John Boyer (IBM)Savvy College Students Monetize Their Term Papers with Amazon Kindle KDP

imageAfter surfing the web, we came across a unique approach for college students to earn a little extra cash this semester-- that is if they follow through and turn their paper submissions into eBooks.

The story was originally found on the CJ Rooney website, where he suggests that students can-- and should-- monetize their college papers using Amazon's KDP program.  The Amazon KDP program is the way many online publishers submit their original works to be sold through Amazon.com.  What CJ is suggesting is something unique and well, profitable, for college students.

Essentially, he is suggesting that instead of doing the grunt work and turning in the original paper to your professor-- also monetize the college papers.  One strategy he recommends is to turn in the college paper, first, and after the grade is returned, then the student can transform that college paper into an Amazon Kindle eBook-- by using the exact same paper! Genius?  We believe so.

Of course, there isn't anything unethical with this approach-- especially if the student is researching and writing their own paper with 100% unique content.  As he proposes, it's just another way for college students to earn a buck this upcoming semester.

Bob DuCharme (Innodata Isogen)Validating RDF data with SHACL

Setting some constraints--then violating them!

shackles

Last month, in The W3C standard constraint language for RDF: SHACL, I described the history of this new standard that lets us define constraints on RDF data and an open source tool that lets us identify where such constraints were violated. The presence of the standard and tools that let us implement the standard will be a big help to the use of RDF in production environments.

There's a lot you can do with SHACL--enough that the full collection of features available and their infrastructure can appear a bit complicated. I wanted to create some simple constraints for some simple data and then use the shaclvalidate.sh tool to identify which parts of the data violated which constraints, and it went very nicely.

I started by going through a TopQuadrant tutorial that builds some SHACL exercises using their TopBraid Composer GUI tool (free edition available by selecting "Free Edition" from the "Product" field on the TopBraid Composer Installation page). Then, after I examined the triples that Composer generated when I followed the tutorial's steps, I created my own new example called employees.ttl to run with shaclvalidate.sh. (To make my example as stripped-down as possible, I used a text editor for this, not Composer.) You can download my file right here; below I describe the file a few lines at a time to show what I was doing and how the pieces fit together.

I started off with declarations for prefixes, a class, and a few properties for that class:

@prefix hr: <http://learningsparql.com/ns/humanResources#> .
@prefix d:  <http://learningsparql.com/ns/data#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix rdf: <http://www.w3.org/1999/02/22-rdf-syntax-ns#> .
@prefix xsd: <http://www.w3.org/2001/XMLSchema#> .
@prefix sh: <http://www.w3.org/ns/shacl#> .

#### Regular RDFS modeling ####

hr:Employee a rdfs:Class .

hr:name
   rdf:type rdf:Property ;
   rdfs:domain hr:Employee .

hr:hireDate
   rdf:type rdf:Property ;
   rdfs:domain hr:Employee ;
   rdfs:range xsd:date .

hr:jobGrade
   rdf:type rdf:Property ;
   rdfs:domain hr:Employee ;
   rdfs:range xsd:integer .

There is nothing new and interesting there, but it's worth reviewing why these declarations are useful: so that applications using instances of this class know more about it and can do more with it. For example, when generating a form to let users edit Employee instances, an application noting that hr:hireDate has an rdfs:range of xsd:date might provide a date-picking widget on the form instead of just providing a text field to fill out. (And, if the application sees an additional property for this class declared someday, it can automatically generate a field for the new property on the edit form, so that this model really is driving application behavior.) These rdfs:range values are not there so that an automated process can check whether that instance data conforms to these types, although some applications may have done that. This is the hole that SHACL fills, as we will see below.

  #### Additional SHACL modeling ####

hr:Employee
# Following two lines are an alternative to the line above
#hr:EmployeeShape
#  sh:targetClass hr:Employee ;
   a sh:NodeShape ;
   sh:property hr:nameShape ;
   sh:property hr:jobGradeShape .

hr:nameShape
   sh:path hr:name ;
   sh:datatype xsd:string ;
   sh:minCount 1 ;
   sh:maxCount 1 .

hr:jobGradeShape
   sh:path hr:jobGrade ;
   sh:datatype xsd:integer ;
   sh:minCount 1 ;
   sh:maxCount 1 ;
   sh:minInclusive 1;
   sh:maxInclusive 7 .

The SHACL vocabulary is associated here with the prefix sh:. Some of the best documentation of this vocabulary is right where it should be--in rdfs:comment values of the class and property declarations in https://www.w3.org/ns/shacl.ttl. (As we'll see, the spec itself is also a good place to find out what's what.)

Above, we see that hr:Employee, which had already been declared to be an rdfs:Class, is also declared to be an sh:NodeShape. To quote a few of the shacl.ttl vocabulary file's rdfs:comment values, "a shape is a collection of constraints that may be targeted for certain nodes," "a node shape is a shape that specifies constraint [sic] that need to be met with respect to focus nodes," and (quoting the spec this time) "an RDF term that is validated against a shape using the triples from a data graph is called a focus node." So, declaring hr:Employee to also be a sh:NodeShape lets it serve as a collection of constraints for certain nodes.

Note the commented-out alternative lines after that first one. Instead of making the existing hr:Employee class also serve as a collection of constraints for instances of that class, we could declare a separate new class as an instance of sh:NodeShape (in the commented-out example, a new instance called hr:EmployeeShape) and go on to define the constraints there. How would the validator know that hr:EmployeeShape was storing constraints for the hr:Employee class? Because, as the last commented-out line shows, its sh:targetClass property would point to the hr:Employee class. (Thanks to my former TopQuadrant colleague Holger for helping me to understand how that works.)

After naming the place to store the constraints, we create some using the SHACL vocabulary's sh:property property. The rdfs:comment for this property in shacl.ttl tells us that it "Links a shape to its property shapes." In the SHACL files created by TopBraid Composer, it links to property shapes grouped together with blank nodes, but as you can see above, I pointed them at shapes for the Employee name and jobGrade properties that have their own URIs.

The hr:nameShape and hr:jobGradShape property shapes above are pretty self-explanatory. To show that one value for each must be included with each instance of hr:Employee, I gave each an sh:minCount and a sh:maxCount value of 1. The property shapes also have data types specified, and unlike the use of the rdfs:range specifications for these properties above, these will be used for validation. For hr:jobGradeShape, I also added sh:minInclusive and sh:maxInclusive values to restrict any data values to be from 1 to 7.

The last part of employees.ttl has four instances of hr:Employee. The first meets all the defined constraints:

d:e1
   a hr:Employee;
   hr:name "Barry Wom" ;
   hr:hireDate "2017-06-03" ;
   hr:jobGrade 6 .

When I comment out the other three instances and run shaclvalidate on the file, it gives me back a validation report, in the form of triples, about how everything is cool:

  @prefix sh:    <http://www.w3.org/ns/shacl#> .

[ a            sh:ValidationReport ;
  sh:conforms  true
] .

The next instance lacks the required hr:jobGrade value:

d:e2
   a hr:Employee;
   hr:name "Ron Nasty" ;
   hr:hireDate "2017-08-11" . 

After I uncommented this instance in employees.ttl, shaclvalidate told me this about it:

@prefix d:     <http://learningsparql.com/ns/data#> .
@prefix sh:    <http://www.w3.org/ns/shacl#> .
@prefix hr:    <http://learningsparql.com/ns/humanResources#> .

[ a            sh:ValidationReport ;
  sh:conforms  false ;
  sh:result    [ a                             sh:ValidationResult ;
                 sh:focusNode                  d:e2 ;
                 sh:resultMessage              "Less than 1 values" ;
                 sh:resultPath                 hr:jobGrade ;
                 sh:resultSeverity             sh:Violation ;
                 sh:sourceConstraintComponent  sh:MinCountConstraintComponent ;
                 sh:sourceShape                hr:jobGradeShape
               ]
] .

As I mentioned last month, returning these validation reports as triples makes it easier to plug the process into a larger automated workflow, and here we see that when constraints are violated, the triples include information to incorporate into that larger workflow--for example, to build a message to display in a pop-up message box. You could also query accumulated validation reports with SPARQL to identify patterns of what kinds of violations happened how often.

The third employee tests the SHACL validator's ability to detect data type violations, because the hr:jobGrade value is not an integer:

  d:e3
   a hr:Employee;
   hr:name "Stig O'Hara" ;
   hr:hireDate "2017-03-14" ;
   hr:jobGrade 3.14 .

shaclvalidate does just fine with that:

@prefix d:     <http://learningsparql.com/ns/data#> .
@prefix sh:    <http://www.w3.org/ns/shacl#> .
@prefix hr:    <http://learningsparql.com/ns/humanResources#> .

[ a            sh:ValidationReport ;
  sh:conforms  false ;
  sh:result    [ a                             sh:ValidationResult ;
                 sh:focusNode                  d:e3 ;
                 sh:resultMessage              "Value does not have datatype xsd:integer" ;
                 sh:resultPath                 hr:jobGrade ;
                 sh:resultSeverity             sh:Violation ;
                 sh:sourceConstraintComponent  sh:DatatypeConstraintComponent ;
                 sh:sourceShape                hr:jobGradeShape ;
                 sh:value                      3.14
               ]
] .

The last employee instance tests the SHACL validator's ability to detect a value that falls outside of a specified range, because hr:jobGrade is greater than 7:

d:e4
   a hr:Employee;
   hr:name "Dirk McQuickly" ;
   hr:hireDate "2017-01-08" ;
   hr:jobGrade 8 .

This isn't a problem either:

@prefix d:     <http://learningsparql.com/ns/data#> .
@prefix sh:    <http://www.w3.org/ns/shacl#> .
@prefix hr:    <http://learningsparql.com/ns/humanResources#> .

[ a            sh:ValidationReport ;
  sh:conforms  false ;
  sh:result    [ a                             sh:ValidationResult ;
                 sh:focusNode                  d:e4 ;
                 sh:resultMessage              "Value is not <= 7" ;
                 sh:resultPath                 hr:jobGrade ;
                 sh:resultSeverity             sh:Violation ;
                 sh:sourceConstraintComponent  sh:MaxInclusiveConstraintComponent ;
                 sh:sourceShape                hr:jobGradeShape ;
                 sh:value                      8
               ]
] .

I deliberately picked simple examples to see how difficult they would be to implement, and as with many powerful software systems, my only problem was navigating the detailed documentation of the architecture and many features to find the parts that I wanted.

What other built-in constraints are available besides sh:datatype, sh:minCount, sh:maxCount, sh:minInclusive, and sh:maxInclusive? See for yourself in section 4 of the spec: Core Constraint Components. (For a nice quick skim of the available constraints, just look through that section's entries in the spec's table of contents.)

If you've done much work with RDF, you're going to enjoy this.

1912 farm and garden supply catalog image courtesy of flickr


Please add any comments to this Google+ post.

John Boyer (IBM)Retiring To Phuket, Thailand

Just about any day in sunny California, there are masses of issues for each vacationers and residents to do for enjoyable and excitement. When most of the things to do Orange County relate to the seaside, the sun, the sand and the surf, there's a higher opportunity that you'll get the most of your beach tour when you get yourself lodging at a fantastic seaside resort. Sure, just as you guessed it, there are a lot of those institutions here simply because remember that it's not a California encounter with out the seaside. Have you noticed the strange dialect of Thai spoken by some folks in Bangkok or even at your phuket beach?

If you have already picked up on some Thai, you may have noticed this. That is the Isaan language, similar to Laos with influences from the Thai language. So, prior to you make your way up, brush up on some Isaan. You'll definitely receive your honest share of smiles and acknowledgement. It doesn't just end there, when I took a taxi, the driver help me bring my luggage into the trunk. I do it myself then but he was very most obliging and I didn't even have to request him to. Gladly I arrived at my buddy's home safe but nonetheless the driver didn't set a foot wrong. Maybe he must have understood everything that a traveler need. It's great, I arrived safe, sound, and satisfied. The phuket airport transfer service at Thai Happy Taxi is the best.

If a person is on a spending budget, then he should search for this kind of offers that are extremely cheap. Even although an individual is on spending budget, he can choose a deal that will consist of all sorts of facilities and solutions. Prior to the offers are chosen, comparison should be made with various other phuket hotels in London. The prices, features and the costs should be regarded as. This will assist in getting a good deal.

 

Only the 1 that ranges in the spending budget ought to be availed as it will offer lots of benefits. Are you searching for great luxury hotels in India for your upcoming holiday? So, you have already determined on your vacation location. Now is the time for you to appear for the resort which will fit you very best in phrases of money and other factors like place of the hotel, services, services etc. Traveling to Poda Islands takes 25 minutes by boat. You can enjoy with the elegance of white coral sand seashores, crystal-clear drinking water, and great natural atmosphere on the little island.

 

Do not miss trying snorkeling and kayaking along the seashores, the water is extremely thoroughly clean and distinct. It enables guests to see beautiful fishes. Reservation on weekdays- If you have been successful in taking a leave from your work for a vacation, then go for weekdays. There are more crowds on weekends rather than weekdays. This might offer you with very best deals on resorts and also multiplies your probabilities of remaining lengthy. In addition, the nearby phone company would charge a fortune to make worldwide immediate dialing to the outside. You finish up having to pay hundreds of dollars at the finish of the thirty day period, not recognizing that you have many many phone calls. For these reasons, there are several local and international businesses that established international contacting card and contacting card company. telephone card enables you to buy pay as you go cards that have a specified par value, in other words known as face worth.

 

In general, phone cards come with ten bucks, 20 dollars, 30 dollars and fifty greenback values. There are some simple actions to adhere to to use this company card. If you are intrigued in getting perception in journey business secrets, there is a good location exactly where 6 various e-publications are provided. They include problems such as airline transportation, journey agencies, consolidators, lodging discounts and numerous strategies and methods in purchase to travel always cheaper. With the buy of 1 of those e-books, you get totally free hotel offers. Essentially a package of 2 evenings in more than 30 possible destinations in the US is accessible. Summing up all the expenses for resort taxes, redemption fees and shipping price, you will be having to pay $24 per individual (the certification is for each resort space, and I think about that usually it will be occupied by two having to pay associates). Providing that the retail value of the stay is much more than $100/person, you are saving a seventy six%25.

John Boyer (IBM)Alternative Transportation In Italy Because Of To The Taxi Strike

Tokyo has turn out to be 1 of the quick expanding metropolitan areas in the Far East. It is one of the most densely populated metropolitan areas in the world and is the money and industrial metropolis of Japan. The city of Tokyo is an industrial metropolis as it hosts significant hefty industries and factories. It's among the most frequented city in the globe especially by business individuals and tourists. Japan is considered as the top manufacturer of the motor car industries. The best and cheap flight should be regarded as when opting to go to Tokyo.

