
* add the pytests Signed-off-by: Peter Staar <taa@zurich.ibm.com> * renamed the test folder and added the toplevel test Signed-off-by: Peter Staar <taa@zurich.ibm.com> * updated the toplevel function test Signed-off-by: Peter Staar <taa@zurich.ibm.com> * need to start running all tests successfully Signed-off-by: Peter Staar <taa@zurich.ibm.com> * added the reference converted documents Signed-off-by: Peter Staar <taa@zurich.ibm.com> * added first test for json and md output Signed-off-by: Peter Staar <taa@zurich.ibm.com> * ran pre-commit Signed-off-by: Peter Staar <taa@zurich.ibm.com> * replaced deprecated json function with model_dump_json Signed-off-by: Peter Staar <taa@zurich.ibm.com> * replaced deprecated json function with model_dump_json Signed-off-by: Peter Staar <taa@zurich.ibm.com> * reformatted code Signed-off-by: Peter Staar <taa@zurich.ibm.com> * Fix backend tests Signed-off-by: Christoph Auer <cau@zurich.ibm.com> * commented out the drawing Signed-off-by: Peter Staar <taa@zurich.ibm.com> * ci: avoid duplicate runs Signed-off-by: Michele Dolfi <97102151+dolfim-ibm@users.noreply.github.com> * commented out json verification for now Signed-off-by: Peter Staar <taa@zurich.ibm.com> * added verification of input cells Signed-off-by: Peter Staar <taa@zurich.ibm.com> * reformat code Signed-off-by: Peter Staar <taa@zurich.ibm.com> * added test to verify the cells in the pages Signed-off-by: Peter Staar <taa@zurich.ibm.com> * added test to verify the cells in the pages (2) Signed-off-by: Peter Staar <taa@zurich.ibm.com> * added test to verify the cells in the pages (3) Signed-off-by: Peter Staar <taa@zurich.ibm.com> * run all examples in CI Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * make sure examples return failures Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * raise a failure if examples fail Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * fix examples Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * run examples after tests Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * Add tests and update top_level_tests using only datamodels Signed-off-by: Christoph Auer <cau@zurich.ibm.com> * Remove unnecessary code Signed-off-by: Christoph Auer <cau@zurich.ibm.com> * Validate conversion status on e2e test Signed-off-by: Christoph Auer <cau@zurich.ibm.com> * package verify utils and add more tests Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * reduce docs in example, since they are already in the tests Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * skip batch_convert Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * pin docling-parse 1.1.2 Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> * updated the error messages Signed-off-by: Peter Staar <taa@zurich.ibm.com> * commented out the json verification for now Signed-off-by: Peter Staar <taa@zurich.ibm.com> * bumped GLM version Signed-off-by: Peter Staar <taa@zurich.ibm.com> * Fix lockfile Signed-off-by: Christoph Auer <cau@zurich.ibm.com> * Pin new docling-parse v1.1.3 Signed-off-by: Christoph Auer <cau@zurich.ibm.com> --------- Signed-off-by: Peter Staar <taa@zurich.ibm.com> Signed-off-by: Christoph Auer <cau@zurich.ibm.com> Signed-off-by: Michele Dolfi <97102151+dolfim-ibm@users.noreply.github.com> Signed-off-by: Michele Dolfi <dol@zurich.ibm.com> Co-authored-by: Christoph Auer <cau@zurich.ibm.com> Co-authored-by: Michele Dolfi <97102151+dolfim-ibm@users.noreply.github.com> Co-authored-by: Michele Dolfi <dol@zurich.ibm.com>
1 line
161 KiB
JSON
1 line
161 KiB
JSON
{"_name": "", "type": "pdf-document", "description": {"title": null, "abstract": null, "authors": null, "affiliations": null, "subjects": null, "keywords": null, "publication_date": null, "languages": null, "license": null, "publishers": null, "url_refs": null, "references": null, "publication": null, "reference_count": null, "citation_count": null, "citation_date": null, "advanced": null, "analytics": null, "logs": [], "collection": null, "acquisition": null}, "file-info": {"filename": "redp5695.pdf", "filename-prov": null, "document-hash": "a03aa4721c6532a8bab8a84cd8fdf579b5d91b92e5e5bbf63552b451c1b1ad7e", "#-pages": 40, "collection-name": null, "description": null, "page-hashes": [{"hash": "2c6aa6caf31aededa105d495c308dfbbb82f36e74a5c918aef77cb55e270512c", "model": "default", "page": 1}, {"hash": "4c44677e63816427d586e3351fca1f60791742ff03d4e4fbd9e20049f0df1e7c", "model": "default", "page": 2}, {"hash": "9b14b4b39f406833be1be7b8a4267fbc0c9e3fb38d9c0d6be9233aaa7b34a290", "model": "default", "page": 3}, {"hash": "b393eac931d491dfb5754007d81c5eb852837b767e6bbf97532fdd9797089c84", "model": "default", "page": 4}, {"hash": "069d8724992bd8bcf023444a735733831db317258922be9bf9e68b6cb71592b3", "model": "default", "page": 5}, {"hash": "50142dc112c6479b6aa9b337444bf76fab1788845c852372d680663fac7bb708", "model": "default", "page": 6}, {"hash": "dd036a3882859d0dca411354baf6f8d89fecaa39938e0336366cdb0e70aea878", "model": "default", "page": 7}, {"hash": "b6ff3d96c10d8bb147a1678f23b1b3dc0a57314ac67de6dc51c7fed42235b8fb", "model": "default", "page": 8}, {"hash": "a9f5f13f5b38d6e5f144870e072b9b5dcda3e9efb2612d12f2f78844a2af5faf", "model": "default", "page": 9}, {"hash": "2ee65c9e3ecaf2ee28d154184562131c2c0d46fde9536daf2bf63f27cd1593fb", "model": "default", "page": 10}, {"hash": "7c3211d92edf78fb8fc2a25419e905c54df6cf08e46a6ba3af97c6ecb6f42976", "model": "default", "page": 11}, {"hash": "e9d2d2c16961c78c4252759f518e49d67e42323770ea954f0fdb5845060255b4", "model": "default", "page": 12}, {"hash": "96ec46a4b8a06f1e4a0b8ab372f0fa2eb9fa3651d598777108e2c8d841504c01", "model": "default", "page": 13}, {"hash": "85666d6d7492d1aa5e2d680aad82b243f74ac9a88d12a822f1e23a4015653280", "model": "default", "page": 14}, {"hash": "996b6243f71e4b579c257f5a8c13120d756c35db892bb3978a030b3c0244b332", "model": "default", "page": 15}, {"hash": "8d3962d8d62baba81d7c1f9136148614f19ce3e67856165e11746a4eea0ba0e2", "model": "default", "page": 16}, {"hash": "c97edc5fbc0c2ebe67d17aaa3a35994c946e63370e43599ff1a53a43cb015f4b", "model": "default", "page": 17}, {"hash": "027b2018dd204fdcfde1f23714efb239c7b0ddec82e6dcb261917047112c59c1", "model": "default", "page": 18}, {"hash": "bfd48e4d4c91d25d1ce8b96cb8b893121083e34366f2336ec2297ad429aefba5", "model": "default", "page": 19}, {"hash": "369aa7281999b4927d03fc80d04f64c4c466672e988a345b8e38b0b413d8b061", "model": "default", "page": 20}, {"hash": "07156cdcdb8bed82cd7def82ae50e3696797733c1af054e52e085d6dc4f158f3", "model": "default", "page": 21}, {"hash": "6868b382cf5f556a700cbfbd3b5019d1874f4d0b539322cf2d66d3ae91750021", "model": "default", "page": 22}, {"hash": "d18c7c0751a2b21cd90b28db97f792b76d800ef27df66b3b7551f30ae8f3c135", "model": "default", "page": 23}, {"hash": "f6bafed831071a1e8cc789bd6dc193c05982a2d11675458e0e470c69e09c39eb", "model": "default", "page": 24}, {"hash": "acd7cf74cdc0fb0f0fa69c5f5d5882fae44ead0f3e98317d0f1ca28a8bbfa0e5", "model": "default", "page": 25}, {"hash": "8618c32aa8f279cc7cfa3df0ffd5eb3f3f54d7216ae3c1af792a4cb778067f0e", "model": "default", "page": 26}, {"hash": "a158cfc6005ac6ec5857112db18ccbab469a42558439bf7c3e2ff5d63894cab4", "model": "default", "page": 27}, {"hash": "d93efe59e4c22d9f511c0df70a9ec01f5a030934af7b9e6f5232db806b143152", "model": "default", "page": 28}, {"hash": "27d5b0915a207c64ea3dfb11866a19a1ef42e54840493113126c243c4be9bd89", "model": "default", "page": 29}, {"hash": "dfd1705fa6a5b13fef569bb8a9dd567ed3950bb91004431c85bd6499135e0d98", "model": "default", "page": 30}, {"hash": "74a78ed4bb5999301ec12e980789a33cabea9131a0a8f03899a49655b7196ea4", "model": "default", "page": 31}, {"hash": "f38e9710dee1ada6c040bdf1d6b33373780790d53391dde1bdf13ba3a24237cc", "model": "default", "page": 32}, {"hash": "4c45d9a942e9431722d4e657e1772e30ed322e4c48aa8fa8e0f582cab686694f", "model": "default", "page": 33}, {"hash": "d5d0bd616da3d60f4162c3bf0c136e6fb6a3776a09daac01676eaf4f194ddbc8", "model": "default", "page": 34}, {"hash": "e68ecc6baff9b98afcefa647a55aa34f9a9fe9f507a393177097d89c5faf1901", "model": "default", "page": 35}, {"hash": "806561bd028d61b13a1d840ef5aa6bc29f596670f6a755cdff7f5ca16156bc6c", "model": "default", "page": 36}, {"hash": "d3b094a0a238bbd0866053a416a69e04d4d8efb937be01a022db3ccb24808e29", "model": "default", "page": 37}, {"hash": "af95f582613321de443a381441d8c361f4ff94fc0f777736e939927cc7d9963f", "model": "default", "page": 38}, {"hash": "28b15af143c0cf1810e8552ebaf1c58b1597cd4bb772e981b5979d0e83c98d0e", "model": "default", "page": 39}, {"hash": "b98218d5619db175ad1a9a2424365094f52356cbefadce85e557ebb182151d82", "model": "default", "page": 40}]}, "main-text": [{"text": "Front cover", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [285.9599914550781, 760.5719604492188, 417.8999938964844, 782.77197265625], "page": 1, "span": [0, 11], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/0"}, {"text": "IBM Cloud Pak for Data on IBM Z", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [44.81999969482422, 595.87158203125, 535.7647094726562, 683.3976440429688], "page": 1, "span": [0, 31], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/1"}, {"text": "Redguide", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [467.2799987792969, 23.920970916748047, 571.5428466796875, 50.99158477783203], "page": 1, "span": [0, 8], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/2"}, {"text": "Executive overview", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.80000305175781, 511.6919860839844, 292.852783203125, 534.8515014648438], "page": 3, "span": [0, 18], "__ref_s3_data": null}]}, {"text": "Most industries are susceptible to fraud, which poses a risk to both businesses and consumers. According to The National Health Care Anti-Fraud Association, health care fraud alone causes the nation around $68 billion annually.$^{1}$ This statistic does not include the numerous other industries where fraudulent activities occur daily. In addition, the growing amount of data that enterprises own makes it difficult for them to detect fraud. Businesses can benefit by using an analytical platform to fully integrate their data with artificial intelligence (AI) technology.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.93536376953125, 393.2442932128906, 547.2804565429688, 476.23895263671875], "page": 3, "span": [0, 573], "__ref_s3_data": null}]}, {"text": "With IBM Cloud Pakfi for Data on IBM Z, enterprises can modernize their data infrastructure, develop, and deploy machine learning (ML) and AI models, and instantiate highly efficient analytics deployment on IBM LinuxONE. Enterprises can create cutting-edge, intelligent, and interactive applications with embedded AI, colocate data with commercial applications, and use AI to make inferences.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.92813110351562, 323.9799499511719, 547.349853515625, 382.1717224121094], "page": 3, "span": [0, 392], "__ref_s3_data": null}]}, {"text": "This IBM Redguide publication presents a high-level overview of IBM Z. It describes IBM Cloud Pak for Data (CP4D) on IBM Z and IBM LinuxONE, the different features that are supported on the platform, and how the associated features can help enterprise customers in building AI and ML models by using core transactional data, which results in decreased latency and increased throughput.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.94898986816406, 253.30953979492188, 547.2882690429688, 312.1575622558594], "page": 3, "span": [0, 385], "__ref_s3_data": null}]}, {"text": "This publication highlights real-time CP4D on IBM Z use cases. Real-time Clearing and Settlement Transactions, Trustworthy AI and its Role in Day-To-Day Monitoring, and the Prevention of Retail Crimes are use cases that are described in this publication. Using CP4D on IBM Z and LinuxONE, this publication shows how businesses can implement a highly efficient analytics deployment that minimizes latency, cost inefficiencies, and potential security exposures that are connected with data transportation.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.8448028564453, 171.74127197265625, 547.2760009765625, 242.12237548828125], "page": 3, "span": [0, 503], "__ref_s3_data": null}]}, {"text": "$^{1 }$https://www.bcbsm.com/health-care-fraud/fraud-statistics.html", "type": "footnote", "name": "Footnote", "font": null, "prov": [{"bbox": [136.8000030517578, 56.842594146728516, 387.7856140136719, 66.6188735961914], "page": 3, "span": [0, 68], "__ref_s3_data": null}]}, {"text": "' Copyright IBM Corp. 2023.", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [63.84707260131836, 27.84148406982422, 180.32760620117188, 37.38951110839844], "page": 3, "span": [0, 27], "__ref_s3_data": null}]}, {"text": "1", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [541.6041259765625, 27.93828010559082, 547.2176513671875, 37.469120025634766], "page": 3, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "IBM Z: An overview", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.75005340576172, 706.0162963867188, 212.3214874267578, 721.6939086914062], "page": 4, "span": [0, 18], "__ref_s3_data": null}]}, {"text": "Ever wonder how many transactions a bank processes per day? What about the pace at which these transactions happen? According to an IBMfi report, 44 of 50 of the world's top banks use IBM Z mainframes for these daily transactions.$^{2}$ IBM Z is a platform that is designed for voluminous data, maximum security, real-time transaction analysis, and cost efficiency.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.85592651367188, 630.8654174804688, 539.5514526367188, 689.4552612304688], "page": 4, "span": [0, 365], "__ref_s3_data": null}]}, {"text": "The most recent platform for IBM Z is IBM z16\u2122. The IBM z16 supports the following features:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.8168182373047, 597.2792358398438, 515.6898803710938, 619.3519287109375], "page": 4, "span": [0, 92], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> On-chip AI acceleration", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.85256958007812, 580.2994384765625, 255.07154846191406, 590.5203857421875], "page": 4, "span": [0, 39], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Quantum-safe crypto discovery", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.62339782714844, 562.92626953125, 289.7875671386719, 573.06884765625], "page": 4, "span": [0, 45], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Simplified compliance", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.72850036621094, 546.2800903320312, 247.85403442382812, 556.7696533203125], "page": 4, "span": [0, 37], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Flexible capacity", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.6919708251953, 528.5509643554688, 225.09173583984375, 539.1024169921875], "page": 4, "span": [0, 33], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Modernization of applications", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.60623168945312, 511.6312561035156, 280.60699462890625, 521.9880981445312], "page": 4, "span": [0, 45], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Sustainability", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.6087646484375, 494.7903137207031, 210.2745361328125, 505.39013671875], "page": 4, "span": [0, 30], "__ref_s3_data": null}]}, {"text": "With these features, enterprises can upgrade applications while preserving secure and resilient data.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.90225219726562, 461.2615661621094, 521.9436645507812, 483.12371826171875], "page": 4, "span": [0, 101], "__ref_s3_data": null}]}, {"text": "To learn more about these features, see the IBM z16 product page.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9076690673828, 439.1145324707031, 434.5896301269531, 449.38116455078125], "page": 4, "span": [0, 65], "__ref_s3_data": null}]}, {"text": "Figure 1 on page 3 shows a picture of the IBM z16 mainframe.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.52610778808594, 417.182861328125, 415.693603515625, 427.33294677734375], "page": 4, "span": [0, 60], "__ref_s3_data": null}]}, {"text": "$^{2 }$https://www.ibm.com/case-studies/bankwest/", "type": "footnote", "name": "Footnote", "font": null, "prov": [{"bbox": [136.1376495361328, 57.05204391479492, 311.9372253417969, 67.31904602050781], "page": 4, "span": [0, 49], "__ref_s3_data": null}]}, {"text": "2", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.08910369873047, 27.93828010559082, 72.8219985961914, 37.42863464355469], "page": 4, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [87.64891815185547, 27.621387481689453, 261.53851318359375, 37.20967102050781], "page": 4, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 1 IBM z16", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [136.36338806152344, 333.7419738769531, 211.10719299316406, 343.4512634277344], "page": 5, "span": [0, 16], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/3"}, {"text": "IBM z16 and IBM LinuxONE Emperor 4 features", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.56404876708984, 301.7572937011719, 355.6016540527344, 314.76092529296875], "page": 5, "span": [0, 43], "__ref_s3_data": null}]}, {"text": "IBM Z are based on enterprise mainframe technology. Starting with transaction-based workloads and databases, IBM Z has undergone tremendous transformations in its system design for many generations to build servers that cater to Linux-based workloads and security with a cyberresilient system, and support quantum computing and modernization by using a hybrid cloud with a focus on data and AI.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.82955932617188, 230.37913513183594, 547.1771240234375, 288.7164306640625], "page": 5, "span": [0, 394], "__ref_s3_data": null}]}, {"text": "3", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [541.1922607421875, 27.93828010559082, 547.2176513671875, 37.54865264892578], "page": 5, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "4", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.48660278320312, 27.93828010559082, 72.8219985961914, 37.547672271728516], "page": 6, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [87.67277526855469, 27.705074310302734, 261.53851318359375, 37.23814392089844], "page": 6, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 2 provides a snapshot of the IBM Z processor roadmap, which depicts the journey of transformation and improvement.