option
Questions
ayuda
daypo
search.php

C1000-118

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
C1000-118

Description:
IBM Cloud Solutions Architect V5

Creation Date: 2022/03/06

Category: Others

Number of questions: 99

Rating:(1)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Select the unique key features of Hyper Protect Crypto Services on the IBM Cloud?. Built on IBM Red Hat OpenShift technology, on single-tenant key management service with key vaulting provided by dedicated customer-controlled HSM. Hyper Protect Crypto Services provide state-of-the-art encryption using DM-CRYPT. IBM Cloud administrators have no access and it provides FIPS 140-2 Level 4-certified hardware. Hyper Protect Crypto Services can integrate with other any other Cloud provider services so as to manage key access, log and monitor security events, and support compliance requirements.

Which Cloud Pak provides a data transfer tool utilizing the FASP protocol to provide significantly faster throughput than typical FTP?. Cloud Pak for Integration. Cloud Pak for Migration. Cloud Pak for Automation. Cloud Pak for Applications.

A customer has defined a requirement to enable all virtual server instances in the proposed VPC to be able to access automatic operating system updates via the Internet. What is required to provide this functionality?. The pre-defined Automatic Updates Security Group must be enabled. Each server must have a Floating IP address. Each subnet must have a Public Gateway. A subscription to the IBM Auto Update proxy service.

In order to provide a highly resilient and highly available network with ECMP and diversity connections to IBM Cloud, how many Direct Link circuits should be recommended?. 4. 2. 6. 3.

Database for PostgreSQL is an example of which type of database?. Key-value. Object-relational. Document. Graph.

What is a key requirement of a resilient architecture?. High rate of resource utilization. Low rate of resource utilization. High tolerance level for interruption. Low tolerance level for interruption.

Which of the following IBM Cloud services is integrated with Certificate Manager?. IBM Bare Metal Server. Red Hat OpenStack on IBM Cloud. IBM Cloud for Power Solutions. IBM Cloud Kubernetes Service.

What's the correct architectural network topology in IBM Cloud?. VPC > Zone > Region > Subnet. VPC > Region > Zone > Subnet. Region > VPC > Zone > Subnet. Region > Zone > VPC > Subnet.

A Dialog Skill in Watson Assistant can make a web service call via which of the following?. A Dialog Skill in Watson Assistant can make a web service call via which of the following?. SOAP Endpoint. Web service definition language. Webhook.

In the context of the Key Protect service, which of the following statements is correct?. Key Protect allows you to manage keys as well as SSL/TLS Digital Certificates. Key Protect allows you to import keys for other Clouds. Key Protect allows you to manage service accounts. Key Protect allows you to create a new key or import your own key (BYOK).

Which file extension does the LogDNA agent monitor by default?. .logdna. .log. .varlog. .logvar.

Which two of the following can be managed by IBM Cloud SSL Certificates? (Choose two.). Self-signed SSL certificates. SSL certificates ordered in IBM Cloud. SSL certificates not imported into IBM Cloud. SSL certificates imported into IBM Cloud. Certificate Service Requests (CSR).

How is access to the IBM Cloud Container Registry controlled?. A platform-built using Docker to run and manage your applications. Watson service credentials. An open-source system named Cloud Foundry. IBM Cloud Identity and Access Management (IAM).

Why would IBM Spectrum Protect Plus form part of an overall system design in IBM Cloud?. It provides a solution for system log analysis and alerting, protecting systems from unplanned downtime. It provides a solution for data protection, data reuse, and data recovery for virtual environments. It provides a dedicated government-only compute environment with built-in quantum-level encryption. It provides a ג€˜Premium Plusג€™ support package for customers with ultra-business critical workloads.

Which statement describes a key-value database?. Each item in the database is encrypted with public-key cryptography. Each item in the database is stored in a column named key with values in each row. Each item in the database is a document with lists of key-value pairs. Each item in the database is stored as an attribute name (referred to as a key) with its corresponding value.

What is the minimum number of servers an Event Stream cluster in IBM Cloud must be composed of?. Four servers in load balance. One. Two servers. Three servers.

Which VMware application mobility technology seamlessly extends on-premises data center networks into IBM Cloud?. VMware HCX. VMware vSphere. VMware Horizon. VMware NSX.

Which are two benefits of IBM Cloud Functions? (Choose two.). Visual debugging. Scale up or down automatically. Based on Kubernetes. Focus on code, not infrastructure. Out-of-the-box connectors to several databases.