If you can't discover any cheap flights in South Africa on the internet, you may want to see if you are component of any benefits programs that allow you to trade points for plane tickets. Many credit card producers and auto golf equipment have programs of this character. Learn much more about flights at www.volo.co.za/domestic-flights. When inexpensive flights to Oslo land at the airport, you are free to use 1 of the many car rental services accessible to take you to the metropolis. You can also choose the taxi bangkok or the Airport Express teach. Airport buses connect the airport to the city bus terminal at every arrival. Of course I prefer Thai Happy Taxi to all other choices. Tourists store and enjoy the bangkok streets lined near the seaside. The crunchy sundal and murukku is a should to taste for each vacationer. Pony rides can also be loved on the beach. Kite flying is also a common sport at this beach. Kids can also enjoy Giant wheels and merry-go-rounds.

Next, consume espresso!!! This was a behavior left by the French and the espresso here is great. The coffeehouses that line the streets speak to its importance to nearby culture. The local style is powerful and sweetened with condensed milk. Attempt Highlands Espresso for a much more worldwide kind of coffee. The History Museum traces 1000's of many years of Vietnamese history for those intrigued in a much more in depth track record to the region. Modern Saigon is about 300 years old. It was a French colony from the mid 1850s. The resistance built to oust the French was the communist celebration led by Ho Chi Minh. There are some good touristy bars on and subsequent to Khaosan Rd but they do tend to near early, 2am is the regular occasions they start to near. There is also a great deal of inexpensive hotels on Khaosan Rd which begin from 150 baht.

My buddy was remaining at 1 for the night, it was fairly a lot just a mattress and a little room. but for that price you can't truly complain. In addition, it's fairly simple to travel to Cyprus from other nations. Most of the time, you can bangkok routes. Just search "flights to Cyprus" and see all of your options! With the vast figures of airways nowadays, you can easily find one that has a sale or a special for a flight to Cyprus. These taxis are an assist, just when you need them. Issue might occur at any stage of time. These taxis are usually on the free, for the welfare of the individuals. People really feel safe while using on these cabs. The cab services companies take care of the security of the people. It is of prior significance to these taxis to make certain that the clients are comfy sitting in the taxis. There are many services offered by these cabs.

The journey in and around Delhi, NCR and know all about the streets and routes. They will take you from the shortest route possible, which saves more time and so that 1 reaches his destination on time. As you are out of the nation, you may not be a great decide of what the transportation prices of the country might be. So for this purpose you can have a reserving beforehand you land the airport. The reserving of the Airport Toronto taxi can be done via a quantity of websites prior to on-line. This is a very good choice as you can verify all the prices peacefully and choose the right 1 for you. Other than that you would not want to begin investing a great deal in the foreign nation from the day first so you require to save on these small issues for a fantastic journey and taxi services in Toronto.

John Boyer (IBM)IBM Notes/Domino Feature Pack 9

IBM Notes/Domino 9.0.1 Feature Pack 9 が予定通り8月中にリリースされました。

今回リリースされた Feature Pack 9 のリリースノートはこちらになります。

http://www-10.lotus.com/ldd/fixlist.nsf/WhatsNew/12d957b7c277fc728525816300434c53?OpenDocument

 

肝心のダウンロードですが、こちらか各コンポーネントをダウンロードできるようになっています。

前回リリースの Feature Pack 8 同様に一部の新機能は更新されたテンプレートを利用する必要があるので

更新テンプレートも忘れずにダウンロードおよび適用してください。

https://www-01.ibm.com/support/docview.wss?uid=swg24037141

 

追加された新機能はヘルプ文書に日本語でまとめられています。

IBM Domino 9.0.1 Feature Pack 9 の新機能

https://www.ibm.com/support/knowledgecenter/ja/SSKTMJ_9.0.1/admin/over_whats_new_in_fp9.html

IBM Notes 9.0.1 Feature Pack 9 の新機能

https://www.ibm.com/support/knowledgecenter/ja/SSKTWP_9.0.1/fram_what_new_FP9_r.html

 

IBM Domino に関してはパフォーマンスの改善、IBM Notes に関しては高解像度への完全な対応が

大きな新機能になるかと思います。

 

みなさんが最も興味あるであろうアプリケーション開発周りの新機能に関してですが、

今回は残念ながらバグフィックスが中心で大きな新機能は入ってきていません。

ただし、現在注力されている Domino に REST API でのアクセスを可能とする

Domino Access Services (DAS) に関しての新機能として、

添付ファイルの取り扱いの強化、検索結果のスコアへの対応、制御用のパラメータの追加があります。

添付ファイルに関しては、文書を取得した際に添付ファイルのデータを返すのでは無く、

添付ファイルへのリンクを返すようにできますので、別リソースとして扱うことが可能になり、

またデータ通信量を大きく削減することができるようになっています。

 

これらの新機能を是非とも試してみてください。

John Boyer (IBM)Best Laptop for Quickbooks

The below list shows you the best laptop for QuickBooks 2017. All these Laptops are high performance laptops and can easily handle QuickBooks tasks. These laptops comes with all the features and specs that are essential and required for quickbooks. QuickBooks is the worlds #1 cloud accounting software for Small Businesses & Self-Employed. Just follow the below list to know which are the best laptop for quickbooks 2017 and also know which are the best budget business laptops in 2017. Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015?

System Requirements for QuickBooks 2017:

  • Operating System: Windows 10, Windows 8.1, Windows 7 SP1, Windows Server 2012 2011, Linux
  • Processor: 2GHz minimum
  • RAM 4GB minimum, 8GB Recommended
  • Disk space 2.5GB of disk space
  • Optical Drive 4X DVD-ROM drive required for CD installations
  • Screen Resolution Display optimized for 1280 x 1024 screen resolution or higher

Best laptop for business and personal use

Best laptop for programming

29 Lightweight gaming laptop UK, USA of 2017

Best Alienware Gaming laptop of 2017 in UK

Best laptops for biology majors in 2017

1. ASUS F556UA-AB54 Laptop (Best Laptop for Quickbooks and Business Professionals)

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This laptop from Asus is one of the  best laptop for quickbooks in 2017. This laptops features a  2.5 GHz Core i5-5287U processor and 8 GB DDR4 SDRAM with  fast 256 GB Flash Memory Solid State drive. It has integrated graphics card and 15.6 inches Full HD display. Other features include windows 10 operating system, 1 USB 3.0 ports and so on.

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015?

SPECS:

Screen Size 15.6 inches
Max Screen Resolution 1920*1080 pixels
Processor 2.5 GHz Core i5-5287U
RAM 8 GB DDR4 SDRAM
Hard Drive 256 GB Flash Memory Solid State
Graphics Coprocessor integrated_graphics
Chipset Brand Intel
Card Description Dedicated
Wireless Type 802.11 A/C
Number of USB 2.0 Ports 1
Number of USB 3.0 Ports 1

 

2. ASUS K501UW-AB78 Gaming Laptop (Powerful Intel Core i7, GTX 960M, 8GB DDR4)

Check and Buy on Amazon and Save

 

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This laptop from Asus is a very powerful laptop that comes with fast latest generation 2.5 GHz Intel Core i7  processor and you can say that it is the best high performance laptop. It also features a fast 512 GB memory and  8GB RAM for fast processing. Other features include nvidia graphics card. 7 hours of battery life and Windows 10.

SPECS: Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015?

Screen Size 15.6 inches
Max Screen Resolution 1920*1080 pixels
Processor 2.5 GHz Intel Core i7
RAM 8 GB DDR4 SDRAM
Hard Drive 512 GB Flash Memory Solid State
Chipset Brand nvidia
Card Description Integrated
Wireless Type 802.11 A/C
Number of USB 3.0 Ports 2
Average Battery Life (in hours) 7 hours

3. Acer Aspire E 15 E5-575G-57D4 (Get $50 off instantly: Pay $529.99)

Check and Buy on Amazon and Save

 

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This is one of the best laptop for quickbooks and features a 15.6 inch display with 1920 x 1080 pixels resolution. It comes with  fast latest generation 2.5 GHz Intel Core i5 processor. It also features a NVIDIA GeForce 940MX  2GB GDDR5 VRAM graphics card, and 8Gb RAM with windows 10 OS. Other features include 12 hours battery life, 15.6 inches display.

SPECS:

Screen Size 15.6 inches
Max Screen Resolution 1920 x 1080 pixels
Processor 2.5 GHz Intel Core i5
RAM 8 GB
Hard Drive SATA
Graphics Coprocessor NVIDIA GeForce 940MX
Chipset Brand nvidia
Card Description Dedicated
Graphics Card Ram Size 2000 MB
Wireless Type 802.11 A/C
Number of USB 3.0 Ports 2
Average Battery Life (in hours) 12 hours

4. Lenovo Ideapad 510 80SV0056US Laptop (Intel Core i7-7500U, 8GB DDR4, 256GB SSD, Intel HD Graphics 620, Windows 10) 

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This is one of the best laptop for quickbooks and features a 15.6 inch display with 1920 x 1080 pixels resolution. It comes with  fast latest generation 2.7 GHz Intel Core i7 processor. It also features a Intel HD Graphics 620 graphics card, and 8Gb RAM with windows 10 OS. Other features include 5 hours battery life, 15.6 inches display, 2.7 GHz Intel Core i7 . Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015?

SPECS:

Screen Size 15.6 inches
Max Screen Resolution 1920x1080 pixels
Processor 2.7 GHz Intel Core i7
RAM 8 GB
Hard Drive 256 GB Solid State Drive
Graphics Coprocessor Intel HD Graphics 620
Chipset Brand Intel HD Graphics 620
Card Description Integrated
Wireless Type 802.11 A/C
Number of USB 3.0 Ports 2
Average Battery Life (in hours) 5 hours

5. LG gram 15Z960 Ultra-Slim Laptop

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015LG gram 15Z960 is the best laptop that will run quickbooks at its best. It comes with 3.1GHz 6th-generation Intel Core i7-6500U processor. It has 8GB DDR3L RAM and 512GB SSD storage. It has 15.6-inch FHD widescreen IPS display. It is the perfect lightweight laptop that weighs under 1kg(2.2 pounds). The operating system is Windows 10. 

This laptop from LG is one of the best and high performance laptop for quickbooks in 2017. LG gram 15Z960 touchscreen 14 inch laptop features a latest fast   6th-generation Intel Core i7-6500U processor which supports 3.1GHz boost. It comes with a 8GB DDR3L RAM and also has fastest 512GB SSD storage. Other features include 1920x1080 display, Windows 10 operating system, integrated graphics and USB 3.0 ports. 

SPECS:

Screen Size 15.6 inches
Max Screen Resolution 1920 x 1080 pixels
Processor 3.1 GHz Intel Core i7
RAM 8 GB DDR3L SDRAM
Hard Drive 512 GB Solid State Drive
Graphics Coprocessor integrated graphics
Chipset Brand intel
Card Description integrated
Wireless Type 802.11 A/C
Number of USB 3.0 Ports 2

 

LG gram 14Z970 i5 14" Touchscreen Laptop: Best Touchscreen Laptop For Quickbooks

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This laptop from LG is one of the best and high performance laptop for quickbooks in 2017. LG gram 14Z970 touchscreen 14 inch laptop features a latest fast   6th-generation Intel Core i7-6500U processor which supports 3.1GHz boost. It comes with a 8GB DDR3L RAM and also has fastest 256GB SSD storage. Other features include 1920x1080 display, Windows 10 operating system, integrated graphics and USB 3.0 ports.  Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015?

SPECS:

Screen Size 14 inches
Max Screen Resolution 1920 x 1080 pixels
Processor 2.5 GHz
RAM 8 GB
Hard Drive 256 GB Flash Memory Solid State
Card Description Integrated
Number of USB 3.0 Ports 2

7 Microsoft Surface Laptop (Intel Core i5, 4GB RAM, 128GB) : Best Portable Laptop for Quickbooks and Business owners

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015At, 2.76 lbs this microsoft surface laptop is one of the portable laptops for business owners, an you can say that it is the best business laptop in 2017 that comes with Latest fast intel core i5 processor and 4GB Ram. This laptop can perform complex tasks with ease and has a gorgeous display 2256x1504 pixels. The display is 13.5 inches in size and it is magnificent. Processor is 3.1 GHz Intel Core i5 and comes with fast 128 GB Flash Memory Solid State. Also includes one USB 3.0 ports, integrated graphics card, Windows 10 and  up to 14.5 hours of video playback. Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015?

SPECS:

Screen Size 13.5 inches
Max Screen Resolution 2256x1504 pixels
Processor 3.1 GHz Intel Core i5
RAM 4 GB
Hard Drive 128 GB Flash Memory Solid State
Card Description Integrated
Number of USB 3.0 Ports 1

 

Lenovo IdeaPad 110 Laptop (Best Budget Business Laptop) Intel Core i5-6200U Processor, 8GB Memory, 1TB Hard Drive

Check and Buy on Amazon and Save

imageBest Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This laptop from lenovo comes with Intel core i5 6th generation laptop that you can use for quickbooks and for your business needs. It is portable and is also the best business laptop under $500 dollars. The display is fantastic with accurate colors abd screen resolution is 1366x768. Feature a High-performance 6th Generation Intel Core i5-6200U 2.3GHz Processor that supports turbo boost up to 2.8GHz. other features include 8 GB RAM, 1 TB HDD, integrated graphics and Windows 10.

SPECS:

Screen Size 15.6 inches
Screen Resolution 1366x768
Processor 2.3 GHz Intel Core i5
RAM 8 GB SDRAM
Hard Drive 1 TB HDD
Chipset Brand intel
Card Description integrated
Wireless Type 802.11abg, 802.11n, Bluetooth
Number of USB 2.0 Ports 1

9 HP 15.6" HD Touchscreen Laptop Computer PC (Best Busines Touchscreen Laptop or Quickbooks Laptop under $500 dollars)

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015Fast latest 7th Gen Intel Dual Core i5-7200U 2.5 Ghz which supports turbo boost up to 3.1 Ghz , a 1366x768 resolution screen, 8 GB DDR4, 1 TB HDD, Integrated graphics card and windows 10. This touchscreen laptop from HP has it all. You can say that it is one of the best laptop for quickbooks in 2017 under $500 dollars. 

SPECS:

Screen Size 15.6 inches
Screen Resolution 1366x768
Max Screen Resolution 1366x768
Processor 2.5 GHz Intel Core i5
RAM 8 GB DDR4
Hard Drive 1 TB HDD 5400 rpm
Graphics Coprocessor integrated_graphics
Chipset Brand intel
Card Description integrated
Wireless Type 802.11bgn
Number of USB 2.0 Ports 2

10 Acer Aspire R 2-in-1 Convertible (Best 2-in-1 Convertible Business laptop in 2017 for quickbooks)

Check and Buy on Amazon and Save

Best Laptop for Quickbooks, best computer to run quickbooks, best business laptop 2017, best laptop for accountants 2015This is one of the best 2-in-1 Convertible touchscreen laptop for businesses and professionals in 2017. And the most important thing is that, it is portable, small in size, low in price and it is touchscreen. This laptop from acer comes with latest generation fast  Intel Dual-Core i5-7200U mobile processor that supports turbo boost up to 3.1 GHz. Some other features include 8 GB DDR4 memory , 2133mHz; 1TB 5400RPM Hard Drive, No DVD/CD drive; Backblit Keyboard. 