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.30259704589844, 699.2496337890625, 543.5195922851562, 721.4502563476562], "page": 6, "span": [0, 121], "__ref_s3_data": null}]}, {"text": "Figure 2 IBM Z: Processor roadmap", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.45831298828125, 403.8142395019531, 213.13937377929688, 413.22802734375], "page": 6, "span": [0, 33], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/4"}, {"text": "The IBM z16 and IBM LinuxONE Emperor 4 are the latest of the IBM Z, and they are developed with a 'built to build' focus to provide a powerful, cyberresilient, open, and secure platform for business with an extra focus on sustainability to help build sustainable data centers. Although the z16 server can host both IBM z/OSfi and Linux workloads, LinuxONE Emperor 4 is built to host Linux only workloads with a focus on consolidation and resiliency. Depending on the workload, consolidation from numerous x86 servers into a LinuxONE Emperor 4 can help reduce energy consumption by 75% and data center floor space by 50%, which helps to achieve the sustainability goals of the organization.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9113311767578, 297.0347900390625, 547.256591796875, 391.550048828125], "page": 6, "span": [0, 689], "__ref_s3_data": null}]}, {"text": "Figure 3 on page 5 shows a summary of the system design of IBM LinuxONE Emperor 4 with the IBM Telum\u2122 processor. The IBM Telum processor chip is designed to run enterprise applications efficiently where their data resides to embed AI with super low latency. The support for higher bandwidth and I/O rates is supported through FCP Express cards with an endpoint security solution. The memory subsystem supports up to 40 TB of memory.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.12657165527344, 226.86495971679688, 547.257568359375, 285.4850769042969], "page": 6, "span": [0, 432], "__ref_s3_data": null}]}, {"text": "Figure 3 System design of IBM z16 LinuxONE Emperor 4", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.32421112060547, 430.4823913574219, 297.8570861816406, 439.8866882324219], "page": 7, "span": [0, 52], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/5"}, {"text": "The IBM z16 and IBM LinuxONE Emperor 4 servers are built with 7-nm technology at a 5.2 GHz speed. They consist of four dual-chip modules (DCMs) per central processor complex (CPC) drawer, each of which is built with two 8-core Telum processor chips that has \"first in the industry\" on-chip acceleration for mid-transaction, real-time AI inferencing, which supports many different use cases, including fraud detection.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.7873992919922, 359.77313232421875, 547.2974243164062, 417.9614562988281], "page": 7, "span": [0, 417], "__ref_s3_data": null}]}, {"text": "Each core has access to a huge private 32 MB L2 cache where up to 16 MB of the L2 cache of an inactive core can be used as virtual cache (L3 / L4) by neighboring active cores on the chip. This cache helps address translation and access checking by prefetching the same virtual cache into the L2 cache. The virtual cache also includes Neural Network Processing Assist instructions and direct memory access with protection, and per chip GZIP compression.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.89752197265625, 277.57452392578125, 547.322265625, 348.19305419921875], "page": 7, "span": [0, 452], "__ref_s3_data": null}]}, {"text": "5", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [541.3024291992188, 27.93828010559082, 547.2176513671875, 37.632568359375], "page": 7, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "6", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.51323699951172, 27.93828010559082, 72.8219985961914, 37.4283332824707], "page": 8, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [87.71185302734375, 27.736722946166992, 261.53851318359375, 37.20823669433594], "page": 8, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 4 provides more information about the features of AI Accelerator integration with the IBM Z processor cores.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.292236328125, 698.827880859375, 541.310546875, 721.4586791992188], "page": 8, "span": [0, 115], "__ref_s3_data": null}]}, {"text": "Figure 4 IBM z16 on-chip AI Accelerator integration with IBM Z processor cores", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.19121551513672, 418.4478454589844, 387.3546142578125, 428.0519714355469], "page": 8, "span": [0, 78], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/6"}, {"text": "The IBM z16 and IBM LinuxONE Emperor 4 server platforms are built with the hardware features that are shown in Figure 4 with addressing data and AI workloads in mind. Regardless of where the ML and deep learning (DL) frameworks are used to build and train data and AI models, the inferencing on existing enterprise application data can happen along currently running enterprise business applications. CP4D 4.6 supports Tensorflow and IBM Snap ML frameworks, which are optimized to use the on-chip AI Accelerator during inferencing. Support for various other frameworks is planned for future releases.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.91659545898438, 323.6279296875, 547.2345581054688, 406.1714172363281], "page": 8, "span": [0, 600], "__ref_s3_data": null}]}, {"text": "Figure 5 on page 7 shows the seamless integration of AI into existing enterprises workloads on the IBM z16 while leveraging the underlying hardware capabilities.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.17147827148438, 289.6532897949219, 544.6222534179688, 311.9052734375], "page": 8, "span": [0, 161], "__ref_s3_data": null}]}, {"text": "Figure 5 Seamless integration", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.43448638916016, 481.01043701171875, 189.449951171875, 490.2646179199219], "page": 9, "span": [0, 29], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/7"}, {"text": "What is Cloud Pak for Data on IBM Z", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.33121490478516, 438.1763000488281, 341.5532531738281, 453.7354431152344], "page": 9, "span": [0, 35], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data allows enterprises to simplify, unify, and automate the delivery of data and AI. It categorizes the activities within the journey to AI as four rungs of the AI Ladder: Collect, Organize, Analyze, and Infuse. For more information about each of the AI Ladder rungs, see Become Data Driven with IBM Z Infused Data Fabric , REDP-5680.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0311737060547, 374.9359130859375, 547.132080078125, 421.4658508300781], "page": 9, "span": [0, 353], "__ref_s3_data": null}]}, {"text": "CP4D on IBM Z provides enterprises with a resilient and secure private cloud platform. You can use it to create ML and AI models that may be included into modern intelligent applications. You also can use it to use and construct applications for mission-critical data. With CP4D on IBM Z, enterprises can lower data movement latency, cost inefficiencies, and potential security exposures. Enterprises can safely store and access their most important company data, and leverage their current infrastructure by using cutting-edge hybrid cloud applications. Enterprises can combine their current database applications without any rewrites, which results in reduced cost and complexity. Lastly, by using CP4D on IBM Z, enterprises can update their database infrastructure to benefit from easier management, a quicker time to value, and lower operating expenses.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.93280029296875, 244.90695190429688, 545.086181640625, 363.6493225097656], "page": 9, "span": [0, 857], "__ref_s3_data": null}]}, {"text": "7", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [541.0161743164062, 27.93828010559082, 547.2838745117188, 37.731361389160156], "page": 9, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "8", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.47938537597656, 27.93828010559082, 72.8219985961914, 37.48422622680664], "page": 10, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [87.7466049194336, 27.745710372924805, 261.53851318359375, 37.175758361816406], "page": 10, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 6 shows a solution overview of CP4D. The infrastructure alternatives are shown at the bottom, and they include IBM Z and LinuxONE. They all leverage Red Hat OpenShift. Common Foundational Services come next, which offer clarity throughout the data and AI lifecycle, that is, from user access management to monitoring and service provisioning. A high-level view of the services is shown in the middle section. The services have several different capabilities that span the AI hierarchy. The platform can be expanded, and it offers a seamless user experience for all distinct personas across the AI lifecycle, from data gathering through AI infusion.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.06129455566406, 626.6174926757812, 547.2805786132812, 721.595947265625], "page": 10, "span": [0, 655], "__ref_s3_data": null}]}, {"text": "Figure 6 Solution overview of Cloud Pak for Data", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.57273864746094, 298.9583435058594, 264.11474609375, 308.77056884765625], "page": 10, "span": [0, 48], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/8"}, {"text": "We highlight the four main pillars that make IBM Z the correct infrastructure for CP4D:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.52293395996094, 276.2957763671875, 518.3954467773438, 286.7032775878906], "page": 10, "span": [0, 87], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Performance and Scale", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.77655029296875, 259.4186096191406, 255.66061401367188, 269.49017333984375], "page": 10, "span": [0, 37], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Embedded Accelerators", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.59234619140625, 242.43878173828125, 257.89263916015625, 252.5904083251953], "page": 10, "span": [0, 37], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Reliability and Availability", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.40530395507812, 224.8186492919922, 263.65850830078125, 235.10702514648438], "page": 10, "span": [0, 44], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Security and Governance.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.4591064453125, 208.41940307617188, 269.5468444824219, 218.50930786132812], "page": 10, "span": [0, 40], "__ref_s3_data": null}]}, {"text": "From a performance perspective, CP4D on IBM Z provides your data and AI with high transaction processing and a powerful infrastructure. From the embedded accelerators perspective, CP4D on IBM Z can investigate each transaction thanks to a cutting-edge DL inference technology even in the most demanding, sensitive, and latency-prone real-time workloads. From a reliability perspective, CP4D on IBM Z provides high availability and resiliency. Lastly from the security perspective, CP4D on IBM Z is suitable for protecting sensitive data and AI models for enterprises in highly regulated industries or those industries that are worried about security.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9900665283203, 102.40120697021484, 547.2814331054688, 196.7720184326172], "page": 10, "span": [0, 650], "__ref_s3_data": null}]}, {"text": "Cloud Pak for Data capabilities on IBM Z and IBM LinuxONE", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.80000305175781, 705.8773193359375, 519.7557983398438, 721.6634521484375], "page": 11, "span": [0, 57], "__ref_s3_data": null}]}, {"text": "With CP4D on IBM Z and IBM LinuxONE, users can develop, train, and deploy AI and ML models. Users can accomplish this task by using the CP4D IBM Watsonfi Studio and IBM Watson Machine Learning (WLM) services. By using these two fundamental services, users can accomplish the following tasks:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.6363067626953, 642.8818969726562, 544.5404052734375, 689.4312133789062], "page": 11, "span": [0, 291], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Provision various containerized databases.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.7655487060547, 626.25927734375, 341.2439270019531, 636.0855102539062], "page": 11, "span": [0, 58], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Explore, clean, shape, and alter data by using Data Refinery.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.609619140625, 608.9733276367188, 423.5125427246094, 619.2939453125], "page": 11, "span": [0, 77], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Use project-specific data that is uploaded, or connect to distant data.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.44422912597656, 592.2996826171875, 454.5639343261719, 602.7785034179688], "page": 11, "span": [0, 87], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Create Spark run times and applications.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.59793090820312, 575.0346069335938, 331.7221984863281, 585.4097900390625], "page": 11, "span": [0, 56], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Create, build, evaluate, and deploy analytics and ML models with trust and transparency.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.42922973632812, 558.2803344726562, 544.107177734375, 568.422607421875], "page": 11, "span": [0, 104], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Leverage the AI Integrated Accelerator for TensorFlow 2.7.2 and Snap ML 1.9.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.64759826660156, 541.0048217773438, 499.1278381347656, 551.3433227539062], "page": 11, "span": [0, 92], "__ref_s3_data": null}]}, {"text": "For more information about the specifics of these capabilities, see Capabilities on Linux on IBM Z and IBM LinuxONE.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.32513427734375, 507.2811279296875, 538.98681640625, 529.5091552734375], "page": 11, "span": [0, 116], "__ref_s3_data": null}]}, {"text": "Open-source ecosystem", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.80000305175781, 463.8086853027344, 250.52972412109375, 479.4306945800781], "page": 11, "span": [0, 21], "__ref_s3_data": null}]}, {"text": "These days, innovation and product development are not limited to closed doors within an organization. In any industry sector, the solutions include a mix of proprietary code addressing the core business solution that is supported or integrated into other software components from open source. In some cases, enterprises business solutions also are built from open-source community offerings. Thus, open-source software becomes an important ingredient in modern-day solution building.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.8963165283203, 376.8506164550781, 543.4259643554688, 447.3017272949219], "page": 11, "span": [0, 484], "__ref_s3_data": null}]}, {"text": "IBM actively participates in various open-source communities as part of steering boards defining the roadmap of the community, and also in contributing code to make the community a better place for everyone to participate. Red Hat also actively participates in various open-source communities and makes extensive contributions. In open-source communities, although most open-source development happens on x86 / amd64 or the Intel architecture, the same open-source software is used by other architectures, such as IBM Power (ppc64le), IBM Z and IBM LInuxONE (s390x), ARM, and Sparc. So, the availability of an open-source ecosystem on any architecture is key and critical to business.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9189453125, 271.0766906738281, 547.2396850585938, 365.0788269042969], "page": 11, "span": [0, 684], "__ref_s3_data": null}]}, {"text": "On IBM Z and IBM LinuxONE (s390x) architecture, there is a huge open-source support ecosystem that ranges from operating systems such as Linux; application run times; cloud and container services; DevOps and automation; big data; observability; analytics; databases; and storage. The ecosystem on IBM Z and IBM LinuxONE is growing.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0531463623047, 213.07455444335938, 537.3534545898438, 259.5094299316406], "page": 11, "span": [0, 331], "__ref_s3_data": null}]}, {"text": "IBM Z and IBM LinuxONE include much open-source software in their ecosystem. You can see the growing list of open-source software for IBM Z and LinuxONE at The Growing Ecosystem of Open-Source Software for IBM Z and LinuxONE.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.2856903076172, 167.24769592285156, 540.7626342773438, 201.58775329589844], "page": 11, "span": [0, 225], "__ref_s3_data": null}]}, {"text": "IBM Z and IBM LinuxONE are available to various communities to include support for s390x builds as part of their community's continuous integration and continuous delivery (CI/CD). Also, for open-source community developers, infrastructure resources are available on a no-charge basis through the IBM LinuxONE community cloud.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.05987548828125, 108.99290466308594, 544.6069946289062, 155.43284606933594], "page": 11, "span": [0, 326], "__ref_s3_data": null}]}, {"text": "9", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [541.1886596679688, 27.93828010559082, 547.2176513671875, 37.77804183959961], "page": 11, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "10", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.68538665771484, 27.93828010559082, 78.4020004272461, 37.55242919921875], "page": 12, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.686418533325195, 267.07440185546875, 37.19207000732422], "page": 12, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "CP4D includes a mix of open-source and proprietary data and AI runtime databases; open-source run times like Python; open-source data platforms like Anaconda; ML and DL frameworks like Pytorch and Tensorflow; and thousands of reusable Python packages. All of them are available and supported on s390x architecture to provide seamless parity with x86 architecture and a seamless experience for enterprise data scientists, architects, and data and AI solution developers on IBM Z and IBM LinuxONE platforms.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9039306640625, 651.1361083984375, 547.312255859375, 721.5728759765625], "page": 12, "span": [0, 505], "__ref_s3_data": null}]}, {"text": "Anaconda is one of the open-source data platforms that provide Python and R based data science ML frameworks; analytics and data visualization tools; and open-source data science tools and libraries like Conda, XGBoost, and SciKit-Learn. Anaconda runs natively on Linux on IBM Z and IBM LinuxONE, and on IBM z/OS Container Extensions (zcX) on z/OS. For more information, see Announcing Anaconda for Linux on IBM Z and LinuxONE.