www.computerweekly.com Open in urlscan Pro
206.19.49.153  Public Scan

URL: https://www.computerweekly.com/opinion/A-beginners-guide-to-quantum-computer-programming
Submission: On March 30 via manual from US

Form analysis 3 forms found in the DOM

GET https://www.computerweekly.com/search/query

<form action="https://www.computerweekly.com/search/query" method="get" class="header-search" style="width: 740px;">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
  <button class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

POST https://users.computerweekly.com/registration/ComputerWeekly/InlineRegisterActivate.page

<form id="inlineregform" class="sign-up-form cascading-reg-form page1" _lpchecked="1" action="https://users.computerweekly.com/registration/ComputerWeekly/InlineRegisterActivate.page" method="post" data-page="1">
  <div id="inlineregErrContainer" style="display:none"></div>
  <ul>
    <li class=""><label for="inlineRegistration_Email">Corporate E-mail Address:</label><input type="text" id="inlineRegistration_Email" name="dgUser#email" maxlength="100" size="25" value="" data-required="true" class="sign-up-textfield">
      <div class="signupErrors">
        <p id="inlineRegistration_Email.blank" class="sign-up-error-msg hidden">You forgot to provide an Email Address.</p>
        <p id="inlineRegistration_Email.invalid" class="sign-up-error-msg hidden">This email address doesn’t appear to be valid.</p>
        <p id="inlineRegistration_Email.exists" class="sign-up-error-msg hidden">This email address is already registered. Please
          <a href="https://users.computerweekly.com/registration/computerweekly/LoginRegister" class="inlineRegLoginErrMsg">login</a>.</p>
        <p id="inlineRegistration_Email.maxlength" class="sign-up-error-msg hidden">You have exceeded the maximum character limit.</p>
        <p id="inlineRegistration_Email.invalid.domain" class="sign-up-error-msg hidden">Please provide a Corporate E-mail Address.</p>
      </div>
    </li>
    <li class="optInCheckboxes">
      <fieldset class="checkboxList">
        <ul>
          <li><input type="checkbox" id="inlineRegistration_Opt-In-Privacy" name="dgUser#optInPrivacy" value="true" data-required="true"><label for="inlineRegistration_Opt-In-Privacy">I agree to TechTarget’s
              <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>, <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>, and the transfer of my information to the United States for
              processing to provide me with relevant information as described in our Privacy Policy.</label></li>
        </ul>
      </fieldset>
      <div class="signupErrors">
        <p id="inlineRegistration_Opt-In-Privacy.blank" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
      </div>
    </li>
    <li class="optInCheckboxes">
      <fieldset class="checkboxList">
        <ul>
          <li><input type="checkbox" id="inlineRegistration_Opt-In-Partners" name="dgUser#optInPartners" value="true" data-required="true"><label for="inlineRegistration_Opt-In-Partners">I agree to my information being processed by TechTarget and its
              <a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.</label></li>
        </ul>
      </fieldset>
      <div class="signupErrors">
        <p id="inlineRegistration_Opt-In-Partners.blank" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
      </div>
    </li><input type="hidden" id="inlineRegistration_AppCode" name="appCD" value="127"><input type="hidden" id="inlineRegistration_FromURL" name="fromURL"
      value="https://www.computerweekly.com/downloadOffer/fulfillment/252465356/f2d5c692cd3e0710VgnVCM1000002901c80aRCRD?submit=1"><input type="hidden" id="inlineRegistration_ContentId" name="guideContentId" value=""><input type="hidden"
      id="inlineRegistration_AdId" name="ad_id" value="252480095"><input type="hidden" id="inlineRegistration_IncentiveId" name="incentiveId" value="252465356"><input type="hidden" id="inlineRegistration_IncentiveRule" name="incentiveRule"
      value="Topic"><input type="hidden" id="inlineRegistration_TEST---AB-Tracking1" name="dgUser#abTracking1" value="">
    <li class=""><input type="submit" value="Download Now" id="inlineRegSubmit" class="sign-up-btn"></li>
    <div id="inlineRegProcessing" style="margin:30px 0px 15px 140px; display:none"><span class="processing" style="display:inline"><span class="animatedIcon"></span><span id="inlineRegProcessingText"></span></span></div>
    <style>
      .optInCheckboxes {
        margin-top: 10px !important;
        margin-bottom: 10px !important;
      }

      .optInCheckboxes li {
        margin: 0px !important;
      }

      .optInCheckboxes .checkboxList li label {
        width: calc(100% - 50px) !important;
        display: block !important;
        margin: 0px 0px 10px 10px !important;
        text-align: left !important;
        float: left !important;
      }

