TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| 4 | |
| 4 Vs Velocity Variety Volume Veracity | |
| 5 | |
| 5G | |
| A | |
| a Business Critical/Financially Significant system on IBM public cloud | |
| Access Control | |
| Agile Service Management | |
| AI | |
| aiops | |
| Always On | |
| Apollo | |
| Application | |
| Application Modernization | |
| application resilience | |
| Architecture | |
| assessment | |
| Augmented Intelligence | |
| auto-scalable | |
| Automatically captures performance bottlenecks and page load details & other performance KPI's | |
| Automation | |
| Availability | |
| AWS | |
| B | |
| Backup | |
| backup and recovery | |
| Best Practices | |
| Black Swan | |
| Block Chain | |
| BuildToManage | |
| Bulk Head | |
| Business Continuity | |
| Business Continuity Planning | |
| Business Resiliency Services | |
| C | |
| Call for Code winner | |
| Capacity analysis | |
| Capacity Planning | |
| cassandra | |
| Change Management | |
| Chaos Engineering | |
| chatbot | |
| chatops | |
| Circuit Breaker | |
| Climate Change Mitigation | |
| Cloud | |
| cloud pak for application | |
| cloud pak for multicloud managmement | |
| Cloud Platform Architectures | |
| Cloud Security | |
| Cloud-native | |
| cloud-security | |
| cloudpak | |
| CloudSecurity | |
| Co-location | |
| Cognitive Application | |
| collaboration | |
| Compensation | |
| compliance | |
| Consistency | |
| container | |
| Container Persistent Data Resiliency | |
| Containerization | |
| Continuous Compliance | |
| Continuous feedback | |
| Continuous monitoring | |
| Corporate Social Responsibility | |
| cost optimization | |
| COVID-19 Pandemic | |
| Crisis Management Team | |
| critical infrastructure | |
| CSMO | |
| Cyber Security | |
| D | |
| Data Consistency | |
| data lake | |
| Data Modelling | |
| Data Science | |
| Datalake | |
| Day 2 | |
| Day 2 Operations | |
| DB2 | |
| DE | |
| desecops | |
| Design Thinking | |
| Developing performance strategy | |
| DevOps | |
| devops engineering | |
| devqosops | |
| devsecops | |
| different technologies | |
| Disaster Recovery | |
| Docker | |
| DR | |
| due-diligence | |
| Dynatrace | |
| E | |
| Edge | |
| EFK | |
| ELK | |
| Empathy map | |
| EMR | |
| encryption | |
| enterprise-scale | |
| Event Sourcing | |
| Event-Driven Architectures | |
| experience and practices | |
| Exploitation of Embedded Web Application | |
| Exploratory testing | |
| F | |
| Feature delivery | |
| Firmware Analysis | |
| Fixing the application and system performance issues | |
| G | |
| Geo-dispersity | |
| gitops | |
| GM | |
| Grafana | |
| GSE | |
| H | |
| HA | |
| handle the large amount of data | |
| High availability | |
| High-quality IoT solutions | |
| HiperSockets | |
| Home automation system | |
| Hybrid | |
| hybrid cloud | |
| Hybrid Cloud Resiliency | |
| Hybrid IT | |
| Hybrid Multi-Cloud | |
| HybridCloud | |
| Hyper Ledger | |
| I | |
| IBM | |
| IBM Cloud | |
| IBM Cloud Paks | |
| IBM Edge Application Manager | |
| IBM Fellow | |
| IBM Garage | |
| IBM IT Security Specification | |
| IBM Z | |
| Identifying non-functional requirements | |
| Information Technology | |
| Infrastructure as Code | |
| Integrity | |
| Internet of Things | |
| Inventory Management | |
| IoT | |
| IOT Architecture & Communication Models | |
| IOT Security Challenges | |
| Isolate performance bottlenecks | |
| IT Governance | |
| J | |
| jenkins pipeplines | |
| JMeter | |
| K | |
| kabanero | |
| keynote | |
| Kubernetes | |
| kubernetes operators | |
| L | |
| lambda | |
| Legacy system to cloud platform | |
| Lifecycle | |
| Linear regression | |
| Linux | |
| LogDNA | |
| logging | |
| lower TCO | |
| lways On | |
| M | |
| Machine Learning | |
| maintain the speed and security | |
