by Henrik Loeser (data_henrik) | Aug 30, 2023 | conference, DB2, IBM, idug, IT
Well, check out the IDUG 2023 EMEA Db2 Tech Conference website. If you want to use the early bird rate to register with a heavy discount, you have to hurry up. It is only available until September 1st. There is another rebate available, but it only works once:...
by Henrik Loeser (data_henrik) | Jul 5, 2023 | administration, DB2, ibmcloud, IT, security
Security feature in action: Trusted ProfileI trust you to know my old blog post about trusted contexts. Some years ago, I explained how to secure your Db2 database using trusted contexts. By establishing a trusted relationship based on specified attributes, the Db2...
by Henrik Loeser (data_henrik) | May 9, 2023 | administration, ibmcloud, IT, json, Kubernetes, linux, security
Today, it is once again time for one of those "let's document it" blog posts. Lately, I looked into one of the IBM Cloud security features, trusted profiles based on compute resources. I described how to turn your container into a trusted identity. For developing code...
by Henrik Loeser (data_henrik) | Apr 20, 2023 | bluemix, cloudfoundry, IBM, ibmcloud, IT, Python
One of my first cloud appsRecently, I tried out a feature of IBM Cloud Code Engine: Deploying my app directly from source code. It was a simple app, but it failed. I was stunned and investigated the problem. To my surprise, I could have known it because it was...
by Henrik Loeser (data_henrik) | Mar 30, 2023 | cloud, IBM, ibmcloud, IT, terraform
I am a regular user of the IBM Cloud provider plugin for Terraform. I use Terraform with the command line on my local machine or with IBM Cloud Schematics as managed service. Often, I am testing and evaluating new features. Sometimes, I face the situation where not...
by Henrik Loeser (data_henrik) | Mar 24, 2023 | administration, github, IBM, ibmcloud, IT, Python, security
ER diagram for cloud security dataRecently, I looked into how to analyze the access management setup of my IBM Cloud account. I wanted to better understand what kind of access policies exist, what service instances are covered by rules and policies, etc. In the past,...
Recent Comments