Free dumps for 000-556 exam are offered by killexams.com

We are normally aware of that major issue in the IT business is that there is lack of real and latest 000-556 test prep. Our 000-556 exam prep Practice test gives all of you that you should take a certification exam. Our IBM 000-556 Exam will give you exam questions with perfect answers that mirror the real Informix 11.50 Application Developer exam. Same day updated 000-556 Practice test. We at killexams.com are set out to authorize you to pass your 000-556 exam with high scores.

Exam Code: 000-556 Practice test 2022 by Killexams.com team
Informix 11.50 Application Developer
IBM Application information
Killexams : IBM Application information - BingNews https://killexams.com/pass4sure/exam-detail/000-556 Search results Killexams : IBM Application information - BingNews https://killexams.com/pass4sure/exam-detail/000-556 https://killexams.com/exam_list/IBM Killexams : Red Hat Transfers Storage Portfolio and Teams to IBM

Consistency of experience, operations and results is one of the most important factors in technology product success. However, while it is a commonplace issue in consumer tech, the subject is seldom highlighted in enterprise IT solutions and services. That makes last week’s announcement that Red Hat will transfer its data storage portfolio and teams to IBM Storage particularly interesting. Let’s take a look.

Also see: Top Cloud Companies

The value of data center and storage consistency

Why is consistency so important? Consider it from a consumer perspective, where a consistent, simple, recognizable, reliable interface removes much of the pain and confusion out of what are often highly complex operations and interactions. Developing reliably consistent, easy to use interfaces is a primary reason for the success of solution providers, such as Microsoft, Apple and Google, as well as web-based companies, like Amazon, eBay and many others.

Those same benefits—reduced complexity and confusion, and increased efficiency and productivity—are clearly in the interest of businesses, as well. But the basic nature of enterprise IT is usually at odds with reliance on or adherence to single companies or platforms. Instead, organizations tend to engage specific vendors to support specific workloads, applications and business processes.

That can be further complicated by leadership changes. For example, new CTO or IT decision makers who prefer or are more familiar with specific vendors and platforms often choose new solutions and tools to replace or run alongside legacy systems and applications. That is further exacerbated by the general longevity of business computing hardware, which is why many enterprise IT infrastructures are hodgepodges of heterogeneous hardware and software.

Let’s add two other issues to the enterprise IT headache heap. First and foremost, all those systems and applications need to be able to successfully access and use organizations’ stored information resources, and to consistently support the creation, acquisition and management of new data. Second, those same on-premises systems, applications and data assets need to be consistently supported and managed across off-premises cloud platforms.

In other words, without the vital benefits that consistent experience, results and expectations provide, enterprise IT can find itself on a fast track to frustration and failure.

Also see: Why Cloud Means Cloud Native

Red Hat and IBM’s storage plan

How does the transfer of Red Hat’s storage assets and teams to IBM address this? First, it is important to consider the work that both have put into taming heterogeneous storage complexity. In IBM’s case, the company’s IBM Spectrum Storage Suite has been designed to support both IBM’s homegrown storage systems and scores of solutions from third party vendors.

For example, IBM Spectrum Control and IBM Storage Insights are designed to effectively monitor, analyze and manage complex enterprise storage environments. In addition, IBM Spectrum Virtualize focuses on block storage management and IBM Spectrum Scale can be used to manage unstructured data storage.

Finally, IBM Spectrum Fusion is a container-native file storage platform designed for Kubernetes applications running on Red Hat’s OpenShift Container Platform (OCP). All can be used with select offerings from Dell EMC, Hitachi Data Systems (HDS), Huawei, HP/3PAR, Lenovo, NetApp and Pure Storage.

Red Hat’s Ceph Storage is a highly scalable open-source software-defined storage solution designed to address enterprises’ block, file and object storage needs. It is deeply integrated with Red Hat’s OpenStack Platform and is at the center of the OpenShift Data Foundation (ODF).

