www.computerweekly.com
Open in
urlscan Pro
206.19.49.153
Public Scan
URL:
https://www.computerweekly.com/opinion/A-beginners-guide-to-quantum-computer-programming
Submission: On March 30 via manual from US
Submission: On March 30 via manual from US
Form analysis
3 forms found in the DOMGET https://www.computerweekly.com/search/query
<form action="https://www.computerweekly.com/search/query" method="get" class="header-search" style="width: 740px;">
<label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
<input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
<button class="header-search-submit"><i class="icon" data-icon="g"></i></button>
<ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>
POST https://users.computerweekly.com/registration/ComputerWeekly/InlineRegisterActivate.page
<form id="inlineregform" class="sign-up-form cascading-reg-form page1" _lpchecked="1" action="https://users.computerweekly.com/registration/ComputerWeekly/InlineRegisterActivate.page" method="post" data-page="1">
<div id="inlineregErrContainer" style="display:none"></div>
<ul>
<li class=""><label for="inlineRegistration_Email">Corporate E-mail Address:</label><input type="text" id="inlineRegistration_Email" name="dgUser#email" maxlength="100" size="25" value="" data-required="true" class="sign-up-textfield">
<div class="signupErrors">
<p id="inlineRegistration_Email.blank" class="sign-up-error-msg hidden">You forgot to provide an Email Address.</p>
<p id="inlineRegistration_Email.invalid" class="sign-up-error-msg hidden">This email address doesn’t appear to be valid.</p>
<p id="inlineRegistration_Email.exists" class="sign-up-error-msg hidden">This email address is already registered. Please
<a href="https://users.computerweekly.com/registration/computerweekly/LoginRegister" class="inlineRegLoginErrMsg">login</a>.</p>
<p id="inlineRegistration_Email.maxlength" class="sign-up-error-msg hidden">You have exceeded the maximum character limit.</p>
<p id="inlineRegistration_Email.invalid.domain" class="sign-up-error-msg hidden">Please provide a Corporate E-mail Address.</p>
</div>
</li>
<li class="optInCheckboxes">
<fieldset class="checkboxList">
<ul>
<li><input type="checkbox" id="inlineRegistration_Opt-In-Privacy" name="dgUser#optInPrivacy" value="true" data-required="true"><label for="inlineRegistration_Opt-In-Privacy">I agree to TechTarget’s
<a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>, <a href="https://www.techtarget.com/privacy-policy/" target="_blank">Privacy Policy</a>, and the transfer of my information to the United States for
processing to provide me with relevant information as described in our Privacy Policy.</label></li>
</ul>
</fieldset>
<div class="signupErrors">
<p id="inlineRegistration_Opt-In-Privacy.blank" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
</div>
</li>
<li class="optInCheckboxes">
<fieldset class="checkboxList">
<ul>
<li><input type="checkbox" id="inlineRegistration_Opt-In-Partners" name="dgUser#optInPartners" value="true" data-required="true"><label for="inlineRegistration_Opt-In-Partners">I agree to my information being processed by TechTarget and its
<a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.</label></li>
</ul>
</fieldset>
<div class="signupErrors">
<p id="inlineRegistration_Opt-In-Partners.blank" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
</div>
</li><input type="hidden" id="inlineRegistration_AppCode" name="appCD" value="127"><input type="hidden" id="inlineRegistration_FromURL" name="fromURL"
value="https://www.computerweekly.com/downloadOffer/fulfillment/252465356/f2d5c692cd3e0710VgnVCM1000002901c80aRCRD?submit=1"><input type="hidden" id="inlineRegistration_ContentId" name="guideContentId" value=""><input type="hidden"
id="inlineRegistration_AdId" name="ad_id" value="252480095"><input type="hidden" id="inlineRegistration_IncentiveId" name="incentiveId" value="252465356"><input type="hidden" id="inlineRegistration_IncentiveRule" name="incentiveRule"
