Re-indexing content on a clustered IBM Connections 5(.5) deployment.
When the index of IBM Connections seems to be corrupt, and you have a clustered WebSphere configuration, it’s very easy to rebuild the index without any downtime of the services.…
When the index of IBM Connections seems to be corrupt, and you have a clustered WebSphere configuration, it’s very easy to rebuild the index without any downtime of the services.…
Is there a way to remove a particular email from all the mail files on a server when message recall is not enabled? Yes, this can be done using an…
IBM Supercomputer To Guard U.S. Nuclear Weapons. IBM is working on a new supercomputer inspired by the human brain. Full story: http://www.valuewalk.com/2016/03/ibm-supercomputer-to-guard-u-s-nuclear-weapons/ Views: 119
When we say we envision bringing the many benefits of Swift to other platforms, IBM joins a growing global community. As a community, we are just starting out on our…
A bad assumption led to a minor fender-bender A Google Lexus-model autonomous vehicle (“Google AV”) was traveling in autonomous mode eastbound on El Camino Real in Mountain View in the…
IBM Connections Mail 1.7 supports IBM Connections 5.5. This compatible version of IBM Connections Mail was released January 27, 2016. IBM Connections 5.5 customers using the IBM Connections Mail Plug-in…
Many people will remember that Watson was developed initially to compete on Jeopardy! versus two of the biggest Jeopardy! champions of all time, and it won a million-dollar prize in…
With credits to the author Christoph Stoettner: http://www.stoeps.de/adding-employee_extended-to-all-users/ Here is a 2 step script for enabling the EMPLOYEE_EXTEND role to all users, it will give all users the right to…
The recent global cloud market analysis1 revealed that the total spend on infrastructure hardware and software to build cloud exceeded $60 billion worldwide, while spend on a range of public,…
IRIS provides a real-time fraud analytics engine that leverages machine learning to generate rapid anti-fraud models while also supporting the creation and modification of ad-hoc models, proven successful on various…