Many enterprises are running Red Hat Rook as the Ceph operator in Kubernetes clusters. However, Ceph can run securely anywhere that OpenShift runs—on-premises and in the cloud—and is designed to help enterprises simplify operations and speed application developers’ time to market.

According to IBM, it will integrate the storage technologies from Red Hat ODF as the foundation for IBM Spectrum Fusion, thus combining the companies’ container technologies. In addition, IBM intends to offer new Ceph solutions to deliver a unified, software-defined storage platform that bridges the architectural divide between data centers and cloud providers.

As Denis Kenneally, GM of IBM Storage noted in a blog post about the announcement, “Today’s news means faster hybrid, multi-cloud deployments, with greater simplicity and expanded platform support backed by IBM’s global sales and lifecycle services. IBM will continue Red Hat’s commitment to existing customers and the open-source community, and we are accelerating our roadmap with new products and services to be announced in the coming months.”

Also see: Top Digital Transformation Companies

Final analysis

So what are the essential takeaways from this announcement? First and most practically, the combination of IBM and Red Hat’s storage assets and teams will support both companies’ existing solutions and initiatives. They should also result in a host of new storage offerings and services their customers can use to consistently manage and monitor their data resources. This is true no matter where they reside—on premises, off premises and in hybrid and multi-cloud environments.

Just as importantly, the announcement speaks to IBM’s continuing efforts to develop innovative heterogeneous storage solutions and to its ongoing commitment to support open-source projects and technologies. It also underscores the value of IBM’s acquisition of Red Hat, and the benefits that have accrued from that deal.

Overall, the combination of IBM and Red Hat’s storage assets and teams should benefit both organizations and their enterprise customers. It will also likely interest other large businesses that are struggling to capture consistent performance and benefits from their data storage investments.

Also see: Best Machine Learning Platforms 

Wed, 12 Oct 2022 06:04:00 -0500 en-US text/html https://www.eweek.com/cloud/red-hat-transfers-storage-portfolio-and-teams-to-ibm/
Killexams : Application Management Services Market Recovery and Impact Analysis Report Accenture, IBM, Infosys

New Jersey, United States, Oct. 10, 2022 /DigitalJournal/ The Application Management Services (AMS) Market research report provides all the information related to the industry. It gives the markets outlook by giving authentic data to its client which helps to make essential decisions. It gives an overview of the market which includes its definition, applications and developments, and manufacturing technology. This Application Management Services (AMS) market research report tracks all the recent developments and innovations in the market. It gives the data regarding the obstacles while establishing the business and guides to overcome the upcoming challenges and obstacles.

Application management services include outsourcing your application support to an external provider specializing in monitoring and maintaining application delivery. Outsourcing your companys IT tasks that are a top priority can free up internal resources and help keep things running smoothly. An increase in the use of BOYD (bring your device) in enterprises, strong demand for mobile applications, and robust mobile application management services are the major factors driving the growth of the global application management services market. Additionally, an expansion in the use of cloud computing and enterprises seeking to derive value from cloud, analytics, social computing, and cognitive computing technologies is fueling the growth of the global market.

Get the PDF sample Copy (Including FULL TOC, Graphs, and Tables) of this report @:

https://a2zmarketresearch.com/sample-request

Competitive landscape:

This Application Management Services (AMS) research report throws light on the major market players thriving in the market; it tracks their business strategies, financial status, and upcoming products.

Some of the Top companies Influencing this Market include:Accenture, IBM, Infosys, TCS, Atos Origin, Bourntec Solutions, Capgemini, Cognizant, CSC, Deloitte, Fujitsu, HP, Iblesoft, Ingenuity Technologies, L&T Infotech, Logica, Tech Mahindra, NTT Data, Wipro, Xerox,

Market Scenario:

Firstly, this Application Management Services (AMS) research report introduces the market by providing an overview that includes definitions, applications, product launches, developments, challenges, and regions. The market is forecasted to reveal strong development by driven consumption in various markets. An analysis of the current market designs and other basic characteristics is provided in the Application Management Services (AMS) report.