What is one of IBM's Operational Responsibilities for managing the IBM Cloud Object Storage Service?. Monitor and manage service health and availability. Provision and manage the VSIs required to serve the data using NFS. Ensure data backup if necessary. Monitor and restore data backups.

What is the function of the IBM Cloud File Storage Capacity Expansion feature?. It is used by the IBM Cloud Storage users to regenerate data storage that may have been deleted. It is used by IBM Cloud Storage users to manage data flow. It is used by IBM Cloud Storage users to expand their file storage immediately. It is used by the IBM Cloud Management team to manage file storage capacity.

When all objects stored in IBM Cloud Object Storage are encrypted using Server-Side Encryption with Customer Provided Keys (SSE-C), how are read and write object requests sent?. Send the required encryption information as part of SSL requests. Have their requested UID/PWD verified prior to HTTP request flow. Send encryption information as part of UID/PWD verification. Send the required encryption information as headers in the HTTP requests only.

IBM Log Analysis with LogDNA can be used to manage which of the following?. Service Mesh in IBM Cloud. Only application logs in the IBM Cloud. Cloud native applications logs on any Cloud. System and application logs in the IBM Cloud.

The Chief Data Officer (CDO) wants to build a new data solution for his clients. This application needs access to a Spark cluster on IBM Cloud without the Spark Cluster being accessible over the Internet. If IBM Analytics Engine (IAE) is selected, what must be enabled to allow the application server to securely access IAE?. Transit Endpoint. Service Endpoint. Gateway Endpoint. Transverse Endpoint.

What enables faster web performance by locating copies of web data closer to end users?. Virtual Private Network. Virtual Router Appliance. Load Balancer. Content Delivery Network.

A VPC has been created with a single subnet. Virtual server instances have been deployed on the subnet that have different functions which support a production application. The security team has now said that they want to ensure that network traffic between the different server types can be controlled. How can this be achieved?. Use a Hardware Security Module to create advanced network routing tables that ensure traffic does not route between server types, as per the security teamג€™s wishes. Create security groups for the different server types with inbound and outbound rules that satisfy the security team, into which the VSIs can be placed. Create a VPC load balancer and place each server type into its own back-end pool, then create Layer-7 routing policies that restrict network traffic flowing between the different pools. Create multiple access control lists with rules that satisfy the security teamג€™s requirements and associate each VSI to the respective ACL.

Which of the following IBM Cloud Paks help to accelerate the build of cloud-native apps by leveraging built-in developer tools and processes?. IBM Cloud Pak for Developers. IBM Cloud Pak for Data. IBM Cloud Pak for Microservices. IBM Cloud Pak for Applications.

A Financial Institution is interested in using IBM Blockchain Platform on IBM Cloud with the requirement that any application meet FIPS 140-2 Level 3 compliance. What option should an architect use for the nodes?. Financial Cloud Connector. Spectrum Protect Module. Hardware Security Module. Cloud Internet Connector.

What industry standard encryption protocol is used for the IBM Cloud Block Storage?. Industry-Standard SSL HTTPS 32 encryption. Industry-Standard AES-256 encryption. Industry-Standard ASE-526 encryption. Industry-Standard SSL HTTP 64 encryption.

What industry compliance program does IBM Cloud File Storage support?. Payment Information Security Management Act (PISMA). High Security Infrastructure Accountability Act (HSIAA). Payment Card Industry (PCI). Federal Data Protection Directive FDPD.

What resource is available in IBM Cloud to help the users quickly create IoT applications based on patterns?. JDK. Istio. Watson API. Starter Kit.

When designing infrastructure for critical business applications, transactional databases, or virtual machines that require low-latency, why might you use Block storage instead of File storage?. Block Storage LUNs have data at rest encryption using in-house managed keys. Block Storage LUNs can be connected to authorized devices through redundant multi-path I/O (MPIO) connections. Block Storage LUNs can be used for file-based NFS shares. Block Storage LUNs can connect to authorized devices in another IBM Cloud datacenter.

What is IBM Cloud Functions?. A polyglot functions-as-a-service (FaaS) programming platform for lightweight code that executes on demand. A capability of Cloudant for triggering an action as data is updated, for example, sending data updates to systems. An IBM Cloud service for implementing multi-stage business processes involving users and systems. The low-code/no-code development environment for data replication and systems integration in App Connect.