SPECS:

 

Screen Size 15.6 inches
Max Screen Resolution 1920 x 1080 (FHD Touch IPS)
Processor 2.5 GHz Intel Core i5
RAM 8 GB
Hard Drive 1 TB HDD 5400 rpm
Graphics Coprocessor integrated_graphics
Chipset Brand intel
Card Description integrated
Wireless Type 802.11A, 802.11bgn, Bluetooth
Average Battery Life (in hours) 9 hours

John Boyer (IBM)Cloud Computing From Personal Perspective

In recent years there has been much talk about cloud computing, the cloud, the change this entails in our way of developing and managing our applications ... But what is cloud computing really?

Large companies began using this term to refer to those services hosted on the network. In fact that is the first thing most of us come to mind about "Cloud Computing". Therefore, we can say that the word cloud would be equivalent to what we know as the Internet. However, the concept has much more scope and is something that we intend to relate in this article.

Types of cloud

There are currently 3 types of clouds:

  • Public clouds: These are those that are administered by the service provider. The great advantage of them is that they do not require an initial investment to start using them and do not entail a maintenance expense for the consuming customer. These clouds are shared with other customers within the provider's data centers.
  • Private clouds: Private clouds, unlike public clouds, are managed by the client to gain greater control. Due to this, it implies an initial investment in the infrastructure since it will be hosted on-premise, ie at the client's premises. As a main advantage, the customer enjoys a cloud of his property where he is the only one who resides in it, although the maintenance costs are borne by the owner.
  • Hybrid clouds: Finally we have this intermediate option between the two previous clouds. While they say that this type will be the most widespread in the future, it is not as defined as the rest. The main idea is that the customer will be able to keep control of those main applications and delegate the administration in which they consider secondary.

Types of services

Once you have covered the types of clouds that exist, what can we do with them?

image

Depending on the need we need to cover, there are different types of services within cloud computing:

  • Infrastructure as a Service (IaaS): This type of service offers us the necessary infrastructure to be able to upload our environment and also to run proprietary software on it. The two fundamental pillars are computing and storage as a service. Sometimes they refer to IaaS as HaaS (Hardware as a Service). As examples of this type of services we can mention GoGrid and Amazon EC2 (Elastic Compute Cloud).
  • Platform as a Service (PaaS): When we talk about the platform within the cloud, the service we offer is the environment where we can directly deploy our applications. The clearest examples in this section are the Windows Azure platform by Microsoft and Google App Engine .
  • Software as a Service (SaaS): The last service, and one of the best known by the market, are those transformed into final applications provided by the provider, ready to be used by customers. In this type of service we are assured the maintenance, the support and the availability of the software. Within this set, we can find Microsoft Business Productivity Online Standard(BPOS) which is a set of well-known applications in its online version like SharePoint Online , Exchange Online , Office Live Meeting and Office Communications Online . Another group of applications within this area would be Salesforce, Known mainly for its CRM in the cloud, and Basecamp where its flagship product is its collaboration tool for projects.

Advantage

As an advantage of this administration and development model, we can highlight the cost savings as the most important, in addition to the high scalability, reliability, as well as the abstraction of hardware maintenance, something up to now innovative in large companies with its own department ITEM.

One of the concepts that best define the cloud environment is the term "Pay as you go", which means that we only pay for usage and not a monthly fixed fee, such as traditional hosting services.

Lastly, it is worth mentioning the agility with which we have these services, achieving in a matter of minutes a putting into production that could take months, when dealing with the traditional on-premise process.

Disadvantages

While it is true that the advantages of cloud computing are worth considering, there are some points that can be crucial when it comes to hitting the cloud:

First, there is the perception of insecurity in moving our information out of our physical reach, which can manifest a sense of vulnerability. To solve this "fear" among potential customers, large cloud companies have efficient, high-security systems to keep data safe from potential attacks.

Another drawback is dependence on an Internet provider. Due to the location of the services, we are tied to this need, so it is advisable to have a second connection in case of failure of the main.

Although less and less, there is still some immaturity in some of the services offered by lack of functionality, in relation to similar products designed to meet these needs in servers within the client.

In summary

In this section, we have been able to know the concept of cloud computing as the technological proposal of large companies to refer to the different services hosted on the Internet, as well as the different types of clouds available in the market. In addition we have listed the types of services available to date and how some companies already offer them to the public.

 

John Boyer (IBM)IBM Systems Technical University Australia Day 3 Final Sessions

Banner-Australia-TechU-2017

This week, I was in beautiful Melbourne, Australia for IBM Systems Technical University.

PowerAI overview and Cognitive Solutions on POWER

Anand Subramaniam, IBM Technical Specialist, presented this session on PowerAI. IBM packaged a collection of Machine Learning libraries, optimized them for POWER8 chip-set, and made this entire package freely available for download as "PowerAI".

(If you don't have access to a POWER8 server, you can try out the "Anaconda" package using Python for x86 laptop or desktop using Windows, Mac or Linux. See Jason Brownlee's [Your First Machine Learning Project in Python: Step by Step] for instructions.)

IBM also is working on a priced value-add collection called "PowerAI Vision"

Hadoop Infrastructure solutions and Point-of-View

Alexis Giral, IBM Executive Storage Architect, presented the benefits of IBM Spectrum Scale using a simple example. Supposed you are gathering 40TB of sensor readings per day. How many TB of storage would you need to hold 2 years worth of data?

Traditionally, HDFS maintains three copies of the data. A recently added feature "HDFS-EC" provides erasure coding to reduce the overall storage requirements. Giral showed this chart:

Method Scheme Factor TB required
Original Source No protection 1.0 27,740
HDFS Triplication 3.0 83,320
HDFS-EC 5+4 Erasure Coding 1.8 49,932
Spectrum Scale ESS 8+3 Erasure Coding 1.3 36,894

And this is assuming all the data is hot. If you decide to keep only 30 percent hot, perhaps the most recent eight months, and the other 70 percent on colder storage, you may reduce your storage requirement costs even further.

IBM Cloud Object Storage - Redefining backup infrastructure

Maciej "Mac" Lasota, presented the use of IBM Cloud Object Storage as a backup repository. While IBM Spectrum Protect is the preferred choice, IBM COS also works well with Commvault and NetBackup.

He listed some of the challenges that companies have with backups to tape, and how IBM COS addresses these challenges.

(While IBM COS is three to four times more expensive than tape, it is a luxury many clients can now afford!)

He wrapped up the session showing five different deployments that he worked on for clients.

New Generation of Storage Tiering: Simpler Management, Lower Costs, and Improved Performance
s014071-Storage-Tiering-Orlando-v1705a-cover

With ever changing amounts of storage, it is hard to find metrics that are consistent year to year. Fortunately, we found I/O density as the metric to focus my efforts, armed with real data from Intelligent Information Lifecycle Management (IILM) studies done at various clients. From that, I was able to talk about storage tiering on three fronts:

  • IBM Easy Tier on DS8000 and Spectrum Virtualize to provide tiering within a system.
     
  • IBM Virtual Storage Center (VSC) to provide tiering between systems in a data center.
     
  • IBM Spectrum Scale, Spectrum Archive and IBM Cloud Object Storage System to provide global tiering across multiple locations, and across flash, disk, tape and cloud resources.

     

Spectrum Scale for Volume, File and Object Storage
s014066-Scale-ESS-Orlando-v1705a-cover
Slides are available on IBM Expert
Network on [Slideshare.net]

IBM Spectrum Scale was formerly called GPFS and has been around since 1998. I am glad it was renamed, as GPFS suffered from "guilt by association" with other file systems, AFS, DFS, XFS, ZFS, and so on.

Spectrum Scale does so much more, supports volume, file and object level access, supports POSIX standards for Windows, AIX and Linux, support Hadoop and Spark with 100 percent compatible HDFS Transparency Connector, support NFS, SMB and iSCSI protocols, as well as OpenStack Swift and Amazon S3 object based access.

Initially designed for video streaming and High Performance Computing (HPC), IBM has extended its reach to work in a variety of workloads across different industries. More than 5,000 production systems are running at client locations.

Beating Ransomware! A deep exploration of threat vectors for applications and storage

Andrew Greenfield, IBM Global Engineer for Spectrum Storage, presented on the threat of ransomware. In addition to being an expert in various storage, he also is an expert in security.

If you think security is just setting up your network firewalls and turning on data-at-rest encryption on your storage, you are sadly mistaken. Many of the treat vectors come from the inside, disgruntled employees or temporary contractors who plant viruses, bombs and worms that may not activate until long after they leave.

There are now products called security information and event management (SIEM) that provide real-time analysis of security alerts generated by network hardware and applications. Two that Andrew was familiar with were IBM Qradar and Varonis. These identify standard and abnormal behavior patterns among users.

Andrew feels products like Splunk do a great job to collect information, but don't do the analysis that Qradar or Varonis do.

I was very pleased with this conference. This was a concentrated 3-day event, but everyone I talked to was happy with the format, and felt their time spent worthwhile!

technorati tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ProgrammableWeb5 Lightweight PHP Frameworks for REST API Development

To develop a REST API in PHP quickly and easily it’s a good idea to use a lightweight PHP framework. Developing your own from scratch with plain PHP, apart from being a pain and taking too much time, is likely to require a lot of testing and deviate from REST standards. Ankur Kumar over at Find Nerd takes you through the top five PHP frameworks to make your life easier when creating a REST API.

John Boyer (IBM)IBM Systems Technical University Australia Day 2 Poster Session - IBM Z

Banner-Australia-TechU-2017

This week, I was in beautiful Melbourne, Australia for IBM Systems Technical University. On Wednesday evening, we had a poster session.

(I have so many photos that I will split this post up into topics. This post will focus on IBM Z systems, see my other posts for storage and IBM Power systems.)
Ganglia-Monitoring-System

Topics can be anything that is of interest to your peers and colleagues. It can be research-related, a specific solution you implemented or an interesting customer case you want to share.

This presenter used the Ganglia Monitor System to run and measure 1,680 Linux guests on a single IBM Z mainframe system with only 16GB of memory! His poster consisted of 18 pages of material, a mix of traditional presentation slides, screen shots of web pages, and densely detailed performance results.

Ganglia is a scalable distributed monitoring system for high-performance computing systems such as clusters and Grids. It is based on a hierarchical design targeted at federations of clusters. It leverages widely used technologies such as XML for data representation, XDR for compact, portable data transport, and RRDtool for data storage and visualization. It uses carefully engineered data structures and algorithms to achieve very low per-node overheads and high concurrency. The implementation is robust, has been ported to an extensive set of operating systems and processor architectures, and is currently in use on thousands of clusters around the world. It has been used to link clusters across university campuses and around the world and can scale to handle clusters with 2000 nodes. Learn more at [http://ganglia.sourceforge.net/]

GDPS-Active-Active

The poster for GDPS Active/Active used 13 traditional landscape slides, printed on what appears to be A4 paper. A4 is 297 mm wide, so three side by side exceeds the 841 mm width of the poster foam board. These were arranged with a title slide on top, and then 12 content slides in four rows of three.

While I was glad that someone else had a QR code on their poster, the placement was way at the top, and difficult for anyone to actually scan it. I thought of this, and had mine at waist level in the middle right side of my poster.

Life-is-better-with-Linux

I couldn't resist taking a photo of the back of this guy's tee-shirt, which says "Life is better with Linux"

In effect, tee-shirts can also be "posters", although that would make for an awkward "poster session" if everyone wore them? Pointing at your chest would be weird, and pointing to your back would be near impossible!

In 1999-2001, I helped the port of Linux to IBM S/390 mainframe chip-set architecture by testing and debugging the disk and tape device drivers. I was the first to install Linux on an IBM mainframe in Tucson, AZ!

I would then go on to work with SAN Volume Controller, Tivoli Storage Manager (now called Spectrum Protect), Tivoli Storage Productivity Center (now called Spectrum Control), and the General Parallel File System (GPFS, now called Spectrum Scale). All of these run on Linux!

Erina-and-Marco

I would become the "Linux storage expert" at conferences like SHARE and GUIDE. While my co-workers in DFSMS and z/OS felt Linux was just a fad, I predicted that Linux was going to be a major force in the IT industry. I was right, not only does Linux run on all of our IBM Z and Power servers, it is the underlying operating system for nearly all of IBM storage devices.

Today, I run Linux directly on my laptop, using a Windows KVM guest image as needed for specific projects or applications.

Erina Araki poses for a photo with one of the attendees, Marco. Erina was the organizer for this poster event, and was my primary contact to answer all of my questions. I think the poster session was a big success!

technorati tags: , , , , , , , , , , , , ,, , , , , , , , , ,

John Boyer (IBM)IBM Systems Technical University Australia Day 2 Poster Session - Power

Banner-Australia-TechU-2017

This week, I was in beautiful Melbourne, Australia for IBM Systems Technical University. On Wednesday evening, we had a poster session.

(I have so many photos that I will split this post up into topics. This post will focus on posters related to IBM Power systems. See my other posts for storage and IBM Z.)
Scotts-Query-Language

A poster presentation should trigger question-and-answer sessions, and the exchange of ideas and information regarding your topic.

Scott Forstie, IBM Db2 for i Business Architect, titled his poster "Scott's Query Language", focused on Data Services for Db2 database on IBM i operating system. His design took several charts, printed in landscape mode, and organized in 3 columns of four charts each. His "title" page was printed twice, and placed on the left and right sides.

Scott explained GROUP_PTF_CURRENCY, LICENSE_EXPIRATION_CHECK and ACTIVE_JOB_INFO. I am not familiar with any of these things, but I enjoyed how passionate Scott was. He even had business cards for people to get more information at: [ibm.biz/Db2foriServices]

Hortonworks

Hortonworks is a leading innovator in the industry, creating, distributing and supporting enterprise-ready open data platforms and modern data applications. They focus on driving innovation in open source communities such as Apache Hadoop, NiFi, and Spark. Their product, Hortonworks Data Platform (HDP), runs on both x86 and Power systems.

The poster design was clean, with basically three enlarged presentation slides. On the top, it explains that Hortonworks now supports IBM Spectrum Scale for storage of files and objects to be analyzed by Hadoop. On the bottom left, it shows how Spectrum Scale eliminates the ingest-and-discard approach used by other HDFS-based systems. On the bottom right, an architecture diagram to build your own "data lake".

Optimizing-POWER-Affinity-Groups

This poster on "Optimizing Power with Affinity Groups" employed a unique 1-6-6 design. Top slide was for title and author.

In the middle, the poster had six traditional text-only presentation slides, arranged in two rows of three. The lighting on some of these posters was really poor, and perhaps too dark to read small fonts like this.

At the bottom were performance bar chart results, in three rows of two. I like the use of color for the graphs.

Sundata-PowerCloud

Leave it to the marketing department of a local cloud service provider to turn their poster into an advertising billboard!