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9044647216797, 581.2603759765625, 547.3501586914062, 639.3648681640625], "page": 12, "span": [0, 427], "__ref_s3_data": null}]}, {"text": "In addition to strong, open-source ecosystem support for application development on Linux and enterprise operating systems, a new generation of IBM Z and IBM LinuxONE servers (IBM z16\u2122) also have strong platform support, and AI acceleration capabilities that can be leveraged by open-source software to perform better on the server infrastructure. For example, the recently released CP4D 4.6 has Tensorflow and IBM SnapML frameworks that leverage the AI accelerators when running on an IBM z16 server.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.92164611816406, 498.8492736816406, 546.230712890625, 569.2470703125], "page": 12, "span": [0, 501], "__ref_s3_data": null}]}, {"text": "So, to summarize, there is a huge, growing data and AI open source ecosystem that is supported and optimized on IBM Z and IBM LinuxONE servers.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.26947021484375, 465.1493225097656, 521.3436889648438, 487.5268249511719], "page": 12, "span": [0, 143], "__ref_s3_data": null}]}, {"text": "Why AI on IBM Z", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.2679214477539, 421.844482421875, 191.19384765625, 437.6422119140625], "page": 12, "span": [0, 15], "__ref_s3_data": null}]}, {"text": "Data and AI playing a major role in the modernization story to enable the digital transformation journey of every organization. Many organizations recognize the business value of infusing AI into their infrastructure. CP4D provides the cloud-native solution to put your data to work. With CP4D, all your data users can collaborate from a single, unified interface that supports many services that work together, including collecting data, organizing the data, analyzing the data, and infusing AI.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.91458129882812, 334.8140563964844, 547.2586059570312, 405.332275390625], "page": 12, "span": [0, 496], "__ref_s3_data": null}]}, {"text": "Traditional ML models' power most of today's ML applications in business and among AI practitioners. CP4D supports traditional ML frameworks for training and inferencing, such as Scikit-learn, Snap ML, and XGBoost. Snap ML is a library that provides high-speed training and inferencing of ML models that leverage the AI accelerator while running on an IBM z16 (Linux on IBM Z). CP4D supports DL frameworks such as TensorFlow and PyTorch. TensorFlow is a DL framework that leverages the AI accelerator while running on an IBM z16 (Linux on IBM Z).", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.89390563964844, 241.02479553222656, 547.2825317382812, 323.4716491699219], "page": 12, "span": [0, 546], "__ref_s3_data": null}]}, {"text": "Figure 7 on page 11 provides an overview of the components that are supported on CP4D on IBM Z. You can leverage Watson Studio for model building, training, and validation, and WML for deployment of the model. Eventually, applications can use the AI inference endpoint to score the model.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0904541015625, 183.28155517578125, 547.3233032226562, 229.29551696777344], "page": 12, "span": [0, 288], "__ref_s3_data": null}]}, {"text": "Figure 7 Developing, training, and deploying an AI model on Cloud Pak for Data on IBM Z and IBM LinuxONE", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.48258972167969, 428.9914245605469, 506.38671875, 438.489013671875], "page": 13, "span": [0, 104], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/9"}, {"text": "In summary, here are some of the reasons why you should choose AI on IBM Z:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.08367919921875, 406.4902648925781, 492.9408264160156, 416.6065673828125], "page": 13, "span": [0, 75], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> World-class AI inference platform for enterprise workloads:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.6901397705078, 389.77813720703125, 413.4001770019531, 399.8421936035156], "page": 13, "span": [0, 75], "__ref_s3_data": null}]}, {"text": "-Embedded accelerators: A centralized on-chip AI accelerator that is shared by all cores.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.4140167236328, 360.75909423828125, 526.1881103515625, 382.4400634765625], "page": 13, "span": [0, 89], "__ref_s3_data": null}]}, {"text": "-Industry standard AI ecosystem: Many industry open-source data science frameworks are available on the platform.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.0751190185547, 331.77947998046875, 547.2465209960938, 353.9866638183594], "page": 13, "span": [0, 113], "__ref_s3_data": null}]}, {"text": "-Seamlessly integrate AI into existing enterprise workload stacks: Train anywhere, and then deploy on IBM Z.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.26991271972656, 302.2157287597656, 546.7576904296875, 324.52313232421875], "page": 13, "span": [0, 108], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Security: Encrypted memory, and improved trusted execution environments.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.60690307617188, 285.71148681640625, 490.0331726074219, 295.9700927734375], "page": 13, "span": [0, 88], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Sustainability: Reduce your energy consumption with real-time monitoring tools about the energy consumption of the system.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.39907836914062, 256.0257873535156, 547.2705078125, 278.7433776855469], "page": 13, "span": [0, 138], "__ref_s3_data": null}]}, {"text": "AI use cases", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.38404083251953, 213.536376953125, 161.7474365234375, 228.9129180908203], "page": 13, "span": [0, 12], "__ref_s3_data": null}]}, {"text": "With billions of transactions per day in many of today's industries, it is key to get real-time insights about what is happening in your data. AI on the IBM Z stack understands these situations, and it delivers in-transaction inference in real time and at scale.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.81288146972656, 162.75877380371094, 533.9012451171875, 196.6822052001953], "page": 13, "span": [0, 262], "__ref_s3_data": null}]}, {"text": "Core banking solutions running on IBM Z that are involved in processing inbound transactions need real-time fraud detection to prevent fraud. Other types of possible use cases might be credit risk analysis, anti-money laundering, loan approval, fraud detection in payments, and instant payments.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0598602294922, 104.60002136230469, 547.2466430664062, 150.73692321777344], "page": 13, "span": [0, 295], "__ref_s3_data": null}]}, {"text": "For insurance companies, a pressing use case would be claims processing. For markets and trading, clearing and settlement use cases are paramount.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.34182739257812, 70.34142303466797, 547.311279296875, 92.59844207763672], "page": 13, "span": [0, 146], "__ref_s3_data": null}]}, {"text": "11", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [536.0999755859375, 27.93828010559082, 547.2591552734375, 37.570030212402344], "page": 13, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "12", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.70201873779297, 27.93828010559082, 78.4020004272461, 37.41368103027344], "page": 14, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.684078216552734, 267.07440185546875, 37.171226501464844], "page": 14, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "For the health care industry, medical image processing (such as MRIs and x-rays), skin cancer detection, and patient monitoring activities such as infant motion analysis, is important.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.13888549804688, 687.2786865234375, 525.1851196289062, 721.3170166015625], "page": 14, "span": [0, 184], "__ref_s3_data": null}]}, {"text": "For the airline industry, processes such as air traffic management, flight management systems, and flight maintenance predictions are use cases that are ideal candidates for using AI on IBM Z.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9561309814453, 641.2594604492188, 547.3113403320312, 675.2321166992188], "page": 14, "span": [0, 192], "__ref_s3_data": null}]}, {"text": "In the following sections, we describe the following use cases:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.2395782470703, 619.1561279296875, 413.4231262207031, 629.3563842773438], "page": 14, "span": [0, 63], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> \"Use case 1: Responsible AI augmented with risk and regulatory compliance\" on page 12 AI model lifecycle governance, risk management, and regulatory compliance are key to the success of the enterprises. It is imperative to adopt a typical AI model lifecycle to protect new end-to-end risks.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.60646057128906, 561.1961059570312, 545.5465698242188, 611.9253540039062], "page": 14, "span": [0, 306], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> \"Use case 2: Credit default risk assessment\" on page 22", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.66265869140625, 544.2186279296875, 402.90234375, 554.5841674804688], "page": 14, "span": [0, 71], "__ref_s3_data": null}]}, {"text": "Core banking solutions running on IBM Z that are involved in processing inbound transactions need real-time fraud detection to prevent fraud. Other types of possible use cases might be credit risk analysis, anti-money laundering, loan approval, fraud detection in payments, and instant payments.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.4883270263672, 490.5600280761719, 547.2406005859375, 537.6137084960938], "page": 14, "span": [0, 295], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> \"Use case 3: Clearing and settlement\" on page 25", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.56887817382812, 474.1841735839844, 371.8055114746094, 484.5502624511719], "page": 14, "span": [0, 64], "__ref_s3_data": null}]}, {"text": "The use of AI can help to predict which trades or transactions have high risk exposures, and propose solutions for a more efficient settlement process.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.5205841064453, 444.71429443359375, 541.1401977539062, 467.2469177246094], "page": 14, "span": [0, 151], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> \"Use case 4: Remaining Useful Life of an aircraft engine\" on page 27 We describe how AI can help to avoid unplanned aircraft downtime by determining the remaining time or cycles that an aircraft engine is likely to operate before failure.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.6227569580078, 398.9003601074219, 534.64013671875, 437.9700012207031], "page": 14, "span": [0, 254], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> \"Use case 5: AI-powered video analytics on an infant's motions for health prediction\" on page 30", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.4189910888672, 370.28338623046875, 539.6531372070312, 392.7353515625], "page": 14, "span": [0, 112], "__ref_s3_data": null}]}, {"text": "In this section, we describe how AI can predict an infant's health conditions by monitoring real-time body movements.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.01174926757812, 340.8392639160156, 547.24267578125, 363.40240478515625], "page": 14, "span": [0, 117], "__ref_s3_data": null}]}, {"text": "Use case 1: Responsible AI augmented with risk and regulatory compliance", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.68285369873047, 278.4156799316406, 547.2564697265625, 313.73541259765625], "page": 14, "span": [0, 72], "__ref_s3_data": null}]}, {"text": "Advancement in AI is changing the world, and organizations must adopt AI to embrace new challenges daily. Many enterprises see tremendous value in adopting AI and ML technologies while establishing organization trust in the models, underlying data, and the process to be followed. An AI model lifecycle can be a daunting task.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.70286560058594, 216.10757446289062, 547.1787719726562, 262.7936706542969], "page": 14, "span": [0, 326], "__ref_s3_data": null}]}, {"text": "How mature is your AI governance? In this section, we provide a use case demonstrating the trustworthiness of AI and its importance in daily monitoring.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.3160858154297, 181.8393096923828, 547.2424926757812, 204.10169982910156], "page": 14, "span": [0, 152], "__ref_s3_data": null}]}, {"text": "Industry challenges", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.45439910888672, 149.6572723388672, 186.71859741210938, 162.72799682617188], "page": 14, "span": [0, 19], "__ref_s3_data": null}]}, {"text": "Here are the three main reasons why organizations struggle with the adoption of AI:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.2456512451172, 126.27838134765625, 508.98724365234375, 136.55023193359375], "page": 14, "span": [0, 83], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Scaling with growing regulations", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.55795288085938, 109.18142700195312, 293.96282958984375, 119.35371398925781], "page": 14, "span": [0, 48], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Lack of confidence in operationalized AI (making responsible AI)", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.5261993408203, 91.55158233642578, 435.7274475097656, 102.10991668701172], "page": 14, "span": [0, 80], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Challenges around managing the risk throughout the entire AI workflow", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.4950714111328, 74.97781372070312, 466.1335144042969, 85.43976593017578], "page": 14, "span": [0, 85], "__ref_s3_data": null}]}, {"text": "Scaling with growing regulations", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [136.3238983154297, 709.180908203125, 324.71160888671875, 721.5367431640625], "page": 15, "span": [0, 32], "__ref_s3_data": null}]}, {"text": "Laws and regulations in the data and AI space are accelerating, and many countries are proposing strict AI policies. Countries are monitoring adherence of these policies by the enterprises and imposing fines for any violations. Responding to these regulations are challenging global organizations where multiple regulations apply. For enterprises, it is important to adopt AI policies when there is change, and to validate explainable models to protect against discrimination.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0789337158203, 636.2792358398438, 536.3155517578125, 706.6138916015625], "page": 15, "span": [0, 476], "__ref_s3_data": null}]}, {"text": "Responsible AI", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [136.8000030517578, 608.0890502929688, 223.54685974121094, 620.142333984375], "page": 15, "span": [0, 14], "__ref_s3_data": null}]}, {"text": "Responsible AI protects against loss of data privacy, and reduced customer loyalty and trust. A data scientist cannot maximize accuracy and model performance above all other concerns. Practicing responsible AI is a best practice, and you must establish protection and validation to ensure that any models that are placed into production are fair and explainable.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.01739501953125, 558.7826538085938, 547.3283081054688, 605.0657348632812], "page": 15, "span": [0, 362], "__ref_s3_data": null}]}, {"text": "Risks throughout the entire AI workflow", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [136.6778106689453, 531.367431640625, 364.1976623535156, 543.471435546875], "page": 15, "span": [0, 39], "__ref_s3_data": null}]}, {"text": "Organizations need to mitigate risk of the following items:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.38307189941406, 517.2207641601562, 389.47918701171875, 528.18359375], "page": 15, "span": [0, 59], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Deciding not to use certain technologies or practices", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.84344482421875, 501.0563659667969, 382.91455078125, 511.1645812988281], "page": 15, "span": [0, 69], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Using personal information when needed and with a user's consent", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.61293029785156, 484.2521667480469, 450.990234375, 494.5205993652344], "page": 15, "span": [0, 80], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Ensuring automated decisions are free from bias", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.7186737060547, 467.2592468261719, 366.2126770019531, 477.1536865234375], "page": 15, "span": [0, 63], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Customer confidence by providing explanations for business decisions", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.6738739013672, 450.26641845703125, 462.3146057128906, 460.5806579589844], "page": 15, "span": [0, 84], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Fraud to the organization and to customer's accounts", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.5981903076172, 433.1468200683594, 386.45635986328125, 443.06573486328125], "page": 15, "span": [0, 68], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Delays in putting models into production", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.56326293945312, 415.8823547363281, 331.2491149902344, 425.7867431640625], "page": 15, "span": [0, 56], "__ref_s3_data": null}]}, {"text": "In fact, in a recent survey, these concerns were echoed by real AI adopters when asked what aspects of trust are most important to them. Although explaining how AI decides is the primary concern, all of these concerns are important.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.1046905517578, 370.3006286621094, 547.186767578125, 404.339111328125], "page": 15, "span": [0, 232], "__ref_s3_data": null}]}, {"text": "The key point here is that risk exists throughout the entire AI lifecycle starting with the underlying data and the business justification behind the \"why\" of the project and continuing into production. Without a formalized process, there is no way to mitigate these risks to unlock the scale that is required to make automated decisions profitable. With these decisions, the business can operate proactively instead of reactively.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.93702697753906, 300.23199462890625, 547.24658203125, 358.55194091796875], "page": 15, "span": [0, 431], "__ref_s3_data": null}]}, {"text": "13", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [536.0999755859375, 27.93828010559082, 547.2591552734375, 37.52984619140625], "page": 15, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "14", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.66812133789062, 27.93828010559082, 78.4020004272461, 37.513004302978516], "page": 16, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.6509952545166, 267.07440185546875, 37.20136260986328], "page": 16, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "For example, a business can start testing a model before production for fairness metrics. For this task, enterprises need an end-to-end workflow with approvals to mitigate these risks and increase the scale of AI investments, as shown in Figure 8, which presents a typical AI model lifecycle in an enterprise.