IOT BASED TRUCK TRACKING
BlueMix is IBM’s PaaS (Platform as a Service) offering A cloud-based platform for rapidly building, managing and running applications of all types (web, mobile, big data, social, … ). Allows developers to use capabilities (services) from IBM or ecosystem partners in a pay-as-you-go model in the cloud. – Running on IBM SoftLayer infrastructure (IaaS) – Based on open-standards (OpenStack, CloudFoundry) Bluemix provides access to a wide variety of services that can be incorporated into an application. Some of these services are delivered through Cloud Foundry. Others are delivered from IBM and third party vendors. New and enhanced services are added to the catalog often. To see the current list of runtimes and services, and their status go to the Bluemix catalog.
Some of the commonly used runtimes are:
Some of the Bluemix services available from the expanding catalog include:
|BigInsights for Hadoop||Powered by InfoSphere BigInsights, which is based on open source Hadoop, this service provides the open source capabilities of HBase, Hive, MapReduce, Pig and others, including your own open source packages.|
|Business Rules||Enables developers to spend less time recoding and testing when the business policy changes. This service minimizes your code changes by keeping business logic separate from application logic.|
|Cloudant NoSQL DB||Provides access to a fully managed NoSQL JSON data layer that’s always on. This service is compatible with CouchDB, and accessible through a simple to use HTTP interface for mobile and web application models.|
|Data Cache||Improve the performance and user experience of web applications by retrieving information from fast, managed, in-memory caches, instead of relying entirely on slower disk-based databases.|
|DevOps Auto-Scaling||Enables you to automatically increase or decrease the compute capacity of your application. The number of application instances are adjusted dynamically based on the Auto-Scaling policy you define.|
|DevOps Delivery Pipeline||Automate builds and deployments, test execution, configure build scripts, and automate execution of unit tests. Automatically build and deploy your application to IBM’s cloud platform, Bluemix.|
|Embeddable Reporting||Use a simple cloud editor then embed reports and dashboards in your web or mobile app using a wide variety of languages such as Node.js or Java using a RESTful API.|
|Geospatial Analytics||Leverage real-time geospatial analytics to track when devices enter or leave defined regions.|
|Internet of Things||Lets your apps communicate with and consume data collected by your connected devices, sensors, and gateways.|
|Mobile Push Notifications||Push information to all application users or to a specific set of users and devices. You can even let users subscribe to specific tags or topics for notification.|
|MongoDB||A popular NoSQL database|
|MQ Light||Develop responsive, scalable applications with a fully-managed messaging provider in the cloud. Quickly integrate with application frameworks through easy-to-use APIs.|
|Redis||A popular distributed dictionary server used by many distributed applications|
|Secure Gateway||Brings Hybrid Integration capability to your Bluemix environment. It provides secure connectivity from Bluemix to other applications and data sources running on-premise or in other clouds. A remote client is provided to enable secure connectivity.|
|Sendgrid||Sendgrid’s cloud-based email infrastructure relieves businesses of the cost and complexity of maintaining email systems.|
|Session Cache||Improve application resiliency by storing session state information across many HTTP requests. Enable persistent HTTP sessions for your application and seamless session recovery in event of an application failure.|
|Single Sign-On||Implement user authentication for your web and mobile apps quickly, using simple policy-based configurations.|
|SQL Database||Add an on-demand relational database to your application. Powered by DB2, it provides a managed database service to handle web and transactional workloads.|
|Watson Alchemy API||Leverage natural language processing and computer vision in your apps to deeply understand the world’s conversations, documents and photos.|
|Watson Language Translation||Converts text input in one language into a destination language for the end user. Translation is available among English, Brazilian Portuguese, Spanish, French, and Arabic.|
|Watson Personality Insights||Derives insights from transactional and social media data to identify psychological traits which determine purchase decisions, intent and behavioral traits; utilized to improve conversion rates.|
BlueMix has some buildpacks built in so that you do not have to specify an external buildpack when deploying an application – for example a Java web application, Node.js application, Ruby application. This uses buildpacks which can be sourced from the community ecosystem – see some of the links provided by others as answers to this question.
Security of the Bluemix platform :
Bluemix provides functional, infrastructure, operational, and physical security (through IBM SoftLayer) for the core platform. The Bluemix environment on SoftLayer is compliant with the most restrictive IBM information technology (IT) security standards, including the following, which meet or exceed the industry standards: Network, data encryption and access control Application access control lists (ACLs), permissions, and penetration testing Identification, authentication, and authorization Information and data protection Service integrity and availability Vulnerability and fix management Denial of service and systematic attacks detection Security incident response Functional security Bluemix provides various functional security capabilities, including user authentication, access authorization, auditing of critical operations, and data protection: Authentication Application developers are authenticated to Bluemix by using the IBM web identity. For Bluemix Dedicated, authentication through LDAP is supported by default. On request, authentication through IBM web identity can be set up instead. Authorization Bluemix uses Cloud Foundry mechanisms to ensure that each application developer has access only to the applications and service instances that they created. Authorization to Bluemix services is based on OAuth. Access to all Bluemix Platform internal endpoints are restricted to external users. Auditing Audit logs are created for all successful and unsuccessful authentication attempts of application developers. Audit logs are also created for privileged access to Linux systems that host the containers where Bluemix applications run. Data protection All Bluemix traffic goes through IBM WebSphere DataPower® SOA Appliances, which provide reverse proxy, SSL termination, and load balancing functions. The following HTTP methods are allowed: DELETE, GET, HEAD, OPTIONS, POST, PUT, TRACE. If HTTP is inactive, it times out at two minutes. Secure development practices Periodic security vulnerability scans are performed on various Bluemix components by using IBM Security AppScan Dynamic Analyzer and static analyzer offerings. Threat modeling and penetration testing are performed to detect and address any potential vulnerabilities. In addition, application developers can use the AppScan Dynamic Analyzer service to secure their web apps that are deployed on Bluemix.
Infrastructure security :
Bluemix builds upon Cloud Foundry to provide a robust foundation for running your applications. Within the architecture, several components are provided for security and isolation: Environment segregation Development and production environments are segregated from each other to improve application stability and security. Firewalls Firewalls are in place to restrict access to the Bluemix network. Intrusion protection Bluemix enables intrusion protection to discover threats so that they can be addressed. Intrusion protection policies are enabled on firewalls. Secure application container management Each Bluemix application is isolated and runs in its own container that has specific resource limits for processor, memory, and disk. Operating system security hardening IBM administrators regularly perform network and operating system hardening by using tools such as IBM Endpoint Manager. In addition, change management and backup and recovery procedures are implemented to ensure integrity and availability. Operational security Bluemix provides a robust operational security environment with the following controls: Vulnerability scan Bluemix uses the Tenable Network Security vulnerability scanning tool, Nessus, to detect any issues with network and host configurations so that the issues can be resolved. Automated fix management Bluemix administrators ensure that fixes for operating systems are applied at appropriate frequencies. Automated fixes are enabled by using IBM Endpoint Manager. Audit log consolidation and analysis Bluemix uses the IBM QRadar® Security Intelligence Platform tools to consolidate Linux logs to monitor privileged access on Linux systems. Bluemix also uses IBM QRadar security information and event management (SIEM) to monitor successful and unsuccessful login attempts of application developers. User access management Within Bluemix, Segregation of Duties guidelines are followed to assign granular access privileges to users and to ensure that users have only the access that is required to perform their jobs according to the principle of least privilege. Within a Bluemix dedicated environment, assigned administrators can manage roles and permissions for Bluemix user in their organization by using the Admin console.