You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Having the appropriate storage for hosting business critical data and the proper analytic software for deep inspection of that data is becoming necessary to get deeper insights into the data so that users can categorize which data qualifies for compliance. This IBM® RedpaperTM publication explains why the storage features of IBM SpectrumTM Scale, when combined with the data analysis and categorization features of IBM StoredIQ®, provide an excellent platform for hosting unstructured business data that is subject to regulatory compliance guidelines, such as General Data Protection Regulation (GDPR). In this paper, we describe how IBM StoredIQ can be used to identify files that are stored in an IBM Spectrum ScaleTM file system that include personal information, such as phone numbers. These files can be secured in another file system partition by encrypting those files by using IBM Spectrum Scale functions. Encrypting files prevents unauthorized access to those files because only users that can access the encryption key can decrypt those files. This paper is intended for chief technology officers, solution, and security architects and systems administrators.
This IBM® Redpaper® publication is intended to facilitate the deployment and configuration of the IBM Spectrum® Scale based high-performance storage solutions for the scalable data and AI solutions on Amazon Web Services (AWS). Configuration, testing results, and tuning guidelines for running the IBM Spectrum Scale based high-performance storage solutions for the data and AI workloads on AWS are the focus areas of the paper. The LAB Validation was conducted with the Red Hat Linux nodes to IBM Spectrum Scale by using the various Amazon Elastic Compute Cloud (EC2) instances. Simultaneous workloads are simulated across multiple Amazon EC2 nodes running with Red Hat Linux to determine scalability against the IBM Spectrum Scale clustered file system. Solution architecture, configuration details, and performance tuning demonstrate how to maximize data and AI application performance with IBM Spectrum Scale on AWS.
Storage systems must provide reliable and convenient data access to all authorized users while simultaneously preventing threats coming from outside or even inside the enterprise. Security threats come in many forms, from unauthorized access to data, data tampering, denial of service, and obtaining privileged access to systems. According to the Storage Network Industry Association (SNIA), data security in the context of storage systems is responsible for safeguarding the data against theft, prevention of unauthorized disclosure of data, prevention of data tampering, and accidental corruption. This process ensures accountability, authenticity, business continuity, and regulatory compliance. S...
This IBM® RedpaperTM publication provides information about how to build, deploy, and use IBM MQ as a service. The information in this paper includes the key factors that must be considered while planning the use of IBM MQ as a service. Through descriptions and examples, this paper explains how to apply as a service methodologies to an IBM MQ environment, and describes techniques and preferred practices for integrating IBM MQ into a self-service portal. This paper explains how to create and use an IBM MQ as a service self-service menu for a portal. It includes examples that show how to use an IBM MQ as a service catalog. This paper describes options and techniques for deploying IBM MQ as a ...
Chapter 1: Introduction -- Chapter 2: Infrastructure as a Service -- Chapter 3: Platform as a Service -- Chapter 4: Application as a Service -- Chapter 5: Paradigms for Developing Cloud Applications -- Chapter 6: Addressing the Cloud Challenges -- Chapter 7: Security -- Chapter 8: Managing the Cloud Infrastructure -- Chapter 9: Related Technologies -- Chapter 10: Future trends and Research Directions.
This IBM® Redbooks® publication provides an example approach for an agile IT team to implement DevOps capabilities in their software delivery of a Java application. We introduce several tools that show how teams can achieve transparency, traceability, and automation in their application lifecycle to all of the stakeholders to deliver a high-quality application that meets its initial requirements. The application that is built highlights the composable and dynamic nature of the Liberty run time. The Liberty run time helps developers to get their applications up and running quickly by using only the programming model features that are required for their applications. The target audience for this book is IT developers, IT managers, IT architects, project managers, test managers, test developers, operations managers, and operations developers.
This IBM® RedpaperTM publication takes you on a journey that surveys cloud computing to answer several fundamental questions about storage cloud technology. What are storage clouds? How can a storage cloud help solve your current and future data storage business requirements? What can IBM do to help you implement a storage cloud solution that addresses these needs? This paper shows how IBM storage clouds use the extensive cloud computing experience, services, proven technologies, and products of IBM to support a smart storage cloud solution designed for your storage optimization efforts. Clients face many common storage challenges and some have variations that make them unique. It describes...
Dhirendra Jha's deeply researched history places Nathuram Godse's life as the juncture of the dangerous fault lines in contemporary India: the quest for independence and the rise of Hindu nationalism. On a wintry Delhi evening on 30 January 1948, Nathuram Godse shot Gandhi at point-blank range, forever silencing the man who had delivered independence to his nation. Godse's journey to this moment of international notoriety from small towns in western India is, by turns, both riveting and wrenching. Drawing from previously unpublished archival material, Jha challenges the standard account of Gandhi's assassination, and offers a stunning view on the making of independent India. Born to Brahmin ...
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.
The book Indian English Drama: Themes & Techniques is a volume of research articles on contemporary Indian dramatists and their works starting from Rabindranath Tagore to nearly all present generation of dramatists like Girish Karnad, Vijay Tendulkar, Mahesh Dattani, Badal Sirkar, Habib Tanvir, Utpal Dutt, Mahasweta Devi, Usha Ganguli, Manjula Padmanabhan, Mahesh Elkunchwar and Manoj Mitra. The book will be helpful in giving critical insight to understand the art and vision of contemporary Indian dramatists both from thematic and technical points of view. The introductory chapter of the book is very resourceful to understand the growth and development of Indian English drama. Authors have presented their critical viewpoints on almost every aspect of dramatic arts, themes and techniques pertaining to Indian playwrights and their works. The book will give many ground breaking concepts and ideas on Indian English drama and is useful for both researchers and learners.