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.99598693847656, 675.0350341796875, 547.3073120117188, 721.3980712890625], "page": 16, "span": [0, 309], "__ref_s3_data": null}]}, {"text": "Figure 8 Typical AI model lifecycle", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.23173522949219, 450.5171203613281, 206.54298400878906, 459.9090881347656], "page": 16, "span": [0, 35], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/10"}, {"text": "Due to regulations, more stakeholders adopt the typical AI model lifecycle to protect their brand from new end-to-end risks. To ensure various aspects of both regulatory compliance and security, the personas that must be involved include the chief financial officer (CFO), chief marketing officer (CMO), chief data officer (CDO), HR, and chief regulatory officer (CRO), along with the data engineers, data scientists, and business analysts, who build AI workflows.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.95455932617188, 367.7792053222656, 540.1202392578125, 437.9422607421875], "page": 16, "span": [0, 464], "__ref_s3_data": null}]}, {"text": "IBM governance solution for IBM Z", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.70768737792969, 335.0872802734375, 279.20489501953125, 348.1524353027344], "page": 16, "span": [0, 33], "__ref_s3_data": null}]}, {"text": "AI model lifecycle governance, risk management, and regulatory compliance are key to the success of enterprises.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.95175170898438, 299.73846435546875, 540.66015625, 322.0162048339844], "page": 16, "span": [0, 112], "__ref_s3_data": null}]}, {"text": "AI governance is a comprehensive framework that uses a set of automated processes, methodologies, and tools to manage an organization's use of AI. Consistent principles guiding the design, development, deployment, and monitoring of models are critical in driving responsible and trustworthy AI. AI governance includes processes that trace and record the origin of data, models (including associated metadata), and pipelines for audits. The details of entry should include the techniques that trained each model, the hyperparameters that were used, and the metrics from testing phases. These details provide increased transparency into the model's behavior throughout the lifecycle, the data that was influential in its development, and the possible risks.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.83395385742188, 181.78021240234375, 547.3551025390625, 288.1084899902344], "page": 16, "span": [0, 755], "__ref_s3_data": null}]}, {"text": "In a world where trust, transparency and explainable AI matters, every organization wants compliance along with the comfort of understanding how analytic insights and decisions are made. The following sections describe some of the principles and organizational requirements for AI governance.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.96249389648438, 123.76123809814453, 543.354248046875, 169.8548126220703], "page": 16, "span": [0, 292], "__ref_s3_data": null}]}, {"text": "Lifecycle governance", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [136.5681610107422, 710.160400390625, 249.01470947265625, 721.4048461914062], "page": 17, "span": [0, 20], "__ref_s3_data": null}]}, {"text": "Lifecycle governance helps you manage your business information throughout its lifecycle, that is, from creation to deletion. IBM AI governance addresses the problems that challenge records managements:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.06361389160156, 672.2786865234375, 544.0435791015625, 706.5530395507812], "page": 17, "span": [0, 202], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Monitor, catalog, and govern AI models from anywhere throughout the AI lifecycle.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.78414916992188, 655.0160522460938, 517.3616333007812, 665.3117065429688], "page": 17, "span": [0, 97], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Automate the capture of model metadata for report generation.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.66246032714844, 637.6724243164062, 428.482666015625, 647.8308715820312], "page": 17, "span": [0, 77], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Drive transparent and explainable AI at scale.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.61790466308594, 621.2044067382812, 352.8333740234375, 631.1478271484375], "page": 17, "span": [0, 62], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Increase accuracy of predictions by identifying how AI is used and where it is lagging.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.47805786132812, 604.2398681640625, 531.1472778320312, 614.4699096679688], "page": 17, "span": [0, 103], "__ref_s3_data": null}]}, {"text": "Risk management", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [136.8000030517578, 580.1421508789062, 231.87411499023438, 591.301513671875], "page": 17, "span": [0, 15], "__ref_s3_data": null}]}, {"text": "Risk management is used in IBM AI governance to identify, manage, monitor, and report on risk and compliance initiatives at scale:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.37351989746094, 553.9462890625, 544.0723266601562, 575.8314819335938], "page": 17, "span": [0, 130], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Automate facts and workflow management to comply with business standards.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.86279296875, 537.0994262695312, 497.7820739746094, 547.1629028320312], "page": 17, "span": [0, 89], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Use dynamic dashboards for clear and concise customizable results.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.80929565429688, 520.2988891601562, 455.0130310058594, 530.4574584960938], "page": 17, "span": [0, 82], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Enhanced collaboration across multiple regions and geographies.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.7198486328125, 502.8976135253906, 440.54815673828125, 513.4384155273438], "page": 17, "span": [0, 79], "__ref_s3_data": null}]}, {"text": "Regulatory compliance", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [136.74740600585938, 479.4071350097656, 258.4198303222656, 490.6507568359375], "page": 17, "span": [0, 21], "__ref_s3_data": null}]}, {"text": "Regulatory compliance is a set of rules that organizations must follow to protect sensitive information and ensure human safety. Any business that works with digital assets, consumer data, health regulations, employee safety, and private communications is subject to regulatory compliance.$^{3}$ The IBM AI governance solution for IBM Z includes the following tasks:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.20217895507812, 428.6148681640625, 547.2466430664062, 475.2479248046875], "page": 17, "span": [0, 366], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Help adhere to external AI regulations for audit and compliance.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.8566436767578, 412.22723388671875, 433.3389892578125, 422.5816955566406], "page": 17, "span": [0, 80], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Convert external AI regulations into policies for automatic enforcement.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.61163330078125, 395.0362243652344, 465.02978515625, 405.4002990722656], "page": 17, "span": [0, 88], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Use dynamic dashboards for compliance status across policies and regulations.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.56532287597656, 378.1607971191406, 503.326171875, 388.5216064453125], "page": 17, "span": [0, 93], "__ref_s3_data": null}]}, {"text": "Enterprises can develop AI models and deploy them by using IBM Watson Studio or WML on CP4D on Red Hat OpenShift on a virtual machine that is based on IBM z/VM or Red Hat Enterprise Linux KVM on IBM Z. AI governance on IBM LinuxONE is supported in the following two ways:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.35816955566406, 319.4354248046875, 547.2515869140625, 365.9399719238281], "page": 17, "span": [0, 271], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Monitor the AI models with Watson OpenScale on CP4D on Red Hat OpenShift on a virtual machine on IBM Z.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.70884704589844, 291.2804870605469, 526.8416137695312, 313.489013671875], "page": 17, "span": [0, 119], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Enterprises can develop AI models by creating and training models by using Watson Studio and development tools such as Jupyter Notebook or JupyterLab, and then deploying the model onto WML on CP4D on Red Hat OpenShift on a virtual machine on IBM Z. Then, these enterprises can achieve end-end AI governance by running AI Factsheets, IBM Watson OpenScale, and IBM Watson OpenPagesfi on CP4D on x86.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.62962341308594, 225.8667449951172, 541.8055419921875, 283.9451904296875], "page": 17, "span": [0, 413], "__ref_s3_data": null}]}, {"text": "Figure 9 on page 16 shows the end-to-end flow for a remote AI governance solution.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.40660095214844, 204.2818603515625, 512.4911499023438, 214.43418884277344], "page": 17, "span": [0, 82], "__ref_s3_data": null}]}, {"text": "$^{3 }$https://www.proofpoint.com/us/threat-reference/regulatory-compliance", "type": "footnote", "name": "Footnote", "font": null, "prov": [{"bbox": [136.0848846435547, 56.93043899536133, 418.2659606933594, 66.85415649414062], "page": 17, "span": [0, 75], "__ref_s3_data": null}]}, {"text": "15", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [536.0999755859375, 27.93828010559082, 547.2591552734375, 37.63853454589844], "page": 17, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "Figure 9 Remote AI governance solution end-to-end flow", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.46823120117188, 488.9634094238281, 295.7712097167969, 498.658203125], "page": 18, "span": [0, 54], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/11"}, {"text": "To achieve end-to-end AI governance, complete the following steps:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.7501678466797, 466.32562255859375, 438.0164794921875, 476.6277160644531], "page": 18, "span": [0, 66], "__ref_s3_data": null}]}, {"text": "1. Create a model entry in IBM OpenPages by using CP4D on a x86 platform, as shown in Figure 10.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.78916931152344, 437.65087890625, 541.7039184570312, 460.17938232421875], "page": 18, "span": [0, 96], "__ref_s3_data": null}]}, {"text": "Figure 10 Creating a model entry in IBM OpenPages", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.23847198486328, 114.00309753417969, 279.3128356933594, 123.19122314453125], "page": 18, "span": [0, 49], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/12"}, {"text": "16", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.66849517822266, 27.93828010559082, 78.4020004272461, 37.487548828125], "page": 18, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.65258026123047, 267.07440185546875, 37.216922760009766], "page": 18, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "2. Train a model by using Watson Studio and by using development tools such as Jupyter Notebook or JupyterLab on CP4D on Red Hat OpenShift on a virtual machine on IBM Z, as shown in Figure 11.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.2081298828125, 686.9100952148438, 542.9114379882812, 721.3231811523438], "page": 19, "span": [0, 192], "__ref_s3_data": null}]}, {"text": "Figure 11 Training an AI model by using Watson Studio", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.40596008300781, 366.4603576660156, 290.68634033203125, 375.5119934082031], "page": 19, "span": [0, 53], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/13"}, {"text": "3. Deploy the model by using WML on CP4D on Red Hat OpenShift on a virtual machine on IBM Z, as shown in Figure 12.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.1393585205078, 331.91552734375, 547.2686767578125, 353.865966796875], "page": 19, "span": [0, 115], "__ref_s3_data": null}]}, {"text": "Figure 12 Deploying an AI model by using WML on Cloud Pak for Data", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.62543487548828, 56.46229553222656, 351.1957092285156, 65.96401977539062], "page": 19, "span": [0, 66], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/14"}, {"text": "17", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [536.0999755859375, 27.93828010559082, 547.2591552734375, 37.6064338684082], "page": 19, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "4. Track the external model lifecycle by browsing through the Catalogs/Platform assets catalog by using AI Factsheets and OpenPages while using CP4D on an x86 platform, as shown in Figure 13. The external model (deployed on CP4D on Red Hat OpenShift on a virtual machine on IBM Z) is saved as a platform asset catalog on the x86 platform.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.96473693847656, 674.9818725585938, 547.24560546875, 721.3460083007812], "page": 20, "span": [0, 338], "__ref_s3_data": null}]}, {"text": "Figure 13 External model", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [136.30557250976562, 394.5406799316406, 242.96470642089844, 403.65936279296875], "page": 20, "span": [0, 24], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/15"}, {"text": "You can track the model through each stage of the model lifecycle, as shown in Figure 14, by using AI Factsheets and OpenPages.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [150.36965942382812, 359.5168151855469, 547.290283203125, 382.07330322265625], "page": 20, "span": [0, 127], "__ref_s3_data": null}]}, {"text": "Figure 14 Tracking the model", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.4922866821289, 72.41610717773438, 187.39756774902344, 81.66903686523438], "page": 20, "span": [0, 28], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/16"}, {"text": "18", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.6649169921875, 27.93828010559082, 78.4020004272461, 37.509376525878906], "page": 20, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.659908294677734, 267.07440185546875, 37.17069625854492], "page": 20, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "You can see that the model facts are tracked and synchronized to IBM OpenPages for risk management, as shown in Figure 15.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [150.21810913085938, 698.8858642578125, 547.2222290039062, 721.4878540039062], "page": 21, "span": [0, 122], "__ref_s3_data": null}]}, {"text": "Figure 15 Model facts that are tracked and synchronized to IBM OpenPages on an x86 platform", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.2066421508789, 367.82769775390625, 450.17156982421875, 377.36688232421875], "page": 21, "span": [0, 91], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/17"}, {"text": "19", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [536.0999755859375, 27.93828010559082, 547.2591552734375, 37.720638275146484], "page": 21, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "5. Create an external model by using IBM OpenScale on the x86 platform, as shown in Figure 16.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.3836669921875, 699.1000366210938, 525.693115234375, 721.4442749023438], "page": 22, "span": [0, 94], "__ref_s3_data": null}]}, {"text": "Figure 16 Creating an external model on an x86 platform", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.4760971069336, 398.4433898925781, 295.7671203613281, 407.997802734375], "page": 22, "span": [0, 55], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/18"}, {"text": "IBM OpenScale provides a comprehensive dashboard that tracks fairness, quality monitoring, drift, and explainability of a model. Fairness determines whether your model produces biased outcomes. Quality determines how well your model predicts outcomes. Drift is the degradation of predictive performance over time. A sample is shown in Figure 17 on page 21.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.8937530517578, 339.7777404785156, 547.329345703125, 386.164794921875], "page": 22, "span": [0, 356], "__ref_s3_data": null}]}, {"text": "20", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [63.96902084350586, 27.93828010559082, 78.4020004272461, 37.76066970825195], "page": 22, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.654016494750977, 267.07440185546875, 37.2003059387207], "page": 22, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 17 IBM OpenScale dashboard that is used to monitor the external model", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.54642486572266, 428.96380615234375, 386.5538024902344, 438.4689636230469], "page": 23, "span": [0, 76], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/19"}, {"text": "You developed and deployed the AI model by using Watson Studio, WML on CP4D on Red Hat OpenShift on a virtual machine on IBM Z, and end-to-end AI model governance by leveraging AI Factsheets, OpenScale, and OpenPages on CP4D on a x86 platform. Figure 18 shows end-to-end AI governance when using IBM OpenPages, AI Factsheets, and OpenScale.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.88458251953125, 358.59173583984375, 547.2167358398438, 416.6777038574219], "page": 23, "span": [0, 340], "__ref_s3_data": null}]}, {"text": "Figure 18 Final result: End-to-end AI governance when using IBM OpenPages, AI Factsheets, and OpenScale", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.40601348876953, 57.904937744140625, 507.6827087402344, 67.22319793701172], "page": 23, "span": [0, 103], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/20"}, {"text": "21", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.4241333007812, 27.93828010559082, 547.2591552734375, 37.61942672729492], "page": 23, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "Use case 2: Credit default risk assessment", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.80000305175781, 706.0162963867188, 389.3597717285156, 721.7960205078125], "page": 24, "span": [0, 42], "__ref_s3_data": null}]}, {"text": "In today's world, many individuals or businesses seeking loans to meet their growing business needs often look to financial institutions. Financial institutions can offer loans to individuals or businesses and charge interest based on the current market situations.