Links to web pages, documents or videos about IT information:
IBM Multicloud Manager
PDF | Cloud | 2018
See how intelligent operations, application and multicloud management solutions boost agility and flexibility
The Twelve-Factor App
HTML | DevOps | 2017
In the modern era, software is commonly delivered as a service: called web apps, or software-as-a-service. The twelve-factor app is a methodology for building software-as-a-service apps
IBM Garage method field guide
PDF | Cloud | 2018
Disrupters are reinventing business processes and leading their industries with digital transformations. Adopting real-time processes, agile methodologies, data-driven decision making, and innovative technology evens the playing field.
IDC MarketScape: Worldwide Object-Based Storage 2016 Vendor Assessment
PDF | Generic | Dec, 2016
The content for this excerpt was taken directly from IDC MarketScape: Worldwide Object-Based Storage 2016 Vendor Assessment (Doc # US41918416). All or parts of the following sections are included in this excerpt: IDC Opinion, IDC MarketScape Vendor Inclusion Criteria, Essential Guidance, Vendor Summary Profile, Appendix and Learn More. Also included is Figure 1.
Review VMware Best Practice documentation
PDF | Vmware | 2015
This book is intended for system administrators who are planning a VMware vSphere 6.0 deployment and want to maximize its performance. The book assumes the reader is already familiar with VMware vSphere concepts and terminology
VMware vCenter Server Performance and Best Practices. VMware vSphere 6.0
PDF | Vmware | 2015
VMware vCenter Server™ 6.0 substantially improves performance over previous vCenter Server versions. This paper demonstrates the improved performance in vCenter Server 6.0 compared to vCenter Server 5.5, and shows that vCenter Server with the embedded vPostgres database now performs as well as vCenter Server with an external database, even at vCenter Server’s scale limits. This paper also discusses factors that affect vCenter Server performance and provides best practices for vCenter Server performance.
VMware NSX in practice – by Iwan Hoogendoorn
VIDEO | Vmware
A big numbre of videos in youtube about practices of Vmware. Great repository of information about practices of administration of Vmware.
VMware Virtual SAN: Training & Whiteboard
VIDEO | Vmware | 2015
Tech Data hosted a live stream event with special guests from VMware for a training Virtual SAN.
VMware Cloud Foundation – Technical Deep Dive
VIDEO | Vmware | 2016
Guide to the Secure Configuration of Red Hat Enterprise Linux 7
HTML | Security | Genuary, 2017
This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7. It is a rendering of content structured in the eXtensible Configuration Checklist Description Format (XCCDF) in order to support security automation. The SCAP content is is available in the scap-security-guide package which is developed at https://www.open-scap.org/security-policies/scap-security-guide.
Windows Server® 2008 R2 Security Guide
DOC | Security | Septembre, 2010
This guide provides instructions and recommendations to help strengthen the security of computers running Windows Server® 2008 that are members of an Active Directory® domain.
In addition to the guidance that the Windows Server 2008 R2 Security Guide prescribes, this Solution Accelerator provides tools, step-by-step procedures, recommendations, and processes that significantly streamline the deployment process. This guide not only provides you with effective security setting guidance. It also provides you with a reproducible method that you can use to apply the guidance to both test and production environments.
Secure Windows Server 2012 R2 and Windows Server 2012
HTML| Security | November 1, 2013
To help you locate resources to secure your servers running Windows Server 2012 R2 and Windows Server 2012, the following links have been compiled for essential assessment tools, reference documentation, and product offerings. Get started with the Security and Protection.
Berkeley Information Security and Policy
ISP Services: Common questions about Information Security and Policy’s service offerings
PCI (industria de tarjetas de pago) – Normas de seguridad de datos Versión 3.0
PDF | Security | November, 2013
Las Normas de seguridad de datos de la industria de tarjetas de pago (PCI DSS) se desarrollaron para fomentar y mejorar la seguridad de los datos del titular de la tarjeta y facilitar la adopción de medidas de seguridad uniformes a nivel mundial. Las PCI DSS proporcionan una referencia de requisitos técnicos y operativos desarrollados para proteger los datos de los titulares de tarjetas. Las PCI DSS se aplican a todas las entidades que participan en el procesamiento de tarjetas de pago, entre las que se incluyen comerciantes, procesadores, adquirientes, entidades emisoras y proveedores de servicios, como también todas las demás entidades que almacenan, procesan o transmiten CHD (datos del titular de la tarjeta) o SAD (datos de autenticación confidenciales). “A continuación, encontrará una descripción general de los 12 requisitos de las DSS de la PCI.”
