Videos

Create personalized app experiences with IBM Bluemix App ID

1 week ago
Try IBM Bluemix App ID here: console.ng.bluemix.net/catalog/services/app-id/ App ID is an authentication and profiles service that makes it easy for developers to add authentication to their mobile and web apps, and secure access to cloud native apps and services on Bluemix. It also helps manage end-user data that developers can use to build personalized app […]

Behind the Scenes: How a major US research university used Azure & DevOps to Deploy back-end & Student VMs

2 weeks ago
A major US research university partnered with Microsoft to learn how Azure infrastructure, the Web Apps feature of Azure App Service, and DevOps best practices could better address their need to quickly, easily, and consistently onboard classroom and student infrastructure. This included back-end servers, storage, and networking as well as student virtual machines (VM), organizational […]

CyberSecurity Insurance Coverage

2 weeks ago
A few things to consider when selecting a CyberSecurity insurance policy.

The Developer Show (TL;DR 068)

2 weeks ago
Google Assistant SDK: goo.gl/EXiSD2 Structured menus in Google My Business API: goo.gl/ZiOVko Create quizzes in Google Forms with Apps Script: goo.gl/aOlhTJ Next steps toward more connection security: goo.gl/ncc5fB Manage gRPC APIs with Google Cloud Endpoints: goo.gl/hDq7jR Highlights: Google Assistant SDK, increased connection security, and Google Cloud Endpoints The Developer Show is where you can stay […]

developerWorks newsblast: The surprising evolution of JavaScript

3 weeks ago
For resources from this video, go to ibm.biz/dwnewsblast-0016 Imagine a world without JavaScript. Will it be utopia or catastrophe? JSON developer Douglas Crockford doesn’t comment on the delights or horrors of a post-JavaScript world, but the industry luminary believes a successor language will need to be less cluttered and more secure. What would Crockford like […]

developerWorks newsblast: Proving your cybersecurity skills

3 weeks ago
Resources for this video can be found at ibm.biz/dwnewsblast-0015 How do you prove you’ve got the creds as a cybersecurity expert? The Computing Technology Industry Association, or CompTIA, is now providing a new, vendor-neutral certification called the CompTIA Cybersecurity Analyst. It is designed to bring behavioral analytics to the forefront of assessing cyber-threats. The certification […]

Securing the modern enterprise with Windows Defender and Windows Defender ATP

1 month ago
Learn how Microsoft IT helps protect and secure our enterprise network against malware and advanced attacks. Brian Hooper, Senior Security Engineer in Microsoft IT, and Daryl Pecelj, Senior Security Architect in Microsoft IT, discuss Windows Defender and how we use Windows Defender Advanced Threat Protection (ATP) to monitor the network for anomalous behavior that may […]

Create a security-based machine-learning front end

1 month ago
Ori Pomerantz walks you though the steps on how to create a security-based machine-learning front end. Learn how to program your machine-learning front end to identify security inconsistencies in your Node.js applications.

Business-Critical Innovation for the NEXT Generation Utility

1 month ago
Oracle Utilities provides business-critical solutions and technology innovation to electric, gas and water utilities worldwide.

Azure Network Security

2 months ago
In Azure, security is built in at every step—design, code development, monitoring, operations, threat intelligence, and response.

Proxied Access

2 months ago
Suppose I have a multi-tenant cloud application. Suppose you are one of my users. Suppose I need to login as you for support. What are some ways I can setup security so you know I’m me?

Securing SOAP and REST

2 months ago
A quick run down of security options for SOAP and REST Web services and APIs.