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.03933715820312, 655.13671875, 547.2247314453125, 689.2626953125], "page": 24, "span": [0, 265], "__ref_s3_data": null}]}, {"text": "Industry challenges", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.6015853881836, 622.3898315429688, 186.71859741210938, 635.3670654296875], "page": 24, "span": [0, 19], "__ref_s3_data": null}]}, {"text": "Financial institutions must make an accurate decision about whether to sanction a loan or not, and judging the likelihood of default is the difference between a successful and unsuccessful loan portfolio. In a traditional scenario, an experienced banker can judge someone's likelihood of default, but that is not an efficient method for judgment as a business grows.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.15077209472656, 563.016357421875, 547.2955322265625, 609.4694213867188], "page": 24, "span": [0, 366], "__ref_s3_data": null}]}, {"text": "Predictions of credit default risk assessment", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.78274536132812, 530.6572875976562, 341.3221740722656, 543.4954833984375], "page": 24, "span": [0, 45], "__ref_s3_data": null}]}, {"text": "In the modern world, growing business institutions can no longer rely on only experienced bankers to decide whether to sanction a loan knowing that there is a probability that the borrower might default on their loans. A better choice is to rely on technological advancements that can help with reasoning based on facts, such as leveraging credit risk modeling techniques to process the historical data of past borrowers to understand their credit behavior and make a more informed decision about whether to lend money, how much money, and decide on the tenure to close the loan.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.8963165283203, 434.8458251953125, 547.2635498046875, 517.2132568359375], "page": 24, "span": [0, 579], "__ref_s3_data": null}]}, {"text": "Financial institutions can leverage AI solutions by using ML techniques to predict the credit risk. Applying AI to credit risk modeling techniques can benefit institutions in decision-making, and thus can help better manage the exposure to credit risk.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.3209991455078, 389.1979064941406, 547.1471557617188, 423.1103210449219], "page": 24, "span": [0, 252], "__ref_s3_data": null}]}, {"text": "Figure 19 on page 23 shows a sample architecture about how to design and develop an AI model for credit risk assessment on IBM Z. An IBM WebSpherefi Application Server is used for handling in-bound transactions, and CP4D is used for AI model lifecycle management that includes building, training, and deploying the model.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.1620635986328, 331.1011047363281, 547.2008666992188, 377.3158874511719], "page": 24, "span": [0, 321], "__ref_s3_data": null}]}, {"text": "22", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [63.99784469604492, 27.93828010559082, 78.4020004272461, 37.64631652832031], "page": 24, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.69827651977539, 267.07440185546875, 37.1955451965332], "page": 24, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 19 Architecture for credit risk prediction by using an ML AI model on IBM Z", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.55125427246094, 439.1292724609375, 395.7654113769531, 448.4423828125], "page": 25, "span": [0, 82], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/21"}, {"text": "A data scientist can leverage Watson Studio to develop and train an AI model and WML to deploy and score the model. In this sample architecture, the WML Python run time leverages the ML framework, IBM Snap Machine Learning (Snap ML), for scoring, can leverage an integrated AI accelerator at the time of model import.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.81259155273438, 380.48779296875, 547.34521484375, 426.5666809082031], "page": 25, "span": [0, 317], "__ref_s3_data": null}]}, {"text": "Then, the banking loan approval team can send a loan applicant request to the IBM WebSphere Application Server, which can make a request to the AI inference endpoint. The AI inference engine scores the transaction and sends the result back to the loan approval team. Based on the results, the approval team can decide on whether to approve a loan or not, and also decide how much they can lend, timelines, and other factors.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.68914794921875, 310.3835754394531, 545.5831909179688, 368.8029479980469], "page": 25, "span": [0, 424], "__ref_s3_data": null}]}, {"text": "The transaction system that is shown in Figure 19 uses IBM WebSphere Liberty as an application server, but you also can use an IBM Open Libertyfi application server or any application server that can send RESTful API communications.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.96060180664062, 264.4761962890625, 528.6572875976562, 298.59375], "page": 25, "span": [0, 232], "__ref_s3_data": null}]}, {"text": "Models are frequently developed and tested in many platforms and languages, such as Python, Scala, R, and Go. Models can leverage ML frameworks like scikit-learn, Snap ML, or XGBoost, or DL frameworks like TensorFlow or PyTorch. Training a model can be done on any platform if you have enough computing power for complex models, but moving that model into production requires careful testing to ensure that transactions are not delayed, especially if you plan to run the model within a transaction.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.14891052246094, 182.34982299804688, 547.310546875, 252.74313354492188], "page": 25, "span": [0, 498], "__ref_s3_data": null}]}, {"text": "We showed how IBM Z enable customers to use AI frameworks to detect credit risk. Now, we look at how you can leverage CP4D and TensorFlow on IBM Z to detect the credit risk.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.84275817871094, 148.16622924804688, 547.2376708984375, 170.75857543945312], "page": 25, "span": [0, 173], "__ref_s3_data": null}]}, {"text": "23", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.4790649414062, 27.93828010559082, 547.2591552734375, 37.54842758178711], "page": 25, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "24", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.0537338256836, 27.93828010559082, 78.4020004272461, 37.74729919433594], "page": 26, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.697975158691406, 267.07440185546875, 37.23467254638672], "page": 26, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 20 shows an architecture for predicting credit risk by using DL on IBM Z.", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [136.27874755859375, 710.9722900390625, 489.5701599121094, 721.4159545898438], "page": 26, "span": [0, 80], "__ref_s3_data": null}]}, {"text": "Figure 20 Architecture for credit risk prediction by using DL on IBM Z", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.493896484375, 421.176025390625, 344.1890563964844, 430.731689453125], "page": 26, "span": [0, 70], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/22"}, {"text": "Data scientists can start creating and training a DL AI model by using a Jupyter Notebook instance and Watson Studio. Then, they can deploy the model by using WML on CP4D running on IBM Z, which provides an endpoint. Other applications, including the IBM WebSphere server, can produce credit risk results by using the model's endpoint.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.09727478027344, 362.354736328125, 534.5686645507812, 408.55877685546875], "page": 26, "span": [0, 335], "__ref_s3_data": null}]}, {"text": "In summary, here are some considerations for developing real-time AI models, such as credit risk assessment:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.12158203125, 328.7194519042969, 547.2158813476562, 350.3298645019531], "page": 26, "span": [0, 108], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> A preference for in-platform run times of the model, such as faster execution results.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.60023498535156, 311.7396545410156, 522.9054565429688, 322.047607421875], "page": 26, "span": [0, 102], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Less overhead in the end-to-end flows might improve scoring time.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.54747009277344, 294.29937744140625, 445.5369873046875, 304.6208801269531], "page": 26, "span": [0, 81], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> If you are using models that are not deployable, CP4D offers a custom Python run time to build your own stack if they are not available on the platform.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.34133911132812, 265.28106689453125, 547.3232421875, 288.05682373046875], "page": 26, "span": [0, 168], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> AI inferencing based on ML or DL models can increase the accuracy of better credit risk assessment.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.48162841796875, 236.74082946777344, 541.7804565429688, 258.6591491699219], "page": 26, "span": [0, 115], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Using IBM z16 and on-chip AI acceleration with the Telum chip that is embedded with regular Integrated Facility for Linux (IFLs) provides an execution speed for your transactions that cannot be achieved by other means.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.3498992919922, 195.72576904296875, 531.8067626953125, 230.00747680664062], "page": 26, "span": [0, 234], "__ref_s3_data": null}]}, {"text": "Use case 3: Clearing and settlement", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.78247833251953, 705.360595703125, 338.5379638671875, 721.9246826171875], "page": 27, "span": [0, 35], "__ref_s3_data": null}]}, {"text": "Clearing and settlements involve banks or financial institutions sending and receiving wire transfers by using secure interbank payments networks that can clear or settle numerous transactions. When an individual or business entity initiates a wire transfer, clearing begins the fund delivery process. Banks can begin the settlement phase either immediately after clearing takes place or later, mostly at the end of the business day.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9156036376953, 630.8539428710938, 539.5654907226562, 689.4520263671875], "page": 27, "span": [0, 433], "__ref_s3_data": null}]}, {"text": "Industry challenge", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.50138092041016, 598.3314208984375, 179.53228759765625, 611.3511352539062], "page": 27, "span": [0, 18], "__ref_s3_data": null}]}, {"text": "Banks and financial institutions must deal with high-risk transactions that can lead to loss. Moreover, these transactions can lead to regulatory violations and extra compliance costs.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.24351501464844, 563.0052490234375, 538.4359130859375, 585.32373046875], "page": 27, "span": [0, 184], "__ref_s3_data": null}]}, {"text": "Clearing and settlement solution", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.65296936035156, 530.1951904296875, 266.077880859375, 543.4844970703125], "page": 27, "span": [0, 32], "__ref_s3_data": null}]}, {"text": "Use AI to predict which trades or transactions have high risk exposures, and propose solutions for a more efficient settlement process. The expedited remediation of questionable transactions can prevent costly consequences, regulatory violations, and negative business impacts.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9798126220703, 471.2395324707031, 545.6968383789062, 517.1358032226562], "page": 27, "span": [0, 277], "__ref_s3_data": null}]}, {"text": "In financial institutions, finding which financial transactions are legitimate and which transactions are fraudulent is of paramount importance. In this section, we go through a use case where we use AI to predict which trades or transactions have high risk exposures, and propose solutions for a more efficient settlement process. The expedited remediation of questionable transactions can prevent costly consequences, regulatory violations, and negative business impacts to financial institutions.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.96380615234375, 389.0691223144531, 544.662109375, 459.2572937011719], "page": 27, "span": [0, 499], "__ref_s3_data": null}]}, {"text": "The goal is to predict in real time whether the transaction being processed might be a fraudulent transaction or not. To achieve this goal, we build an ML model that can do this prediction for the financial institution. Because there would be many transactions being processed at any point by the financial institution, it is important to perform this prediction of fraudulent transactions in near-real time in a few milliseconds.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.98394775390625, 319.3011169433594, 543.3472900390625, 377.23699951171875], "page": 27, "span": [0, 430], "__ref_s3_data": null}]}, {"text": "One possible solution is to build and train a TensorFlow based DL model that learns from the historical data and predicts the fraudulent transactions. CP4D on IBM Z and IBM LinuxONE is a suitable product where this task can be achieved and the model deployed, and coming up with a serving endpoint.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0880584716797, 261.0608825683594, 547.2335815429688, 307.2639465332031], "page": 27, "span": [0, 298], "__ref_s3_data": null}]}, {"text": "25", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.4534301757812, 27.93828010559082, 547.2591552734375, 37.55341339111328], "page": 27, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "26", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [63.914608001708984, 27.93828010559082, 78.4020004272461, 37.52546691894531], "page": 28, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.69200897216797, 267.07440185546875, 37.19856643676758], "page": 28, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Figure 21 provides a high-level diagram of a clearing and settlement use case for financial transactions that uses CP4D on IBM Z and IBM LinuxONE.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.05018615722656, 699.2785034179688, 537.352294921875, 721.2307739257812], "page": 28, "span": [0, 146], "__ref_s3_data": null}]}, {"text": "Figure 21 Clearing and settlement use case for financial transactions by using Cloud Pak for Data", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.39627838134766, 467.5994567871094, 459.98809814453125, 477.4582214355469], "page": 28, "span": [0, 97], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/23"}, {"text": "Here are the steps of the high-level process flow:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.23934936523438, 445.1138916015625, 353.37115478515625, 455.2171325683594], "page": 28, "span": [0, 50], "__ref_s3_data": null}]}, {"text": "1. Create a connection to a database (for example, an IBM Db2fi database) where the historical data will be used for ML model building.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.8000030517578, 415.7784729003906, 524.740966796875, 438.1050720214844], "page": 28, "span": [0, 135], "__ref_s3_data": null}]}, {"text": "2. Read the data from the database and prepare the data for AI by using the Data Refinery tool in CP4D.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.04005432128906, 387.2192687988281, 542.9837646484375, 409.4548034667969], "page": 28, "span": [0, 103], "__ref_s3_data": null}]}, {"text": "3. A Jupyter Notebook or JupyterLab IDE that is provided by the Watson Studio component in CP4D helps us build and train the AI model. The trained model can be saved into a WML repository.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.2370147705078, 345.5196533203125, 545.7424926757812, 380.059326171875], "page": 28, "span": [0, 188], "__ref_s3_data": null}]}, {"text": "4. Deploy the saved model into a deployment space for batch deployment.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.07083129882812, 328.86895751953125, 468.5547790527344, 339.33837890625], "page": 28, "span": [0, 71], "__ref_s3_data": null}]}, {"text": "5. Create a batch deployment by using any of these interfaces:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.43487548828125, 311.5809631347656, 417.2825622558594, 322.1788330078125], "page": 28, "span": [0, 62], "__ref_s3_data": null}]}, {"text": "a. Watson Studio user interface from an Analytics deployment space.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.6441192626953, 294.92474365234375, 460.12939453125, 305.1920471191406], "page": 28, "span": [0, 67], "__ref_s3_data": null}]}, {"text": "b. WML Python client.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.69277954101562, 277.7862243652344, 251.6896209716797, 288.1532287597656], "page": 28, "span": [0, 21], "__ref_s3_data": null}]}, {"text": "c. WML REST APIs.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.7314910888672, 261.2212829589844, 244.95565795898438, 271.8070373535156], "page": 28, "span": [0, 17], "__ref_s3_data": null}]}, {"text": "6. A hardware configuration can be chosen for the deployment.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.27818298339844, 243.74349975585938, 418.506591796875, 253.9542694091797], "page": 28, "span": [0, 61], "__ref_s3_data": null}]}, {"text": "7. A batch deployment processes input data from a file, data connection, or connected data in a storage bucket, and writes the output to a selected destination.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.3677978515625, 214.9309539794922, 545.685791015625, 237.33485412597656], "page": 28, "span": [0, 160], "__ref_s3_data": null}]}, {"text": "8. One way to run batch deployment to predict or score is to create and run a batch deployment job.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.3165283203125, 185.6129150390625, 510.0397033691406, 207.9795379638672], "page": 28, "span": [0, 99], "__ref_s3_data": null}]}, {"text": "9. Provide an input data type:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.2800750732422, 168.84835815429688, 270.1285705566406, 179.39981079101562], "page": 28, "span": [0, 30], "__ref_s3_data": null}]}, {"text": "a. Inline data for entering a JSON format payload.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.57568359375, 151.5411834716797, 374.55621337890625, 161.9819793701172], "page": 28, "span": [0, 50], "__ref_s3_data": null}]}, {"text": "b. Select Data asset , click Select data source , and then specify your asset.