PREVAIL 2020: IBM CONFERENCE ON PERFORMANCE ENGINEERING, AVAILABILITY AND SECURITY
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

4
4 Vs Velocity Variety Volume Veracity
5
5G
A
a Business Critical/Financially Significant system on IBM public cloud
Access Control
Agile Service Management
AI
aiops
Always On
Apollo
Application
Application Modernization
application resilience
Architecture
assessment
Augmented Intelligence
auto-scalable
Automatically captures performance bottlenecks and page load details & other performance KPI's
Automation
Availability
AWS
B
Backup
backup and recovery
Best Practices
Black Swan
Block Chain
BuildToManage
Bulk Head
Business Continuity
Business Continuity Planning
Business Resiliency Services
C
Call for Code winner
Capacity analysis
Capacity Planning
cassandra
Change Management
Chaos Engineering
chatbot
chatops
Circuit Breaker
Climate Change Mitigation
Cloud
cloud pak for application
cloud pak for multicloud managmement
Cloud Platform Architectures
Cloud Security
Cloud-native
cloud-security
cloudpak
CloudSecurity
Co-location
Cognitive Application
collaboration
Compensation
compliance
Consistency
container
Container Persistent Data Resiliency
Containerization
Continuous Compliance
Continuous feedback
Continuous monitoring
Corporate Social Responsibility
cost optimization
COVID-19 Pandemic
Crisis Management Team
critical infrastructure
CSMO
Cyber Security
D
Data Consistency
data lake
Data Modelling
Data Science
Datalake
Day 2
Day 2 Operations
DB2
DE
desecops
Design Thinking
Developing performance strategy
DevOps
devops engineering
devqosops
devsecops
different technologies
Disaster Recovery
Docker
DR
due-diligence
Dynatrace
E
Edge
EFK
ELK
Empathy map
EMR
encryption
enterprise-scale
Event Sourcing
Event-Driven Architectures
experience and practices
Exploitation of Embedded Web Application
Exploratory testing
F
Feature delivery
Firmware Analysis
Fixing the application and system performance issues
G
Geo-dispersity
gitops
GM
Grafana
GSE
H
HA
handle the large amount of data
High availability
High-quality IoT solutions
HiperSockets
Home automation system
Hybrid
hybrid cloud
Hybrid Cloud Resiliency
Hybrid IT
Hybrid Multi-Cloud
HybridCloud
Hyper Ledger
I
IBM
IBM Cloud
IBM Cloud Paks
IBM Edge Application Manager
IBM Fellow
IBM Garage
IBM IT Security Specification
IBM Z
Identifying non-functional requirements
Information Technology
Infrastructure as Code
Integrity
Internet of Things
Inventory Management
IoT
IOT Architecture & Communication Models
IOT Security Challenges
Isolate performance bottlenecks
IT Governance
J
jenkins pipeplines
JMeter
K
kabanero
keynote
Kubernetes
kubernetes operators
L
lambda
Legacy system to cloud platform
Lifecycle
Linear regression
Linux
LogDNA
logging
lower TCO
lways On
M
Machine Learning
maintain the speed and security
Maximum number of nodes
Microservices
ML
Modernization
monitoring
Multi-access Edge Computing
Multi-Availability Regions
Multi-Cloud
multicloud
N
NASA
Natural Language Processing
Network Virtualization
NewRelic APM
NFR's
nginx
NV Tools
O
Observability
OCP
Offering management
oms
Open Source Velero
OpenShift
OpenShift Container Platform
OpenStack Platform
Operations
Operations Risk Insights
Operator
Operators
Optimisation
order
Organisational Resilience
Organizational Change
OSA
Outage Avoidance
Outbox
P
Performance
Performance analysis
Performance Engineering
Performance Engineering case study in Private Data Center
Performance Evaluation
Performance Management
Performance metrics
Performance Testing
Performance Testing Case study on Private Data Center
Performance testing with different configurations
Personas
Post Incident Learning
Post Mortem
Prediction
preformance
Proactively manage key business transactions using synthetic monitoring methodologies
Product-agnostic
Prometheus
Q
Quality attributes
R
RADAR tool
RCA
Realtime
Red Hat
refactor
Reliability
Resilience
Resilience Engineering
Resilience Framework
Resiliency
Reusable
Risk Management
Robust
Root Cause Analysis
RPA
RPO
RTO
S
Saga
SAP on Z
scalability
scalability and reliability
Scalable
Scaling Agile Framework (SAFe)
securely transition
SecureTesting
SecureThought
security
securityInDesign
Self-Adaptive systems
self-healing
Sending alerts
server consolidation
Service management
Sharding
Shared Operational Services (SOS)
shared-responsibilities
Shift Left
Side by Side testing
Significance of Test data
SingleURL and ClickPath Monitoring
Site Reliability Engineering
Site Reliability Engineering (SRE)
SLA
SLO
SMC-D
Social Media Analysis
software as a Service
Software Defined Infrastructure
Software-defined Environments (SDE)
Space
spark
Speaker
SQRS
SRE
stateful application
sterling
strategic-planning
Synthetic Monitoring
Sysdig
system performance
System Theory
T
Technical Debt
tekton
Telco Network Cloud Platform
Test data challenges
test data management
Testing approaches
Testing challenges
Testing solutions
TestNG
Toil reduction
Topology
tracing
Transactions
Transformation
Trust boundary for organisation
Tuning
Tuning HANA system memory from 1TB to 350 GB
U
uptime
V
Visitor Prioritization
W
WAN/LAN emulation
Work Load Modeling
workshops
Z
z/VM
Zero Downtime
zero trust
• Accelerator for Teams
• Helm charts
• Hyper Protect Crypto Service (HPCS)
• Hyper Protect data privacy and confidential computing
• IBM Cloud Pak security mechanisms
• IBM Cloud Paks for Applications
• IBM Cloud Paks on z
• Identify and Access Management (IAM)
• OCP on Z Platform
• Open source technologies for security
• Performance/Observability Tools
• Platform security technologies
• Tekton CI/CD Pipelines
• Z Platform Security