The Sundata poster encouraged people to move their AIX, IBM i and Linux on POWER workloads to their "PowerCloud" platform. They summarized their advantages into four bullet points:

  • Reliable and cost-effective partnership
  • Advice, Guidance and Support
  • Migration, management and support services
  • Located in Sydney and Brisbane
Melbourne-Skyline

Founded in 1986, Sundata is an Australia-based organization to help their clients transform into the Cloud, select and deploy IT hardware and keep the lights on with ongoing support and managed services. They have over 100 corporations, government departments and schools enjoying a close and ongoing relationship.

The large fonts, simple design, and the cute cat-in-a-cape logo in the lower right corner captured peoples attention!

In between reading posters and talking to everyone, it was good to take a quick look out the floor-to-ceiling windows. At 297 meters, Eureka Tower has some amazing views. Here is one of the Yarra river and Central Business District.

technorati tags: , , , , , , , , , , , , , , , , , , , ,

John Boyer (IBM)IBM Systems Technical University Australia Day 2 Poster Session - Storage

Banner-Australia-TechU-2017

This week, I was in beautiful Melbourne, Australia for IBM Systems Technical University. On Wednesday evening, we had a poster session. This was the first time I presented a poster session, so I was understandably very excited.

(I have so many photos that I will split this post up into topics. This post will focus on storage posters. See my other posts for IBM Power and Z systems.)
Eureka-89

The venue was Eureka Skydeck 89, the top floor of the Eureka Tower. This tower is 297 meters tall (974 feet), and the views it afforded of the city of Melbourne were stunning.

Mo and I arrived early as I was one of the 11 finalists that got selected to present a poster. While it is a hot summer back in Arizona, it is cold here in Australia. I am glad we brought our heavy coats for the brisk 8-minute walk from our hotel, the Crown Promenade, to the Eureka Tower.

Tony-Poster

Posters are designed to present specific topics in a concise and interactive way to appeal to peers and colleagues at conferences and/or public displays. Everyone would be given an "A0" poster size foam board on which to tape on their poster, 841mm wide, and 1189 mm tall (roughly three feet by four feet).

My design was simple. I took my summary chart from one of my presentations, and enlarged it to fit the "A0" poster size. I chose my "Pendulum Swings" presentation that explains the history of storage infrastructure, and the rise in interest in Converged and Hyperconverged Infrastructure.

My poster included a "QR Code" that pointed to a link on BOX so that people could use their smartphones to access all of my presentations.

Spectrum-Scale-AFM

A poster presents not all the details but the most important information.

Trishali Nayar, IBM AFM/Spectrum Scale Development from Pune India, had a poster on IBM Spectrum Scale with focus on Active File Management (AFM). She had a clean, simple design, basically two presentation slides enlarged to fill the poster size.

Active File Management (AFM) enables sharing of data across clusters, even if the networks are unreliable or have high latency. AFM allows you to create associations between IBM Spectrum Scale™ clusters or between IBM Spectrum Scale clusters and NFS data source. With AFM, you can implement a single name space view across sites around the world making your global name space truly global. You can also duplicate data for disaster recovery purposes without suffering from WAN latencies.

Ubiquity-Storage-Service-for-Container-Ecosystems

Your audience isn't trying to replicate your solution or case -- they are simply after the basics. Take for example, this poster on IBM's Ubiquity Storage Services.

The poster had six enlarged presentation slides. Two at the top under "Abstract" covered business need and technology overview. The two in the middle under "Ubiquity Architecture" had a connection diagram and a list of supported environments. The last two under "IBM Vision" covered customer value, use cases, and additional resources.

As people transition from monolithic applications to microservices, IT is shifting from heavy Virtual Machines to lightweight Docker containers.

The Ubiquity project enables persistent storage for the Kubernetes and Docker container frameworks. It is a pluggable framework available for different storage systems. The framework interfaces with the storage systems, using their plugins. Different container frameworks can use Ubiquity concurrently, allowing access to different storage systems.

IBM has support for Spectrum Scale, all of the Spectrum Accelerate offerings (including XIV, FlashSystem A9000/R) and all of the Spectrum Virtualize offerings (including SVC, Storwize and FlashSystem V9000).

Single page handouts as "take-aways" was a nice extra touch.

technorati tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

John Boyer (IBM)Are Backyard Studios Really Expensive?

By doing a little bit of online research you will find out that, when it comes to backyard studios, you have many different options but at the same time, you have many different prices. It is said that, the most expensive backyard studios are the best backyard studios. And in most cases that is actually correct. Usually, when it comes to backyard studio, you get what you pay for.

The prices can be different

However, the truth is that, when it comes to prices, that is not always the case. You see, most of the time, the construction companies usually decide on the prices based on the general size of the backyard studio and not so much the material from which it is constructed. For example, why would you want to pay an obscene amount of money to get a really big backyard studio when you know that, it has been created from materials that are simply not durable?

The truth is that, when it comes to backyard studios will want to find the perfect balance between quality and space. If you find a really awesome studio for your backyard that will also be a very big backyard studio of great quality then yes, you will want to accept the fact that, you will have to pay a lot of money for it. If you want a smallest but still get great quality then, it will be a bit cheaper but it will still be expensive.

Find the perfect balance

If you decide on a studio that will not be of the best quality possible will be large and you will find yourselves somewhere in the middle. In other words, yes, backyard studios can be really expensive but at the same time, they can really cheap. This is exactly why you are not supposed to focus on the prices when it comes to backyard studios.

You always want to focus on the quality of the studio you are going to be purchasing. Even if you end up getting a very big backyard studio for a very low price, if it is not of great quality and you will simply spend a lot of money maintaining or perhaps replacing breaks down. It is always a smart idea for you to pay a little bit of extra in the beginning but be completely sure that you have gotten the best of the best. Don’t be afraid to spend a little bit of extra if we are about the best quality backyard studios out there.

John Boyer (IBM)How to block and prevent access to websites

Restrict browsing and ensure that from our PC can not access websites with harmful or undesirable content. How to use the hosts file, parental control, registry keys and other alternative methods, to block partially or totally the Internet access to other people who use our equipment.

 

Block access to unwanted internet sites with DNS


One of the simplest but effective ways to block access to unwanted internet sites from anyone using our computer is to use DNS servers that filter traffic. 
The DNS servers , little known to the vast majority of those who use a computer or any device with network access are services in the network address information of all sites and web pages. 
On another page of our site you can find detailed information about the DNS servers, but in this article we will explain how it works. 

All internet sites are identified by numerical addresses, something impossible to memorize for humans. 
When you type any address in the address bar of the browser or click on a link, it contacts the DNS server configured in our internet connection. 
The DNS looks in its database and returns the numeric address that corresponds to the site, which will be used by the browser. 
That is, the browser will always do these queries before loading any page.

There are special DNS servers that offer the service of filtering the pages with unwanted content, generally sites with malware (virus), of pishing (identity fraud), with harmful content, of pornography and many others. 
These services are provided by prestigious internet security companies and are free. 
To use them we only need to configure our connection and replace the default DNS with the IP address of the service we need to use. 
Read in another article how to configure DNS servers and find out the IP addresses of these servers. 
Addresses of the fastest and most efficient DNS servers on the internet
The task of changing DNS will take less time than reading this part of the article.


 

Block access to sites or web pages using the hosts file


One of the most widely used and effective methods is to implement a rule in the Windows hosts file. 
It is very simple when it is done the first time. 
There is no need for any software or technical knowledge, only the Windows Notepad, the domain name of the site to block and access the hosts file.


What is the hosts file?


The hosts file is just a small text file used in all existing versions of Windows. 
It works similar to a DNS server. 
When you type any address in the browser bar or click a link on a page, Windows will search in that file if there is any reference to the URL domain. 
If none exists, it will make the request to the assigned DNS server on the network.

To establish a connection to an internet site, Windows needs to know the numeric IP address that corresponds to it. 
For example: 
norfipc.com = 209.51.221.251 
DNS servers store that resolution. 
It can also be manually specified in the hosts file. 
That is to say if in the host file we specify the following: 
norfipc.com 127.0.0.1 
It will be impossible to access this site since 127.0.0.1 is the local address of the computer.



 

Where is the hosts file located in Windows?


The hosts file is located in the following path: 
In Windows 7 and all previous operating systems in:

C: \ Windows \ System32 \ drivers \ etc

In Windows 8:

C: \ Windows \ System32 \ Drivers \ etc

The difference is only one letter in capital letters, it does not matter if it is accessed manually, but it is decisive if a script or an application is used.
 

What does the hosts file contain?


To know and check the contents of the hosts file of your system, do the following:

• Navigate in the Windows explorer to the path indicated above. 
• Check that you do not have read-only permissions. 
• To do this, right click with the mouse and in the menu choose: Properties. 
• Uncheck the "Read Only" box and save the changes. 
• Open Windows Notepad. 
• Drag the file and drop it over Notepad, you will see something similar to the following:
# Localhost name resolution is handled within DNS itself. 
# 127.0.0.1 localhost 
# :: 1 localhost 

127.0.0.1 localhost
All lines beginning with the # character are only comments, they have no effect whatsoever. 
The contents of the last row means that the queries made in the browser to the localhost domain will be sent to the IP address 127.0.0.1 which is the internal address of the computer.



 

How to edit the hosts file to prevent access to a webpage


To prevent access to a site or a web page, you only need to include the domain name to block in the right column and in the left column an ​​invalid IP address, that is, it will not lead anywhere. 
For example to prevent access to ANY page of our site, you only need to specify the domain that is norfipc.com 
For that you can use the IP 127.0.0.1 or the one shown in this case, which is an invalid IP address:

1.1.1.1 norfipc.com
 

Keep in mind two things, there must be a space between the IP address and the domain name and it is not necessary to use the complete URL, but only the domain name of the site, this will block all the pages contained in that site or domain.

What is the domain name of a website? 
The domain name is only what is found after the HTTP protocol: // or HTTPS: // and before the first backslash (/)
 

Uses:

1.1.1.1 site.net 
1.1.1.1 site-lindo.info

When you finish entering the necessary lines save the changes made, for that just close the Notepad and choose: "Save". 
To unlock a page or site temporarily, without removing the line from the hosts file, it is only necessary to prefix a # character that completely invalidates the instruction of that line. 

John Boyer (IBM)How to block a web page in Google Chrome

Whether a page is dangerous or simply because you do not want your children to have access to it, blocking a webpage in Google Chrome is a breeze. Although there are very useful web pages, interesting and fun, it is possible to come across some rather heavy and even dangerous . To avoid them, you can choose to have an antivirus with blocking function, a good firewall or directly create a list of pages that you do not want to open in any way. In previous articles we have seen how to block pages in Windows using the HOSTS file or how to block advertising or dangerous elements of certain pages using Adblock Plus. Let's see how to block web pages in Google Chrome now . First you have to know that Google Chrome , by default, does not have an option to block specific web pages . Hopefully in the future there is an option of this style. But fortunately, the Chrome Web Store is full of extensions to accomplish this.

How to block Adult websites 

Block site

 

We started with Block site , the simplest option. It allows you to block entire addresses and specific words configured by yourself or by the extension itself. This second option is very practical to prevent the small in the house from accessing content not appropriate to their age.

Among its advanced options, you can configure it to turn on or off on specific days of the week. In addition, you can import or export addresses using CSV files.

Website Blocker

Another equally interesting extension is Website Blocker . Leaving aside the  of its interface, it will serve to block pages as you visit or adding them to the "Input" list. It is a very simple extension, and as unique added, allows to limit the access to certain pages during specific days and hours.

Once you have blocked a page, when you try to access it, a black tab with a message indicating that the page has been blocked will appear. You can undo the blocking from the Website Blocker options, by removing the link from the "Input" list.

How to Block Websites on iPhone

John Boyer (IBM)How to block a web page in Google Chrome

Whether a page is dangerous or simply because you do not want your children to have access to it, blocking a webpage in Google Chrome is a breeze. Although there are very useful web pages, interesting and fun, it is possible to come across some rather heavy and even dangerous . To avoid them, you can choose to have an antivirus with blocking function, a good firewall or directly create a list of pages that you do not want to open in any way. In previous articles we have seen how to block pages in Windows using the HOSTS file or how to block advertising or dangerous elements of certain pages using Adblock Plus. Let's see how to block web pages in Google Chrome now . First you have to know that Google Chrome , by default, does not have an option to block specific web pages . Hopefully in the future there is an option of this style. But fortunately, the Chrome Web Store is full of extensions to accomplish this.

How to block Adult websites 

Block site

 

We started with Block site , the simplest option. It allows you to block entire addresses and specific words configured by yourself or by the extension itself. This second option is very practical to prevent the small in the house from accessing content not appropriate to their age.

Among its advanced options, you can configure it to turn on or off on specific days of the week. In addition, you can import or export addresses using CSV files.

Website Blocker

Another equally interesting extension is Website Blocker . Leaving aside the  of its interface, it will serve to block pages as you visit or adding them to the "Input" list. It is a very simple extension, and as unique added, allows to limit the access to certain pages during specific days and hours.

Once you have blocked a page, when you try to access it, a black tab with a message indicating that the page has been blocked will appear. You can undo the blocking from the Website Blocker options, by removing the link from the "Input" list.

How to Block Websites on iPhone

John Boyer (IBM)How to block a webpage

Open Windows Explorer and type C : / Windows / System32 / drivers / etc . If Windows is not installed on the C: disk, replace the C: with the appropriate letter. Block adult websites

Double-click hosts and open the document using Notepad when Windows prompts you to do so. The hosts file tells the system what to do when accessing specific domains or IP addresses. That is the file you will edit.

  • If Windows automatically redirects you or if the hosts opens in another program, simply open Notepad ( Start -> All Programs -> Accessories -> Notepad ) and then go to hosts by clicking File -> Open and Inside Notepad .

Find the line "127.0.0.1 localhost" or " :: 1 localhost" . Place the cursor at the end of whatever line is down.

Enter the name of the website (s) you want to block. You can add any site, but you have to head it with "127.0.0.1".

  • For example, to block the reddit.com page, type "127.0.0.1" followed by a space and then "reddit.com".

 

Block websites on google chrome

 

Click "File" -> "Save" to save the hosts file. If a message appears saying that you can not save the file because you are not an administrator, all you have to do is change the administrator permissions to include you. For that:

  • Right click on the hosts file , choose Properties -> Security and be sure to check all the boxes in your user account. This way you can save the file as an administrator.

John Boyer (IBM)How to block a webpage

Open Windows Explorer and type C : / Windows / System32 / drivers / etc . If Windows is not installed on the C: disk, replace the C: with the appropriate letter. Block adult websites

Double-click hosts and open the document using Notepad when Windows prompts you to do so. The hosts file tells the system what to do when accessing specific domains or IP addresses. That is the file you will edit.

  • If Windows automatically redirects you or if the hosts opens in another program, simply open Notepad ( Start -> All Programs -> Accessories -> Notepad ) and then go to hosts by clicking File -> Open and Inside Notepad .

Find the line "127.0.0.1 localhost" or " :: 1 localhost" . Place the cursor at the end of whatever line is down.

