Blog-on-Digital-Transformation

Technical Introduction to Hyperledger ...

April 12, 2016 | 4 Comments | Roger Strukhoff...
Why Hyperledger and not Ethereum? How to deploy an app and chaincode with Hyperledger Fabric? How does peer discovery work? Learn in this post.

How to Use Elastic Services for Anomaly Detection on IBM ...

April 11, 2016 | 0 Comments | Leandro Costantini
From the tutorial, you will learn how to install and configure each of the services and how to run the entire stack on Bluemix.

Introduction to Skflow and ...

April 11, 2016 | 0 Comments | Sophia Turol
Scikit Flow, a simplified TensorFlow interface, provides modeling and visualization techniques to get started with predictive analysis and data mining.

Uploading Files to IBM Bluemix Object Storage: A Sample ...

April 8, 2016 | 0 Comments | Gastón Ramos
The service from IBM can serve as an alternative to AWS S3.

Using Predix Mobile Services to Create a Cross-Platform ...

April 7, 2016 | 0 Comments | Igor Razhnov
Learn how to create an app targeted at multiple platforms with a single code base—by employing Apache Cordova and Predix Mobile services.

Adding a SQL Service to a .NET Application on IBM ...

April 6, 2016 | 0 Comments | Eugene Lahansky
Relational databases are the most common choice for .NET applications.

Deploying a Goji / PostgreSQL App to IBM ...

April 5, 2016 | 0 Comments | Stas Turlo
Sometimes you can choose between different offerings for the same tool in the Bluemix services catalog.

Visualizing TensorFlow Graphs with ...

April 4, 2016 | 0 Comments | Sergey Kovalev
With the sample source code, this blog post shows how to launch TensorBoard and use a set of operations for graph visualization in TensorFlow.

Deploying Kibana to IBM Bluemix for Exploring Elasticsearch ...

April 4, 2016 | 8 Comments | Hanna Yurkevich
From the tutorial, you'll also learn how to adapt Kibana, which is not cloud-native, for the use in the platform.

Cloud Foundry Security: BOSH User Roles and the UAA ...

Learn what permissions are available to BOSH operators and how to make Cloud Foundry deployments more secure.