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.6676025390625, 135.0714874267578, 492.3292236328125, 145.2565460205078], "page": 28, "span": [0, 78], "__ref_s3_data": null}]}, {"text": "10.The output data type can be a new output file or a connected data asset.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.80201721191406, 117.79898834228516, 471.90997314453125, 127.81742095947266], "page": 28, "span": [0, 75], "__ref_s3_data": null}]}, {"text": "11.A Kubernetes admin can change the maximum number of concurrent batch jobs that can be run.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.80201721191406, 89.26384735107422, 546.2705688476562, 111.39698028564453], "page": 28, "span": [0, 93], "__ref_s3_data": null}]}, {"text": "12.Get the deployment endpoint URL. For more information, see Getting the deployment endpoint URL.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [136.80201721191406, 59.67621612548828, 531.2200927734375, 81.98482513427734], "page": 28, "span": [0, 98], "__ref_s3_data": null}]}, {"text": "Summary", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.38957977294922, 708.2412719726562, 124.10479736328125, 721.2948608398438], "page": 29, "span": [0, 7], "__ref_s3_data": null}]}, {"text": "With this use case, we attempted to demonstrate how to predict, in real time, whether the transaction that is being processed might be a fraudulent transaction or not. By using the method, you have the following advantages:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.63417053222656, 660.6920776367188, 532.9658813476562, 695.446533203125], "page": 29, "span": [0, 223], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> No Impact to SLAs and the batch process window.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.5712432861328, 643.5092163085938, 374.5103454589844, 654.0914306640625], "page": 29, "span": [0, 63], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Proactively stop losses, and lower operational, regulatory, and compliance costs.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.46438598632812, 626.6151123046875, 508.5062255859375, 637.4598388671875], "page": 29, "span": [0, 97], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> The solution is using a DL framework like TensorFlow for high-performing, low latency scoring.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.59495544433594, 598.0394287109375, 533.5338134765625, 620.7293701171875], "page": 29, "span": [0, 110], "__ref_s3_data": null}]}, {"text": "Use case 4: Remaining Useful Life of an aircraft engine", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.5902099609375, 554.939453125, 482.53704833984375, 571.1951293945312], "page": 29, "span": [0, 55], "__ref_s3_data": null}]}, {"text": "In this use case, we describe how an airline can deploy an AI model for inferencing by using IBMfi zSystems.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.06735229492188, 516.2785034179688, 545.7247314453125, 538.8272094726562], "page": 29, "span": [0, 108], "__ref_s3_data": null}]}, {"text": "Remaining Useful Life (RUL) is the remaining time or cycles that an aircraft engine is likely to operate without any failure. In this case, it is the equivalent of the number of flights remaining for the engine after the last flight. By estimating RUL, the operator can decide on the next maintenance schedule and avoid unplanned downtime.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.07571411132812, 458.041015625, 547.2705688476562, 504.0214538574219], "page": 29, "span": [0, 339], "__ref_s3_data": null}]}, {"text": "Figure 22 provides an overview of the inferencing architecture for the RUL of an aircraft engine when using IBM Z.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.3302459716797, 424.0997314453125, 525.1622924804688, 446.7457275390625], "page": 29, "span": [0, 114], "__ref_s3_data": null}]}, {"text": "Figure 22 Inferencing architecture on IBM Z", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.4977035522461, 161.0757598876953, 244.7244415283203, 170.71823120117188], "page": 29, "span": [0, 43], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/24"}, {"text": "Because we are looking into data-driven model development, the data set of our target is the run-to-failure data of the engine. We are looking into a supervised learning problem, and we use regression techniques to learn from the data. DL techniques such as Long Short-Term Memory (LSTM) or Gated Recurrent Units (GRU) are our choice because we are looking into a time series data set. TensorFlow or PyTorch frameworks are leveraged to create models. AI governance monitors the data and model drift to maintain the model quality throughout the model's life.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.01132202148438, 66.6394271850586, 547.2557373046875, 148.60031127929688], "page": 29, "span": [0, 557], "__ref_s3_data": null}]}, {"text": "27", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.3837280273438, 27.93828010559082, 547.2591552734375, 37.68974685668945], "page": 29, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "28", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [63.9516716003418, 27.93828010559082, 78.4020004272461, 37.51277542114258], "page": 30, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.685588836669922, 267.07440185546875, 37.18029022216797], "page": 30, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Open-source data from NASA was used to build the AI model, which then was deployed on CP4D. CP4D enables the data-scientist's journey from modeling to deployment in a seamless process. Data engineers leverage Db2 to host the data set, which includes the training, testing, and validation of a data set. Since data is hosted on Db2, you can expect low latency while retrieving the data and serve data security needs because Db2 is hosted on the IBM Z platform. Data is fetched by the data refinery to do the necessary pre-processing and data imputations. You can use the programming languages Golang or C++ for real-time predictions, depending on customer needs. For more information about this topic, see \"Use case 3: Clearing and settlement\" on page 25.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9266815185547, 614.9383544921875, 547.2824096679688, 721.2327270507812], "page": 30, "span": [0, 754], "__ref_s3_data": null}]}, {"text": "Model building is done on Watson Studio, leveraging the high-performance computing hardware on IBM Z. You can train the model anywhere (on your own hardware or the cloud) and bring the model directly into CP4D, which provides data scientists with the flexibility of implementation choices.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.1148681640625, 557.2208862304688, 545.1770629882812, 603.3070678710938], "page": 30, "span": [0, 289], "__ref_s3_data": null}]}, {"text": "We used LSTM to build the AI model and used the training data. The model was continuously evaluated to model convergence. The final model is tested with the test data, which is never exposed at the time of training to make sure that the model works.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.87142944335938, 510.6993713378906, 547.212890625, 545.31201171875], "page": 30, "span": [0, 249], "__ref_s3_data": null}]}, {"text": "This model is deployed on WML on CP4D and runs on IBM Z. If required, the trained model can be converted to the Open Neural Network Exchange (ONNX) format before deployment. Based on project requirements, IBM Z supports high-throughput, low latency inference requirements by leveraging an AI accelerator.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.99119567871094, 453.0931396484375, 547.3082885742188, 499.47491455078125], "page": 30, "span": [0, 304], "__ref_s3_data": null}]}, {"text": "For decision-making about an aircraft engine's life, it is important to be able to explain the model predictions from end to end. This explainability may be global or local. Global explainability enables decision-makers to evaluate the trained model in general from the subject matter expert (SME) point of view. Local explainability enables the operator to validate the reasons behind the present inference and relate it to the past data points, which are an indicative cause of the prediction.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.13357543945312, 371.263671875, 547.282470703125, 441.48968505859375], "page": 30, "span": [0, 495], "__ref_s3_data": null}]}, {"text": "The AI governance components such as IBM OpenScale on CP4D support explainability and manages the drifts in data and concept. OpenPages and AI FactSheet together can alert the stakeholders about important events through a dashboard and allow course correction at any point.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.87094116210938, 313.0604553222656, 547.32421875, 359.3154296875], "page": 30, "span": [0, 273], "__ref_s3_data": null}]}, {"text": "Client-side applications can invoke a REST apiserver that handles some preprocessing of an incoming request before initiating the inference pipeline. Efficiencies might be needed in real-time applications, and inference response time can be reduced by adopting low-level programming while components are communicating.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9972686767578, 255.09030151367188, 547.2745361328125, 301.46954345703125], "page": 30, "span": [0, 318], "__ref_s3_data": null}]}, {"text": "Figure 23 on page 29 provides a more in-depth view of the architecture of an AI-based predictive maintenance application.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.4759063720703, 220.89736938476562, 521.204345703125, 243.2855987548828], "page": 30, "span": [0, 121], "__ref_s3_data": null}]}, {"text": "Figure 23 In-depth architectural view", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.46824645996094, 340.3482971191406, 216.07789611816406, 349.8203430175781], "page": 31, "span": [0, 37], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/25"}, {"text": "In summary, consider the following points while developing an AI-based predictive maintenance application:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.14920043945312, 305.67156982421875, 501.76422119140625, 327.83966064453125], "page": 31, "span": [0, 106], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> CP4D offers a Python run time to build a custom solution stack, but also supports different components like Watson Studio, WML, Db2, Data Refinery, OpenScale, AI Factsheets, and OpenPages.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.6149139404297, 264.79376220703125, 547.3203125, 299.5812683105469], "page": 31, "span": [0, 204], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> The trustworthiness of the predicted output is important for critical use cases.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.60621643066406, 247.86065673828125, 491.34027099609375, 257.88116455078125], "page": 31, "span": [0, 96], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> IBM Z provides high data security and low latency requirements at scale for the critical applications.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.48333740234375, 219.0656280517578, 534.4998779296875, 241.49769592285156], "page": 31, "span": [0, 118], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> A data scientist can choose to train the model and deploy it on CP4D seamlessly with the latest tech stack that is available.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.4168243408203, 190.18487548828125, 547.2156982421875, 212.0349884033203], "page": 31, "span": [0, 141], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> The AIOps and MLOps supported by CP4D to track AI model and data lifecycle throughout the application lifecycle.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.57362365722656, 160.84478759765625, 504.0291748046875, 183.60284423828125], "page": 31, "span": [0, 128], "__ref_s3_data": null}]}, {"text": "29", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.4987182617188, 27.93828010559082, 547.2591552734375, 37.63166046142578], "page": 31, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "Use case 5: AI-powered video analytics on an infant's motions for health prediction", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.60496520996094, 687.0557861328125, 542.2593994140625, 721.791015625], "page": 32, "span": [0, 83], "__ref_s3_data": null}]}, {"text": "Each year, approximately 5 million newborns worldwide are suffering from a neuro-developmental disorder. Due to the lack of early diagnoses and intervention, many infants are disabled and abandoned, especially in countries with limited numbers of pediatricians with extensive experience in neuro-developmental disorders. This situation is a conundrum that plagues many families around the world.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.98846435546875, 612.279052734375, 546.6989135742188, 670.7722778320312], "page": 32, "span": [0, 395], "__ref_s3_data": null}]}, {"text": "Infant motion analysis plays critical importance to understanding and comprehending healthy childhood development. In infants, monitoring their poses provides information about their health that can lead to a better prediction of early developmental risk assessment and diagnosis.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0279998779297, 553.5992431640625, 547.3121948242188, 600.06591796875], "page": 32, "span": [0, 280], "__ref_s3_data": null}]}, {"text": "Adults use different techniques and methods to express their feelings (like sick, happy, stressed, or hungry), but this case is usually different for infants who cannot express their feelings. Based on the baby movements, AI can predict their expression or health.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.17251586914062, 508.10137939453125, 533.3443603515625, 542.4315185546875], "page": 32, "span": [0, 264], "__ref_s3_data": null}]}, {"text": "In this use case, we examine how AI-powered video analytics can assist new parents and hospitals by addressing pose-based real-time body movements of the infants (such as arching back, head banging, kicking legs, rubbing eyes, stretching, and sucking fingers). During the initial months of a baby's life, spontaneous movements might indicate later developmental disorders, such as cerebral palsy, Rett syndrome, and autism spectrum disorders.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.91824340820312, 426.2819519042969, 535.1302490234375, 496.59674072265625], "page": 32, "span": [0, 442], "__ref_s3_data": null}]}, {"text": "Industry challenges", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.6669921875, 393.6462707519531, 186.71859741210938, 406.78857421875], "page": 32, "span": [0, 19], "__ref_s3_data": null}]}, {"text": "There are video surveillance systems that are installed for monitoring an infant's movement in many hospitals or homes so that any problem can be witnessed and potentially even stopped before they take place. These systems require much manual work to monitor the real-stream videos and intervene when a problem is detected.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.72630310058594, 334.298828125, 547.2576293945312, 380.78509521484375], "page": 32, "span": [0, 323], "__ref_s3_data": null}]}, {"text": "There is a certain amount of trust that you must place on the person who monitors a surveillance system to ensure that the job is being done effectively and efficiently, and that the surveillance system is being vigilantly watched. Because of the dependency on these manual efforts, you need something \"smart\" that monitors constantly the surveillance system and detect problems effectively.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.09779357910156, 264.0821228027344, 547.2775268554688, 322.5864562988281], "page": 32, "span": [0, 391], "__ref_s3_data": null}]}, {"text": "AI is shaping the controls of surveillance that can map and track occurrences with self-learning abilities, AI can improve on human operations and analyze video footage in real time to alert the hospitals or parents if any anomalies are identified.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.74172973632812, 217.7925262451172, 547.2385864257812, 252.07472229003906], "page": 32, "span": [0, 248], "__ref_s3_data": null}]}, {"text": "Video processing a stream of data from surveillance systems and then performing advance analytics and detecting anomalies quickly is a significant challenge in the industry.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9100341796875, 183.46926879882812, 541.7665405273438, 206.01150512695312], "page": 32, "span": [0, 173], "__ref_s3_data": null}]}, {"text": "Infant motion analytics in real time", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.55262756347656, 150.96932983398438, 278.4443054199219, 164.3548583984375], "page": 32, "span": [0, 36], "__ref_s3_data": null}]}, {"text": "AI is the current \"market trend evolution\" in video analytics and advancing the decision-making capabilities of the human mind. DL-based computer vision AI techniques are being widely adopted by various industries to solve real-time problems. These techniques improve the detection and prediction accuracy without increasing the hardware cost exponentially. For users, AI greatly reduces the workload of the monitoring staff and provides benefits by detecting unusual incidents and solving many video forensic problems.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.83998107910156, 67.68016052246094, 547.2257080078125, 137.958740234375], "page": 32, "span": [0, 519], "__ref_s3_data": null}]}, {"text": "30", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.2401351928711, 27.93828010559082, 78.4020004272461, 37.58808135986328], "page": 32, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.673728942871094, 267.07440185546875, 37.15589141845703], "page": 32, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "S", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.79975891113281, 614.259521484375, 71.44307708740234, 623.4725341796875], "page": 33, "span": [0, 1], "__ref_s3_data": null}]}, {"text": "Figure 24 Architecture for AI-powered video analytics", "type": "caption", "name": "Caption", "font": null, "prov": [{"bbox": [64.60729217529297, 368.9632873535156, 281.4980773925781, 378.5414733886719], "page": 33, "span": [0, 53], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/26"}, {"text": "Live camera feeds or recorded videos of an infant's movement are the inputs for a pose detection model. This video streaming data was stored in IBM Cloudfi Object Storage for image processing. Video data must be transformed into frames so that the infant's body poses can be detected. These post-estimation components of the pipeline predict the location of all 17-person key points with 3 degrees of freedom each (x, y location and visibility) plus two virtual alignment key points. This approach also embraces a compute-intensive heat map prediction of infant body posture.