A web application has been deployed in an IBM Virtual Private Cloud. In testing, it's discovered that the web server is not responding to requests over the Internet. What could be the problem?. The web server is in a Security Group which is missing a rule that allows inbound traffic on port 80. The VPCג€™s Vyatta Gateway does not have a NAT configuration for the web server group. The VPC load balancer hasnג€™t been configured with the SSH key for the web server. The subnet ACL has an ALLOW ALL inbound rule set at Priority 1 but a BLOCK ALL inbound rule set at Priority 2.

Identify the component marked as B in the Cloud Connection scenario that shows a persistent connection established between the customer's environment and the IBM Cloud. Virtual Router Appliance. Cloud Gateway Appliance. Secure Gateway Service. Secure Gateway Client.

With regards to disaster recover, what industry term describes `˜the maximum amount of time it should take to restore application or system functions following a service disruption'?. Restore Point Duration. Recovery Point Objective. Recovery Time Objective. Restore Time Duration.

What does an IBM Cloud Container Registry provide?. A collection of multiple zones rules that allow inbound connections to reach the cluster services. Multi-tenant, highly available, and scalable private image registry that is hosted and managed by IBM. A collection of multiple regions rules that allow inbound connections to reach the cluster services. Single-tenant, highly available, and scalable private image registry that is hosted and managed by IBM.

What is the charging model for IBM Cloud Object Storage Standard Tier?. The charge is calculated only based on the amount of data retrieved. The charge is based on the size of the Storage Class Standard Tier configuration. The charge is calculated only based on the amount of data stored. The charge is calculated based on the amount of data stored and retrieved.

Which Watson Language Translator feature protects your privacy so you can own your data?. Ability to stream data over HTTPS. Ability to opt-out of any data collection. Watson object store for data. Data privacy plug-in for Watson.

Which of the following is the dedicated virtual software appliance that provides local load balancing on both the public and private IBM Cloud network?. Secure Gateway Service. Virtual Router Appliance. Cloud Juniper Vsrx. Citrix Netscaler VPX.

Which of the following is a compliance program that IBM Cloud supports?. AES. CNSI. OSI. HIPAA.

A customer has a compute resource in their private datacenter which they need to securely connect to compute resources in the IBM Virtual Private Cloud. How can this be achieved?. Configure a Vyatta Secure Gateway at the VPC entry point. Create a Security Group rule that explicitly blocks any other traffic. Direct all commands via the ibmcloud CLI. Use an IBM Cloud VPN for VPC.

The Db2 service on IBM Cloud use which type of data model?. Columnar. Relational. Graph. Document.

What is IBM App Connect in IBM Cloud?. A tool used to improve operational efficiency by using real-time analytics to identify and resolve problems faster. A tool used to address system management needs that are useful to cloud-based applications. A tool used to increase operational reliability and agility by using event-driven guidance, automation, and notification to prompt the right activity to resolve important issues. A tool used to integrate your cloud-based or on-premises applications for data transformation and automate repetitive tasks.

Which of the following two databases are integrated with IBM Cloud Hyper Protect Crypto Services?. PostgreSQL. MySQL. MongoDB. Cassandra DB. MS-SQL.

To get the most out of Endurance File Storage, which option specifies performance?. Choose configuration items from NFS that configure performance levels to fit workloads. Choose IOPS storage tier that feature pre-defined performance limits. Choose IOPS catalog items from NFS that manage performance configuration settings. Choose from NFS catalog items from that manage performance configuration settings.

Why should removing the Veeam service from a deployment be done with caution?. Agents are left on the VSIs which can degrade performance. The service agreement carries cancellation costs of up to 1 year. If a backup is currently running, it can corrupt the filesystem. Doing so irreversibly deletes all the previous backups.

What is a key consideration when connecting VPCs with VPNs?. There is a limit of four VPCs that can be connected via a single VPN. The IP addresses of subnets on the connected VPCs must not overlap. The VPN must be terminated on a load balancer or Vyatta Gateway. All server instances in the connected VPCs must use the same SSH key.

Which of the following is a Cloud native container monitoring and trouble shooting service?. IBM Cloud Monitoring with Sysdig. IBM Log Analysis with LogDNA. API Gateway. PortWorx Enterprise.