      .optInCheckboxes .checkboxList li input[type=checkbox] {
        margin-top: 5px !important;
      }

      .optInCheckboxes .errorMessageInput {
        margin-left: 25px !important;
      }

      .optInCheckboxes .checkboxList .default-list {
        margin-bottom: 0px;
      }
    </style>
    <p class="declarationOfConsent" id="inlineRegistration_declarationOfConsent" style="display:none">By submitting my Email address I confirm that I have read and accepted the Terms of Use and
      <a href="https://users.computerweekly.com/registration/ComputerWeekly/DisplayConsentText.page?languageCd=en&amp;enText=true" class="consentWindow" target="Consent">Declaration of Consent.</a></p>
    <input type="hidden" id="inlineRegistration_Consent-Popup" name="user_consent#link" value="en">
  </ul>
</form>

<form id="loggedoutCommentsForm" class="comments-form logged-out">
  <div class="cleditorMain" style="width: 100%; height: 200px;">
    <div class="cleditorToolbar" style="height: 27px;">
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
        <div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 73px;">
        <div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 49px;">
        <div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
        <div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
        <div class="cleditorDivider"></div>
      </div>
      <div class="cleditorGroup" style="width: 25px;">
        <div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
        <div class="cleditorDivider"></div>
      </div>
    </div><textarea id="loggedoutCommentBody" class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 776px; height: 173px;"></textarea><iframe frameborder="0"
      src="javascript:true;" style="width: 776px; height: 173px;"></iframe>
  </div>
  <fieldset class="notifications">
    <input data-field="" id="notifications" name="notifications" checked="checked" type="checkbox"> Send me notifications when other members comment.
  </fieldset>
  <button type="submit" class="comments-form-btn submit" href="#comments-reg-login">Add My Comment</button>
  <div style="display:none;">
    <div id="comments-reg-login">
      <section id="commenting-registration">
        <div class="modal-register">
          <h4>Register</h4>
          <input class="comments-username" type="text" placeholder="Username">
          <input class="comments-email" type="text" placeholder="email@techtarget.com">
          <input class="comments-password" type="password" placeholder="Password">
          <ul class="optInCheckboxesWrapper">
            <li class="optInCheckboxes">
              <fieldset class="checkboxList">
                <ul class="default-list">
                  <li><input type="checkbox" id="comments-optin-privacy" name="comments-optin-privacy" value="true" data-required="true">
                    <label for="comments-optin-privacy"> I agree to TechTarget’s <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>,
                      <a href="https://www.techtarget.com/privacy-policy-may25/" target="_blank">Privacy Policy</a>, and the transfer of my information to the United States for processing to provide me with relevant information as described in our
                      Privacy Policy.</label>
                  </li>
                </ul>
              </fieldset>
              <div class="signupErrors">
                <p id="comments-optin-privacy-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
              </div>
            </li>
            <li class="optInCheckboxes">
              <fieldset class="checkboxList">
                <ul class="default-list">
                  <li><input type="checkbox" id="comments-optin-partners" name="comments-optin-partners" value="true" data-required="true">
                    <label for="comments-optin-partners"> I agree to my information being processed by TechTarget and its <a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other
                      means regarding information relevant to my professional interests. I may unsubscribe at any time.</label>
                  </li>
                </ul>
              </fieldset>
              <div class="signupErrors">
                <p id="comments-optin-partners-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
              </div>
            </li>
          </ul>
          <input id="submit-register" class="comments-form-btn" type="submit" value="Add My Comment">
        </div>
        <div class="modal-divider"></div>
        <div class="modal-login">
          <h4>Login</h4>
          <input class="comments-email" type="text" placeholder="email@techtarget.com">
          <input class="comments-password" type="password" placeholder="Password">
          <a class="forgot-password" href="#forgotPasswordModal">Forgot your password?</a>
          <input id="submit-login" class="comments-form-btn" type="submit" value="Add My Comment">
          <div style="display:none;">
            <div id="forgotPasswordModal">
              <section id="commenting-forgot-password">
                <div id="forgotPasswordModalHeader">
                  <h4>Forgot your password?</h4>
                  <div id="forgotPasswordModalMessaging">
                    <span class="forgotPasswordModalIntro">No problem! Submit your e-mail address below. We'll send you an email containing your password.</span>
                  </div>
                </div>
                <input id="forgotPasswordModalFormMessage" name="email" tabindex="1" class="required" placeholder="email@techtarget.com">
                <button type="submit" id="forgotPasswordModalFormSubmit" class="button primaryButton">Submit</button>
              </section>
            </div>
          </div>
          <div style="display:none;">
            <div id="forgotPasswordModalConfirm">
              <div id="forgotPasswordModalHeader">
                <h4>Your password has been sent to:<span class="email"></span></h4>
              </div>
            </div>
          </div>
        </div>
      </section>
    </div>
  </div>
</form>