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.84861755371094, 274.2659912109375, 547.311279296875, 356.6263732910156], "page": 33, "span": [0, 575], "__ref_s3_data": null}]}, {"text": "When changes in body posture or movement happen, analytics can be performed, and a threshold can be set for the angle of the body and posture movements. An analysis can be performed on movement that is based on that threshold to help to predict an infant's health index in the output video stream by leveraging the IBM z16 on-chip AI acceleration, which provides an execution speed in real time on an edge device, which cannot be achieved by other means.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.89413452148438, 192.76055908203125, 539.9171752929688, 262.6158447265625], "page": 33, "span": [0, 454], "__ref_s3_data": null}]}, {"text": "We can leverage the following AI technology stack for this use case:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.61978149414062, 170.2261962890625, 437.95953369140625, 180.65838623046875], "page": 33, "span": [0, 68], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Convolutional neural network: Build an artificial neural network model on video streaming and images.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.57650756835938, 141.35748291015625, 546.6869506835938, 163.9613494873047], "page": 33, "span": [0, 117], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> TensorFlow: A DL back-end framework that is based on TensorFlow.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.63107299804688, 124.72181701660156, 455.69329833984375, 134.6374969482422], "page": 33, "span": [0, 80], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Mediapipe: A library that helps with video streaming processing and prediction of human pose estimation.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.57284545898438, 95.74219512939453, 543.4529418945312, 117.91780090332031], "page": 33, "span": [0, 120], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> OpenCV: A real-time computer vision library that helps perform image processing.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.501220703125, 78.27716064453125, 516.3308715820312, 88.64454650878906], "page": 33, "span": [0, 96], "__ref_s3_data": null}]}, {"text": "31", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.5914916992188, 27.93828010559082, 547.2591552734375, 37.50794219970703], "page": 33, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "CP4D was used to build and deploy the AI-powered video analytics on infant's motion for health prediction use case on IBM Z. IBM Z with AI accelerator enables faster inference for detecting face and body movements and performing angle analytics in real time.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.94410705566406, 686.981201171875, 540.1576538085938, 721.435791015625], "page": 33, "span": [0, 258], "__ref_s3_data": null}]}, {"text": "Figure 24 shows an architectural diagram about how to design and develop an AI model for real-time body pose detection on IBM Z. A deep convolutional neural network architecture was trained on the task of infant pose estimation on the custom data set by leveraging IBM Cloud Pak for Data.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0972137451172, 629.25927734375, 542.9444580078125, 675.5055541992188], "page": 33, "span": [0, 288], "__ref_s3_data": null}]}, {"text": "WML was used for deployment of the pose detection model and generated notifications to users with web and mobile applications, and it integrates with Fitbit for push notifications so that hospitals and parents can take preventive actions.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.89791870117188, 687.1724243164062, 542.3601684570312, 721.3072509765625], "page": 34, "span": [0, 238], "__ref_s3_data": null}]}, {"text": "Additional resources", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.27169799804688, 644.0363159179688, 223.8605499267578, 659.7733154296875], "page": 34, "span": [0, 20], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> The Cloud Pak for Data 4.5 on IBM Z Overview Demo video provides an overview of some of the more important features of CP4D on IBM Z.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.46092224121094, 605.2584838867188, 547.2325439453125, 627.453857421875], "page": 34, "span": [0, 149], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> IBM Cloud Pak for Data Tutorials.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.48532104492188, 588.2786865234375, 300.0693054199219, 598.7608642578125], "page": 34, "span": [0, 49], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Here are some additional use cases that use the data science frameworks that are available as part of CP4D on IBM Z and IBM LinuxONE:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.57339477539062, 559.299072265625, 518.558837890625, 581.29833984375], "page": 34, "span": [0, 149], "__ref_s3_data": null}]}, {"text": "-Payment Card Fraud Detection by using TensorFlow on CP4D on IBM Z and IBM LinuxONE is a payment card fraud detection use case.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.18695068359375, 529.6796875, 527.840576171875, 552.08740234375], "page": 34, "span": [0, 127], "__ref_s3_data": null}]}, {"text": "-Fashion-MNIST clothing classification with PyTorch on Cloud Pak for Data on IBM Z and IBM LinuxONE is a Fashion-MNIST clothing classification use case.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.0952606201172, 501.1863708496094, 539.9617919921875, 523.5965576171875], "page": 34, "span": [0, 152], "__ref_s3_data": null}]}, {"text": "-Payment Card Fraud Prevention by using Snap ML on IBM Cloud Pak for Data on Red Hat OpenShift on a virtual machine on IBM Z and IBM LinuxONE, which leverage the z16 integrated AI accelerator describes a use case that uses Snap Machine Learning in Cloud Pak for Data on IBM Z and IBM LinuxONE. It is a Snap ML use case.", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [151.3111572265625, 448.2712097167969, 547.2676391601562, 494.79150390625], "page": 34, "span": [0, 319], "__ref_s3_data": null}]}, {"text": "A companion video can be found at Credit Card Fraud Detection by using Snap ML on IBM Cloud Pak for Data on IBM Z and IBM LinuxONE.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [164.91055297851562, 419.2614440917969, 547.1928100585938, 441.53619384765625], "page": 34, "span": [0, 131], "__ref_s3_data": null}]}, {"text": "Summary", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.38446807861328, 375.9455871582031, 137.7028350830078, 391.6693420410156], "page": 34, "span": [0, 7], "__ref_s3_data": null}]}, {"text": "This IBM Redbooksfi publication presented an overview of how IBM Cloud Pak for Data on IBM Z can modernize your data infrastructure; develop and deploy ML and AI models; and instantiate highly efficient analytics deployment on IBM LinuxONE. This publication demonstrated these tasks by guiding the reader through five common use cases where CP4D on IBM Z and IBM LinuxONE uses the different features that are supported on the platform, and showing how the associated features can help an enterprise to build AI and ML models with core transactional data, which results in a highly efficient analytics deployment that minimizes latency, cost inefficiencies, and potential security exposures that are connected with data transportation.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.69834899902344, 253.239990234375, 547.1648559570312, 359.5583801269531], "page": 34, "span": [0, 734], "__ref_s3_data": null}]}, {"text": "Authors", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [63.984222412109375, 220.6373748779297, 114.55732727050781, 233.51852416992188], "page": 34, "span": [0, 7], "__ref_s3_data": null}]}, {"text": "32", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.27400970458984, 27.93828010559082, 78.4020004272461, 37.550392150878906], "page": 34, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.730152130126953, 267.07440185546875, 37.189125061035156], "page": 34, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "This publication was produced by a team of specialists from around the world working with the IBM Redbooks team:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.93601989746094, 185.25857543945312, 538.573486328125, 207.30662536621094], "page": 34, "span": [0, 112], "__ref_s3_data": null}]}, {"text": "Jasmeet Bhatia is an AI on IBM Z Product Manager who supports CP4D on IBM Z. She has 2.5 years of combined experience as a data scientist and a product manager. Jasmeet lives in San Francisco, California and holds a Bachelor of Arts degree in Data Science. She is working on her Master of Science degree in Data Science. Her area of expertise includes AI, data science, and product management.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.83291625976562, 115.17806243896484, 547.2435913085938, 173.28330993652344], "page": 34, "span": [0, 393], "__ref_s3_data": null}]}, {"text": "Ravi Gummadi is a Technical Leader for CP4D on Linux on IBM Z and IBM LinuxONE in India. He has 18+ years of experience in the design and development of enterprise software for various platforms, including IBM Z and IBM LinuxONE. He holds a master's degree in computer science and engineering from the Indian Institute of Technology Madras (IIT Madras). His areas of expertise include compilers, virtualization, big data analytics, containers, data, and AI, with a special focus on open-source ecosystems.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.073974609375, 651.14697265625, 546.0402221679688, 721.3735961914062], "page": 35, "span": [0, 505], "__ref_s3_data": null}]}, {"text": "Chandra Shekhar Reddy Potula is a Lead AI on zSystems team Architect for Linux on IBM Z and LinuxONE in India. He has 18+ years of experience in the design and development of enterprise software and firmware for various platforms, including IBM Z and LinuxONE. He holds a degree in computer science of engineering from Jawaharlal Nehru Technological University (JNTU). His areas of expertise include networking, virtualization, containers, data, and AI, with a special focus on open-source ecosystems.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.9738311767578, 568.9080200195312, 546.8887329101562, 639.3916015625], "page": 35, "span": [0, 501], "__ref_s3_data": null}]}, {"text": "Srirama Sharma is a Lead Technical Architect for IBM Cloud Pak, IBM Instanafi, IBM Turbonomicfi, and Red Hat Advanced Cluster Management for Kubernetes (RHACM) on IBM Z and LinuxONE. He has 18+ years of experience in UNIX and Linux application and device driver development. He designs ISV solutions on IBM Systems and IBM Blockchainfi. He also works on cloud-native adoption of enterprise solutions on IBM Z and LinuxONE. Srirama holds a Bachelor of Engineering degree in computer science from Visvesvaraya Technological University (VTU). He lives in Bangalore, Karnataka. His areas of expertise include UNIX and Linux systems programming, virtualization, performance benchmarking of Financial Services Sector (FSS) industry solutions, open-source ecosystems, server infrastructure, and cloud-native adoption and modernization.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.81300354003906, 439.12628173828125, 547.256103515625, 557.2632446289062], "page": 35, "span": [0, 828], "__ref_s3_data": null}]}, {"text": "Thanks to the following people for their contributions to this project:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.1691436767578, 417.03826904296875, 432.8396301269531, 427.28643798828125], "page": 35, "span": [0, 71], "__ref_s3_data": null}]}, {"text": "Lydia Parziale, Project Manager IBM Redbooks, Poughkeepsie Center", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.17153930664062, 382.91351318359375, 314.4146423339844, 405.3429870605469], "page": 35, "span": [0, 65], "__ref_s3_data": null}]}, {"text": "Shin Kelly Yang, AI on IBM Z Product Management IBM US", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.13253784179688, 349.3034973144531, 364.24346923828125, 371.6414489746094], "page": 35, "span": [0, 54], "__ref_s3_data": null}]}, {"text": "Tom Ramey, Anna Shugol, Andrew Sica, Jonathan Sloan, Elpida Tzortzatos, Meeta Vouk, IBM", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.0904998779297, 315.28411865234375, 537.7623291015625, 337.33740234375], "page": 35, "span": [0, 87], "__ref_s3_data": null}]}, {"text": "Now you can become a published author, too!", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.80000305175781, 282.2770690917969, 349.12164306640625, 295.41973876953125], "page": 35, "span": [0, 43], "__ref_s3_data": null}]}, {"text": "Here's an opportunity to spotlight your skills, grow your career, and become a published author-all at the same time! Join an IBM Redbooks residency project and help write a book in your area of expertise, while honing your experience using leading-edge technologies. Your efforts will help to increase product acceptance and customer satisfaction, as you expand your network of technical contacts and relationships. Residencies run from two to six weeks in length, and you can participate either in person or as a remote resident working from your home base.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [135.90232849121094, 187.2394561767578, 547.3480224609375, 269.3630065917969], "page": 35, "span": [0, 559], "__ref_s3_data": null}]}, {"text": "Find out more about the residency program, browse the residency index, and apply online at:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.51300048828125, 164.8619842529297, 547.3431396484375, 175.372802734375], "page": 35, "span": [0, 91], "__ref_s3_data": null}]}, {"text": "ibm.com /redbooks/residencies.html", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [136.80099487304688, 148.4791259765625, 301.6788024902344, 157.64808654785156], "page": 35, "span": [0, 34], "__ref_s3_data": null}]}, {"text": "33", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.5746459960938, 27.93828010559082, 547.2591552734375, 37.47697448730469], "page": 35, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "Stay connected to IBM Redbooks", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.46549987792969, 708.3641967773438, 270.4855651855469, 721.534423828125], "page": 36, "span": [0, 30], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Find us on LinkedIn:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.5939178466797, 685.2982788085938, 241.2664794921875, 695.3732299804688], "page": 36, "span": [0, 36], "__ref_s3_data": null}]}, {"text": "http://www.linkedin.com/groups?home=&gid=2130806", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [150.66708374023438, 667.9544677734375, 391.0767822265625, 677.9544677734375], "page": 36, "span": [0, 48], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks weekly newsletter:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.4261932373047, 639.2014770507812, 546.8383178710938, 661.0797729492188], "page": 36, "span": [0, 118], "__ref_s3_data": null}]}, {"text": "https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [150.72427368164062, 622.588134765625, 451.4742736816406, 632.6220703125], "page": 36, "span": [0, 60], "__ref_s3_data": null}]}, {"text": "GLYPH<SM590000> Stay current on recent Redbooks publications with RSS Feeds:", "type": "paragraph", "name": "List-item", "font": null, "prov": [{"bbox": [135.66847229003906, 605.2367553710938, 430.1478271484375, 615.342041015625], "page": 36, "span": [0, 76], "__ref_s3_data": null}]}, {"text": "http://www.redbooks.ibm.com/rss.html", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [150.44317626953125, 588.5687866210938, 331.0777282714844, 598.3783569335938], "page": 36, "span": [0, 36], "__ref_s3_data": null}]}, {"text": "34", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.26653289794922, 27.93828010559082, 78.4020004272461, 37.59064865112305], "page": 36, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 27.662551879882812, 267.07440185546875, 37.169410705566406], "page": 36, "span": [0, 38], "__ref_s3_data": null}]}, {"text": "Notices", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.80000305175781, 695.9519653320312, 151.5048065185547, 718.752197265625], "page": 37, "span": [0, 7], "__ref_s3_data": null}]}, {"text": "This information was developed for products and services offered in the US. This material might be available from IBM in other languages. However, you may be required to own a copy of the product or product version in that language in order to access it.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.00486755371094, 629.8663330078125, 547.2454833984375, 659.926025390625], "page": 37, "span": [0, 254], "__ref_s3_data": null}]}, {"text": "IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.13760375976562, 559.7279663085938, 547.1796875, 619.8883056640625], "page": 37, "span": [0, 625], "__ref_s3_data": null}]}, {"text": "IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.0386962890625, 519.6210327148438, 547.3560180664062, 550.1978149414062], "page": 37, "span": [0, 232], "__ref_s3_data": null}]}, {"text": "IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.49063873291016, 509.9056701660156, 535.3104248046875, 520.2186889648438], "page": 37, "span": [0, 99], "__ref_s3_data": null}]}, {"text": "INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION \"AS IS\" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.12965393066406, 449.7742004394531, 545.7673950195312, 500.42437744140625], "page": 37, "span": [0, 411], "__ref_s3_data": null}]}, {"text": "This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.0031509399414, 400.1820983886719, 547.2484130859375, 439.9192810058594], "page": 37, "span": [0, 345], "__ref_s3_data": null}]}, {"text": "Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [63.96153259277344, 359.86328125, 541.5413208007812, 389.9772033691406], "page": 37, "span": [0, 286], "__ref_s3_data": null}]}, {"text": "IBM may use or distribute any of the information you provide in any way it believes appropriate without incurring any obligation to you.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.42230224609375, 329.4605407714844, 519.2667846679688, 350.0104675292969], "page": 37, "span": [0, 136], "__ref_s3_data": null}]}, {"text": "The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [63.80852127075195, 299.43133544921875, 505.2710266113281, 319.78839111328125], "page": 37, "span": [0, 191], "__ref_s3_data": null}]}, {"text": "Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.22393798828125, 249.75856018066406, 547.2424926757812, 289.9355163574219], "page": 37, "span": [0, 408], "__ref_s3_data": null}]}, {"text": "Statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.30084991455078, 219.74908447265625, 544.685791015625, 239.94190979003906], "page": 37, "span": [0, 146], "__ref_s3_data": null}]}, {"text": "This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to actual people or business enterprises is entirely coincidental.