Blog-on-Digital-Transformation

Blog on Digital Transformation

Technical Introduction to Hyperledger Fabric

April 12, 2016 | 4 Comments | Roger Strukhoff...
Why Hyperledger and not Ethereum? How to deploy an app and chaincode with Hyperledger Fabric? How does peer discovery work? Learn in this post.

How to Use Elastic Services for Anomaly Detection on IBM Bluemix

April 11, 2016 | 0 Comments | Leandro Costantini
From the tutorial, you will learn how to install and configure each of the services and how to run the entire stack on Bluemix.

Introduction to Skflow and TensorFlow

April 11, 2016 | 0 Comments | Sophia Turol
Scikit Flow, a simplified TensorFlow interface, provides modeling and visualization techniques to get started with predictive analysis and data mining.

Uploading Files to IBM Bluemix Object Storage: A Sample App

April 8, 2016 | 0 Comments | Gastón Ramos
The service from IBM can serve as an alternative to AWS S3.

Using Predix Mobile Services to Create a Cross-Platform App

April 7, 2016 | 0 Comments | Igor Razhnov
Learn how to create an app targeted at multiple platforms with a single code base—by employing Apache Cordova and Predix Mobile services.

Adding a SQL Service to a .NET Application on IBM Bluemix

April 6, 2016 | 0 Comments | Eugene Lahansky
Relational databases are the most common choice for .NET applications.

Deploying a Goji / PostgreSQL App to IBM Bluemix

April 5, 2016 | 0 Comments | Stas Turlo
Sometimes you can choose between different offerings for the same tool in the Bluemix services catalog.

Visualizing TensorFlow Graphs with TensorBoard

April 4, 2016 | 0 Comments | Sergey Kovalev
With the sample source code, this blog post shows how to launch TensorBoard and use a set of operations for graph visualization in TensorFlow.

Deploying Kibana to IBM Bluemix for Exploring Elasticsearch Data

April 4, 2016 | 8 Comments | Hanna Yurkevich
From the tutorial, you'll also learn how to adapt Kibana, which is not cloud-native, for the use in the platform.

Cloud Foundry Security: BOSH User Roles and the UAA Service

Learn what permissions are available to BOSH operators and how to make Cloud Foundry deployments more secure.
3-248x270-1.png