Regional Coverage:

The region-wise coverage of the market is mentioned in the report, mainly focusing on the regions:

  • North America
  • South America
  • Asia and Pacific region
  • Middle East and Africa
  • Europe

Segmentation Analysis of the market

The market is segmented based on the type, product, end users, raw materials, etc. the segmentation helps to deliver a precise explanation of the market

Market Segmentation: By Type

Discrete AMS, Embedded AMS,

Market Segmentation: By Application

BFSI, Telecom and IT, Retail and eCommerce, Healthcare and Lifesciences, Manufacturing, Energy and Utilities, Others

For Any Query or Customization: https://a2zmarketresearch.com/ask-for-customization

An assessment of the market attractiveness about the competition that new players and products are likely to present to older ones has been provided in the publication. The research report also mentions the innovations, new developments, marketing strategies, branding techniques, and products of the key participants in the global Application Management Services (AMS) market. To present a clear vision of the market the competitive landscape has been thoroughly analyzed utilizing the value chain analysis. The opportunities and threats present in the future for the key market players have also been emphasized in the publication.

This report aims to provide:

  • A qualitative and quantitative analysis of the current trends, dynamics, and estimations from 2022 to 2029.
  • The analysis tools such as SWOT analysis and Porter’s five force analysis are utilized, which explain the potency of the buyers and suppliers to make profit-oriented decisions and strengthen their business.
  • The in-depth market segmentation analysis helps identify the prevailing market opportunities.
  • In the end, this Application Management Services (AMS) report helps to save you time and money by delivering unbiased information under one roof.

Table of Contents

Global Application Management Services (AMS) Market Research Report 2022 – 2029

Chapter 1 Application Management Services (AMS) Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Application Management Services (AMS) Market Forecast

Buy Exclusive Report @: https://www.a2zmarketresearch.com/checkout

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

[email protected]

+1 775 237 4157

Mon, 10 Oct 2022 01:44:00 -0500 A2Z Market Research en-US text/html https://www.digitaljournal.com/pr/application-management-services-market-recovery-and-impact-analysis-report-accenture-ibm-infosys
Killexams : IBM Redefines Hybrid Cloud Application and Data Storage Adding Red Hat Storage to IBM Offerings

The MarketWatch News Department was not involved in the creation of this content.

IBM Redefines Hybrid Cloud Application and Data Storage Adding Red Hat Storage to IBM Offerings

ARMONK, N.Y., Oct. 4, 2022

Newly expanded software-defined storage portfolio enables IBM to deliver a consistent experience from edge-to-core-to-cloud

ARMONK, N.Y., Oct. 4, 2022 /PRNewswire/ -- IBM (NYSE: IBM) announced today it will add Red Hat storage products and Red Hat associate teams to the IBM Storage business unit, bringing consistent application and data storage across on-premises infrastructure and cloud.

With the move, IBM will integrate the storage technologies from Red Hat OpenShift Data Foundation (ODF) as the foundation for IBM Spectrum Fusion. This combines IBM and Red Hat's container storage technologies for data services and helps accelerate IBM's capabilities in the burgeoning Kubernetes platform market.

In addition, IBM intends to offer new Ceph solutions delivering a unified and software defined storage platform that bridges the architectural divide between the data center and cloud providers. This further advances IBM's leadership in the software defined storage and Kubernetes platform markets.

According to Gartner, by 2025, 60% of infrastructure and operations (I&O) leaders will implement at least one of the hybrid cloud storage architectures, which is a significant increase from 20% in 2022.1 IBM's software defined storage strategy is to take a "born in the cloud, for the cloud" approach--unlocking bi-directional application and data mobility based on a shared, secure, and cloud-scale software defined storage foundation.

"Red Hat and IBM have been working closely for many years, and today's announcement enhances our partnership and streamlines our portfolios," said Denis Kennelly, general manager of IBM Storage, IBM Systems. "By bringing together the teams and integrating our products under one roof, we are accelerating the IBM's hybrid cloud storage strategy while maintaining commitments to Red Hat customers and the open-source community."

