Remove blog-container
article thumbnail

Local HTTPS for Optimizely, Kestrel, and SQL Server (Pt 1)

Perficient Digital Transformation

You’d go to a secure page and almost always see a message saying, “This page contains both secure and nonsecure items. If you need help binding the certificate to your IIS site, I will have instructions in part two of this blog. Stop the ‘Page Contains Secure and Nonsecure Items’ Warning,” 2014. 4 Keyfactor.

article thumbnail

TenCate Grass gets a grip on growth with IBM Planning Analytics

IBM Business Partners

In 2016, the parent company of TenCate Grass, Royal TenCate, was taken over by a private equity. Furthermore, in 2016 it became clear that TenCate Grass had to comply with IFRS16, the new guidelines for the administrative processing of lease agreements. The business challenge. The solution. Read more about IBM’s Analytics solutions.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Accessing Power BI confidential data in Excel for internal organization users

Perficient Digital Transformation

Linked data type holds a reference to a record (or row) containing multiple fields. All the things explained and demonstrated in the blog are compatible on an Office 365 version of Excel (Desktop + Web). Office 365 Personal / Home subscription or perpetual editions of Office like 2013, 2016, 2019, 2021 etc.

article thumbnail

The history of Kubernetes

IBM Services

When it comes to modern IT infrastructure, the role of Kubernetes —the open-source container orchestration platform that automates the deployment, management and scaling of containerized software applications (apps) and services—can’t be underestimated. Containers Enter container technology.

Sourcing 107
article thumbnail

Horizontal vs. Vertical Integration: A Comprehensive Guide

Planergy Software

In this blog post, we will explore these two critical concepts, their benefits, challenges, and differences, and how they apply to modern-day businesses. Learn best practices for purchasing, finance, and more Browse hundreds of articles , containing an amazing number of useful tools, techniques, and best practices.

article thumbnail

Celebrating 40 years of Db2: Running the world’s mission critical workloads

IBM Services

Db2 Universal Container (also known as Db2u) is a containerization technology based on microservices architecture. In this environment, each component is separated into services that run in one of more containers. is a proven, versatile, and AI-ready solution.

article thumbnail

The History of Malware: A Primer on the Evolution of Cyber Threats

IBM Services

It also contained a poetic message that read: ELK CLONER: THE PROGRAM WITH A PERSONALITY IT WILL GET ON ALL YOUR DISKS IT WILL INFILTRATE YOUR CHIPS YES IT’S CLONER! However, while the effects of Elk Cloner were contained to one small computer club, the Brain virus spread worldwide.

Software 112