TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
4 | |
4 Vs Velocity Variety Volume Veracity | |
5 | |
5G | |
A | |
a Business Critical/Financially Significant system on IBM public cloud | |
Access Control | |
Agile Service Management | |
AI | |
aiops | |
Always On | |
Apollo | |
Application | |
Application Modernization | |
application resilience | |
Architecture | |
assessment | |
Augmented Intelligence | |
auto-scalable | |
Automatically captures performance bottlenecks and page load details & other performance KPI's | |
Automation | |
Availability | |
AWS | |
B | |
Backup | |
backup and recovery | |
Best Practices | |
Black Swan | |
Block Chain | |
BuildToManage | |
Bulk Head | |
Business Continuity | |
Business Continuity Planning | |
Business Resiliency Services | |
C | |
Call for Code winner | |
Capacity analysis | |
Capacity Planning | |
cassandra | |
Change Management | |
Chaos Engineering | |
chatbot | |
chatops | |
Circuit Breaker | |
Climate Change Mitigation | |
Cloud | |
cloud pak for application | |
cloud pak for multicloud managmement | |
Cloud Platform Architectures | |
Cloud Security | |
Cloud-native | |
cloud-security | |
cloudpak | |
CloudSecurity | |
Co-location | |
Cognitive Application | |
collaboration | |
Compensation | |
compliance | |
Consistency | |
container | |
Container Persistent Data Resiliency | |
Containerization | |
Continuous Compliance | |
Continuous feedback | |
Continuous monitoring | |
Corporate Social Responsibility | |
cost optimization | |
COVID-19 Pandemic | |
Crisis Management Team | |
critical infrastructure | |
CSMO | |
Cyber Security | |
D | |
Data Consistency | |
data lake | |
Data Modelling | |
Data Science | |
Datalake | |
Day 2 | |
Day 2 Operations | |
DB2 | |
DE | |
desecops | |
Design Thinking | |
Developing performance strategy | |
DevOps | |
devops engineering | |
devqosops | |
devsecops | |
different technologies | |
Disaster Recovery | |
Docker | |
DR | |
due-diligence | |
Dynatrace | |
E | |
Edge | |
EFK | |
ELK | |
Empathy map | |
EMR | |
encryption | |
enterprise-scale | |
Event Sourcing | |
Event-Driven Architectures | |
experience and practices | |
Exploitation of Embedded Web Application | |
Exploratory testing | |
F | |
Feature delivery | |
Firmware Analysis | |
Fixing the application and system performance issues | |
G | |
Geo-dispersity | |
gitops | |
GM | |
Grafana | |
GSE | |
H | |
HA | |
handle the large amount of data | |
High availability | |
High-quality IoT solutions | |
HiperSockets | |
Home automation system | |
Hybrid | |
hybrid cloud | |
Hybrid Cloud Resiliency | |
Hybrid IT | |
Hybrid Multi-Cloud | |
HybridCloud | |
Hyper Ledger | |
I | |
IBM | |
IBM Cloud | |
IBM Cloud Paks | |
IBM Edge Application Manager | |
IBM Fellow | |
IBM Garage | |
IBM IT Security Specification | |
IBM Z | |
Identifying non-functional requirements | |
Information Technology | |
Infrastructure as Code | |
Integrity | |
Internet of Things | |
Inventory Management | |
IoT | |
IOT Architecture & Communication Models | |
IOT Security Challenges | |
Isolate performance bottlenecks | |
IT Governance | |
J | |
jenkins pipeplines | |
JMeter | |
K | |
kabanero | |
keynote | |
Kubernetes | |
kubernetes operators | |
L | |
lambda | |
Legacy system to cloud platform | |
Lifecycle | |
Linear regression | |
Linux | |
LogDNA | |
logging | |
lower TCO | |
lways On | |
M | |
Machine Learning | |
maintain the speed and security | |
Maximum number of nodes | |
Microservices | |
ML | |
Modernization | |
monitoring | |
Multi-access Edge Computing | |
Multi-Availability Regions | |
Multi-Cloud | |
multicloud | |
N | |
NASA | |
Natural Language Processing | |
Network Virtualization | |
NewRelic APM | |
NFR's | |
nginx | |
NV Tools | |
O | |
Observability | |
OCP | |
Offering management | |
oms | |
Open Source Velero | |
OpenShift | |
OpenShift Container Platform | |
OpenStack Platform | |
Operations | |
Operations Risk Insights | |
Operator | |
Operators | |
Optimisation | |
order | |
Organisational Resilience | |
Organizational Change | |
OSA | |
Outage Avoidance | |
Outbox | |
P | |
Performance | |
Performance analysis | |
Performance Engineering | |
Performance Engineering case study in Private Data Center | |
Performance Evaluation | |
Performance Management | |
Performance metrics | |
Performance Testing | |
Performance Testing Case study on Private Data Center | |
Performance testing with different configurations | |
Personas | |
Post Incident Learning | |
Post Mortem | |
Prediction | |
preformance | |
Proactively manage key business transactions using synthetic monitoring methodologies | |
Product-agnostic | |
Prometheus | |
Q | |
Quality attributes | |
R | |
RADAR tool | |
RCA | |
Realtime | |
Red Hat | |
refactor | |
Reliability | |
Resilience | |
Resilience Engineering | |
Resilience Framework | |
Resiliency | |
Reusable | |
Risk Management | |
Robust | |
Root Cause Analysis | |
RPA | |
RPO | |
RTO | |
S | |
Saga | |
SAP on Z | |
scalability | |
scalability and reliability | |
Scalable | |
Scaling Agile Framework (SAFe) | |
securely transition | |
SecureTesting | |
SecureThought | |
security | |
securityInDesign | |
Self-Adaptive systems | |
self-healing | |
Sending alerts | |
server consolidation | |
Service management | |
Sharding | |
Shared Operational Services (SOS) | |
shared-responsibilities | |
Shift Left | |
Side by Side testing | |
Significance of Test data | |
SingleURL and ClickPath Monitoring | |
Site Reliability Engineering | |
Site Reliability Engineering (SRE) | |
SLA | |
SLO | |
SMC-D | |
Social Media Analysis | |
software as a Service | |
Software Defined Infrastructure | |
Software-defined Environments (SDE) | |
Space | |
spark | |
Speaker | |
SQRS | |
SRE | |
stateful application | |
sterling | |
strategic-planning | |
Synthetic Monitoring | |
Sysdig | |
system performance | |
System Theory | |
T | |
Technical Debt | |
tekton | |
Telco Network Cloud Platform | |
Test data challenges | |
test data management | |
Testing approaches | |
Testing challenges | |
Testing solutions | |
TestNG | |
Toil reduction | |
Topology | |
tracing | |
Transactions | |
Transformation | |
Trust boundary for organisation | |
Tuning | |
Tuning HANA system memory from 1TB to 350 GB | |
U | |
uptime | |
V | |
Visitor Prioritization | |
W | |
WAN/LAN emulation | |
Work Load Modeling | |
workshops | |
Z | |
z/VM | |
Zero Downtime | |
zero trust | |
• | |
• Accelerator for Teams | |
• Helm charts | |
• Hyper Protect Crypto Service (HPCS) | |
• Hyper Protect data privacy and confidential computing | |
• IBM Cloud Pak security mechanisms | |
• IBM Cloud Paks for Applications | |
• IBM Cloud Paks on z | |
• Identify and Access Management (IAM) | |
• OCP on Z Platform | |
• Open source technologies for security | |
• Performance/Observability Tools | |
• Platform security technologies | |
• Tekton CI/CD Pipelines | |
• Z Platform Security |