"Red Hat and IBM have a shared belief in the mission of hybrid cloud-native storage and its potential to help customers transform their applications and data," said Joe Fernandes, vice president of hybrid platforms, Red Hat. "With IBM Storage taking stewardship of Red Hat Ceph Storage and OpenShift Data Foundation, IBM will help accelerate open-source storage innovation and expand the market opportunity beyond what each of us could deliver on our own. We believe this is a clear win for customers who can gain a more comprehensive platform with new hybrid cloud-native storage capabilities."

As customers formulate their hybrid cloud strategies, critical to success is the emphasis and importance of infrastructure consistency, application agility, IT management and flexible consumption consistency as deciding factors to bridge across on-premises and cloud deployments.

With these changes to the IBM portfolio, clients will have access to a consistent set of storage services while preserving data resilience, security, and governance across bare metal, virtualized and containerized environments. Some of the many benefits of the software defined portfolio available from IBM will include:

  • A unified storage experience for all containerized apps running on Red Hat OpenShift: Customers can use IBM Spectrum Fusion (now with Red Hat OpenShift Data Foundation) to achieve the highest levels of performance, scale, automation, data protection, and data security for production applications running on OpenShift that require block, file, and/or object access to data. This enables development teams to focus on the apps, not the ops, with infrastructure-as-code designed for simplified, automated managing and provisioning.
  • A consistent hybrid cloud experience at enterprise levels of scale and resiliency with IBM Ceph: Customers can deliver their private and hybrid cloud architectures on IBM's unified and software defined storage solution, providing capacity and management features. Capabilities include data protection, disaster recovery, high availability, security, auto-scaling, and self-healing portability, that are not tied to hardware, and travel with the data as it moves between on-premises and cloud environments.
  • A single data lakehouse to aggregate and derive intelligence from unstructured data on IBM Spectrum Scale: Customers can address the challenges that often come with quickly scaling a centralized data approach with a single platform to support data-intensive workloads such as AI/ML, high performance computing, and others. Benefits can include less time and effort to administer, reduced data movement and redundancy, direct access to data for analytics tools, advanced schema management and data governance, all supported by distributed file and object storage engineered to be cost effective.
  • Build in the cloud, deploy on-premises with automation: Customers can move developed applications from the cloud to on-premises services, automate the creation of staging environments to test deployment procedures, validate configuration changes, database schema and data updates, and ready package updates to overcome obstacles in production or correct errors before they become a problem that affects business operations.

"IBM and Red Hat speaking with one voice on storage is delivering the synergies derived from IBM's Red Hat acquisition," said Ashish Nadkarni, group vice president and general manager, Infrastructure Systems at IDC. "The combining of the two storage teams is a win for IT organizations as it brings together the best that both offer: An industry-leading storage systems portfolio meets an industry-leading software-defined data services offering. This initiative enables IBM and Red Hat to streamline their family of offerings, passing the benefits to their customers. It also helps accelerate innovation in storage to solve the data challenges for hybrid cloud, all while maintaining their commitment to open source."

Preserving commitment to Red Hat clients and the community

Under the agreement between IBM and Red Hat, IBM will assume Premier Sponsorship of the Ceph Foundation, whose members collaborate to drive innovation, development, marketing, and community events for the Ceph open-source project. IBM Ceph and Red Hat OpenShift Data Foundation will remain 100% open source and will continue to follow an upstream-first model, reinforcing IBM's commitment to these vital communities. Participation by the Ceph leadership team and other aspects of the open-source project is a key IBM priority to maintain and nurture ongoing Red Hat innovation.

Red Hat and IBM intend to complete the transition by January 1, 2023, which will involve the transfer of storage roadmaps and Red Hat associates to the IBM Storage business unit. Following this date, Red Hat OpenShift Platform Plus will continue to include OpenShift Data Foundation, sold by Red Hat and its partners. Additionally, Red Hat OpenStack customers will still be able to buy Red Hat Ceph Storage from Red Hat and its partners. Red Hat OpenShift and Red Hat OpenStack customers with existing subscriptions will be able to maintain and grow their storage footprints as needed, with no change in their Red Hat relationship.