value="Topic"><input type="hidden" id="inlineRegistration_TEST---AB-Tracking1" name="dgUser#abTracking1" value="">
<li class=""><input type="submit" value="Download Now" id="inlineRegSubmit" class="sign-up-btn"></li>
<div id="inlineRegProcessing" style="margin:30px 0px 15px 140px; display:none"><span class="processing" style="display:inline"><span class="animatedIcon"></span><span id="inlineRegProcessingText"></span></span></div>
<style>
.optInCheckboxes {
margin-top: 10px !important;
margin-bottom: 10px !important;
}
.optInCheckboxes li {
margin: 0px !important;
}
.optInCheckboxes .checkboxList li label {
width: calc(100% - 50px) !important;
display: block !important;
margin: 0px 0px 10px 10px !important;
text-align: left !important;
float: left !important;
}
.optInCheckboxes .checkboxList li input[type=checkbox] {
margin-top: 5px !important;
}
.optInCheckboxes .errorMessageInput {
margin-left: 25px !important;
}
.optInCheckboxes .checkboxList .default-list {
margin-bottom: 0px;
}
</style>
<p class="declarationOfConsent" id="inlineRegistration_declarationOfConsent" style="display:none">By submitting my Email address I confirm that I have read and accepted the Terms of Use and
<a href="https://users.computerweekly.com/registration/ComputerWeekly/DisplayConsentText.page?languageCd=en&enText=true" class="consentWindow" target="Consent">Declaration of Consent.</a></p>
<input type="hidden" id="inlineRegistration_Consent-Popup" name="user_consent#link" value="en">
</ul>
</form>
<form id="loggedoutCommentsForm" class="comments-form logged-out">
<div class="cleditorMain" style="width: 100%; height: 200px;">
<div class="cleditorToolbar" style="height: 27px;">
<div class="cleditorGroup" style="width: 73px;">
<div class="cleditorButton cleditorDisabled" title="Bold" disabled="disabled"></div>
<div class="cleditorButton cleditorDisabled" title="Italic" disabled="disabled" style="background-position: -24px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Strikethrough" disabled="disabled" style="background-position: -72px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 73px;">
<div class="cleditorButton cleditorDisabled" title="Font" disabled="disabled" style="background-position: -144px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Font Size" disabled="disabled" style="background-position: -168px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Style" disabled="disabled" style="background-position: -192px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 49px;">
<div class="cleditorButton cleditorDisabled" title="Font Color" disabled="disabled" style="background-position: -216px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Remove Formatting" disabled="disabled" style="background-position: -264px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 49px;">
<div class="cleditorButton cleditorDisabled" title="Bullets" disabled="disabled" style="background-position: -288px center;"></div>
<div class="cleditorButton cleditorDisabled" title="Numbering" disabled="disabled" style="background-position: -312px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 25px;">
<div class="cleditorButton cleditorDisabled" title="Insert Hyperlink" disabled="disabled" style="background-position: -576px center;"></div>
<div class="cleditorDivider"></div>
</div>
<div class="cleditorGroup" style="width: 25px;">
<div class="cleditorButton ttCleditorButton cleditorDisabled" title="Code" disabled="disabled"></div>
<div class="cleditorDivider"></div>
</div>
</div><textarea id="loggedoutCommentBody" class="comments-form-textarea" placeholder="Share your comment" style="border: none; margin: 0px; padding: 0px; display: none; width: 776px; height: 173px;"></textarea><iframe frameborder="0"
src="javascript:true;" style="width: 776px; height: 173px;"></iframe>
</div>
<fieldset class="notifications">
<input data-field="" id="notifications" name="notifications" checked="checked" type="checkbox"> Send me notifications when other members comment.