Which of the following statements is correct?. VMware Solutions Shared is a hosted private cloud that delivers the VMware vSphere stack as a service. VMware Solutions Shared can be deployed at any IBM Cloud Data Centers. VMware Solutions Shared requires a Pay As You Go or Subscription IBM Cloud account. VMware Solutions Shared is a streamlined and optimized ordering platform for VMware.

What enables faster web performance by locating copies of web data closer to end users?. Virtual Private Network. Content Delivery Network. Load Balancer. Virtual Router Appliance.

Which of the following aggregates logs in IBM Log Analysis with LogDNA?. Private cloud system built for logging. On-premises logging system. Centralized logging system. Distributed logging system.

What are two benefits of using IBM Cloud Container Registry?. Benefit from unlimited free storage and pull traffic to your private images for an unlimited term. Store your private images and share them with users in your IBM Cloud account. ILMT is built-in to ensure compliance with IBM Licensing terms. Set up your own single-tenant image namespace in a highly available, scalable, encrypted private registry that is hosted and managed by IBM. The built-in Vulnerability Advisor feature that scans for potential security issues and vulnerabilities.

Which service does IBM Cloud Pak for Data utilize to organize data through data classification and governance?. Watson Data Catalog Service. Watson Chat Catalog Service. Watson Health Catalog Service. Watson Knowledge Catalog Service.

What is meant by the practice of Continuous Integration?. Frequently committing code to prevent significant drift and competing changes. Automating the process that moves software through the software development lifecycle. Automating data change replication between data sources at short intervals, for example, every 5 minutes via synchronous or asynchronous methods. A technique in which application logs are constantly tailed and records are forwarded to a central console.

The customer decided to remove the Caveonix RiskForesight all-in-one service from the IBM Cloud and move to a distributed model for VMware Solutions. By default, IBM automatically deletes only the single deployed all-in-one Caveonix VM and the dedicated private subnet that was ordered for it.What are the key considerations? (Select Two). Old configurations can be deleted and migrated to a new environment. Delete the VM and Storage allocation, Cavenoix RiskForesight will discontinue data gathering and services are deemed stopped. If you used the IP addresses of the dedicated private subnet on additional VMs, those VMs must be assigned new IP addresses to continue to function. If you scaled out the Caveonix VM into multiple VMs, those additional VMs are not removed. Unsubscribe the license and remove the instance of all-in-one deployment in the VMware solutions, release the IP address to DHCP, DNS servers.

A regional customer would like to migrate their VMware workloads to IBM Cloud with an emphasis on a lower cost resiliency model to protect against approximately 48 hours of localized outages. The customer currently uses Veeam. Multi zone vCenter Server, Veeam, and File Storage for backup retention. Single zone vCenter Server, Veeam, and Object Storage for backup retention. Single zone vCenter Server, Veeam, and Endurance Storage for backup retention. Multi zone vCenter Server, Veeam, and NetApp Storage Appliance for backup retention.

What is the first customer-u address assuming a VPC subnet has the CIDR range 10.10.10.0/24?. 10.10.10.4. 10.10.10.0. 10.10.10.24. 10.10.10.1.

When managing file storage in IBM Cloud, what are "Authorized" hosts?. Hosts that are authorized to be used to access file storage virtual machines. Hosts given volume access to a virtual volume storage. Hosts directly connected to a particular volume. Hosts given access to a particular volume.

A retail company has issued an RFP to transform an existing on premise publicly accessible application to Cloud Native using IBM Kubernetes Service and Cloud Internet Services. The customer brought up an additional non-functional requirement around performance at the edge. It is explained that the solution will be able to accommodate the concern without additional service.How is this possible?. Cloud Internet Service has Page Rules. IKE provides a built in Content Delivery Network. IKS can scale across the globe. Cloud Internet Server has a 32TB Network.

When connecting an Application Server running on a VSI to a database server running on Bare Metal in IBM Cloud, which of the following is the recommended connectivity option at the lowest cost?. Over the IBM Cloud private network. Using VPC VPN. Via a Direct Link VPN. Through the public network.

Which IBM Cloud servers can run AIX and IBM i?. Bare Metal Servers. Reserved Virtual Servers. Dedicated Virtual Servers. Power Systems Virtual Server.

Which of the following IBM Cloud Paks provides Al capabilities?. IBM Cloud Pak for Al. IBM Cloud Pak for Integration. IBM Cloud Pak for Data. IBM Cloud Pak for Application.

