IBM

Displaying 201-240 of 3748 results

  • White Papers // Nov 2010

    Join IBM for the Information On Demand Virtual Event 2010

    Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals. Attend Now.

    Provided By IBM

  • White Papers // Oct 2010

    Reducing IT Operational Costs With IBM Power Systems Cloud Solutions

    This paper describes an approach to help answer this question. This paper first examined the challenge of IT labor costs. The authors then introduced the key components of the Power Systems cloud solutions and how each tier of the private cloud stack fits within the virtualization, standardization and automation model....

    Provided By IBM

  • White Papers // Dec 2010

    Stopping Internet Threats Before They Impact Your Business With IBM Security Network Intrusion Prevention Systems

    IT perimeter security is a fairly broad term that has a diverse set of implications and meanings. It is quite common to misunderstand the nuances implied by the term. In the beginning of the digital computer age, computer systems were single stand-alone entities, tipsily located in a physically secured room...

    Provided By IBM

  • White Papers // Nov 2009

    Introduction to Security Assertion Markup Language (SAML) and SAML Support in IBM WebSphere Application Server Version 7.0 Fix Pack 7

    Security Assertion Markup Language (SAML) is an XML based framework developed by the Organization for the Advancement of Structured Information Standards (OASIS), used for the exchange of security information between different parties. This is an open standard that can be used to exchange security information between different products. SAML support...

    Provided By IBM

  • White Papers // Dec 2010

    Virtual Scalability: Charting the Performance of Linux in a Virtual World

    Many past topics at the Linux Symposium have covered Linux Scalability. While still quite valid, most of these topics have left out a hot feature in computing: Virtualization. Virtualization adds a layer of resource isolation and control that allows many virtual systems to coexist on the same physical machine. However,...

    Provided By IBM

  • White Papers // Dec 2010

    Lguest: Implementing the Little Linux Hypervisor

    Lguest is a small x86 32-bit Linux hypervisor for running Linux under Linux, and demonstrating the paravirtualization abilities in Linux since 2.6.20. At around 5,000 lines of code including utilities, it also serves as an excellent springboard for mastering the theory and practice of x86 virtualization. This talk will cover...

    Provided By IBM

  • White Papers // May 2009

    Planning, Budgeting And Forecasting: Software Evaluation And Selection Guide

    This paper addresses the challenges of planning, budgeting and forecasting in a spreadsheet environment and highlights the advantages of using a software solution designed specifically for planning, budgeting and forecasting. The business challenges and drivers are discussed, including organizational and technological best practices to follow. A Planning Software Selection Matrix...

    Provided By IBM

  • White Papers // Sep 2010

    Report on the First International Workshop on Cloud Data Management (CloudDB 2009)

    The first ACM international workshop on cloud data management was held in Hong Kong, China on November 6, 2009 and co-located with the ACM 18th Conference on Information and Knowledge Management (CIKM). The main objective of the workshop was to address the challenge of large data management based on cloud...

    Provided By IBM

  • White Papers // May 2009

    Cloud Analytics: Do We Really Need to Reinvent the Storage Stack?

    Cloud computing offers a powerful abstraction that provides a scalable, virtualized infrastructure as a service where the complexity of fine-grained resource management is hidden from the end-user. Running data analytics applications in the cloud on extremely large data sets is gaining traction as the underlying infrastructure can meet the extreme...

    Provided By IBM

  • White Papers // Jan 2010

    Dispelling the Vapor Around Cloud Computing: Drivers, Barriers and Considerations for Public Andprivate Cloud Adoption

    In recent years, cloud computing environments have been gaining popularity. In the IBM Global CIO Study 2009, when asked about their most important visionary initiatives, cloud computing was cited by more than one-third of CIOs as being among the most important. The many inherent benefits of a cloud environment make...

    Provided By IBM

  • White Papers // Dec 2010

    Using a the Xen Hypervisor to Supercharge OS Deployment

    Hypervisor technology presents some promising opportunities for optimizing Linux deployment. By isolating a server's unique properties into a set of patches to initialization scripts and other selected files, deployment of a new server will be demonstrated to occur in a few seconds by creating a new Xen domain, re-using an...

    Provided By IBM

  • White Papers // Apr 2010

    V Locking Protocol for Materialized Aggregate Join Views on B-Tree Indices

    Immediate materialized view maintenance with transactional consistency is highly desirable to support real-time decision making. Nevertheless, due to high deadlock rates, such maintenance can cause significant performance degradation in the database system. To increase concurrency during such maintenance, the authors previously proposed the V locking protocol for materialized aggregate join...

    Provided By IBM

  • White Papers // Sep 2010

    Smart Grid Security and Architectural Thinking

    Smart grid means automation of the electric power grid, and automation often means computerization, which can create new cyber security risks to a process if proper thought to the system design is not applied. When implementing a smart grid project, security issues and lessons to consider include source code security,...