</fieldset>
<button type="submit" class="comments-form-btn submit" href="#comments-reg-login">Add My Comment</button>
<div style="display:none;">
<div id="comments-reg-login">
<section id="commenting-registration">
<div class="modal-register">
<h4>Register</h4>
<input class="comments-username" type="text" placeholder="Username">
<input class="comments-email" type="text" placeholder="email@techtarget.com">
<input class="comments-password" type="password" placeholder="Password">
<ul class="optInCheckboxesWrapper">
<li class="optInCheckboxes">
<fieldset class="checkboxList">
<ul class="default-list">
<li><input type="checkbox" id="comments-optin-privacy" name="comments-optin-privacy" value="true" data-required="true">
<label for="comments-optin-privacy"> I agree to TechTarget’s <a href="https://www.techtarget.com/terms-of-use/" target="_blank">Terms of Use</a>,
<a href="https://www.techtarget.com/privacy-policy-may25/" target="_blank">Privacy Policy</a>, and the transfer of my information to the United States for processing to provide me with relevant information as described in our
Privacy Policy.</label>
</li>
</ul>
</fieldset>
<div class="signupErrors">
<p id="comments-optin-privacy-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
</div>
</li>
<li class="optInCheckboxes">
<fieldset class="checkboxList">
<ul class="default-list">
<li><input type="checkbox" id="comments-optin-partners" name="comments-optin-partners" value="true" data-required="true">
<label for="comments-optin-partners"> I agree to my information being processed by TechTarget and its <a href="https://www.techtarget.com/privacy-partners/" target="_blank">Partners</a> to contact me via phone, email, or other
means regarding information relevant to my professional interests. I may unsubscribe at any time.</label>
</li>
</ul>
</fieldset>
<div class="signupErrors">
<p id="comments-optin-partners-error" class="sign-up-error-msg hidden">Please check the box if you want to proceed.</p>
</div>
</li>
</ul>
<input id="submit-register" class="comments-form-btn" type="submit" value="Add My Comment">
</div>
<div class="modal-divider"></div>
<div class="modal-login">
<h4>Login</h4>
<input class="comments-email" type="text" placeholder="email@techtarget.com">
<input class="comments-password" type="password" placeholder="Password">
<a class="forgot-password" href="#forgotPasswordModal">Forgot your password?</a>
<input id="submit-login" class="comments-form-btn" type="submit" value="Add My Comment">
<div style="display:none;">
<div id="forgotPasswordModal">
<section id="commenting-forgot-password">
<div id="forgotPasswordModalHeader">
<h4>Forgot your password?</h4>
<div id="forgotPasswordModalMessaging">
<span class="forgotPasswordModalIntro">No problem! Submit your e-mail address below. We'll send you an email containing your password.</span>
</div>
</div>
<input id="forgotPasswordModalFormMessage" name="email" tabindex="1" class="required" placeholder="email@techtarget.com">
<button type="submit" id="forgotPasswordModalFormSubmit" class="button primaryButton">Submit</button>
</section>
</div>
</div>
<div style="display:none;">
<div id="forgotPasswordModalConfirm">
<div id="forgotPasswordModalHeader">
<h4>Your password has been sent to:<span class="email"></span></h4>
</div>
</div>
</div>
</div>
</section>
</div>
</div>
</form>
Text Content
Search the TechTarget Network Join CW+ Login Register Cookies * News * In Depth * Blogs * Opinion * Videos * Photo Stories * Premium Content * 2019 salary survey results RSS * IT Management * IT leadership & CW500 * IT architecture * IT efficiency * Governance * Innovation * Legislation & regulation * Operations & support * Project management * Strategy * Supplier management * Business issues * Sponsored Communities * Industry Sectors * Healthcare IT * Charity IT * Business services IT * Financial services IT * Government & public sector IT * Leisure & hospitality IT * Manufacturing IT * Media & entertainment IT * Retail IT * SME IT * Telecoms & internet * Transport & travel IT * Utilities IT * IT suppliers * Technology Topics Datacentre View All * Clustering for high availability and HPC * Containers * Converged infrastructure * Datacentre backup power and power distribution * Datacentre capacity planning * Datacentre cooling infrastructure * Disaster recovery/security * Green IT * Performance, monitoring and optimisation * Systems management * DevOps * IaaS * Server and Operating Systems * PaaS * Virtualisation * SaaS * Desktop virtualisation platforms Enterprise software View All * AI and automation * Blockchain * Business applications * Business intelligence * Cloud applications * Collaboration * CRM * Database * ERP * Financial applications * HR software * Middleware * Microservices * Windows * Mobile * Open source * Operating systems * SOA * Software development * Software licensing * Virtualisation * Web software IT in Europe and Middle East View All * IT in Benelux * IT in Germany * IT in Italy * IT in Poland * IT in Russia * IT in Spain * IT in the Middle East * IT in Turkey * IT in France * IT in the Nordics Information Management View All * Big data * Business intelligence and analytics * BPM * Content management * Quality/governance * Data warehousing * Database management * MDM/Integration IT in Asia-Pacific View All * IT in ASEAN * IT in Australia & New Zealand Internet View All * Cloud * E-commerce * Internet infrastructure * Social media * Web development IT skills View All * Diversity in IT * Training * Jobs * Management skills * Technical skills Hardware View All * Chips & processors * Printers * Storage * Data centre * Mobile * Networking * PC * Servers IT security View All * Antivirus * Secure Coding and Application Programming * Continuity * Cloud security * Data Breach Incident Management and Recovery * Endpoint and NAC Protection * Cybercrime * IAM * Risk management * Network Security Management * Data protection * Compliance Regulation and Standard Requirements * Security policy and user awareness * Web Application Security IT services View All * Cloud * Consultancy * Outsourcing * Hosting * Offshore * Startups Mobile View All * Laptop * Mobile software * Mobile networking * Smartphone * Tablet Networking View All * Datacentre networking * Internet of Things * Mobile * Network hardware * Network monitoring and analysis * Network routing and switching * Network security strategy * Network software * Software-defined networking * Telecoms networks and broadband communications * Unified communications * VoIP * WAN performance and optimisation * Wireless Storage View All * Cloud storage * Containers and storage * Compliance and storage * Backup * Disaster recovery * Flash and SSDs * Hyper-convergence * Object storage * Disk systems * Software-defined storage * Storage switches * Storage management * Storage performance * Virtualisation and storage Please select a category * Datacentre * Enterprise software * IT in Europe and Middle East * Information Management * IT in Asia-Pacific * Internet * IT skills * Hardware * IT security * IT services * Mobile * Networking * Storage * Follow: * * * A BEGINNER’S GUIDE TO QUANTUM COMPUTER PROGRAMMING * * QUANTUM COMPUTING TAKES A RADICALLY DIFFERENT APPROACH TO PROGRAMMING. IBM’S EDUCATION HEAD DISCUSSES HOW TO GET STARTED Share this item with your network: * * * By * Abraham Asfaw Published: 19 Mar 2020 The field of quantum computation has made rapid progress just in the last few years. In 2016, IBM put the first quantum computer on the cloud, expanding the reach of the technology beyond research laboratories. Our goal is to make quantum computing available to anyone who is interested, and to help prepare a quantum-ready workforce that can translate industry challenges into problems that quantum computers can solve. Download this free guide CW BENELUX: NETHERLANDS OFFERS YOUNG HACKERS RE-EDUCATION Read how young hackers in the Netherlands are being rehabilitated through punishments that educate rather than incarcerate. Start Download * Corporate E-mail Address: You forgot to provide an Email Address. This email address doesn’t appear to be valid. This email address is already registered. Please login. You have exceeded the maximum character limit. Please provide a Corporate E-mail Address. * * I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy. Please check the box if you want to proceed. * * I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time. Please check the box if you want to proceed. * By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent. Industry has begun experimenting with quantum computers to help optimise transaction settlements, use machine learning to tease out new insights and accelerate scientific discoveries. For those and other projects to succeed, we will need a lot more quantum developers. Wondering if you, too, should get “quantum ready”? The short answer is: yes. Just four and a half years ago, when I was a graduate school teaching assistant at Princeton University, I taught quantum computation using a whiteboard to roughly 20 students. Since IBM made cloud-based quantum computers available, instructors at Princeton – an IBM Q Network academic partner since 2019 – have been able to integrate hands-on experiences into its curriculum. Attendance in the course (ELE 396/COS 396) has grown to become one of the largest in the department. Today, several universities around the world offer similar quantum computing courses, integrating cloud-based quantum computers in their pedagogy. WHAT YOU NEED TO KNOW ABOUT QUANTUM COMPUTERS First, a bit about how quantum computers work. Quantum computing effectively harnesses the power of quantum mechanics for computing. Quantum bits, or qubits, are the basic units of