Zum Hauptinhalt wechseln

IT Learning Hub

Explore the concepts behind Kyndryl's technology services

Artificial Intelligence Explained

Artificial intelligence or AI refers to the theory and development of computer systems that simulate human intelligence to make decisions and perform tasks.

AI, Machine Learning and Data Center Operations

AI and machine learning are increasingly used to help solve complex issues including prediction and optimization.    

Business Continuity Plan (BCP)

Ensure that your business continues to operate and your data is protected by establishing a BCP for your enterprise.   

Cyber Attacks

Cyber attacks are infamous for attacking computer infrastructure and users’ personal computers and devices.    

Data Breach

Increasing your cyber security and cyber resilience reduces your risk of a data breach.

Data Fabric

Rather than being a single piece of technology, data fabric is a holistic data and AI strategy that helps organizations leverage all existing and future investments within their data estate.

Data Governance

Data governance is a collection of processes, roles, policies, standards, and metrics that ensures the effective and efficient use of information, empowering an organization to achieve its goals.

Data Loss Prevention (DLP)

Apply DLP practices, strategies, and techniques to help your data remain protected.     

Desktop Virtualization

Desktop virtualization is the process of separating the desktop environment and associated application software from the physical client device that is used to access it.

Disaster Recovery (DR) Plan

Develop a DR plan that boosts your cyber resilience and recovery capability.

Edge Computing

Edge computing (AKA fog computing) is a distributed computing model and open information technology (IT) architecture.

Information Security and Cybersecurity

InfoSec and cybersecurity help you protect your organization from hackers and other cybersecurity threats.     

Network Functions Virtualization (NFV)

NFV changes how architect networks deliver network services, and helps improve flexibility and reduce costs and vendor lock-in.

Recovery Point Objective (RPO)

RPO helps you establish a disaster recovery plan or a data protection plan.    

Recovery Time Objective (RTO)

Establishing RTOs helps you to quickly resume your normal business operations after a disaster or disruption.

Security Operation Center (SOC)

Composed of an on-site or external team of cyber security professionals who monitor an enterprise’s IT infrastructure, a SOC provides a wide range of IT services.

Software-Defined Data Center

SDDCs help large and small enterprises access compute, network, and storage elements that they otherwise wouldn’t be able to afford.    

Software-Defined Networking (SDN) vs traditional networking

The biggest different between SDN and traditional networking is that SDN is software-based and traditional networking is usually hardware-based.    

Software-Defined Wide Area Network (SD-WAN)

SD-WAN is a software-defined approach to network connectivity that helps lower operational costs and improves optimized business application experience.  

Zero Trust

Zero trust is a security mindset that helps ensure the safety of everything that accesses your information assets and helps prevent threats to information assets based on the phrase "trust no one implicitly".