    Provided By IBM

  • White Papers // Jan 2011

    Runtime Monitoring of Web Service Conversations

    For a system of distributed processes, correctness can be ensured by (Statically) checking whether their composition satisfies properties of interest. In contrast, Web services are being designed so that each partner discovers properties of others dynamically, through a published interface. Since the overall system may not be available statically and...

    Provided By IBM

  • White Papers // Nov 2009

    Cloud Security Guidance

    Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned on demand, regardless of the user location or device. As a result, cloud computing...

    Provided By IBM

  • White Papers // Jan 2010

    Evaluating the Impact of Undetected Disk Errors in RAID Systems

    Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, Undetected Disk Errors (UDEs) also known as silent data corruption events, become a real challenge as storage capacity scales. While RAID systems have proven effective in protecting data from traditional disk failures,...

    Provided By IBM

  • White Papers // Jun 2009

    Connecting to the Cloud, Part 3: Cloud Governance and Security

    A number of initiatives such as the Cloud Security Alliance are in place to address cloud security. At the moment, providers such as Amazon, Google, and Force.com are taking the lead at the service provider level. However, not all are convinced: The Federal Trade Commission has been asked to investigate...

    Provided By IBM

  • Downloads // Jan 2011

    Cloud Security Guidance IBM Recommendations for the Implementation of Cloud Security

    Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives...

    Provided By IBM

  • Case Studies // Jan 2011

    Get more out of IBM Maximo Asset Management solutions for facility management

    In April, IBM made two announcements that significantly expand IBM Maximo? Asset Management solutions for facilities management. First, IBM announced its agreement with Drawbase Software to enhance its capabilities around smarter buildings management. As part of the agreement, IBM will license Drawbase software code to add space management and space...

    Provided By IBM

  • White Papers // Jan 2011

    Achieve business agility with BPM & SOA connectivity

    This MaxFacts? interactive ebook explores business agility and IBM's smart work initiative in the context of business process management and SOA connectivity and Integration. It contains information and graphics gathered and adapted with permission from multiple IBM and non-IBM sources. Also, there are embedded links to more-detailed, multimedia content available...

    Provided By IBM

  • White Papers // Oct 2009

    Are Clouds Ready for Large Distributed Applications?

    Cloud computing carries the promise of providing powerful new models and abstractions that could transform the way IT services are delivered today. In order to establish the readiness of clouds to deliver meaningful enterprise-class IT services, the authors identify three key issues that ought to be addressed as first priority...

    Provided By IBM

  • White Papers // Jun 2010

    Parallel and Distributed Simulation in the Cloud

    Cloud computing offers the ability to transparently provide computing services remotely to users through the Internet, freeing them of the burdens associated with managing computing resources and facilities. It offers the potential to make parallel and distributed simulation capabilities much more widely accessible to users who are not experts in...

    Provided By IBM

  • White Papers // Dec 2010

    kvm: The Linux Virtual Machine Monitor

    Virtualization is a hot topic in operating systems these days. It is useful in many scenarios: server consolidation, virtual test environments, and for Linux enthusiasts who still can not decide which distribution is best. Recently, hardware vendors of commodity x86 processors have added virtualization extensions to the instruction set that...

    Provided By IBM

  • White Papers // Dec 2010

    Cloud Computing: Coming Out of the Fog

    Cloud computing is a term that has been around for a while but has been storming into the mainstream lexicon again, although with a lot of confusion about what Cloud Computing really means. Many vendors are jumping into Cloud like solutions and are labeling every new activity as somehow related...

    Provided By IBM

  • White Papers // Dec 2010

    A Survey of Virtualization Workloads

    The authors survey several virtualization benchmarks, including benchmarks from different hardware and software vendors, comparing their strengths and weaknesses. They also cover the development (in progress) of a new virtualization benchmark by a well known performance evaluation group. The authors evaluate all the benchmarks' ease of use, accuracy, and methods...

    Provided By IBM

  • White Papers // May 2010

    Differentiated Configuration Pricing Strategies For Multi-Commodity Request-For-Quotes

    In this paper, the authors consider the pricing of request-for-quotes (RFQs) for multi-commodity bid configurations. A bid configuration consists of a server computer and a set of server accessories such as memory and hard drives. A buyer submits an RFQ for a desired quantity and requested price for each product...

    Provided By IBM

  • White Papers // Mar 2010

    Analytics And The Smarter Consumer

    For retailers and consumer products companies, the customer has always been critical to the business. Now, if anything, the balance of power has shifted even more. Consumers are getting smarter. They're incorporating new technologies and more information into their daily lives. People are more connected, empowered and demanding. And they...