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [63.958980560302734, 170.14593505859375, 547.016357421875, 209.852294921875], "page": 37, "span": [0, 335], "__ref_s3_data": null}]}, {"text": "COPYRIGHT LICENSE:", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.37278747558594, 150.16616821289062, 172.50048828125, 160.1703643798828], "page": 37, "span": [0, 18], "__ref_s3_data": null}]}, {"text": "This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are provided \"AS IS\", without warranty of any kind. IBM shall not be liable for any damages arising out of your use of the sample programs.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [63.9893798828125, 59.65068817138672, 547.3580932617188, 140.0205841064453], "page": 37, "span": [0, 779], "__ref_s3_data": null}]}, {"text": "' Copyright IBM Corp. 2023.", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [63.854331970214844, 27.89427947998047, 180.32760620117188, 37.42281723022461], "page": 37, "span": [0, 27], "__ref_s3_data": null}]}, {"text": "35", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [535.5529174804688, 27.93828010559082, 547.2591552734375, 37.60062026977539], "page": 37, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "Trademarks", "type": "subtitle-level-1", "name": "Section-header", "font": null, "prov": [{"bbox": [64.16413116455078, 706.0162963867188, 155.489501953125, 721.5309448242188], "page": 38, "span": [0, 10], "__ref_s3_data": null}]}, {"text": "IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at \"Copyright and trademark information\" at http://www.ibm.com/legal/copytrade.shtml", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.14505004882812, 649.2987060546875, 547.2343139648438, 689.3553466796875], "page": 38, "span": [0, 383], "__ref_s3_data": null}]}, {"text": "The following terms are trademarks or registered trademarks of International Business Machines Corporation, and might also be trademarks or registered trademarks in other countries.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [63.75762176513672, 619.232177734375, 547.241455078125, 639.3633422851562], "page": 38, "span": [0, 181], "__ref_s3_data": null}]}, {"name": "Table", "type": "table", "$ref": "#/tables/0"}, {"text": "The following terms are trademarks of other companies:", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.11603546142578, 523.834716796875, 312.0052490234375, 533.9044189453125], "page": 38, "span": [0, 54], "__ref_s3_data": null}]}, {"text": "Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.29424285888672, 493.69439697265625, 528.6849365234375, 514.6287841796875], "page": 38, "span": [0, 184], "__ref_s3_data": null}]}, {"text": "The registered trademark Linuxfi is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a worldwide basis.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [63.84184265136719, 464.0928955078125, 541.6887817382812, 484.438720703125], "page": 38, "span": [0, 174], "__ref_s3_data": null}]}, {"text": "Red Hat and OpenShift are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.25360870361328, 434.2598876953125, 531.9806518554688, 454.5678405761719], "page": 38, "span": [0, 140], "__ref_s3_data": null}]}, {"text": "UNIX is a registered trademark of The Open Group in the United States and other countries.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.4344482421875, 414.2238464355469, 472.0943908691406, 424.56378173828125], "page": 38, "span": [0, 90], "__ref_s3_data": null}]}, {"text": "Other company, product, or service names may be trademarks or service marks of others.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [64.17461395263672, 394.30035400390625, 465.3721618652344, 404.4769287109375], "page": 38, "span": [0, 86], "__ref_s3_data": null}]}, {"text": "36", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [64.34241485595703, 26.91827964782715, 78.4020004272461, 36.332603454589844], "page": 38, "span": [0, 2], "__ref_s3_data": null}]}, {"text": "IBM Cloud Pak for Data on IBM zSystems", "type": "page-footer", "name": "Page-footer", "font": null, "prov": [{"bbox": [93.42030334472656, 26.466215133666992, 267.07440185546875, 36.090301513671875], "page": 38, "span": [0, 38], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/27"}, {"text": "Back cover", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [287.2200012207031, 741.251953125, 415.20721435546875, 763.4519653320312], "page": 40, "span": [0, 10], "__ref_s3_data": null}]}, {"text": "REDP-5695-00", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [496.1397399902344, 670.4779663085938, 564.1908569335938, 680.523193359375], "page": 40, "span": [0, 12], "__ref_s3_data": null}]}, {"text": "ISBN 0738461067", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [482.7099609375, 649.478271484375, 564.5999145507812, 659.0663452148438], "page": 40, "span": [0, 15], "__ref_s3_data": null}]}, {"text": "Printed in U.S.A.", "type": "paragraph", "name": "Text", "font": null, "prov": [{"bbox": [497.399169921875, 89.81710052490234, 564.1929321289062, 99.43573760986328], "page": 40, "span": [0, 17], "__ref_s3_data": null}]}, {"name": "Picture", "type": "figure", "$ref": "#/figures/28"}], "figures": [{"bounding-box": null, "prov": [{"bbox": [409.23211669921875, 713.666259765625, 568.517822265625, 757.0501708984375], "page": 1, "span": [0, 0], "__ref_s3_data": null}], "text": "", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [0.12108886241912842, 90.19225311279297, 610.4767456054688, 504.2667541503906], "page": 1, "span": [0, 0], "__ref_s3_data": null}], "text": "", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [33.33281326293945, 552.1343383789062, 238.89004516601562, 721.9103393554688], "page": 3, "span": [0, 0], "__ref_s3_data": null}], "text": "", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [135.98939514160156, 345.3135986328125, 436.0746154785156, 714.1400756835938], "page": 5, "span": [0, 16], "__ref_s3_data": null}], "text": "Figure 1 IBM z16", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.93318176269531, 415.7976989746094, 547.8917236328125, 685.1072998046875], "page": 6, "span": [0, 33], "__ref_s3_data": null}], "text": "Figure 2 IBM Z: Processor roadmap", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [434.496826171875, 442.9707946777344, 543.5748901367188, 660.1309204101562], "page": 7, "span": [0, 52], "__ref_s3_data": null}], "text": "Figure 3 System design of IBM z16 LinuxONE Emperor 4", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [65.18315887451172, 430.1353454589844, 547.7926635742188, 684.5646362304688], "page": 8, "span": [0, 78], "__ref_s3_data": null}], "text": "Figure 4 IBM z16 on-chip AI Accelerator integration with IBM Z processor cores", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.25979614257812, 492.203369140625, 548.035888671875, 714.2471923828125], "page": 9, "span": [0, 29], "__ref_s3_data": null}], "text": "Figure 5 Seamless integration", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.54902648925781, 310.984375, 547.7777709960938, 612.0947265625], "page": 10, "span": [0, 48], "__ref_s3_data": null}], "text": "Figure 6 Solution overview of Cloud Pak for Data", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.61245346069336, 441.5110168457031, 547.817138671875, 714.1513061523438], "page": 13, "span": [0, 104], "__ref_s3_data": null}], "text": "Figure 7 Developing, training, and deploying an AI model on Cloud Pak for Data on IBM Z and IBM LinuxONE", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.72257995605469, 462.15850830078125, 547.6842041015625, 660.9888916015625], "page": 16, "span": [0, 35], "__ref_s3_data": null}], "text": "Figure 8 Typical AI model lifecycle", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.82352828979492, 501.3348693847656, 548.0906982421875, 714.08984375], "page": 18, "span": [0, 54], "__ref_s3_data": null}], "text": "Figure 9 Remote AI governance solution end-to-end flow", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.964263916015625, 125.87242126464844, 547.62890625, 423.3223571777344], "page": 18, "span": [0, 49], "__ref_s3_data": null}], "text": "Figure 10 Creating a model entry in IBM OpenPages", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.76428985595703, 378.5587158203125, 547.38916015625, 672.571533203125], "page": 19, "span": [0, 53], "__ref_s3_data": null}], "text": "Figure 11 Training an AI model by using Watson Studio", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.11590576171875, 67.91944122314453, 547.7499389648438, 318.0794982910156], "page": 19, "span": [0, 66], "__ref_s3_data": null}], "text": "Figure 12 Deploying an AI model by using WML on Cloud Pak for Data", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [136.353515625, 406.53900146484375, 533.409912109375, 661.0449829101562], "page": 20, "span": [0, 24], "__ref_s3_data": null}], "text": "Figure 13 External model", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.07536315917969, 83.89727020263672, 547.8724975585938, 346.0033874511719], "page": 20, "span": [0, 28], "__ref_s3_data": null}], "text": "Figure 14 Tracking the model", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.772430419921875, 380.2639465332031, 547.672119140625, 684.7722778320312], "page": 21, "span": [0, 91], "__ref_s3_data": null}], "text": "Figure 15 Model facts that are tracked and synchronized to IBM OpenPages on an x86 platform", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.67052459716797, 410.38824462890625, 547.7557983398438, 684.6401977539062], "page": 22, "span": [0, 55], "__ref_s3_data": null}], "text": "Figure 16 Creating an external model on an x86 platform", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.84904861450195, 440.8315734863281, 547.9327392578125, 713.8433837890625], "page": 23, "span": [0, 76], "__ref_s3_data": null}], "text": "Figure 17 IBM OpenScale dashboard that is used to monitor the external model", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.19013214111328, 69.50128936767578, 547.7117919921875, 344.5738220214844], "page": 23, "span": [0, 103], "__ref_s3_data": null}], "text": "Figure 18 Final result: End-to-end AI governance when using IBM OpenPages, AI Factsheets, and OpenScale", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.70671081542969, 451.1697692871094, 545.1655883789062, 713.8380737304688], "page": 25, "span": [0, 82], "__ref_s3_data": null}], "text": "Figure 19 Architecture for credit risk prediction by using an ML AI model on IBM Z", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.45086669921875, 433.2137756347656, 547.7979736328125, 696.4598388671875], "page": 26, "span": [0, 70], "__ref_s3_data": null}], "text": "Figure 20 Architecture for credit risk prediction by using DL on IBM Z", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.91328811645508, 479.8487548828125, 542.5390625, 684.5452270507812], "page": 28, "span": [0, 97], "__ref_s3_data": null}], "text": "Figure 21 Clearing and settlement use case for financial transactions by using Cloud Pak for Data", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.87143325805664, 173.84889221191406, 539.6433715820312, 410.2047119140625], "page": 29, "span": [0, 43], "__ref_s3_data": null}], "text": "Figure 22 Inferencing architecture on IBM Z", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [63.89833068847656, 352.471923828125, 547.9695434570312, 714.0540771484375], "page": 31, "span": [0, 37], "__ref_s3_data": null}], "text": "Figure 23 In-depth architectural view", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [64.11891174316406, 381.7127380371094, 541.8325805664062, 614.5540161132812], "page": 33, "span": [0, 53], "__ref_s3_data": null}], "text": "Figure 24 Architecture for AI-powered video analytics", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [42.87873458862305, 15.771553993225098, 69.14901733398438, 43.16151428222656], "page": 40, "span": [0, 0], "__ref_s3_data": null}], "text": "", "type": "figure"}, {"bounding-box": null, "prov": [{"bbox": [433.9858703613281, 19.161434173583984, 572.2542114257812, 54.680973052978516], "page": 40, "span": [0, 0], "__ref_s3_data": null}], "text": "", "type": "figure"}], "tables": [{"#-cols": 3, "#-rows": 6, "bounding-box": null, "data": [[{"bbox": [75.5999984741211, 601.1370239257812, 98.19540405273438, 609.4619750976562], "spans": [[0, 0]], "text": "Db2fi IBMfi", "type": "", "col": 0, "col-header": false, "col-span": [0, 1], "row": 0, "row-header": false, "row-span": [0, 1]}, {"bbox": [236.40029907226562, 601.13623046875, 292.0049743652344, 609.461181640625], "spans": [[0, 1]], "text": "IBM Watsonfi", "type": "", "col": 1, "col-header": false, "col-span": [1, 2], "row": 0, "row-header": false, "row-span": [0, 1]}, {"bbox": [397.2005920410156, 601.1354370117188, 455.17950439453125, 609.4603881835938], "spans": [[0, 2]], "text": "Redbooks (log o) fi Turbon", "type": "", "col": 2, "col-header": false, "col-span": [2, 3], "row": 0, "row-header": false, "row-span": [0, 1]}], [{"bbox": null, "spans": [[1, 0]], "text": "", "type": "", "col": 0, "col-header": false, "col-span": [0, 1], "row": 1, "row-header": false, "row-span": [1, 2]}, {"bbox": [236.40029907226562, 590.15625, 278.3294982910156, 598.481201171875], "spans": [[1, 1]], "text": "IBM z16\u2122", "type": "", "col": 1, "col-header": false, "col-span": [1, 2], "row": 1, "row-header": false, "row-span": [1, 2]}, {"bbox": [425.6900939941406, 590.1554565429688, 451.2635803222656, 598.4804077148438], "spans": [[1, 2]], "text": "omicfi", "type": "", "col": 2, "col-header": false, "col-span": [2, 3], "row": 1, "row-header": false, "row-span": [1, 2]}], [{"bbox": [75.5999984741211, 579.1167602539062, 144.1304931640625, 587.4417114257812], "spans": [[2, 0]], "text": "IBM Blockchainfi", "type": "", "col": 0, "col-header": false, "col-span": [0, 1], "row": 2, "row-header": false, "row-span": [2, 3]}, {"bbox": [236.40029907226562, 579.115966796875, 272.4696044921875, 587.44091796875], "spans": [[2, 1]], "text": "Instanafi", "type": "", "col": 1, "col-header": false, "col-span": [1, 2], "row": 2, "row-header": false, "row-span": [2, 3]}, {"bbox": [397.2005920410156, 579.1151733398438, 451.2527770996094, 587.4401245117188], "spans": [[2, 2]], "text": "WebSpherefi", "type": "", "col": 2, "col-header": false, "col-span": [2, 3], "row": 2, "row-header": false, "row-span": [2, 3]}], [{"bbox": [75.5999984741211, 568.1367797851562, 112.57559204101562, 576.4617309570312], "spans": [[3, 0]], "text": "IBM Cloudfi IBM Clou", "type": "", "col": 0, "col-header": false, "col-span": [0, 1], "row": 3, "row-header": false, "row-span": [3, 4]}, {"bbox": [236.40029907226562, 568.135986328125, 294.3809509277344, 576.4609375], "spans": [[3, 1]], "text": "Open Libertyfi", "type": "", "col": 1, "col-header": false, "col-span": [1, 2], "row": 3, "row-header": false, "row-span": [3, 4]}, {"bbox": [397.2005920410156, 568.1351928710938, 423.8045959472656, 576.4601440429688], "spans": [[3, 2]], "text": "z/OSfi", "type": "", "col": 2, "col-header": false, "col-span": [2, 3], "row": 3, "row-header": false, "row-span": [3, 4]}], [{"bbox": [112.60798645019531, 557.1567993164062, 142.21170043945312, 565.4817504882812], "spans": [[4, 0]], "text": "d Pakfi", "type": "", "col": 0, "col-header": false, "col-span": [0, 1], "row": 4, "row-header": false, "row-span": [4, 5]}, {"bbox": [236.40029907226562, 557.156005859375, 290.44708251953125, 565.48095703125], "spans": [[4, 1]], "text": "OpenPagesfi", "type": "", "col": 1, "col-header": false, "col-span": [1, 2], "row": 4, "row-header": false, "row-span": [4, 5]}, {"bbox": [397.2005920410156, 557.1552124023438, 420.6365966796875, 565.4801635742188], "spans": [[4, 2]], "text": "z16\u2122", "type": "", "col": 2, "col-header": false, "col-span": [2, 3], "row": 4, "row-header": false, "row-span": [4, 5]}], [{"bbox": [75.5999984741211, 546.1165161132812, 128.0511016845703, 554.4414672851562], "spans": [[5, 0]], "text": "IBM Telum\u2122", "type": "", "col": 0, "col-header": false, "col-span": [0, 1], "row": 5, "row-header": false, "row-span": [5, 6]}, {"bbox": [236.40029907226562, 546.11572265625, 283.47210693359375, 554.440673828125], "spans": [[5, 1]], "text": "Redbooksfi", "type": "", "col": 1, "col-header": false, "col-span": [1, 2], "row": 5, "row-header": false, "row-span": [5, 6]}, {"bbox": null, "spans": [[5, 2]], "text": "", "type": "", "col": 2, "col-header": false, "col-span": [2, 3], "row": 5, "row-header": false, "row-span": [5, 6]}]], "model": null, "prov": [{"bbox": [75.00436401367188, 546.11572265625, 487.3641357421875, 611.8494262695312], "page": 38, "span": [0, 0], "__ref_s3_data": null}], "text": "", "type": "table"}], "bitmaps": null, "equations": [], "footnotes": [], "page-dimensions": [{"height": 792.0, "page": 1, "width": 612.0}, {"height": 792.0, "page": 2, "width": 612.0}, {"height": 792.0, "page": 3, "width": 612.0}, {"height": 792.0, "page": 4, "width": 612.0}, {"height": 792.0, "page": 5, "width": 612.0}, {"height": 792.0, "page": 6, "width": 612.0}, {"height": 792.0, "page": 7, "width": 612.0}, {"height": 792.0, "page": 8, "width": 612.0}, {"height": 792.0, "page": 9, "width": 612.0}, {"height": 792.0, "page": 10, "width": 612.0}, {"height": 792.0, "page": 11, "width": 612.0}, {"height": 792.0, "page": 12, "width": 612.0}, {"height": 792.0, "page": 13, "width": 612.0}, {"height": 792.0, "page": 14, "width": 612.0}, {"height": 792.0, "page": 15, "width": 612.0}, {"height": 792.0, "page": 16, "width": 612.0}, {"height": 792.0, "page": 17, "width": 612.0}, {"height": 792.0, "page": 18, "width": 612.0}, {"height": 792.0, "page": 19, "width": 612.0}, {"height": 792.0, "page": 20, "width": 612.0}, {"height": 792.0, "page": 21, "width": 612.0}, {"height": 792.0, "page": 22, "width": 612.0}, {"height": 792.0, "page": 23, "width": 612.0}, {"height": 792.0, "page": 24, "width": 612.0}, {"height": 792.0, "page": 25, "width": 612.0}, {"height": 792.0, "page": 26, "width": 612.0}, {"height": 792.0, "page": 27, "width": 612.0}, {"height": 792.0, "page": 28, "width": 612.0}, {"height": 792.0, "page": 29, "width": 612.0}, {"height": 792.0, "page": 30, "width": 612.0}, {"height": 792.0, "page": 31, "width": 612.0}, {"height": 792.0, "page": 32, "width": 612.0}, {"height": 792.0, "page": 33, "width": 612.0}, {"height": 792.0, "page": 34, "width": 612.0}, {"height": 792.0, "page": 35, "width": 612.0}, {"height": 792.0, "page": 36, "width": 612.0}, {"height": 792.0, "page": 37, "width": 612.0}, {"height": 792.0, "page": 38, "width": 612.0}, {"height": 792.0, "page": 39, "width": 612.0}, {"height": 792.0, "page": 40, "width": 612.0}], "page-footers": [], "page-headers": [], "_s3_data": null, "identifiers": null} |