Which is an example of A/B Testing?. A new software release is deployed to production and tested before the previous release is removed. New functionality is released to a small set of customers to test that it is functioning properly. A new software release is deployed to different geographic regions over a period of days or weeks. Different versions of a website are presented online to see which one performs better.

Which statement best describes the Watson Tone Analyzer service?. The Watson Tone Analyzer service uses deep learning models to analyze tones across social media platforms. The Watson Tone Analyzer service uses linguistic analysis to detect emotional and language tones in written text. The Watson Tone Analyzer service understands the sentiment and emotions in documents. The Watson Tone Analyzer service uses acoustic analysis to detect emotional and language tones in audio.

On IBM Cloud, what are the two types of pipelines and how are they specified?. Simple pipelines are specified with XM. Complex pipelines are specified in JSO. Classic pipelines are specified graphically. Tekton pipelines are specified in YAM. Legacy pipelines are specified with CSV files. NextGen pipelines are specified in JSON. Tekton pipelines are specified in YAM. Codewind pipelines are specified in XMI.

A customer has a solution that involves 10TB of Parquet files in their Data Pipeline that will i 20% every week. Which feature of SQL Query would make it a good architectural fit?. Uses Performance Storage. Uses Cloud Object Storage. Uses Flash Array Storage. Uses RedHat Gluster Storage.

For File Storage Configuration, what are jumbo frames?. Local Virtual Frames that are used for network communication. Network Frames that manage payload communication. Ethernet Frames used to manage payload configuration. Ethernet Frames with a large payload that is used on local area networks.

Which IBM Cloud database service provides transactional support?. Databases for MongoDB. Cloudant. Databases for MySQL. Databases for PostgreSQL.

What is the pre-defined combined limit on the number of volumes for Block Storage and File Storage per IBM Cloud account?. 500. 2500. 5000. 250.

A Dialog Skill in Watson Assistant can make a web service call via which of the following?. Message queue. SOAP Endpoint. Web service definition language. Webhook.

Which IBM Cloud for VMware Solutions Shared component has the capability to backup VMs from any Virtual Data Center in the organization?. Veeam Backup Essentials. Veeam Availability Suite. Veeam Availability Orchestrator. Veeam Cloud Connect.

What are compute hosts in a Kubernetes cluster referred as?. Virtual machines. Pods. Containers. Worker nodes.

How is data encrypted in transit when a LogDNA agent sends data to a LogDNA instance?. HTTPS. UDP. HTTP. TCP/IP.

How does distributing an application across regions improve availability?. It provides lower throughput latency. It ensures the application is running close to support staff. It reduces single points of failure. It prevents timeout errors.

Which of the following is mandatory for creating a namespace?. The namespace can be set of compute engine instances called nodes. The namespace must be unique across all IBM Cloud accounts in the same region. The namespace must to be an open-source system. The namespace can be the same and shared across all IBM Cloud accounts.

How are "Access ToKens" consumed as part of IBM Cloud App ID?. Allow the users to stay signed in without having to re-authenticate. Prompt the user to login. Represent authentication and contain information about the user. Represent authorization and enable communication with protected back-end resources.

How do Blue/Green deployments work?. A new software release is deployed before the previous release is removed to eliminate downtime. New functionality is deployed to a small set of customers to test that it is functioning properly. A new software release is deployed to different geographic regions over a period of days or weeks. Different graphic designs are presented online for the same product to see which design attracts more buyers.

Which of the following is an encryption method used to secure web traffic in transit?. WebDAV. Telnet. WebHooks. TLS.

There is a request to architect a hybrid VMware solution in IBM Cloud to address failures in the on-premise data centers. What additional VMware component would allow for seamless network access for workloads from the VMware Cluster on-premise to the VMware Cluster in IBM Cloud to facilitate resiliency into existing solutions?. NSX-C. HCX. NSX-T. NCX.

A utility company's Emergency Response Team has need of a PostgreSQL database for a Smart Phone Application. The application layer has resiliency built into it via Load Balancing across IBM Cloud Zones in a Region. Which service in the architecture would provide resiliency for the database?. Terraform recipe for PostgreSQL. Power VSI for PostgreSQL. Database for PostgreSQL. IBM Relational Database for PostgreSQL.