    Provided By IBM

  • White Papers // Mar 2010

    Security in Development: The IBM Secure Engineering Framework

    This paper describes secure engineering practices for software products. The authors offer a description of an end-to-end approach to product delivery, with security taken into account. IBM is publishing this in the hope that interested parties - whether they be clients, other IT companies, academics and others - can find...

    Provided By IBM

  • White Papers // Jun 2009

    Lessons Learned From Building the IMed Intelligent Medical Search Engine

    Searching for medical information on the Web has become highly popular, but it remains a challenging task because searchers are often uncertain about their exact medical situations and unfamiliar with medical terminology. To address this challenge, the authors have built an intelligent medical Web search engine called iMed. iMed introduces...

    Provided By IBM

  • White Papers // Oct 2009

    Virtualization Strategy for Mid-Sized Hospitals

    Virtualization of business applications allows IT operations in hospitals of all sizes to reduce costs, improve IT services and manage risk. The most dramatic cost savings are the result of reducing hardware, space and energy usage, as well as the productivity gains that also lead to cost savings. Service improvements...

    Provided By IBM

  • White Papers // Sep 2009

    Why Performance Management? A Guide For The Midsize Organization: Gain Competitive Advantage Without Breaking The Bank

    Performance management links the insights drawn from trusted information to the actions in strategic and operational plans. It sees reports, scorecards and plans not as separate technologies or processes, but as critical partners in managing your organization. Midsize organizations are uniquely positioned to take advantage of a performance management approach...

    Provided By IBM

  • White Papers // Jan 2011

    Balance Workload In A Cloud Environment Use Threshold Policies To Dynamically Balance Workload Demands

    Many businesses and government agencies demand cloud services to provide continuous operational availability and security. To make this a reality, they will require a threshold policy on resource management for application testing and production. In this paper, the author explains what a threshold policy is and how it can help...

    Provided By IBM

  • Videos // Jan 2011

    IBM Pulse 2011 - The Premier Service Management Event

    As the software, systems, and services of a smarter planet become more interconnected, innovation in your organization requires visibility, control and automation. Pulse 2011 is the Premier Service Management event where you can learn the best practices and cutting-edge tools and solutions to effectively manage service delivery in any industry...

    Provided By IBM

  • White Papers // Jan 2011

    Using VMware VSphere and IBM Storwize V7000 as a Complete Virtualization Solution

    The intent of this paper is to examine the virtualized environment that IBM Storwize V7000 and VMware vSphere provide. VMware vSphere when combined with the IBM Storwize V7000 provide a complete server and storage virtualization solution in which the infrastructure is dynamic and responsive to ever-changing business needs and requirements....

    Provided By IBM

  • White Papers // Jan 2011

    A Randomized Energy-Conservation Protocol for Resilient Sensor Networks

    In this paper the authors present PEAS, a randomized energy-conservation protocol that seeks to build resilient sensor networks in the presence of frequent, unexpected node failures. PEAS extends the network lifetime by maintaining a necessary set of working nodes and turning off redundant ones, which wake up after randomized sleeping...

    Provided By IBM

  • White Papers // Jan 2011

    Characterizing Mobility and Network Usage in a Corporate Wireless Local-Area Network

    Wireless local-area networks are becoming increasingly popular. They are commonplace on university campuses and inside corporations, and they have started to appear in public areas. It is thus becoming increasingly important to understand user mobility patterns and network usage characteristics on wireless networks. Such an understanding would guide the design...

    Provided By IBM

  • White Papers // Feb 2010

    Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

    Several trends are contributing to a growing desire to "Outsource" computing from a (Relatively) weak computational device to a more powerful computation service. For years, a variety of projects, including SETI@Home, Folding@Home, and the Mersenne prime search, has distributed computations to millions of clients around the Internet to take advantage...

    Provided By IBM

  • White Papers // Aug 2010

    RC2 - A Living Lab for Cloud Computing

    In this paper the authors present the experience in building the Research Compute Cloud (RC2), a cloud computing platform for use by the worldwide IBM Research community. Within eleven months of its official release RC2 has reached a community of 631 users spanning 34 countries, and serves on average 350...

    Provided By IBM

  • White Papers // Mar 2010

    Wireless Networks for the Smart Energy Grid: Application Aware Networks

    Telecommunications operators are well versed in deploying 2G and 3G wireless networks. These networks presently support the mobile business user and/or retail consumer wishing to place conventional voice calls and data connections. The electrical power industry has recently commenced transformation of its distribution networks by deploying smart monitoring and control...

    Provided By IBM

  • White Papers // Sep 2010

    Just-in-Time Data Integration in Action

    Today's data integration systems must be flexible enough to support the typical iterative and incremental process of integration, and may need to scale to hundreds of data sources. In this work the authors present a novel data integration system that offers great flexibility and scalability. They approach to data integration...

    Provided By IBM