Remove Case Study Remove Cloud Remove IT Remove Libraries
article thumbnail

IBM Cloud solution tutorials: 2023 in review

IBM Big Data Hub

This year, IBM Cloud introduced projects and deployable architectures. A deployable architecture is a cloud automation for deploying a common architectural pattern that combines one or more cloud resources that are designed for easy deployment, scalability and modularity. Its goal is to advance open, safe and responsible AI.

Cloud 73
article thumbnail

Accelerate your hybrid cloud journey and keep your business running with reliable failover solutions from IBM Power Virtual Server

IBM Big Data Hub

Go hybrid for disaster recovery (DR) With a hybrid cloud strategy, you can deploy your workloads across multiple locations—on-premises or in public or private clouds—and not risk losing them all in the event of a disaster or an attack. What are virtual tape libraries and how can you use them on IBM Power Virtual Server?

Cloud 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deploying applications built in external CI through IBM Cloud DevSecOps

IBM Big Data Hub

IBM Cloud for Financial Services This is where IBM Cloud for Financial Services shines—it helps clients to fill that gap by supporting innovation while guaranteeing security and compliance. The goal of IBM Cloud for Financial Services is to provide security and compliance for financial services companies.

Cloud 82
article thumbnail

[Podcast] Tips for Staying Cyber-Safe While Working from Home

AIIM

And finally, on this episode, hear an AIIM member case study of how Laserfiche helped Mille Lacs Corporate Ventures migrate their contract management process to the cloud. Click here to access our full library of episodes. At the office, typically somebody else takes care of the cybersecurity measures.

Libraries 147
article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

Researchers from Broadcom Symantec’s Threat Hunter team discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials that allowed access to private cloud services. “Over three-quarters (77%) of the apps contained valid AWS access tokens allowing access to private AWS cloud services.”

Cloud 97
article thumbnail

Building a Quantum-Safe Blockchain Today

Thales Cloud Protection & Licensing

It contains the IronCAP library for post-quantum cryptography, serving as an extension to legacy cryptography support within the Luna FM. If you want to learn more about how Thales Luna HSM facilitate quantum-safe blockchain today, download the IronCAP case study. IronCAP technology is protected in the U.S.A.

article thumbnail

The Future of RegTech for AI Governance

IBM Big Data Hub

” Examples of RegTech include chatbots that can advise on regulatory questions, cloud-based platforms for regulatory and compliance data management, and computer code that enables more automated processing of data relating to regulations [9]. Case studies on OpenPages: Using RegTech for AI governance.