Which IBM Cloud service makes it possible to correlate information from different sources into actionable incidents, synchronize teams, and automate incident resolution?. IBM Cloud Monitoring with Sysdig. Log Analysis with LogDNA. Portworx Enterprise. IBM Event Management.

After deploying the IBM Cloud Kubernetes service on Public Cloud, how soon are metrics collected by the IBM Cloud Monitoring service?. After 4 hours of cluster provisioning. Start of the next business day. As soon as the cluster is provisioned. After logging into your cluster for the first time.

Which is a Cloud Functions best practice?. Use Go-lang or Java to implement a function. Define long-running processes as a Cloud Functions workload. Define stateful applications as cloud functions. Make each function perform only one action.

What is Continuous Delivery?. Automating the process that moves software through the software development lifecycle. An asynchronous message delivery service on IBM Cloud. The practice of using canary deployments when delivering code. Frequently code, build, and integrate the work of all developers on a software project each day.

In the "Share responsibilities for using IBM Cloud offerings:, which party is responsible for the "operating system" Security and Regulation Compliance when using Infrastructure-as-a-Service(IaaS)?. Shared. Customer. Red Hat. IBM.

Select two key features of IBM Cloud DevOps Insights: (Choose two.). Analyze risks by using historical data and defined benchmarks. Provides a dashboard to prioritize DevOps stories using the MoSCoW method. Collect IBM Transformation Advisor data and generate burndown charts for migration to IBM Cloud. Connect Rational Team Concert metrics to IBM Cloud to generate code migration insights. Define benchmarks to create policies based on aggregated data.

Manage file storage IOPS only when provisioned. Manage file storage performance as needed. Manage IOPS on file storage as needed. Manage file storage IOPS only when provisioned. Use file storage IOPS only when needed.

Cloudant is an example of which type of database?. Graph database. Document database. Key-value database. Relational database.

What is required before an IBM Cloud Toolchain can be executed?. Creator role permissions. A Kubernetes cluster. A Continuous Delivery service. A container repository.

IBM Cloud Activity Tracker with LogDNA service monitors which set of events?. IBM Cloud Activity Tracker with LogDNA service monitors which set of events?. How users, applications, and services interact in an account. Payment transactions. Realtime performance.

Which approach must be used to access worker nodes in an IBM Cloud Red Hat OpenShift Kubernetes Service (ROKS)?. IBM Cloud management console. telnet. SSH. OpenStack API server.

What is the maximum File Storage volume size that can be provisioned?. They can be provisioned up to 12 GB. They can be provisioned up to 12 TB. They can be provisioned up to 20 GB. They can be provisioned up to 20 TB.

Which of the following is a key features of the IBM Cloud HSM: Support for HMAC key padding for one-time authentication tokens. Provides CA Issued certificates. Generate, process and store keys. Secure erasure using DoD 5220.22-M Data Wipe Method.

What does a toolchain do?. Integrates tools that support development, deployment, and operations tasks. Instruments application code to collect execution data during testing and ongoing operations C Profiles developer productivity in terms of lines of code written, bugs, and bugs remediated. Performs container orchestration for automatic application deployment, scaling, and management based on Podman.

IBM Cloud Security Advisor Network Insights uses which two KPIs to monitor inbound traffic? (Choose two.). Reconnaissance by suspicious clients. Suspicious request header format. Abnormally large numbers of failed login attempts. Suspicious client IP address from the black list. Abnormally large payloads sent by suspicious clients.

Which IBM Cloud server also offers a Power architecture on Linux?. Power Systems Virtual Servers. Reserved Virtual Servers. Dedicated Virtual Servers. Virtual Servers for VPC.

A utility company's Emergency Response Team has need of a PostgreSQL database for a Smart Phone Application. The application layer has resiliency built into it via Load Balancing across IBM Cloud Zones in a Region. Which service in the architecture would provide resiliency for the database?. Database for PostgreSQL. Terraform recipe for PostgreSQL. IBM Relational Database for PostgreSQL. Power VSI for PostgreSQL.

Which IBM Analytics product helps you make your data ready for an Al and hybrid cloud world?. IBM Watson OpenScale. IBM Cloud Pak for Data. IBM Watson Studio Desktop. IBM StoredlQ Suite.

What is API Gateway?. A service used to create, secure, share and manage APIs. A service that provides agility and speed in releasing new APIs functionalities. A tool used to write automated tests, ideally before writing code. A service used to create, secure, share, and manage code.

Report abuse