skip to Main Content

Each Technology page is effectively a mini site for a particular technology solution. Each page contains contextual information about the topic, commentary from our analysts, links to product information and additional educational resources if you wish to dig deeper.

  • All
  • Action
  • Data
  • Infrastructure
  • Trust


Artificial Intelligence (AI) is the ability of machines to perform tasks that would normally require human intelligence.

Analytic Databases (Data Warehousing)

A data warehouse is a database implementation that supports the storage and analysis of historic data, with the aim of understanding what happened in the past or predicting what will happen in the future.


Analytics supports the complex multi-variant decision-making that is now taking place in the volatile global markets in which companies, and most governmental bodies, now operate.

Application Assurance

Application Assurance comprises the culture, processes and technologies that enables Outcome Automation to deliver business outcomes.

Big Data

Big Data refers to the ability to analyse any type of data, not limited to (but including) data in relational tables. There may be a lot of such data …


A blockchain is a distributed ledger, implemented across many servers, consisting of a continuously growing list of records, called blocks, which are linked across the whole network and secured using cryptography.


Cloud provides a business the option of having its applications and underpinning compute and storage technology, delivered as a service.

Cloud Management

The boundaries of what we view, broadly, as the Cloud Management market have increased.

Data as an Asset

What is it?What does it do?Who should care?Emerging trendsVendor landscapeWhat is it? Treating data as an asset essentially requires four things: Knowing what data (or content) you have and where it is Understanding that data and how it relates to…

Data at Rest

Data is either in a particular place (or places) or it is being moved between places. The former is referred to as “Data at rest”.

Data Discovery and Catalogues

Both data discovery and data cataloguing are designed to allow you to know what you have and how it is related.

Data Fabric

Data Fabric is an approach to getting a unified view across the enterprise that involves creating a semantic layer to navigate it in place, rather than moving physical copies of the data.

Data Governance

Data governance is about ensuring that your organisation’s information assets meet corporate policies for accuracy, timeliness, completeness and compliance.

Data in Motion

Data is either in a particular place (or places) or it is being moved between places. The latter is referred to as “Data in motion”.

Data Masking

Developers and data scientists may not be allowed to see detailed personal information but at the same time they may need that data, or its equivalent.

Data Movement

Data movement does what its name suggests and there are multiple ways of doing so and of avoiding do so.

Data Quality

Data quality is about ensuring that data is fit for purpose; that it is accurate, timely and complete enough for use in business.

Data Security

Achieving robust data security is essential for any organisation for which data is a strategic asset. No organisation can afford to rest on its laurels.


DevOps is about encouraging a culture of collaboration across development, operations and business silos (and, by implication, removing these silos).

Edge Computing

Edge computing, along with SDNs, the global ubiquity of smart phones, 5G mobile technology, and IoT platforms and frameworks, are key enablers for Industry 4.0.


Encryption – and its opposite, decryption – is the process of converting data into code that is unreadable by a human who does not possess the necessary key for decrypting it.


FinOps is an essential component of Cloud Management. There’s a Foundation for it. Practitioners can get badges of certification for it.

Graph Databases

Graph databases store data in terms of entities and the relationships between entities.


GRC solutions support three interlinked sets of requirements for dealing with three key elements of operating organisations, and measuring trustworthiness.

Identity and Trust

Identity and access management tools are key weapons in any organisation’s arsenal for protecting the confidentiality, integrity and availability of sensitive information.

Information Governance and Data Security

Adequate and appropriate security controls must be applied to all information and data for effective information governance purposes and accountability.

Low-Code/No-Code Development

Low and no-code development allow you to develop applications unprecedentedly quickly and efficiently while enabling citizen development, collaboration and self-service.

Machine Learning and Artificial Intelligence

At its simplest it is using computers to run algorithms that give them the ability to undertake reasoning that was previously seen as the preserve of humans.

Mainframe 3.0

Many enterprises still run on Mainframes but start-ups that value growth without early over-provisioning should also consider Mainframe platforms.


Large organisations have many systems which store master data, and the man¬agement of multiple and competing definitions of this data is known as Master Data Management (MDM).

Network and Endpoint Security

Network security refers to those technologies and processes that are used to keep networks in good, secure working order. Network security encompasses the prime

NoSQL Databases

NoSQL – not only SQL – non-relational databases.

Operational Databases

An operational database is designed to run the day-to-day operations or transactions of your business.

Outcome Automation

Outcome Automation is based on Design Thinking, culture and IT, and it provides a capability for automating the delivery of mutable business outcomes.

Right Insight

Application and system feedback and particularly the insights that can be gleaned from it are a fundamental part of almost all business systems. The question is how to acquire the right insight.

Service Virtualisation

Service virtualisation is a technique used to virtualise external services used by a developing system, so that it can be developed and tested without regard to the stability or availability of services it depends on.

Spreadsheet Governance

Spreadsheet governance is a specialised aspect of governance – dealing with the error-prone nature of spreadsheets and their ungoverned proliferation.

Streaming Analytics Platforms

Once there was complex event processing but now the major market for event processing is in streaming analytics.

Test Data Management

This is the use of tools to make a representative subset or copy of a whole database that lets you adequately test relevant applications.

Test Design Automation

Test design automation provides a potentially massive boost to testing speed and efficiency. Properly leveraged, it can also dramatically improve the end-user experience.

Threat Detection and Response

Efficient threat detection and response is imperative in combating today’s complex threat landscape. This webpage describes the options available.


Trust can be defined as the ability to believe in the reliability and integrity of something or someone.

Trust in Data

There are various data tools that enable us to trust, specifically data profiling, data quality and data preparation.

Back To Top