Text Content

Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * 2019 salary survey results

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
    * IT in France
    * IT in the Nordics
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Quality/governance
    * Data warehousing
    * Database management
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * Cloud storage
    * Containers and storage
    * Compliance and storage
    * Backup
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 




A BEGINNER’S GUIDE TO QUANTUM COMPUTER PROGRAMMING

 * 
 * 




QUANTUM COMPUTING TAKES A RADICALLY DIFFERENT APPROACH TO PROGRAMMING. IBM’S
EDUCATION HEAD DISCUSSES HOW TO GET STARTED

Share this item with your network:

 * 
 * 
 * 

By
 * Abraham Asfaw

Published: 19 Mar 2020

The field of quantum computation has made rapid progress just in the last few
years. In 2016, IBM put the first quantum computer on the cloud, expanding the
reach of the technology beyond research laboratories. Our goal is to make
quantum computing available to anyone who is interested, and to help prepare a
quantum-ready workforce that can translate industry challenges into problems
that quantum computers can solve.

Download this free guide



CW BENELUX: NETHERLANDS OFFERS YOUNG HACKERS RE-EDUCATION

Read how young hackers in the Netherlands are being rehabilitated through
punishments that educate rather than incarcerate.

Start Download
 * Corporate E-mail Address:
   
   You forgot to provide an Email Address.
   
   This email address doesn’t appear to be valid.
   
   This email address is already registered. Please login.
   
   You have exceeded the maximum character limit.
   
   Please provide a Corporate E-mail Address.

 *  * I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of
      my information to the United States for processing to provide me with
      relevant information as described in our Privacy Policy.
   
   Please check the box if you want to proceed.

 *  * I agree to my information being processed by TechTarget and its Partners
      to contact me via phone, email, or other means regarding information
      relevant to my professional interests. I may unsubscribe at any time.
   
   Please check the box if you want to proceed.

   
   
   
   
   
   
   
 * 
   
   

   By submitting my Email address I confirm that I have read and accepted the
   Terms of Use and Declaration of Consent.

   



Industry has begun experimenting with quantum computers to help optimise
transaction settlements, use machine learning to tease out new insights and
accelerate scientific discoveries. For those and other projects to succeed, we
will need a lot more quantum developers. Wondering if you, too, should get
“quantum ready”? The short answer is: yes.

Just four and a half years ago, when I was a graduate school teaching assistant
at Princeton University, I taught quantum computation using a whiteboard to
roughly 20 students. Since IBM made cloud-based quantum computers available,
instructors at Princeton – an IBM Q Network academic partner since 2019 – have
been able to integrate hands-on experiences into its curriculum. Attendance in
the course (ELE 396/COS 396) has grown to become one of the largest in the
department.

Today, several universities around the world offer similar quantum computing
courses, integrating cloud-based quantum computers in their pedagogy.


WHAT YOU NEED TO KNOW ABOUT QUANTUM COMPUTERS

First, a bit about how quantum computers work. Quantum computing effectively
harnesses the power of quantum mechanics for computing. Quantum bits, or qubits,
are the basic units of information used by quantum computers, as opposed to the
bits used by today’s classical digital computers.

While the bits in our classical computers can only take on values of 0 or 1,
qubits can exist in combinations of 0 and 1. This property, known as
superposition, means that individual qubits can take on states that are not
available in classical computers like the laptop I used to type this article.

Multiple qubits can also become entangled. Given two entangled qubits, if I were
to measure the state of one of them, then the outcome of measuring the other
qubit is correlated in some way and isn’t completely random any more, even if
the two qubits are far apart. Together, superposition and entanglement can be
harnessed for quantum computation. 

Another concept that becomes important in writing quantum algorithms is
interference. To have a clear picture of interference, think of a pair of sine
waves. When the waves align, then the two signals add up, which means you get an
enhanced signal. In the opposite case, when they don’t line up, you get
destructive interference that diminishes the signal.

Several quantum algorithms begin by creating superpositions of an exponentially
large number of logical states. These algorithms take advantage of interference
in such a way that all the incorrect answers of the specific problem
destructively interfere and no longer appear in the final output, leaving behind
only the correct answer.