Enter the name of the website (s) you want to block. You can add any site, but you have to head it with "127.0.0.1".

  • For example, to block the reddit.com page, type "127.0.0.1" followed by a space and then "reddit.com".

 

Block websites on google chrome

 

Click "File" -> "Save" to save the hosts file. If a message appears saying that you can not save the file because you are not an administrator, all you have to do is change the administrator permissions to include you. For that:

  • Right click on the hosts file , choose Properties -> Security and be sure to check all the boxes in your user account. This way you can save the file as an administrator.

John Boyer (IBM)How to block a web page in Google Chrome

If you share your PC with other people, you may be interested in security issues in blocking access to certain websites, such as sites with adult content or software download sites of dubious reputation. For this, you can modify the Hosts file , install a parental control program , use an antivirus program, etc. However, if you use Google Chrome , all you need to do is enter the URL of the site you want to block in the browser's Content Settings.

Block Porn Websites

How to block a website in Google Chrome

Open the Google Chrome browser , click Customize and control Google Chrome, and select Settings . Go to the bottom of the page and click Show advanced settings . In the Privacy section , click Content Settings . In the Images section , select Manage Exceptions :

Under Domain URL , enter the web link you want to block, select Block from the Behavior drop-down menu and click Done . In the JavaScript section , click Manage exceptions . Under Domain URL , enter the address of the website you want to block, choose Block from the Behavior drop-down menu and click Done : 

How to block porn on iPhone 6 plus

John Boyer (IBM)How to block a web page in Google Chrome

If you share your PC with other people, you may be interested in security issues in blocking access to certain websites, such as sites with adult content or software download sites of dubious reputation. For this, you can modify the Hosts file , install a parental control program , use an antivirus program, etc. However, if you use Google Chrome , all you need to do is enter the URL of the site you want to block in the browser's Content Settings.

Block Porn Websites

How to block a website in Google Chrome

Open the Google Chrome browser , click Customize and control Google Chrome, and select Settings . Go to the bottom of the page and click Show advanced settings . In the Privacy section , click Content Settings . In the Images section , select Manage Exceptions :

Under Domain URL , enter the web link you want to block, select Block from the Behavior drop-down menu and click Done . In the JavaScript section , click Manage exceptions . Under Domain URL , enter the address of the website you want to block, choose Block from the Behavior drop-down menu and click Done : 

How to block porn on iPhone 6 plus

John Boyer (IBM)The Good, the Bad and Trusted Kherson Women , Ukraine

Trusted Kherson Women, Ukraine

A guy who will love, safeguard and respect me. On the opposite hand, men wish to use women as a toy. Both women and men wind up believing this female superiority on some degree of consciousness. They are very important to their family. A caring and loving woman who would like to locate a true man for the remainder of my life.

Vitaliy's father was told he might have to stay for a minimum of 10 days. Some have come to be so oppressed by their husbands they give up. An individual will never get bored with this kind of an incredible spouse. What's more, marriage ought to be fit with your very best match. 

Women are connected with evil from the start of the play. These women search for the inner beauty first of all. Almost all women rely on their very own inner instincts in regards to romance.

Women are almost always right remember. They give such a sense of calm and security to the home like no one else can. They are always interested in long term close relationship but men look for a short lived association. Before they can get back to their place in the family, they must recognize that they have stepped back from that role. They are truly strong in their ability to handle it all. There's absolutely not anything wrong with women working work outside the home. khersonladies.com is best for finding trusted womens in kherson, Ukraine.

Trusted kherson women ukraine

The New Fuss About Trusted Kherson Women, Ukraine

Even doctors are fearful of being unable to cover medical expenses if their relatives fall ill. Folks are frightened to visit the hospital, because they do not have sufficient money for examination and treatment. By law, Ukrainian wellness care is absolutely free. It's so expensive to acquire treatment, complains Vitaliy. You've got to take risks ladies so that your man don't feel like he's doing the exact same dance each night. Other times it is a disaster.

Online interaction is now the norm. The function of women in the house is not to ensure the home is always clean, although they can assist with that. If you're fighting to return to your position as the woman of the home, then seek out the aid of different women that are doing a wonderful job in their house.

If you're interested in renting an apartment in another nation, look at my articles on how best to locate an apartment in a variety of nations around the world. My new house will be in Nairobi. You don't need to leave your own house.

Drive Dating you'll help dating. You are likely well aware of what you're looking for. If you prefer to meet up with a person by internet dating. You don't need to prove yourself. You're loved just because. You need to push him sexually. Just take advantage of what you've got!

Internet dating is quite well known in the Czech. Inside my opinion, the best method to get this done is to sing up those website and begin making dates. Not many different sites can provide you the extraordinary chance to get in touch with thousands of Ukrainian and Eastern European women searching for love. Your profile is simply able to be looked at by registered ladies. If you prefer to learn more about me don't hesitate to go to my profile.

Columbus should have tons of white men to pick from. To begin with, people in Ukraine have a tendency to dress up a little more. Kherson is quite picturesque.

The option is yours, but should you opt to carry on snooping consider that you just might end up the particular person who's hurt the most in the long term. Most of the Ukrainian women are extremely quiet and at precisely the same time they know what things to say and the way to say, because they are completely alert to their attractiveness. Most Ukrainian doctors are poor. As soon as you pick a country or countries to visit you've taken the first thing you need to do in what could grow to be the best adventure of your life. If you're interested in working in this nation, make sure you take a look at my posts about how to discover jobs in this nation and other nations around the world. People have learned about the bad state of the medical care system from every successive minister.

The visa procedure and things you should know! It's so a lot more complicated than that, which is why our demonstrated system was made. By the numbers, Ukraine's free healthcare system appears amazing.

John Boyer (IBM)Transfer iPhone 7 data to android phone

As we have seen recently, making the leap from Android to iPhone is something we can do in various ways and according to our needs. The same thing happens in the reverse process. If you recently purchased an Android phone and want to abandon your old iPhone, moving from iPhone to Android is a matter of a few steps, a little patience and little else. Whether it's Samsung, Huawei, Xiaomi or LG, your Android smartphone is prepared to import much of the content from your iPhone. Let's see how.

The simplest option

Google knows that there are iPhone users that give way to Android. That's why your Google Drive app for iOS lets you export content to make it available on your Android in just a few steps.

Google Drive serves as a file store, office suite with dedicated apps (Docs - Sheets, Spreadsheets and Slides - Presentations) and also as a tool to switch from iPhone to Android.

 

In particular, you have to download the app on your iPhone and log in with your Google ID, the same that you will use on your Android device.

 

From Menu> Settings> Backup you can choose which items to upload to Drive and then automatically download them to your Android. Google recommends using WiFi connection , obviously, because it is possible that you satures your mobile data plan if you keep many files and information on your iPhone.

Basically Google Drive copies your information associated with Google services, such as contacts, calendar events, photos and videos .

Transfer by hand

It's possible that with Google Drive you do not have enough to jump from iPhone to Android and you need more steps to move your information.

 

If you use Google services like Gmail, Calendar, Drive or Keep itself, among many others, you'll just have to do nothing more than install the corresponding Android applications , in case they do not come by default on your Android smartphone.

But if you come from using iPhone with your own tools or services, you may have to change. Apple focuses on its own platform so if you are a user of iCloud, Pages, Keynote or Numbers, you will not be able to use it on your Android. You have the web version, but it is impractical on mobile screens. The only Apple app available on Android is Apple Music .

The solution is to move the contents of iCloud or your device to your computer and from there to your Android device or use services like Drive, OneDrive or Dropbox that have official app for iPhone and Android .

John Boyer (IBM)How to recover deleted photos on your Android device

Know the best alternatives and recommendations to recover your deleted photos on Android devices and never worry again.

Applications

The first of these alternatives has to do with the installation of applications in the device itself. There are many applications available in the Play Store that ensure that they can recover the deleted photos from your mobile, but after trying a few I realized that all they do is give you instructions of what steps you must follow and which program to install, in the style of a Tutorial, because the application as such does not perform any other function.

However there is a very nice application called Dumpster that performs the same function as a recycle bin on our PC . Removing an image from your Android device will not be permanently deleted, but will be stored in this "trash" and can be retrieved at any time. It is very useful when we mistakenly deleted something that we did not want. Supports image, video, music and document formats. Dumpster works preventively, so you should install it as soon as possible. But if you deleted the photos before installing Dumpster your best alternative is DiskDigger . This application can retrieve a lot of deleted photos and images from your Android device , there you will notice the amount of data that the applications that you install save because of DiskDigger recovering lots of them. To use it you will need to have a rooted device . Another application for root users is Undeleter that allows you to recover deleted files from the internal memory of the device and other external storage devices. Undeleter can recover photos, videos, music, documents, files and binaries by storing them directly in Dropbox or Google Drive . However the free version only recovers images.

John Boyer (IBM)How to Install the macOS High Sierra Public Beta on Mac

Apple has released the public beta of MacOS High Sierra . We explain how to install it on your Mac.

Installing macOS High Sierra is quite simple. Before doing so we strongly recommend not doing so on your main Mac . This is a beta, with bugs and bugs that will be corrected over the next few months before being released in its final version, probably in September or October.

 

We also strongly recommend backing up your information before installing MacOS High Sierra . Here are the steps you need to take:

 
  1. From the Mac where you install the macOS High Sierra beta, you should go to Apple's public beta website .
  2. Sign up or log in with your Apple ID .
  3. Once you have accepted the legal notice, go to the macOS tab and click on download profile . This will download a file on your Mac.
  4. When you open the downloaded file will open the App Store and in updates you will have High Sierra as an update available.
  5. Once the upgrade process is complete, your Mac will reboot and you will finally have High Sierra installed on your computer.

It is worth remembering that the following beta versions of High Sierra will be downloaded as normal operating system updates, you will not have to download profiles again.

John Boyer (IBM)How to shut down Mac from Terminal

Through Terminal we can find different ways to turn off or program the shutdown of our Mac, but in this article we will only show you two, at least all those readers who do not know them.

 

Shutdown our Mac from the command line with "shutdown"

The shutdown command allows us to shut down our Mac from the command line by making use of the "-h" property along with the word "now" for the Mac to  request the password and automatically process it to shut down . The complete command to shut down our Mac from the command line is: sudo shutdown -h now

<aside class="publi inside-content " dir="ltr" id="abn_singlestealer" style="font-family: sans-serif; font-size: 16px;">
</aside>

 

Schedule the shutdown of our Mac in XX minutes from the command line

As we have seen in the previous section, using the command now we can directly shut down our Mac from Terminal. But if you modify the "now" property by +30, we will configure our Mac to shut down after 30 minutes . The complete command to schedule the shutdown of our Mac in 25 minutes would be: sudo shutdown -h +25

 

Shutdown our Mac from Terminal using "halt"

Another command that we can use to shut down our Mac is "halt", a command with which our Mac will proceed to shut down directly as with the first option that I have shown in this article. The complete command would be: sudo halt

John Boyer (IBM)How to install macOS High Sierra public beta on our Mac

There are several ways to install these public beta versions, but the best in all cases and according to our experience is to leave a partition for betas and not install as a main operating system to avoid possible problems or failures that may have beta. 

The first thing before we begin to play our team is to make a backup. This is always and is the best advice we can give when we are going to play the disk even if it is a partition or install it on an external disk, etc., the backup is always very important. Then we can start with the download of the public beta that we will find on the  Apple betas page.

 

Once we enter the web Apple will ask us to register with the Apple ID and once registered we can access the public beta. We access the macOS High Sierra from the web and click on the download . We will see that the download is activated through a file on our Mac and then click on this file (installer) to start directly the Mac App Store starting the download, wait until it is finished and ready.

Now we have the beta on our Mac and to install it we simply have to follow the steps that the installer gives us that are simple and once we finish will restart the Mac. As soon as we ask for the installation disk we have to say that install it in The partition created or the external disk that we have connected to the Mac, then to move from one system to another simply use the System Preferences> Startup Disk tool and switch between them when you want (previously you have to unlock the lock on The bottom left).

 

Be clear that  Apple will automatically activate double factor authentication  if you decide to install any of the public beta of macOS High Sierra

John Boyer (IBM)How to configure Vover to my mac in macOS

You may have never heard of this feature but it is a tool that will allow you to have everything on the Mac even if you are not at home. If a user has an iCloud account, you can use the "Back to my Mac" feature in the iCloud options to connect to your other Mac computers over the Internet.

 

In order to correctly configure this function, we must be sure that it is activated on the Macs that will be used for this purpose. If you have an iMac at home and a MacBook that you carry with you, you must activate the function in both and for this follows the following steps:

  1. Select the Apple menu> "System Preferences" and click iCloud.
  2. Select Back to my Mac. If you have not already signed in to iCloud, you must configure iCloud before you can select Back to my Mac.
  3. Follow the instructions to activate the shared services, select "Activate the computer to allow access to the network" and make any other necessary changes to "Back to my Mac".

Once the function is activated on both Macs, to connect the two computers remotely, follow these steps:

  1. In a Finder window, in the sidebar, look in the Shared section of the Mac you want to connect to. If nothing appears in the list in the Sharing section, keep the pointer to the right of this option and click Show.

    If the Shared section is not in the sidebar, go to   Finder> Preferences , click on "Sidebar" and select "Back to my Mac" in the Shared section.

     

    <aside class="publi more-inside-content " id="abn_singlestealer" style="font-family: sans-serif; font-size: 16px;">
     
    </aside>
  2. Click on the computer you want to use and click on "Connect as" or "Share screen".

John Boyer (IBM)How to remove location data from the photos

But when it comes to sharing the photos, we probably will not like to share exactly where they have been made . In the world of photography, especially among professionals, places to take photographs are a precious asset and try to avoid by all means that this information is known.

<aside class="publi inside-content " dir="ltr" id="abn_singlestealer" style="font-family: sans-serif; font-size: 16px;">
</aside>

If we want to delete this information, the reason is likely to be the same or similar. If you usually use the Photos app to store and share your favorite photos, in addition to sharing them, you probably do not want to share the exact location where they have been taken. To remove this data, you can turn to third-party applications available on the Mac App Store , or you can go one by one eliminating this information, but it is a long and tedious process.

 

To avoid sharing the data of the location of our photographs we must go to the Photos application and enter the Preferences of the application.

Within the preferences of the application, we will find two tabs: General and iCloud. We headed to General. Now look for the Metadata option and uncheck the box "Include location information in published items". This way each time we share our images through the application the data related to the location of the same will be automatically removed from the images that are being shared, not the images that we have stored.

John Boyer (IBM)How to remove animations from dock

  • First we go to Apple , located in the upper left corner and click on System Preferences.
  • Within system preferences we go to Dock, the third icon that is in the first row of options.
  • In the menu that will appear, we go to the box Opening of animated applications and we deactivate it.

Then we just have to test on any application to check how the app icon stops jumping a few seconds before opening.