PCI (Industria de Tarjetas de pago) – Normas de Seguridad de datos Versión 3.2
HTML | Security | April, 2016
The Document Library includes a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step.
The Forrester Wave™: Security Analytics Platforms, Q1 2017
HTML | Security | March, 2017
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Cloud Foundry User Survey
PDF| Cloud | 2018
Cloud Foundry is the prevailing open source cloud application platform used by half of the Fortune 500 and a third of the Global 2000 to increase their developer productivity, saving them significant time and resources while making them more competitive in today’s ever-evolving market. Cloud Foundry Foundation’s biggest supporters—including Fujitsu, IBM, Pivotal, SAP and SUSE—donate code and projects back into Cloud Foundry, ensuring the technology continues to evolve at a rapid pace, keeping up with the expeditious changes in IT and cloud.
This report is the second Cloud Foundry User Survey, a series of semi-annual surveys conducted and produced by ClearPath Strategies, a technology- and politics-focused research and strategy firm. For more details on Methodology, see page 15.
The Top 10 Most Downloaded AWS Security and Compliance Documents in 2016
HTML | Cloud | Decembre, 2016
The following list includes the ten most downloaded AWS security and compliance documents in 2016. Using this list, you can learn about what other people found most interesting about security and compliance last year.
The definitive guide to IBM Cloud Object Storage dispersed storage
PDF | Cloud | July, 2016
According to IDC, object-based storage capacity is expected to grow at a CAGR of 30.7% from 2016 to 2020, reaching 293.7 EB in 2020. Likewise, object-based storage market revenue is expected to hit USD 19.8 billion that same year.
The Total Economic Impact™ Of Cleversafe, An IBM Company (2015)
PDF | Cloud | 2015
Cleversafe commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize by using Cleversafe object storage. The purpose of
this study is to provide readers with a framework to evaluate the potential financial impact of Cleversafe to reduce the cost of storing massive data sets required for the collection and analysis of big data.
IBM Cloud Object Storage System features and benefits
PDF | Cloud | July, 2016
The IBM® Cloud Object Storage (COS) System is a breakthrough cloud platform that helps solve petabyte and beyond storage challenges for companies worldwide. This Solution Brief summarizes its features that are designed to provide the scalability, availability, security, manageability, flexibility, and lower total cost of ownership (TCO) benefits.
Jenkins on AWS
PDF | Cloud | Septembre, 2016
Although there are many ways to deploy the Jenkins open-source automation server on Amazon Web Services (AWS), this whitepaper focuses on two specific approaches. First, the traditional deployment on top of Amazon Elastic Compute Cloud (Amazon EC2). Second, the containerized deployment that leverages Amazon EC2 Container Service (Amazon ECS). These approaches enable customers to take advantage of the continuous integration/ continuous delivery (CI/CD) capabilities of Jenkins. Using an extensive plugin system, Jenkins offers options for integrating with many AWS services and can morph to fit most use cases (e.g., traditional development pipelines, mobile development, security requirements, etc.).
How to effectively operate a bimodal IT Strategy (Apr, 2017)
PDF | Cloud | April, 2017
There are a lot of myths surrounding bimodal IT strategies, either that mode 1 is outdated and mode 2 is the future, or mode 1 is always on-prem and mode 2 is always in the cloud, but these myths don’t always turn out to be true.
A bimodal strategy may be the best way to confront digitization today, simultaneously focusing on stability and innovation.
Access this e-guide to learn from Kurt Marko, analyst at MarkoInsights, what the benefits of a bimodal IT strategy might be in your organization.
Magic Quadrant for Cloud Infrastructure as a Service, Worldwide
HTML| Cloud | Juny, 2017
The market for cloud IaaS is dominated by two leading service providers. Other service providers have responded by launching new offerings, but customers must carefully manage the risks of adopting less-mature offerings.