PUTTING QUANTUM COMPUTING TO WORK

It takes only one operation to go from a classical computing state that looks
like either a 0 or a 1, to a superposition state, where the information can be
in a combination of 0 and 1. Similarly, it takes only two operations to create
entanglement between two qubits.

The IBM Quantum Experience provides access to IBM’s public 5-qubit, and 15-qubit
systems. IBM provides a tool called Circuit Composer to write quantum programs
by dragging and dropping gates individually on qubits.

Developers can also program using Qiskit, an open-source quantum programming
platform that uses Python. If you already know Python, then you’re well on your
way to take advantage of superposition, entanglement and interference in your
quantum programs. 

For seasoned developers in industry looking to explore the potential
applications of quantum computing, the Qiskit element Aqua (algorithms for
quantum computing applications) offers a library of algorithms for artificial
intelligence, chemistry, finance and optimisation. For example, there are a
number of finance-related tutorials to experiment with credit risk analysis,
fixed income pricing, basket option pricing, and others.

IBM and JP Morgan Chase scientists published research on testing potential
future speedups to option pricing, versus current, classical Monte Carlo
methods, using the amplitude estimation algorithm on Qiskit. 

Abraham Asfaw is quantum education lead at IBM Quantum

READ MORE ABOUT QUANTUM COMPUTING

 * Google claims it has developed an algorithm for a quantum computer that would
   take a traditional “classical” computer 10,000 years to run.
 * Volkswagen Group recently demonstrated how it was working with D-Wave to
   research uses for quantum computing. We find out what the car maker is hoping
   to achieve.



READ MORE ON CHIPS AND PROCESSOR HARDWARE

 * CES 2020: IBM GROWS Q NETWORK COLLABORATORS
   
   
   By: Cliff Saran

 * QUANTUM SUPREMACY
   
   
   By: Margaret Rouse

 * 3 WAYS TO USE QUANTUM TECHNOLOGY FEATURES IN YOUR ENTERPRISE
   
   
   By: David Petersson

 * 5 QUICK QUANTUM COMPUTING TERMS TO LEARN
   
   
   By: Jessica Lulka

Latest News
 * Coronavirus: Viability of half of London’s tech startups threatened
 * Coronavirus: internet providers enhance support for customers, end data caps
 * Coronavirus: Warning over surge in Zoom security incidents
 * View All News

Download CW Europe
 * In The Current Issue:
   * Sorting out the Dutch government’s IT mess
   * EU court opinion finds EU-US data transfers lawful but raises questions
     over Privacy Shield
   * Russia’s VTB and Rostelecom focus on big data
   Download Current Issue

Latest Blog Posts
 * What is InnerSource anyway? – Open Source Insider
 * Tomorrow began last week: Preparing for a Post Covid Lockdown World – When IT
   Meets Politics
 * View All Blogs

Related Content
 * qubit – WhatIs.com
 * CES 2020: IBM grows Q network collaborators – ComputerWeekly.com
 * quantum computing – WhatIs.com

START THE CONVERSATION


0 COMMENTS


Send me notifications when other members comment. Add My Comment

REGISTER

 *  * I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of
      my information to the United States for processing to provide me with
      relevant information as described in our Privacy Policy.
   
   Please check the box if you want to proceed.

 *  * I agree to my information being processed by TechTarget and its Partners
      to contact me via phone, email, or other means regarding information
      relevant to my professional interests. I may unsubscribe at any time.
   
   Please check the box if you want to proceed.



LOGIN

Forgot your password?

FORGOT YOUR PASSWORD?

No problem! Submit your e-mail address below. We'll send you an email containing
your password.
Submit

YOUR PASSWORD HAS BEEN SENT TO:

PLEASE CREATE A USERNAME TO COMMENT.

Oldest  Newest 




-ADS BY GOOGLE


LATEST TECHTARGET RESOURCES

 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management


SEARCHCIO


 * SUCCESSFUL DIGITAL ECOSYSTEMS DEPEND ON CLOUD SERVICES
   
   Business models are changing in the digital age, requiring companies to
   create sometimes unexpected partnerships, enabled by the ...


 * CONTRACT RISK MANAGEMENT: FOCUS ON THESE 6 AREAS
   
   Inspecting vendor contracts for risk is increasingly important as CIOs
   scramble to stay nimble in a volatile economy. ClearEdge ...


 * HOW TO WRITE AN RFP AND STATEMENT OF WORK FOR AN IT SERVICES CONTRACT
   
   Master how to write an RFP and statement of work to get the IT services you
   need using these best practices from consulting firm ...