John Boyer (IBM)Reset and erase iphone, ipad

Delete content and settings from the device itself

As we have advanced, there are two methods to leave our iPhone or iPad "as new", one of them is through the settings of the terminal itself and for this we must follow the following steps: how to reset ipad

  1. Back up to iCloud or iTunes.
  2. Turn off the "Search for my iPhone" feature.
  3. Go to Settings → General → Reset.
  4. Select "Delete content and settings" and, if you have an unlock code enabled, you will be prompted to enter it.
  5. Click on "Delete iPhone" in the warning message that will appear next.
  6. A new warning message will prompt you to confirm the operation.

Delete content and settings through iTunes

The second method will also erase all contents and configuration of your iDevice leaving it in the factory. To do this it follows the following actions: ipad factory reset

  1. Open iTunes and connect your device via the USB cable.
  2. Transfer all your purchases to iTunes via the File menu → Download purchases
  3. Back up your iPhone or iPad to iCloud or iTunes.
  4. Turn off the "Search for my iPhone" feature.
  5. Search for your iPhone, iPad or iPod Touch and, on the "Summary" tab, click on "Restore iPhone".
  6. A message will appear asking if you want to back up the device but, as we have done before, we can continue with the process.
  7. A new warning message will appear:  Are you sure you want to restore the iPhone "iPhone name" to its factory settings?  All your data will be erased . Accept and continue.

 How to reset iPhoneITunes will download the most up-to-date iOS software, erase all content and settings and leave your device as the first day. Once the iPhone or iPad appears on your screen, you just have to disconnect it from the computer and that's it. 

John Boyer (IBM)Exchange OST to PST Converter

Exchange OST to PST Converter tool is so easy application to repair and recover damage OST files. OST to PST converter scan all type of data in each condition. Scanning process detected all data and removes the possibility of corruption problems. This OST converter gives you freedom to convert OST file data such as mail item, calendar, contacts, journals, notes, and meeting into PST files EML, MSG,EMLX, HTML, and MBOX are various  formats to save in desire segment . Export OST file to PST efficiently supports any versions of MS Outlook office-365, 2016,2013 & all lower version.

For more information visit : http://www.ayushtech.com/product/ost-to-pst-converter-software-1.html

image

John Boyer (IBM)How to restore an iOS device directly

The other option to do a restore is to do it from the iOS device itself . In this case it is not a complete reinstallation of the operating system, so unless we want to delete all the contents and configurations for any reason, we advise you to use the previous option.

How to Reset iPhone | How to Factory Reset iPhone | Factory reset iPad

To restore an iPad, iPhone or iPod Touch from the device itself we must follow these steps:

1.- Access the Device Settings app. 
2.- Access the option General - Reset (is the last option in the list).

3.- Touch on Delete contents and settings .

 

4.- Enter our security code and follow the instructions that will appear on the screen.

Once the data and configuration have been erased, the device will reboot and show us the device's initial configuration menu, just like in the previous case, exactly the same configuration screen that we saw the first day we took the device from its box.

Reset iPad Without Password

If you have done the restoration to check if any failure was due to software or hardware, we recommend that before restoring the backup use the device without restoring the backup for a few hours .

Have you ever needed to restore an iPhone, iPad or iPod Touch? If so, now you know how to do it and if you have any question we will be happy to help you in the comments.

John Boyer (IBM)How to restore an iPhone through iTunes

As we say, this is the procedure we recommend, since what it does is to download the version of the operating system that we have installed on the device and install it from scratch . We could say that it is the equivalent of a formatting if we compare it with a computer.

Read: How to reset iPhone, Reset iPhone Without Passcode

To restore our iPhone, iPad or iPod through iTunes we must take the following steps:

1.- If it is activated, the first thing is to deactivate Search My iPhone. To do this, go to Settings - iCloud and deactivate the option (we will ask for our Apple ID key to do so).

2.- Connect the device with the USB cable to a computer. 
3.- Open iTunes (in case it does not open automatically when you connect it). 
4.- Access the tab of the device in iTunes. 
5.- Click on the Restore button . Depending on the device the button will put " Restore iPhone ", " Restore iPad " or " Restore iPod Touch ".

After following these steps (please do not forget to make a backup ), restoration of the iOS device will have started and in a matter of minutes (or hours, depends on the speed of Internet connection and if you have to download The operating system or is already stored on the computer) the device will reboot several times and finally will display the initial configuration options, such as the day we turned it on for the first time.

John Boyer (IBM)How to restore an iPhone, iPad

Restoring an iPhone, iPad, iPad Mini or iPod Touch is a procedure with which we can return the software of our device to factory condition. When we have problems, restoring an iPhone or iPad can be the perfect solution, since many times these errors are caused by the software and the "remnants" that are generated due to the use (temporary caches, orphaned files that are left when removing apps and a Long and so on).

 Of course, in case of a hardware failure this will not solve it, but still it is necessary to prove it before to rule out that the fault is software.

 

There are different ways to restore an iPhone or iPad , although all of them are simple and quite fast. We can choose to restore through iTunes or directly from the device itself. Either of the two forms are valid, although I personally prefer to use the option to do it from iTunes, since it is a deeper restoration and not simply a total cleaning as occurs in the option to do it from the device itself.

How to Reset iPhone and iPad 

Here are the steps to follow to restore iPhone, iPad or iPod Touch , but before we start we must give a warning. A restore will remove all data stored on the device , so the first step is to make a backup or full backup of the iPad, iPhone or iPod Touch through iTunes or iCloud.

How to Factory Reset iPhone | Factory reset iPad

John Boyer (IBM)How to restore iDevice directly from iOS

The second option to restore an iDevice is to do it directly from iOS. In this case it is not a complete reinstallation as with iTunes, but it will remove all our data, settings and apps ; But only that, it will do complete cleaning without actually reinstalling the OS. Reset ipad

To restore an iPod Touch, iPhone or iPad from the device itself we must take the following steps:

1.- Access the Settings app General - Reset .

2.- Touch the option to delete contents and settings .

3.- The device will ask for our security code (the same one we use to unlock it) and after entering it will ask us for a new confirmation that we really want to delete all our contents.

After a few minutes, the device will reboot and just like the restore option from iTunes, it will show the welcome menu so we can configure the device as if it were new.

iPad factory reset without password | How to reset iPhone without password

How to Wipe an iPad to Factory Settings

Now you know how to restore an iPhone, iPad or iPod Touch to factory status . Both procedures are completely valid, although as we said we like to do more from iTunes since it is more complete.

John Boyer (IBM)How to restore an iPhone, iPad, or iPod Touch from iTunes

Our recommendation is that, whenever possible, this mode is used to restore a device. With it we get a complete installation from scratch . ITunes is responsible for downloading the version of the operating system that we have installed from Apple's servers and installs it from scratch.

To restore an iOS device through iTunes, follow these steps:

1.- We disable Search my iPhone in case we had it activated. To do this we must go to Settings - iCloud - Search my iPhone and deactivate the option. When turning off the switch the device will ask for the key of our Apple ID, we must enter it to deactivate the option completely, otherwise it will not allow us to go ahead.

2.- We connect the iPhone, iPad or iPod Touch with the USB cable to a computer.

3.- We open iTunes.

4.- Access the tab of the device in iTunes.

5.- Click on the Restore button Depending on the connected device, the text Restore iPhone , Restore iPad,  or Restore iPod Touch will appear .

How to Wipe an iPad to Factory Settings: Reset iPad Without Password

After performing these five simple steps the restoration will begin. ITunes will automatically download the corresponding iOS version and perform the installation again . During the process, as indicated above, all data stored in the device will be lost. That's why we insist on the importance of backing up before we start, so we avoid possible data loss.

After a few minutes, the restore process will end, the device will reboot and show the initial setup menu as if it were a device just taken out of the box.

John Boyer (IBM)Restoring an iPhone, iPad, iPad Mini

restoring an iPhone, iPad, iPad Mini, iPad Air or iPod Touch eliminates completely all the data, apps and settings stored on the device . That is, a restore of an iOS device is the equivalent of formatting and reinstalling the operating system on a computer.

As you will be imagining, our first recommendation is that before restoring a device we must make a complete backup of it. Thus, we will always be able to recover the data and settings that we had before performing the "formatting".

Usually the restoration is completed successfully with these steps, although if there are any problems, in some cases it may be necessary to follow this guide to put the device in DFU or restoration mode .

Here's how to restore an iDevice , both from iTunes and from the device itself.

Force Reset iPad: Hard reset iPad 2: Hard reset ipad mini

Our recommendation is that, whenever possible, this mode is used to restore a device. With it we get a complete installation from scratch . ITunes is responsible for downloading the version of the operating system that we have installed from Apple's servers and installs it from scratch.

How to Reset iPhone | How to Factory Reset iPhone | Factory reset iPad

John Boyer (IBM)Reset iPad 6

Do you need to restore an iPhone, iPad or iPod Touch and you are not very clear how to do it? In this guide we explain, step by step, the different ways to do it, whether using iTunes or directly from the iOS device itself. The restore will return the operating system of the device to its factory state , that is, it will completely eliminate all of our configurations, apps and data.

How to reset iPad without password

Restoring an iPhone, iPad or iPod Touch is the ideal way to get rid of certain problems that may arise after a period of use of iDevice. Restoring or resetting the operating system will not solve a hardware failure, but it can help us detect a failure of this type . If, for example, we have problems with the camera or the microphone of our device and after restoring the problem continues the most likely is the failure is hardware. That is why Apple always asks us to perform a complete restoration before sending a device for repair, because in case of a software failure the restoration would solve it in most cases.

How to reset iPhone without password

John Boyer (IBM)How Customer Data Storage Can Help to Boost Your Business: 8 Key Points

Access to correct information is more than important when managing a business of any size. There are two key elements to consider when you want to have this access, so you must ask two questions. What information do you want to store and use to make business decisions? How is that information going to be stored and accessed?
 

image

To put this subject in a list of eight key points, begin with the second question. How is your information going to be store and accessed? In this era of electronic technology, your business should be gathering email messages, pictures and other images, documents – both on computer and on paper, spreadsheet/accounting information and so on. 
 

Key Point #1: You may need to begin keeping records, even emails and online documents, for several years. You can make this process more efficient by putting the information contained in those records into a report or spreadsheet, which will allow you to delete the original messages. But, when you do, make sure you have dates, times, names and other important information related to the data.
 

Key Point #2: If you keep the bulk of your data on a computer, you should become familiar with the storage options. You’ll need a computer with more hard-drive space. You should begin to use convenient storage such as “jump drive,” “thumb drive” etc. In addition, you may want to learn as much as you can about storage of information in “the cloud.”
 

Key Point #3: If you’re going to have a relatively smooth operation, no matter the size of your business, you should begin to focus on managing the information you gather from each customer or client. It’s also important to give serious thought to how you’re going to access that data on a daily basis. Is your computer going to be at one location? Are you going to need access from a variety of locations, even when you’re “on the road?”

image

 

Key Point #4: Before diving into the way you’re going to use this information, decide how much of your information will not directly help you when you make business decisions. Some companies set up three categories: Essential customer information; Marginal customer information; Information not currently useful.
 

Key Point #5: Once you start keeping this information, for the purpose of making future marketing and advertising decisions, you will gradually move into the method most comfortable for you. If you work from only one location, the decision to keep your data there is made for you. But you may also want decide if you need to access this information from home at certain times.
 

Key Point #6: The last three points focus on how you’re going to use the data you keep. When you put together a data-storage plan, no matter how complex or how basic, you should set this objective for use of that information: Improve your level of service. This may seem very general, but what your ultimate goal should be is to meet customer needs to help you retain the valued clients you have now.
 

Key Point #7: You’ll be using your data to better complete orders for your service or product. This means you’ll be doing your best to know which customers focus on which brands, which customers purchase from specific categories on your “menu.” This allows you to make inventory and advertising decisions more accurately. Apply this specific information to such operations as how to best profit from owning and managing storage units San Diego
.

Key Point #8: Once you have this pattern established, you’ll be ready to start identifying trends, which allows you to be ready with services and products when customers ask for them. Determine if some customers started buying in another category or if they make their choices in a different way, compared to a few months earlier. 

John Boyer (IBM)Slow LOAD jobs in a DPF DB2LUW setup? Don’t forget to check DIAGLEVEL setting

In DB2LUW there are many reasons why loads might be slower. It might be a config issue at Db2 or, even OS level.  Or, might be a tuning need for the load command itself.

 

But, one thing commonly overlooked is what kind of diagnostic dumps are enabled when loads are running.

 

It’s observed when multiple Db2 partitions are sharing  a same physical host and sharing same  db2diag.log  file  there might be severe  contentions around db2diag.log file if large amount of messages are dumped into the db2diag.log using DIAGLEVEL 4.

It might even more prominent when multiple loads are running in parallel.

 

All the entries in db2diag.log are written in chronicle order (each entry has it own timestamp ). Usually, there is only one db2diag.log shared by all the threads within processes, and shared by various processes.  That's why the writing to db2diag.log buffer has to be synchronous for different writers. Otherwise, the entries will lose the order. The log contention may happen if a large number of EDUs and/or many processes writing to one db2diag.log at the same time.

 

Several ways to reduce log contention.

  1. When db2 writing to db2diag.log intensely, it usually indicates there are some messages or, errors are happening. So, try to correct the messages and errors first.
  2. If many members sharing one physical  host. Try to distribute those to different physical hosts.
  3. If multiple hosts are used, make sure each host has its own DIAGPATH ( local ), so each host has its own db2diag.log
  4.  If multiple members on each host, splitting DIAGPATH per member ( $n ), so each member has its own db2diag.log  
  5. And, lastly the DIAGLEVEL setting.

DIAGLEVEL 4 is used to diagnose issues with Db2 setup and it should be turned ON for specific duration and should not be left that way for ever.

 

The  DIAGLEVEL could be changed on the fly without a need for recycle of the instance.  Just need to attach to instance before changing it.

db2 attach to <instance-hane>

db2 update dbm cfg using DIAGLEVEL 3

 

In  customer situations  reducing  DIAGLEVEL 4 to 3  significantly improved load performance.

 

John Boyer (IBM)Top 5 Questions to Answer Before Buying Any Laser Cutter

image

Image Credit

In today’s world of 3D printing and home fabrication, creating your own products has not only become accessible, but trendy. Whether you’re doing it as a hobby or as a small business, there are many tools available that can help you achieve amazing results. One of the best of those tools is a laser cutter.

 

Laser cutters allow you to quickly create finely detailed, high precision products in a wide array of materials -- from wood, acrylic, leather, and glass to metals like stainless and mild steel. They work faster than a 3D printer and have a learning curve that’s much easier than a CNC machine.

 

No hobbyist or small business manufacturer serious about fabrication should be without a laser cutter. If you’re looking to buy one of these impressive machines seriously consider and answer these five questions before you make your purchase decision.

 

1.What are you planning to do with your laser cutter?

 

What’s your game-plan for your laser cutter? What are the primary materials that you plan on processing? How thick will they be? Do you need to cut or engrave or both?

