, audits, compliance, how business continuity and operational resilience are handled, procedures for change control, data and data center security, IAM (identify and access management) and much more. The answers include many links to references, documentation and other valuable information. Just for that it is worth going over the security questionnaires for IBM Cloud.
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter (@data_henrik) or LinkedIn.
Tuesday, February 27, 2018
Security Details: Serverless database access within IBM Watson Conversation service
![]() |
Slackbot Architecture |
Tuesday, February 6, 2018
Chatbots: Some tricks with slots in IBM Watson Conversation

Slots
With my chatbot interface to Db2 I want to both query the database and insert new records. Thus, I need to collect input data of various kind. The Conversation service has a neat feature named input slots that simplifies that process. Within a dialog node (a logical step within the chat flow) I can specify a list of items the Conversation service should check for. I can tell in which variable to save that input and what question to ask if that data was not provided yet. Optional slots, i.e., optional data, can be enabled.Tuesday, August 15, 2017
Secure Your Db2 Data Base - Using Trusted Contexts
![]() |
Db2 Security - Trusted Context |
Wednesday, August 9, 2017
Introduction to Cloud App Security - Part 1
![]() |
Security for Cloud Apps |
Note that this is part 1 of 2. Part 2 is linked at the bottom.
Labels:
applications,
best practices,
bluemix,
cloud,
cloudfoundry,
encryption,
IBM,
ibmcloud,
IT,
security
Introduction to Cloud App Security - Part 2
(This is a continuation from part 1 of this introduction to Cloud App Security.)
Providing a secure app or application is a fundamental requirement. This is especially true in a cloud environment. In my post about “Securing Workloads on the IBM Cloud” I discussed the various layers that realize secure cloud computing. Today, I want to focus solely on apps that are built for deployment in the IBM Cloud. What makes up a secure app? What cloud services help establishing app security? Let’s take a look together.
App Security Services
To focus on the application logic, the functionality and business side, developers can delegate or “outsource” some of security tasks. Here is a non-exhaustive list of services that the IBM Cloud with the Bluemix platform provides. I am going to use the list of security topics from above:
Labels:
applications,
best practices,
bluemix,
cloud,
encryption,
IBM,
ibmcloud,
IT,
security
Friday, July 7, 2017
Best practices for lively chatbots
![]() |
TJBot as lively chatbot |
Introduction
I started my series on chatbots with lessons and tips from a chatbot hackathon.
In that blog I focused on general aspects of building dialogs and
designing a conversation system. The language needs to fit the audience.
It is something we will look at again today. In a recent blog post I
shared tips and tricks for building chatbots.
It is possible to carry context throughout a conversation and embed
conditions and advanced expressions into the dialog flow and single
reponses. We will use that to implement some of the best practices found
below. Building lively chatbots could also mean to give the bot a face.
The open source project TJBot
(pictured) is an example for that. The TJBot can listen, speak and see,
give additional feedback and interact through its arm and its light. We
won’t cover those aspects, e.g., hardware design or user interfaces, in
this blog entry.
Monday, June 26, 2017
More Tips and Tricks for Building Chatbots
![]() |
Chatbot Architecture |
Subscribe to:
Posts (Atom)