| Maximum number of nodes | |
| Microservices | |
| ML | |
| Modernization | |
| monitoring | |
| Multi-access Edge Computing | |
| Multi-Availability Regions | |
| Multi-Cloud | |
| multicloud | |
| N | |
| NASA | |
| Natural Language Processing | |
| Network Virtualization | |
| NewRelic APM | |
| NFR's | |
| nginx | |
| NV Tools | |
| O | |
| Observability | |
| OCP | |
| Offering management | |
| oms | |
| Open Source Velero | |
| OpenShift | |
| OpenShift Container Platform | |
| OpenStack Platform | |
| Operations | |
| Operations Risk Insights | |
| Operator | |
| Operators | |
| Optimisation | |
| order | |
| Organisational Resilience | |
| Organizational Change | |
| OSA | |
| Outage Avoidance | |
| Outbox | |
| P | |
| Performance | |
| Performance analysis | |
| Performance Engineering | |
| Performance Engineering case study in Private Data Center | |
| Performance Evaluation | |
| Performance Management | |
| Performance metrics | |
| Performance Testing | |
| Performance Testing Case study on Private Data Center | |
| Performance testing with different configurations | |
| Personas | |
| Post Incident Learning | |
| Post Mortem | |
| Prediction | |
| preformance | |
| Proactively manage key business transactions using synthetic monitoring methodologies | |
| Product-agnostic | |
| Prometheus | |
| Q | |
| Quality attributes | |
| R | |
| RADAR tool | |
| RCA | |
| Realtime | |
| Red Hat | |
| refactor | |
| Reliability | |
| Resilience | |
| Resilience Engineering | |
| Resilience Framework | |
| Resiliency | |
| Reusable | |
| Risk Management | |
| Robust | |
| Root Cause Analysis | |
| RPA | |
| RPO | |
| RTO | |
| S | |
| Saga | |
| SAP on Z | |
| scalability | |
| scalability and reliability | |
| Scalable | |
| Scaling Agile Framework (SAFe) | |
| securely transition | |
| SecureTesting | |
| SecureThought | |
| security | |
| securityInDesign | |
| Self-Adaptive systems | |
| self-healing | |
| Sending alerts | |
| server consolidation | |
| Service management | |
| Sharding | |
| Shared Operational Services (SOS) | |
| shared-responsibilities | |
| Shift Left | |
| Side by Side testing | |
| Significance of Test data | |
| SingleURL and ClickPath Monitoring | |
| Site Reliability Engineering | |
| Site Reliability Engineering (SRE) | |
| SLA | |
| SLO | |
| SMC-D | |
| Social Media Analysis | |
| software as a Service | |
| Software Defined Infrastructure | |
| Software-defined Environments (SDE) | |
| Space | |
| spark | |
| Speaker | |
| SQRS | |
| SRE | |
| stateful application | |
| sterling | |
| strategic-planning | |
| Synthetic Monitoring | |
| Sysdig | |
| system performance | |
| System Theory | |
| T | |
| Technical Debt | |
| tekton | |
| Telco Network Cloud Platform | |
| Test data challenges | |
| test data management | |
| Testing approaches | |
| Testing challenges | |
| Testing solutions | |
| TestNG | |
| Toil reduction | |
| Topology | |
| tracing | |
| Transactions | |
| Transformation | |
| Trust boundary for organisation | |
| Tuning | |
| Tuning HANA system memory from 1TB to 350 GB | |
| U | |
| uptime | |
| V | |
| Visitor Prioritization | |
| W | |
| WAN/LAN emulation | |
| Work Load Modeling | |
| workshops | |
| Z | |
| z/VM | |
| Zero Downtime | |
| zero trust | |
| • | |
| • Accelerator for Teams | |
| • Helm charts | |
| • Hyper Protect Crypto Service (HPCS) | |
| • Hyper Protect data privacy and confidential computing | |
| • IBM Cloud Pak security mechanisms | |
| • IBM Cloud Paks for Applications | |
| • IBM Cloud Paks on z | |
| • Identify and Access Management (IAM) | |
| • OCP on Z Platform | |
| • Open source technologies for security | |
| • Performance/Observability Tools | |
| • Platform security technologies | |
| • Tekton CI/CD Pipelines | |
| • Z Platform Security | |