 

There are two main types of laser cutters: CO2 and fiber.Because they each create and focus the laser beam in a unique way, they have different advantages and disadvantages.

 

If you plan on cutting or engraving on metal-materials such as wood, paper or leather, a CO2 laser is the way to go. Other commonly processed materials for a CO2 laser include glass, acrylic, stone, and fabric.These machines are typically thought of as more diverse in their capabilities than a fiber laser. Depending on the level of power, some CO2 lasers can also cut thick metals.

 

A fiber laser has a wavelength that’s perfect for cutting metals(both reflective and non-reflective), and it really shines when cutting thin metals. If you want to process thin metals on a large-scale, fiber lasers can do so quickly and efficiently. They’re also great for marking and engraving metals like aluminum, steel, gold, and silver. For the customer who is exclusively working with metals, the fiber laser is an excellent choice. With that said, fiber lasers can also etch on plastics as well, thus giving the operator some flexibility to offer more services.

 

Keep in mind that the thicker the material you want to process, the higher the laser power you’ll need. Laser power is measured in watts (W). Higher power usually allows you to cut faster, though it’s very much dependent on application and material. Your laser cutter manufacturer will be able to tell how much power you need for what you plan to do.

 

2. What is your budget?

 

How much are you willing to spend on a laser cutter? Fiber lasers tend to cost more than their CO2 counterparts. Many companies offer entry-level CO2 systems for under $10,000, while fiber systems start at around $15,000.Generally, the more power and size, the more expensive the machine.

 

When looking at USA-made machines over $10,000, you’ll find sizes of 24 inches by 36 inches and larger. These can also include premium motion systems for the laser head that allow for incredibly precise movements and cutting.

 

When deciding your budget, you should also think about maintenance. When proper care is exercised, a laser cutter can last a lifetime. But during that lifetime, certain parts may need to be replaced, such as the nozzle, mirrors, optics, and tubes -- these are considered consumables. Of these, your laser tubes will be the biggest expense, because they’ll need to be replaced the most frequently.

 

The specific costs of consumables, as well as how often they should be replaced, can vary from machine to machine. Ask your manufacturer what you should expect from your particular system in terms of maintenance costs.

 

3. What size machine do you need?

 

Where will you be installing your laser cutter? What material sizes do you plan to process? These are the two main factors that should be considered when determining what size of the machine is best for your needs.

 

Make sure that your installation area has ample space for your laser cutter. It shouldn’t be a tight fit. You want to be able to easily walk around every side -- for both maintenance purposes and in case you need adjust the material on the bed at any point. It goes without saying, but you should also check all doorways leading to the installation location and ensure that your machine will fit through them.

 

Your laser cutter’s bed size needs to be large enough to accommodate the material that you’ll be processing. Make sure you take this into account when deciding machine size.

 

If you’re unsure about your material size, it’s better to go with a larger laser cutter now, rather than later regret a system that’s too small. You can always upgrade your laser’s power, but you can’t increase its size.

 

4. What type of laser tube do you need?

 

The type of laser tube you’ll need depends on what types of applications you plan on running. Put simply, if you have a CO2 machine, you’ll need a CO2 laser tube. For a fiber machine, you will need a fiber laser.

 

CO2 laser tubes last approximately 5,000 to 10,000 machine hours, depending on their wattage. Higher wattage tubes last longer.Lower power tubes have a comparatively shorter lifespan, but they also cost less. Most manufacturers offer a variety of options ranging from40W – 200W.

 

Lower wattage replacement laser tubes can cost in the range of $300 to $600, while very high wattage tubes can cost upwards of $4,000. When shopping, make sure that the manufacturer specifies that the tubes have been lab tested.

 

Most fiber lasers are rated to last over 100,000 machine hours. Popular options range from 20W – 50W for engraving machines, and 300W – 2,000W for cutting machines.Fiber lasers generally require less maintenance than CO2 lasers.

 

5. What company should you buy your laser cutter from?

 

While there are many laser cutter manufacturers out there, companies in the United States generally offer the best return for your investment. Not only do these companies place high importance on quality control and testing, they’re not shipping your laser cutter across the ocean when you buy from them. This means less chance for damage or problems during transport.

 

Imported laser machines may not include high-quality control standards, and technical support can be inconsistent or unavailable. In addition, ordering replacement parts may be next to difficult if not impossible.

 

Choose a company that has extensive quality assurance testing, tech support readily available, and a reputation of excellent customer service.   Right now a growing company that fits that description, and is not too hefty on the wallet:  Boss Laser.  Their staff receives awesome reviews, and seem to be very helpful from in all stages of purchasing and operating a laser machine.

 

Purchasing your first laser cutter doesn’t have to be an overwhelming task. If you can answer all five questions above, your path to ownership should be smooth and simple. If you have any additional questions or concerns, your manufacturer will be happy to talk to you about them.

ProgrammableWebWhy ProgrammableWeb Refers to a Javascript API as an SDK

A few years back, ProgrammableWeb had four directories; the API directory (what ProgrammableWeb is famous for), the Mashup (app) Directory, a directory of mashup source code that was discovered elsewhere on the Web, and a resource directory that was a mish-mash of anything else that could be helpful to API practitioners (developers, providers, etc.).

John Boyer (IBM)In DB2LUW how to restart a vendor archiving mechanism without restarting the whole database

In DB2LUW for some reason we faced some issues with the archive mechanism and we want to restart the archive mechanism ONLY and not the whole database or instance.

So, how to restart the archiving mechanism without restarting a database.

 

There is a way   to restart the archiving mechanism when it uses vendor code.

 

It’s,  db2pd -fvp

 

It’s documented in the Knowledge Center,

https://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.admin.cmd.doc/doc/r0011729.html

 

>--+-----------------------------------------------------+------>

   '- -fvp--+-agent_eduid-+--+------+--+---------------+-'   

            +-LAM1--------+  '-term-'  '-file=filename-'     

            +-LAM2--------+                                  

            '-LAM3--------'    

 

As an example,

A database named SAMPLE has logarchmeth1 set to TSM.

At any time run,

db2pd -db sample -fvp lam1

The resulting output is as follows:

-------------------------------------------------------------------------

Fenced Vendor Process State Information:

-------------------------------------------------------------------------

 

Log Manager:

-------------------------------------------------------------------------

LOGARCHMETH1 available.

 

Vendor EDU is available and running.

  startTime: 1155581841  20060814145721

  function: sqluvint

 

This tells us that the fenced vendor process is running in the vendor function sqluvint since August 14, 2006 14:57. Now, if we feel that this has been running too long, or we have determined that this process has hung waiting for TSM resources, we can terminate the fenced vendor process by issuing:

 

db2pd -db sample -fvp lam1 term

The resulting output is as follows:

-------------------------------------------------------------------------

Fenced Vendor Process State Information:

-------------------------------------------------------------------------

 

Log Manager:

-------------------------------------------------------------------------

LOGARCHMETH1 available.

 

Vendor EDU is available and running.

  startTime: 1155581841  20060814145721

  function: sqluvint

This fenced vendor process has been sent a signal to terminate.

This shows us the same information as the previous output, but also let us know that the terminate request has been sent. After waiting a few moments, we should notice that the request has taken affect.

          

             If the fenced vendor process is running, but not running in vendor code, we will see this for a regular display request:

-----------------------------------------------------------------

Fenced Vendor Process State Information:

----------------------------------------------------------------

 

Log Manager:

----------------------------------------------------------------

LOGARCHMETH1 available.

 

Vendor EDU is available and running.

No vendor code being run.

 

 

Once it’s  terminated, any further  archive request will restart the archive mechanism

ProgrammableWebDaily API RoundUp: CheckMobi, Home Assistant, Pike13

Every day, the ProgrammableWeb team is busy, updating its three primary directories for APIs, clients (language-specific libraries or SDKs for consuming or providing APIs), and source code samples.

ProgrammableWebGoogle Chrome 61 Beta Includes Web Share, WebUSB, Payment Request APIs

This week Google announced that the beta version of Chrome 61 will support a number of new APIs. The Payment Request API is an API standard from the W3C that Google integrated back in May. The API provides a process layer which enables purchases from third-party websites within Chrome in an effort to make payment checkouts easier.

John Boyer (IBM)In DB2LUW How to find the statement/Query/SQL running against a Static SQL section number

This question comes many times. So, trying to clarify a bit.

 

We have a Db2  application snapshot and it’s not showing the statement the application is running.  Instead it’s showing package details.

 

Example,

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

            Application Snapshot

 

Application handle                         = 20160

Application status                         = UOW Waiting

Status change time                         = 07/20/2017 10:48:30.415436

Application code page                      = 819

Application country/region code            = 1

 

Application name                           = my_application

Application ID                             =   21.21.33.23.49955.180624151926

Sequence number                            = 00003

 

Client login ID                            = mylogin

Configuration NNAME of client              = abcdefg

Client database manager product ID         = SQL09079

Process ID of client application           = 10944662

Platform of client application             = AIX 64BIT

Communication protocol of client           = TCP/IP

 

Statement type                             = Static SQL Statement

Statement                                  = Execute

Section number                             = 9

Application creator                        = AAA250

Package name                               = MYPACKAGE

Consistency Token                          =

Package Version ID                         = MM-R150E63-020

 

How can we find the SQL statement from that ?

 

creator, package_version_id, package_name and section number  monitor elements could be used to query the SYSCAT.STATEMENTS system catalog table and obtain the static SQL statement text, using the sample query as follows:

 

 

    SELECT SEQNO, SUBSTR(TEXT,1,120)

           FROM SYSCAT.STATEMENTS

           WHERE PKGNAME   = 'package_name’ AND

                 PKGSCHEMA = 'creator'      AND

                 VERSION = 'package_version_id' AND

                 SECTNO    = section_number

           ORDER BY SEQNO

 

 

So, in this specific example it will be,

 

SELECT SEQNO, SUBSTR(TEXT,1,120)

           FROM SYSCAT.STATEMENTS

           WHERE PKGNAME   = ' MYPACKAGE ' AND

                 PKGSCHEMA = ' AAA250’   AND

                 VERSION = ' MM-R150E63-020' AND

                 SECTNO    = 9

           ORDER BY SEQNO

 

 

It’s documented in the Knowledge Center,

https://www.ibm.com/support/knowledgecenter/en/SSEPGG_11.1.0/com.ibm.db2.luw.admin.mon.doc/doc/r0001347.html

 

Also, this caution is mentioned there,

Exercise caution in obtaining static statement text, because this query against the system catalog table could cause lock contention. Whenever possible, only use this query when there is little other activity against the database.

John Boyer (IBM)How to use the CSS skip feature in bulk

When indexing content into IBM Content Search Services (CSS), retries for non-index-able content such as Tiff files shouldn't occur, but if they do you can tell the Content Platform Engine to skip these.  This means that it will not include them again when re-dispatching content to be indexed.  This feature is typically used for problem documents such as corrupt content or emails with unusually large attachments.

 

If there are only a few of these documents, it is easy to use the Administration Console for Content Platform Engine (ACCE) tool to navigate to the Indexing Queue and select Actions --> Skip Requests.  When there are more items than can easily be dealt with, you can use the following bulk processing approach.

 

How to use the CSS skip feature in bulk

1.  In the ACCE administration tool, open an object store and create a new object store search.
2.  On the SQL view tab, enter the following query:

SELECT TOP 100 This FROM CmIndexRequest WHERE RetryCount > 1

3.  Select Enable bulk action on the bulk action tab.
4.  In the Script section, click Run script.
5.  Copy the following JavaScript code and paste it into the Script field.

importClass(Packages.com.filenet.api.constants.RefreshMode);
importClass(Packages.com.filenet.api.constants.IndexingOperation);
 
function OnCustomProcess (CEObject)
{
    CEObject.set_IndexingOperation(IndexingOperation.SKIP);
    CEObject.save(RefreshMode.REFRESH);
}

6.  Click Run. The administration console runs the query and the JavaScript action.

 

 

 

John Boyer (IBM)Clearing Your Email is Good for your Health

I was reading this article "Cleaning office clutter is good for your health" which talks about the psychological impact of a cluttered desk or work environment on your stress level and ability to focus.

 

As I was reading it, I started to think about Verse, or any mail tool for that matter, and how emails impacts our quality of work... our health! Indeed, not well controlled, mail can overwhelm you, kill your day, disorganize you! As I read about the impact of the visual cortex solicitation on productivity and emotional health, I realized that the cleaner interface of Verse is more than just an advantage for faster ramp up of new users. It delivers value and relief to users day to day. By not throwing a complex UI at you to disclose cues on the history or the content of the 20-30 messages listed on the screen, the reader's energy can instead be focused on managing more timely What's New and What's Next. Indeed, the red dots are attention grabbers for important news while the scrolling calendar bar helps you keep track of your time. This is so handy in today's dynamic workplace where things change on the spur of the moment.

 

So, of course, I wanted to see if the tips offered on how to de-clutter apply as well. They evolve around 2 things: (1) the level of tolerance to cluttering and (2) everything having a home for efficient handling, Folders have been for years the answer for these homes, while some people use the inbox as a gigantic manor in which they work all the time. Has this progressed with Verse? From my experience, actions to handle tasks and follow ups are easier and more natural to work with than the former follow up flags. The birds-eye view on the mail by age is priceless for those who's action and tolerance levels are time sensitive - many project managers will recognize themselves here. And, first and foremost, the wisely designed inbox has become a more efficient triage and attention center, where emails can be acted on, discarded or pinned for action more timely than before thanks to several UI improvements and an empowering search engine. 

 

How cluttered is your desk or your email interface?

John Boyer (IBM)What is my AS2 URL?

Setting up an AS2 trading partner is well documented in this blog series:

https://www.ibm.com/developerworks/community/blogs/SterlingB2B/entry/Setting_up_AS2_part_1_The_AS2_Organization?lang=en_us
https://www.ibm.com/developerworks/community/blogs/SterlingB2B/entry/Setting_up_AS2_part_2_The_AS2_Partner?lang=en_us
https://www.ibm.com/developerworks/community/blogs/SterlingB2B/entry/Setting_up_AS2_part_3_The_AS2_Relationship?lang=en_us

 

A question often posed to IBM is why doesn't our documentation provide the URL to give to the trading partner? The reason for this is it depends on your network configuration. Out of the box, the default adapter used for AS2 inbound traffic is called the "HTTP Server Adapter" and it can be found via Deployment → Services → Configuration and then in the "Search by Service Type:" field, select "HTTP Server Adapter" and click Go!.

 

image

If you are using the default adapter, it is named "HTTP Server Adapter" . 

image

If you click on the adapter name it displays the configuration, note the values for the "HTTP Listen Port" and the "URI" that is assigned to the EDIINTParse Business Process. Again by default, the HTTP Server Adapter listens on base port + 33 (where "base port" is the port on which IBM Sterling B2B Integrator was installed ... this is the same port you use to access the administrator dashboard).