SEARCHSECURITY


 * CYBERINSURANCE CARRIER CHUBB INVESTIGATING POSSIBLE DATA BREACH
   
   Insurance giant Chubb confirmed it is investigating an incident that may
   involve the Maze ransomware group, which claims to have ...


 * AI SECURITY ALLIANCE URGES CLARITY FOR BUYING AI SECURITY TOOLS
   
   Vendors and customers must be aware of potential gaps between expectations
   and reality in the sale or purchase of AI ...


 * RISK & REPEAT: COVID-19 BOOSTING SOCIAL ENGINEERING ATTACKS
   
   This episode of the Risk & Repeat podcast looks at how social engineering
   attacks have become more successful by taking advantage...


SEARCHNETWORKING


 * THE 8 LEADING OPTIONS IN NETWORK AUTOMATION TOOLS
   
   The right network automation platform can help admins build and oversee
   company networks. Discover the top choices in the market ...


 * U-TURN IN NETWORK MARKET FORECAST AMID CORONAVIRUS PANDEMIC
   
   IDC predicts the global market for switches and wireless LAN products will
   fall in 2020, with revenues from switches below last ...


 * 802.3CG STANDARD EXTENDS SINGLE-PAIR ETHERNET RANGE AND SPEED
   
   IEEE 802.3cg is a single-pair Ethernet standard that aims to support speeds
   up to 10 Mbps, extend Ethernet range up to 1,000 ...


SEARCHDATACENTER


 * TECH GIANTS AIM SUPERCOMPUTERS, CLOUDS AT FINDING A COVID-19 CURE
   
   The new COVID-19 HPC consortium comprised of tech giants, national labs and
   academia are using supercomputers and clouds to speed...


 * TOP VENDOR SDDC CERTIFICATION PROGRAMS FOR ADMINS
   
   If you decide to grow your knowledge of software-defined data center
   technologies, VMware, Nuage Networks and Microsoft offer ...


 * BUILD UP YOUR KNOWLEDGE OF LEAF-SPINE NETWORK TECHNOLOGY
   
   As organizations deal with challenges of single tree path networks, many
   admins are considering leaf-spine architectures. Learn ...


SEARCHDATAMANAGEMENT


 * ASCEND BOOSTS ENTERPRISE DATA GOVERNANCE WITH DATA LINEAGE
   
   The new capabilities of Ascend Govern bring data lineage and enterprise data
   governance as well as the ability to try and figure ...


 * THE BUSINESS BENEFITS OF ENTERPRISE DATA GOVERNANCE AND MDM
   
   Data leaders from prominent large organizations provide insights into data
   governance best practices and benefits, at ...


 * HOW DATA GOVERNANCE AND DATA MANAGEMENT WORK TOGETHER
   
   Data governance is an important part of data management. These
   recommendations will help build a strong complementary ...

 * About Us
 * Meet The Editors
 * Contact Us
 * Privacy Policy
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Archive
 * Answers
 * E-Products
 * Events
 * In Depth

 * Guides
 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2020, TechTarget

Do Not Sell My Personal Info

Arial
Arial Black
Comic Sans MS
Courier New
Narrow
Garamond
Georgia
Impact
Sans Serif
Serif
Tahoma
Trebuchet MS
Verdana
1
2
3
4
5
6
7

Paragraph


HEADER 1


HEADER 2


HEADER 3

HEADER 4

HEADER 5

HEADER 6


Enter URL:


Paste the code:


Latest News
 * Coronavirus: Viability of half of London’s tech startups threatened
 * Coronavirus: internet providers enhance support for customers, end data caps
 * Coronavirus: Warning over surge in Zoom security incidents
 * View All News

Download CW Europe
 * In The Current Issue:
   * Sorting out the Dutch government’s IT mess
   * EU court opinion finds EU-US data transfers lawful but raises questions
     over Privacy Shield
   * Russia’s VTB and Rostelecom focus on big data
   Download Current Issue

Latest Blog Posts
 * What is InnerSource anyway? – Open Source Insider
 * Tomorrow began last week: Preparing for a Post Covid Lockdown World – When IT
   Meets Politics
 * View All Blogs

Related Content
 * qubit – WhatIs.com
 * CES 2020: IBM grows Q network collaborators – ComputerWeekly.com
 * quantum computing – WhatIs.com

Close





x

We value your privacy
TechTarget and its partners employ cookies to improve your experience on our
site, to analyze traffic and performance, and to serve personalized content and
advertising that are relevant to your professional interests. You can manage
your preferences at any time.

Please view our Privacy Policy for more information
Manage Preferences OK Dismiss