AWS Government Handbook Series: Secure Network Connections
PDF | Cloud | August, 2017
As a global first mover, the USG has invested considerable time in developing approaches to network perimeter security. As discussed below, however, while these approaches have been operating in the traditional IT space, additional innovation and iteration is necessary to better align with newer, non-traditional technologies, such as cloud.
Comparing Traditional, Converged and Hyperconverged Infrastructure
VIDEO | Cloud | January, 2017
This quick 10 minute video describes the differences between traditional, converged, and hyperconverged architectures and provides some strategies for customers who are looking to evaluate these choices in a normalized way.
Comparing Cloud Instance Pricing: AWS vs Azure vs Google vs IBM
HTML | Cloud | Novembre, 2017
As cloud computing matures, instance types from the top public cloud providers are becoming more similar, making it easier to compare cloud instance pricing. At the same time, cloud providers continue to reduce prices and add discounting options, creating opportunities to save money for the 85 percent of organizations that have a multi-cloud strategy.
In this article we dive down into the details to show you which providers have the lowest-cost options for cloud compute instances and under which circumstances. We also cover what’s been changing in cloud pricing over the last six to nine months.
Cloud Security Report
PDF | Cloud | January, 2017
In the last few years the IT industry has crossed the chasm and cloud adoption no longer looks like an exotic proposition. This is as profound a paradigm shift as the Internet transformation appeared to be two decades ago, and it is driving an equally powerful change in the way we must evaluate the threat landscape. In 2017, we see a consolidation of threats in the very topmost layers of the computing model. The shift suggests that new approaches and fresh thinking will be required for businesses looking to increase their security posture and manage risk in cloud and hybrid environments.
Jenkins the definitive guide ebook
PDF | Cloud | 2011
This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can take your Continuous Integration infrastructure further. Much of this book discusses Jenkins in the context of Java or JVM-related projects. Nevertheless, even if you are using another technology stack, this book should give you a good grounding in Continuous Integration with Jenkins. We discuss how to build projects using several non-Java technologies, including as Grails, Ruby on Rails and .NET. In addition, many topics, such as general configuration, notification, distributed builds and security are applicable no matter what language you are using.
IBM SoftLayer New Customer Document
PDF | Cloud | February, 2016
IBM SoftLayer Cloud Services delivers IAAS (Infrastructure As A Service) and is designed to run enterprise workloads. It is the ideal solution to create hybrid solutions with your on premise datacenter(s). Check the IBM Cloud Chalk and Talk video on YouTube for more information on the IBM Cloud solution.
IBM offers also different types of SAAS (Software As A Service) and PAAS (Platform As A Service) solutions running on SoftLayer. Check the IBM Marketplace website. IBM can also help you with migrating your data to the cloud. Please contact your local IBM Cloud representative for assistance.
IBM – APM Home Page
HTML | APM |
Give your DevOps team a comprehensive suite of capabilities for every application stage. Detect, isolate, diagnose and resolve application problems as they occur in complex cloud and on-premises environments.
Application Performance Management and DevOps: A winning combination
PDF | APM | January, 2017
APM and DevOps: A complementary approach to agile, responsive development
Here’s what the industry is getting wrong about APM
HTML | APM | February, 2017
Recently, you may have seen news about recent consolidation in the application process management (APM) space. Some might see this as the industry making big bets on combining network management with application management.
HTML | APM
IBM® Cloud Application Performance Management (APM) is IT service management
software designed to efficiently monitor, analyze and manage cloud, on-premises and hybrid applications and IT infrastructure. It helps you monitor and analyze application performance, discover issues, identify root causes, and prevent outages to improve user experience and stability.
APM Live Demo
HTML | APM
Live demo to known how the APM works
IBM Application Modernization – Field Guide
PDF | Digital Transformation | 2018
Business pressures demand faster time to market and app modernization. Your existing estate determines the best approach to modernization. Containers, Kubernetes, and microservices are proven to deliver speed and simplicity,
and are being adopted rapidly. IBM can make this easy for you.