 

image

The tricky part is what is the full URL your trading partner will need to use to deliver an AS2 document. The reason IBM does not document this is many - you could be using an IBM Sterling B2B Integrator Remote Perimeter server so the reachable address might be the remote perimeter server's fully qualified domain name. Another possibility is that your network team might be using Network Address Translation, a load balancer or some other means to disguise the actual IBM Sterling B2B Integrator server. Generally speaking the URL you provide to your trading partner consists of the following:

 

For the default HTTP Server adapter this would look like:  FQDN:port/URI 

How do you find the FQDN? From a command line on a Unix box you can use:

 grep `hostname` /etc/hosts

On a Windows box you can use 

ipconfig /all

image
To construct the URL for this installation of SI take the FQDN (in the screenshot above that would be danal.ibm.com) , the port 42533 and the URI of /as2

"http://danal.ibm.com:42533/as2"

 

Troubleshooting

  • If your trading partner encounters a connection error (site can't be reached, connection refused, etc.) your first point of contact should be your network team. 
  • If your trading partner encounters a "Page not found or not allowed" error have them check the case - they may have entered something like "http://danal.ibm.com:42533/AS2when the URI is actually lower case "as2".
  • Is your HTTP Server Adapter started/enabled?

image

  • If they receive an HTTP 500 error the partner reached your server but did not attempt to deliver an AS2 document

image

If you've worked with your network team and performed basic troubleshooting of your own and still cannot determine the error then when you open a new PMR and provide the AS2 "must gather" : https://www-304.ibm.com/support/docview.wss?uid=swg21641008 and indicate whether this works for other AS2 trading partners, the error you're receiving and any other items you have ruled out.

 

 

 

 

 

John Boyer (IBM)3 Reasons Why Cloud Faxing is Alive, Well and Growing in Popularity

imageIt’s both refreshing and distressing that there is a generation of young adults whose only familiarity with a fax machine is due to discovering one at their grandparent’s garage sale (“Why would anyone pay $15 for this plastic blob?”), or that they discover from watching old movies (“What is that guy doing with that piece of paper?”).  

 

As more businesses are moving to the cloud, these pieces of hardware are no longer as significant. However, rumors of the trusty ol’ fax machines total extinction from the business landscape have not just been greatly exaggerated, but they are categorically false, because in many industries and sectors such as health care, law, government, and more, faxing is alive, well and — believe it or not — growing in popularity. The only difference — and it’s a pretty big one — is that instead of physical hardware, businesses are leveraging VoIP to send and receive “cloud faxes.”

 

Here are the three key reasons why faxing through the air not part of some hipster nostalgia craze, but is instead part of an innovative and forward-looking communication infrastructure strategy:

 

  1. It’s Cheaper

 

Simply put, cloud faxing is much cheaper than sending and receiving paper-based faxes. For example, there are no costs for phone lines, long distance, paper, ink, maintenance and repairs. There’s also no hardware or software to purchase or on-site technical support burden.

 

  1. It Saves Space

 

It may seem like a small detail or an afterthought, but considering that a few square feet of commercial space can be worth anywhere from hundreds to thousands of dollars, the fact that cloud faxing takes up no space whatsoever is indeed an advantage. This is particularly the case for organizations like hospitals, and it’s a big reason why VoIP for healthcare (phone, video, faxing and unified communications) is one of the fastest-growing business segments in the world.

 

  1. It’s More Secure

 

What do law firms and pharmacies have in common? Aside from the fact that their clientele is usually in search of some substantial pain relief, they both tend to do a significant amount of faxing — and most of that correspondence is sensitive and confidential. Cloud faxing is inherently more secure than paper-based faxes, and uses both transport layer security (TLS) protocol and NIST-standard level encryption. In addition, faxed documents are bolted down with AES 256-bit encryption and stored in a secure off-site data center.

 

The Bottom Line

 

Saving money, saving space, and increasing security are objectives that never go out of style. So yes, while physical “old school” fax machines are filling up e-waste recycling centers, cloud faxing is alive, well and growing in popularity — and might be ideal for your business now and into the future.

 

John Boyer (IBM)3 Technologies that are Reshaping the Brick-and-Mortar Retail Landscape

imageWith much of the focus these days on the web and its array of tools and technologies — everything from chatbots to IoT — it’s easy to forget that the demise of the brick-and-mortar retail world is not just greatly exaggerated: it’s outright false.


True, some categories are struggling more than others. But many are experiencing relative stability, while others are enjoying strong growth, such as those selling sporting goods, health and wellness products (e.g. nutritional supplements, health foods, higher-end beauty items, etc.), building supply products, and garden equipment.

 

What’s more, the dichotomy that all of the customer centric innovation is flocking online, and people who visit brick-and-mortar stores should make sure they shine up their horse and buggy before the trek to the big city is also, of course, false. Indeed, just walk into any future-focused retail environment and you’ll likely come across one, some, or all of these advanced technologies that are reshaping the brick-and-mortar retail landscape:

 

  1. Mobile Point-of-Sale Systems

 

A major pet peeve that keeps plenty of customers in front of their screens vs. in retail stores is being forced to stand in a dreaded checkout line. Well, many retailers are using mobile point-of-sale (PoS) systems to bring the payment register to customers vs. the other way around. For example, many independent pharmacists are using a pharmacy pos to improve customer satisfaction, while also increase purchase amounts and foster loyalty.

 

  1. Geo-Fencing

 

Geo-fencing lets retailers target specific customers with tailored messages when they’re within proximity of their store, or at certain locations within the store environment. For example, a customer who has previously purchased large eggs at a grocery store can be reminded of a special sale when they’re passing the dairy section. This technology is also being used to launch “flash sales” that last for minutes or hours (or sometimes until limited stock is sold out), which is as much about generating sales as it is about sparking buzz, and giving folks on social media something interesting to talk about and share.

 

  1. Augmented Reality

 

To date, cost factors have somewhat slowed down the adoption of augmented reality technology and limited it to more well-heeled retailers (IKEA) and brands (LEGO). However, we’re only a few years away from when this technology will be standard operating procedure, and shoppers in any retail environment — whether they’re buying shoes or a car — will be able to easily search for products, add them to a shopping list, and locate products from the comfort and convenience of their smartphone or wearable device.

 

Looking Ahead

 

The rise of the web in general, and ecommerce specifically, has served as a wake-up call for retailers that they can’t rest on previous success (yes Sears, I’m looking at you!). They need to constantly find new and better ways to win over their customers’ hearts, minds, and indeed, wallets. The above technologies are part of that critical retail game plan, and hopefully, the success story as well.

 

John Boyer (IBM)SQL1229 during activation of a member after hard crash of a DB2LUW DPF host

There was a situation faced lately by a customer where a hard crash happened in one physical hosts of a DPF setup.   There were some hardware issues.

They brought back the DPF instance in all the partitions. But, trying to activate the database was continuously getting SQL1229 from one of the members.

SQL1229N  The current transaction has been rolled back because of a

      system error.

 

The database was restarted with,

db2_all "db2 restart database DW_AUDIT"

 

Sill problem was present from one of the partitions,

 

Unauthorized use of or access to the system is prohibited.

SQL1229N  The current transaction has been rolled back because of a System error.  SQLSTATE=40504

myhost: db2 restart database ... completed rc=4

 

The db2diag.log showed,

2017-08-02-10.43.28.293536-240 I5770E530           LEVEL: Warning

PID     : 23166                TID  : 46920269556032PROC : db2sysc 14

INSTANCE: db2inst1             NODE : 009          DB   : MYDB

APPHDL  : 1-47418              APPID: <>

 EDUID   : 121116               EDUNAME: db2agent (idle) 14

FUNCTION: DB2 UDB, base sys utilities, sqeApplication::AppSecondaryStartUsing, probe:611

DATA #1 : <preformatted>

Agent executing rqst type = 0x8000001e; acbInfo = 0x40; app_status = 0xa; sqlcode = -1229

 

It showed all the members were successfully doing deactivation except the problem partition.  Following messages from all the other partitions,

SQL1496W  Deactivate database is successful, but the database was not activated.

 

Deactivation was stuck in the problem member which was causing issues when trying to activate it back.

Once the entire instance restarted the problem got resolved.

John Boyer (IBM)Maximo Asset Management 7.6.0.7 Interim Fix 005 released

The Interim Fix (IFIX) is available at Fix Central.

 

As with all IFIXes, MAM 7607 IFIX 005 is cumulative and includes all fixes provided with Maximo Asset Management 7.6.0.7 Interim Fix 004, with these additions:

 

APAR

Application Name

Description

IV89431

Security Groups

Access is required to create work orders and tasks.

IV95332

Assets

In the Assets application, for multiple assets, you cannot change the status in the background.

IV98279

Conditional Monitoring

In the Conditional Monitoring application, when you add a job plan to a condition, the prioirty does not populate.

IV94406

Graphical Scheduling

In the Graphical Scheduling application, when you use Microsoft Internet Explorer 11, the Gantt view does not render.

IV94978

Job Plans

In the Job Plans application, when auto-number functionality is enabled, job plan predecessors are not recorded correctly in the database.

IV92471

Purchase Orders

In the Purchase Orders application, when you use the Go To function on a purchase order line and the work order site is different that the main purchase order site, records are not returned.

IV93059

Automation Scripts

When you change the status of an asset, an automation script causes an exception.

IV97336

System Object

When you install one or more secondary languages, some messages in the browser are incorrectly translated.

IV95258

System Object

Maximo searches on the SQL server are adding additional brackets that cause the search to fail.

IV90039

Inventory Usage

In the Inventory Usage application, you cannot update an inventory usage document if it has an associated reservation that is canceled.

 

To install the IFIX, see Installing an Interim Fix in Maximo 7.6.

John Boyer (IBM)Now Available: Notes & Domino 9.0.1 Feature Pack 9 (Zircon)

Notes & Domino 9.0.1 Feature Pack 9 (Zircon) is available on Fix Central starting today and it will also be available on Passport Advantage starting August 24th. For details on what's new in this release, refer to the Release Notice & Fix List linked below. Direct download links for this feature pack and its new templates (pubnames.ntf, pernames.ntf, and mail9.ntf) can be found via the Download Info link provided below.

> Release Notice & Top 20 Fix List
> Download Info (Fix Central download links + Passport Advantage part numbers).

image

John Boyer (IBM)HealthCenter Thread Dumps To Save Your Sanity!

imageimage

 

HELP!  I AM UNSUCCESSFUL IN CAPTURING THREAD DUMPS DURING A REQUIRED TIME-FRAME?

You have lived the story before:  There is an intermittent delay in your IBM JVM application serving environment.  You contact support and they ask for the Performance MustGather collected DURING the time of the delay.  While the actual act of collecting the MustGather data is simple, since the delay is intermittent, you just can't seem to capture the MustGather data DURING the time of the performance issue.  No MustGather = No way to understand the problem.  This can be a frustrating situation for both you and the support person trying to assist.

 

SOLUTION: 

Add -Xhealthcenter:level=headless to the generic JVM arguments. Save, synchronize and restart the JVM.

Java Health Center - IBM Application Server Performance Cookbook

 

IDEAL OUTCOME:

Gather the generated *.hcd file from the WebSphere Application Server profile directory, and view results in the Java Health Center client.

The healthCenter*.hcd file will be produced on JVM stop.

 

*********************************************************

IF YOU DO NOT WISH TO WAIT FOR JVM STOP:

Prior to JVM stop, the JHC data is retained in a tmp directory which can be harvested in it's raw form:

*********************************************************

LOCATE:

The WebSphere Application Server profile directory for a folder named tmp_<mmddyy>_<hhmmss> "threads" file.

The threads file contains JHC raw thread dump data which you will want to convert to a human readable format:

 

image

 

ZIP: 

The threads file to a new threads.zip file.

I suggest to name the threads.zip file with the PID and timestamp if possible: PID12345_100817_002136_threads.zip

LOAD:

Upload the threads.zip file to WebSphere Commerce Health Center Report

This tool was created by the Commerce Team but it works just as well for WebSphere Application Server JHC data.

CLICK:

Threads -> Thread Dumps

This step will parse the threads*.zip data, convert it into separate human-readable thread dump files, and zip the individual files into a single hcthreads.zip file.

 

image

 

DOWNLOAD:

hcthreads.zip:

image

 

The hcthreads.zip will contain thread dumps collected at 30 second intervals.

I suggest renaming this hcthreads.zip file to the same PID and timestamp which the *.threads.zip was named for.

Note:

The number of files that Health Center creates depends on the length of time that you have been monitoring the application, and the number of backing files that you chose to keep

 

REVIEW:

Each dump will be named with the timestamp of when it was collected by the JVM.

Find the thread dumps that match the time of slow performance.

Threads that do not change their state over time or threads that are "BLOCKED" are suspect for contention.

 

FURTHER ASSISTANCE:

If you are unable to determine the cause of the performance delay by reviewing the thread dumps over time, engage WebSphere Application Server Support for further assistance.

 

RELATED:

developerWorks : Technical Topics : Java technology : IBM Developer kits : Tools : IBM Monitoring and Diagnostic Tools - Health Center

IBM MustGather: Read first for WebSphere Application Server

Java Health Center - IBM Application Server Performance Cookbook

 

**Using the documented MustGathers for collecting performance data is the recommended method to collect the most complete set of data to use when working with IBM Support.  The suggestion above is an alternative method for capturing thread data when the MustGather method has been unsuccessful or if a long running set of thread dump data is required.

IBM MustGather: Performance, hang, or high CPU issues with WebSphere Application Server on AIX

IBM MustGather: Performance, hang, or high CPU issues with WebSphere Application Server on Linux

IBM MustGather: Performance, hang, or high CPU issues on Windows

 

***The overhead for running JHC is very low at ~1% with the default settings.

John Boyer (IBM)5 Things to Know about IBM Redbooks

image

 

5 Things to Know about IBM Redbooks - IBM Redbooks provide a unique technical perspective to many technical questions from the point of view of SMEs, who at times get together for a brief period to put together a publication to solve a business challenge.  At times these challenges come from customer requests, field experiences, or from ideas the residents bring or develop during the development of the Redbooks. [Read more...] 

 

 

John Boyer (IBM)Using Kiviat diagrams for plotting multi-dimensional temporal data

The radar chart, also known as web chart, spider chart, star chart, star plot, cobweb chart, irregular polygon, polar chart, or Kiviat diagram, commonly used in many domains. Here is in innovative way  of using Radar Chart for plotting a multi-dimensional time-series data:

 

image

Here a five-dimensional dataset with one-minute sampling time, is used for illustration purposes. The first sample is plotted (a) on the Kiviat plot having a time axis that is normal to the plot plane. The next samples are added as additional Kiviat plots whose planes are parallel to the plane of the first and spaced along the time axis according to the sampling time (b–d). The diagram can be updated by adding such “data slices” in a first-in, first-out manner.

 

This technique of using Radar Chart for plotting multi-dimensional time-series data was first used by Ray C. Wang, Michael Baldea, and Thomas F. Edgar in their published paper titled Data Visualization and Visualization-Based Fault Detection for Chemical Processes

Footnotes

Updated: .  Michael(tm) Smith <mike@w3.org>