IBM Researchers Remove the “Mem” from Memcache

A team of researchers at IBM’s Zurich lab have developed a managed memcache service using non-volatile memory (NVM) in the IBM Cloud called Data Store for Memcache. Data Store for Memcache replaces DRAM with NVM storage for caching using the same memcache API. The result offers o … | Continue reading


@ibm.com | 5 years ago

AIX Event Monitoring Pseudo Filesystem (2011)

The AIX Event Infrastructure is an extensible framework for monitoring multiple types of system events. This article gives an overview of the monitoring interface, as well as pointers for writing event monitoring applications. | Continue reading


@ibm.com | 5 years ago

Data alignment: Straighten up and fly right (2005)

Data alignment is an important issue for all programmers who directly use memory. Data alignment affects how well your software performs, and even if your software runs at all. As this article illustrates, understanding the nature of alignment can also explain some of the "weird" … | Continue reading


@ibm.com | 5 years ago

Tree visitors in Clojure

The Visitor pattern is commonly used to traverse and manipulate tree data in Java and other object-oriented programs. Now let's see what happens when Alex Miller rewrites the pattern using Clojure's functional zippers. | Continue reading


@ibm.com | 5 years ago

Fingernail Sensors and AI Can Help Clinicians Monitor Disease Progression

A first-of-a-kind "fingernail sensor" prototype that continuously measures how a person's fingernail bends and moves, a key indicator of grip strength. | Continue reading


@ibm.com | 5 years ago

2018 Cost of a Data Breach Study

Download the Cost of Data Breach Study to learn more about the global impact of a data breach and how data breaches affect individual nations. | Continue reading


@ibm.com | 5 years ago

Elegant, Disgusting Cryptography

“The prettiest thing I had ever seen” is not how IBM researcher Shai Halevi describes the beaches in Israel where he grew up. Or the sunset after a long day of hiking in Mitzpe Ramon desert. Rather, he saves these words to describe the first time he saw a cryptographic equation a … | Continue reading


@ibm.com | 5 years ago

IBM object storage leave openstack swift for S3 compliant API

Beginning August 1st, 2018 no new instances of Object Storage OpenStack Swift (PaaS) can be created. Existing Object Storage OpenStack Swift instances will continue to work and be supported. Customers are encouraged to use IBM Cloud Object Storage. This does NOT apply to Object S … | Continue reading


@ibm.com | 5 years ago

Watson AI Assistant

Watson Assistant is an AI assistant built on the previous IBM Watson Conversation service that delivers scalable, engaging experiences across your business. With digital and voice capabilities, Watson Assistant solutions represent your brand and your brand’s unique personality. | Continue reading


@ibm.com | 5 years ago

Detecting the Magnetism of a Single Atom’s Nucleus

This feat opens the door to using the nucleus as way to sense and control magnetism at the atomic scale. | Continue reading


@ibm.com | 5 years ago

Scientists Prove a Quantum Computing Advantage Over Classical

Scientists prove quantum advantage for certain mathematical problems: shallow quantum circuits are more powerful than their classical counterparts. | Continue reading


@ibm.com | 5 years ago

IBM Food Trust

Continue reading


@ibm.com | 5 years ago

X-Force Command Cyber Tactical Operations Center

Continue reading


@ibm.com | 5 years ago

IBM free cash flow: $2.2B, IBM stock buybacks and dividends: $2.1B [pdf]

Continue reading


@ibm.com | 5 years ago

A Blockchain Architecture for the Internet of Things

The promise of the Internet of Things: This integration should ideally map to a decentralized hardware and software platform. | Continue reading


@ibm.com | 5 years ago

Macromolecules Kill Multidrug-Resistant Cancer Cells in New Study

Scientists developed a new class of macromolecules designed to selectively kill cancer cells, while ignoring healthy ones. | Continue reading


@ibm.com | 5 years ago

Configuring IBM Cloud App ID from the Toolchain

Learn how to configure the IBM Cloud App ID from a toolchain as part of continuous delivery process. Here is some background and the script we use. | Continue reading


@ibm.com | 5 years ago

Approximate Computing for On-Chip AI Acceleration: IBM Research at VLSI

IBM scientists developed a digital accelerator core for AI hardware that uses approximate computing to improve compute efficiency. | Continue reading


@ibm.com | 5 years ago

Synaptic Architecture for Brain-Inspired Computing

As reported last week in Nature Communications, IBM Researchers have developed and experimentally tested an artificial synapse architecture using 1 million devices -- a significant step towards realizing large-scale and energy efficient neuromorphic computing technology. | Continue reading


@ibm.com | 5 years ago

How an Accidental Discovery Led to a New, Highly Recyclable Plastic

Sunday marked the 48th annual celebration of Earth Day, the global event that celebrates the importance of environmental protection. This year, the Earth Day Network’s focus is to, “fundamentally changing human attitude and behavior about plastics and catalyzing a significant red … | Continue reading


@ibm.com | 5 years ago

E-Book: Blockchain for Dummies (by IBM)

Continue reading


@www-01.ibm.com | 5 years ago

AI Learns the Art of Debate (IBM Blog Post)

An AI system that can engage in debate with humans, Project Debater moves us closer to one of the great boundaries in AI: mastering language. | Continue reading


@ibm.com | 5 years ago

The Future of AI Needs Better Compute: HW Accelerators from Analog Mem. Devices

Software-equivalent accuracy achieved in with analog memory. | Continue reading


@ibm.com | 5 years ago

The art of metaprogramming

One of the most under-used programming techniques is writing programs that generate programs or program parts. Learn why metaprogramming is necessary and look at some of the components of metaprogramming (textual macro languages, specialized code generators). See how to build a c … | Continue reading


@ibm.com | 5 years ago

Beginner's Guide to Rust: Get to Know Rust

Get to know Mozilla Rust, a safe, statistically typed compiled language. | Continue reading


@ibm.com | 5 years ago

Domain experts, welcome to quantum: Introducing QISKit ACQUA

Working with real quantum computers just got easier for experts in chemistry, artificial intelligence and optimization: Introducing QISKit ACQUA. | Continue reading


@ibm.com | 5 years ago

Inside memory management (2004)

Get an overview of the memory management techniques that are available to Linux programmers, focusing on the C language but applicable to other languages as well. This article gives you the details of how memory management works, and then goes on to show how to manage memory manu … | Continue reading


@ibm.com | 5 years ago

How Bradesco solves customer queries in just seconds with AI

Using IBM Watson, Bradesco implemented Bradesco Inteligência Artificial to assist employees and customers in answering their questions about bank products | Continue reading


@ibm.com | 5 years ago

Java 8 idioms

A collection of short explorations that invite you to rethink the Java conventions you have come to take for granted. | Continue reading


@ibm.com | 5 years ago

IBM i2 Analyst's Notebook

Continue reading


@ibm.com | 6 years ago

IBM Acquires Armanta

As industry pressures continue to grow, financial services companies are seeking to accelerate their ability to meet increasing regulatory requirements and other business demands, such as CECL, FRTB, traded credit risk, ALM and liquidity, portfolio management and more. That’s why … | Continue reading


@ibm.com | 6 years ago

Un simulador abierto de alto rendimiento para circuitos cuánticos

The recent surge of interest in quantum computing is largely due to the approach of “quantum advantage." | Continue reading


@ibm.com | 6 years ago