information used by quantum computers, as opposed to the bits used by today’s classical digital computers. While the bits in our classical computers can only take on values of 0 or 1, qubits can exist in combinations of 0 and 1. This property, known as superposition, means that individual qubits can take on states that are not available in classical computers like the laptop I used to type this article. Multiple qubits can also become entangled. Given two entangled qubits, if I were to measure the state of one of them, then the outcome of measuring the other qubit is correlated in some way and isn’t completely random any more, even if the two qubits are far apart. Together, superposition and entanglement can be harnessed for quantum computation. Another concept that becomes important in writing quantum algorithms is interference. To have a clear picture of interference, think of a pair of sine waves. When the waves align, then the two signals add up, which means you get an enhanced signal. In the opposite case, when they don’t line up, you get destructive interference that diminishes the signal. Several quantum algorithms begin by creating superpositions of an exponentially large number of logical states. These algorithms take advantage of interference in such a way that all the incorrect answers of the specific problem destructively interfere and no longer appear in the final output, leaving behind only the correct answer. PUTTING QUANTUM COMPUTING TO WORK It takes only one operation to go from a classical computing state that looks like either a 0 or a 1, to a superposition state, where the information can be in a combination of 0 and 1. Similarly, it takes only two operations to create entanglement between two qubits. The IBM Quantum Experience provides access to IBM’s public 5-qubit, and 15-qubit systems. IBM provides a tool called Circuit Composer to write quantum programs by dragging and dropping gates individually on qubits. Developers can also program using Qiskit, an open-source quantum programming platform that uses Python. If you already know Python, then you’re well on your way to take advantage of superposition, entanglement and interference in your quantum programs. For seasoned developers in industry looking to explore the potential applications of quantum computing, the Qiskit element Aqua (algorithms for quantum computing applications) offers a library of algorithms for artificial intelligence, chemistry, finance and optimisation. For example, there are a number of finance-related tutorials to experiment with credit risk analysis, fixed income pricing, basket option pricing, and others. IBM and JP Morgan Chase scientists published research on testing potential future speedups to option pricing, versus current, classical Monte Carlo methods, using the amplitude estimation algorithm on Qiskit. Abraham Asfaw is quantum education lead at IBM Quantum READ MORE ABOUT QUANTUM COMPUTING * Google claims it has developed an algorithm for a quantum computer that would take a traditional “classical” computer 10,000 years to run. * Volkswagen Group recently demonstrated how it was working with D-Wave to research uses for quantum computing. We find out what the car maker is hoping to achieve. READ MORE ON CHIPS AND PROCESSOR HARDWARE * CES 2020: IBM GROWS Q NETWORK COLLABORATORS By: Cliff Saran * QUANTUM SUPREMACY By: Margaret Rouse * 3 WAYS TO USE QUANTUM TECHNOLOGY FEATURES IN YOUR ENTERPRISE By: David Petersson * 5 QUICK QUANTUM COMPUTING TERMS TO LEARN By: Jessica Lulka Latest News * Coronavirus: Viability of half of London’s tech startups threatened * Coronavirus: internet providers enhance support for customers, end data caps * Coronavirus: Warning over surge in Zoom security incidents * View All News Download CW Europe * In The Current Issue: * Sorting out the Dutch government’s IT mess * EU court opinion finds EU-US data transfers lawful but raises questions over Privacy Shield * Russia’s VTB and Rostelecom focus on big data Download Current Issue Latest Blog Posts * What is InnerSource anyway? – Open Source Insider * Tomorrow began last week: Preparing for a Post Covid Lockdown World – When IT Meets Politics * View All Blogs Related Content * qubit – WhatIs.com * CES 2020: IBM grows Q network collaborators – ComputerWeekly.com * quantum computing – WhatIs.com START THE CONVERSATION 0 COMMENTS Send me notifications when other members comment. Add My Comment REGISTER * * I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy. Please check the box if you want to proceed. * * I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time. Please check the box if you want to proceed. LOGIN Forgot your password? FORGOT YOUR PASSWORD? No problem! Submit your e-mail address below. We'll send you an email containing your password. Submit YOUR PASSWORD HAS BEEN SENT TO: PLEASE CREATE A USERNAME TO COMMENT. Oldest Newest -ADS BY GOOGLE LATEST TECHTARGET RESOURCES * CIO * Security * Networking * Data Center * Data Management SEARCHCIO * SUCCESSFUL DIGITAL ECOSYSTEMS DEPEND ON CLOUD SERVICES Business models are changing in the digital age, requiring companies to create sometimes unexpected partnerships, enabled by the ... * CONTRACT RISK MANAGEMENT: FOCUS ON THESE 6 AREAS Inspecting vendor contracts for risk is increasingly important as CIOs scramble to stay nimble in a volatile economy. ClearEdge ... * HOW TO WRITE AN RFP AND STATEMENT OF WORK FOR AN IT SERVICES CONTRACT Master how to write an RFP and statement of work to get the IT services you need using these best practices from consulting firm ... SEARCHSECURITY * CYBERINSURANCE CARRIER CHUBB INVESTIGATING POSSIBLE DATA BREACH Insurance giant Chubb confirmed it is investigating an incident that may involve the Maze ransomware group, which claims to have ... * AI SECURITY ALLIANCE URGES CLARITY FOR BUYING AI SECURITY TOOLS Vendors and customers must be aware of potential gaps between expectations and reality in the sale or purchase of AI ... * RISK & REPEAT: COVID-19 BOOSTING SOCIAL ENGINEERING ATTACKS This episode of the Risk & Repeat podcast looks at how social engineering attacks have become more successful by taking advantage... SEARCHNETWORKING * THE 8 LEADING OPTIONS IN NETWORK AUTOMATION TOOLS The right network automation platform can help admins build and oversee company networks. Discover the top choices in the market ... * U-TURN IN NETWORK MARKET FORECAST AMID CORONAVIRUS PANDEMIC IDC predicts the global market for switches and wireless LAN products will fall in 2020, with revenues from switches below last ... * 802.3CG STANDARD EXTENDS SINGLE-PAIR ETHERNET RANGE AND SPEED IEEE 802.3cg is a single-pair Ethernet standard that aims to support speeds up to 10 Mbps, extend Ethernet range up to 1,000 ... SEARCHDATACENTER * TECH GIANTS AIM SUPERCOMPUTERS, CLOUDS AT FINDING A COVID-19 CURE The new COVID-19 HPC consortium comprised of tech giants, national labs and academia are using supercomputers and clouds to speed... * TOP VENDOR SDDC CERTIFICATION PROGRAMS FOR ADMINS If you decide to grow your knowledge of software-defined data center technologies, VMware, Nuage Networks and Microsoft offer ... * BUILD UP YOUR KNOWLEDGE OF LEAF-SPINE NETWORK TECHNOLOGY As organizations deal with challenges of single tree path networks, many admins are considering leaf-spine architectures. Learn ... SEARCHDATAMANAGEMENT * ASCEND BOOSTS ENTERPRISE DATA GOVERNANCE WITH DATA LINEAGE The new capabilities of Ascend Govern bring data lineage and enterprise data governance as well as the ability to try and figure ... * THE BUSINESS BENEFITS OF ENTERPRISE DATA GOVERNANCE AND MDM Data leaders from prominent large organizations provide insights into data governance best practices and benefits, at ... * HOW DATA GOVERNANCE AND DATA MANAGEMENT WORK TOGETHER Data governance is an important part of data management. These recommendations will help build a strong complementary ... * About Us * Meet The Editors * Contact Us * Privacy Policy * Our Use of Cookies * Advertisers * Business Partners * Media Kit * Corporate Site * Contributors * Reprints * Archive * Answers * E-Products * Events * In Depth * Guides * Opinions * Quizzes * Photo Stories * Tips * Tutorials * Videos * Computer Weekly Topics All Rights Reserved, Copyright 2000 - 2020, TechTarget Do Not Sell My Personal Info Arial Arial Black Comic Sans MS Courier New Narrow Garamond Georgia Impact Sans Serif Serif Tahoma Trebuchet MS Verdana 1 2 3 4 5 6 7 Paragraph HEADER 1 HEADER 2 HEADER 3 HEADER 4 HEADER 5 HEADER 6 Enter URL: Paste the code: Latest News * Coronavirus: Viability of half of London’s tech startups threatened * Coronavirus: internet providers enhance support for customers, end data caps * Coronavirus: Warning over surge in Zoom security incidents * View All News Download CW Europe * In The Current Issue: * Sorting out the Dutch government’s IT mess * EU court opinion finds EU-US data transfers lawful but raises questions over Privacy Shield * Russia’s VTB and Rostelecom focus on big data Download Current Issue Latest Blog Posts * What is InnerSource anyway? – Open Source Insider * Tomorrow began last week: Preparing for a Post Covid Lockdown World – When IT Meets Politics * View All Blogs Related Content * qubit – WhatIs.com * CES 2020: IBM grows Q network collaborators – ComputerWeekly.com * quantum computing – WhatIs.com Close x We value your privacy TechTarget and its partners employ cookies to improve your experience on our site, to analyze traffic and performance, and to serve personalized content and advertising that are relevant to your professional interests. You can manage your preferences at any time. Please view our Privacy Policy for more information Manage Preferences OK Dismiss