Forthcoming IBM Ceph and IBM Spectrum Fusion storage solutions based on Ceph are expected to ship beginning in the first half of 2023.

Read more about today's news in this blog from Denis Kennelly, general manager of IBM Storage, IBM Systems: "IBM + Red Hat: Doubling Down on Hybrid Cloud Storage"

Statements regarding IBM's future direction and intent are subject to change or withdrawal without notice and represent goals and objectives only. Red Hat, Ceph, Gluster and OpenShift are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries.

About IBM
IBM is a leading global hybrid cloud and AI, and business services provider, helping clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries.�?�Nearly 3,800 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM's hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently, and securely.�?�IBM's breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients.�?�All of this is backed by IBM's legendary commitment to trust, transparency, responsibility, inclusivity, and service. For more information, visit�?�www.ibm.com for more information.

Media Contacts:
Ben Stricker, IBM
ben.stricker@ibm.com

1 Gartner, Market Guide for Hybrid Cloud Storage, Julia Palmer, Kevin Ji, Chandra Mukhyala, 3 October 2022

View original content to obtain multimedia:https://www.prnewswire.com/news-releases/ibm-redefines-hybrid-cloud-application-and-data-storage-adding-red-hat-storage-to-ibm-offerings-301640078.html

SOURCE IBM

COMTEX_415899106/2454/2022-10-04T09:01:20

Is there a problem with this press release? Contact the source provider Comtex at editorial@comtex.com. You can also contact MarketWatch Customer Service via our Customer Center.

Copyright (C) 2022 PR Newswire. All rights reserved

The MarketWatch News Department was not involved in the creation of this content.

Tue, 04 Oct 2022 01:01:00 -0500 en-US text/html https://www.marketwatch.com/press-release/ibm-redefines-hybrid-cloud-application-and-data-storage-adding-red-hat-storage-to-ibm-offerings-2022-10-04-9183120
Killexams : Federal Circuit Hands Zillow a Win, Ruling IBM Map Display Patents Cover Abstract Ideas

“Using a computer to ‘concurrently update’ the map and the list may speed up the process, but ‘mere automation of manual processes using generic computers does not constitute a patentable improvement in computer technology.’” – Federal Circuit

The U.S. Court of Appeals for the Federal Circuit (CAFC) today issued a precedential decision finding that two IBM patents directed to technology that allows users to select and view results on a map were directed to ineligible subject matter under 35 U.S.C. § 101. IBM had sued Zillow, alleging that several of the services offered on Zillow’s website and mobile applications infringed the claims. But the district court granted Zillow’s motion for judgment on the pleadings, finding the claims were directed to abstract ideas and lacked any inventive concept.

The opinion was authored by Judge Hughes. Judge Stoll dissented in part, explaining that claims 9 and 13 of IBM’s U.S. Patent No. 7,187,389 were plausibly patent eligible and should not have been found ineligible at the pleadings stage.

U.S. Patent No. 9,158,789 covers a method for “coordinated geospatial, list-based and filter-based selection.” The ‘389 patent is directed to “methods of displaying layered data on a spatially oriented display (like a map), based on nonspatial display attributes (like visual characteristics—color hues, line patterns, shapes, etc.),” according to the CAFC opinion. The layering feature of the ’389 patent is illustrated in the image below.

Federal Circuit

‘789 Patent

In its analysis of the district court’s decision, the CAFC majority agreed at Alice step one that the ‘789 patent is “directed to the abstract idea of responding to a user’s selection of a portion of a displayed map by simultaneously updating the map and a co-displayed list of items on the map.” Since this can be done in the physical realm by hand using a paper map, the district court concluded that the claims merely contemplate the automation of an existing practice using a computer. Specifically, the district court reasoned that the task “could be performed by hand, using a printed map and related list of items on the map, a transparent overlay, a wet-erase marker, a blank sheet of opaque paper, and a knife or scissors.”

The CAFC further explained that “[t]he claims are directed to limiting and coordinating the display of information based on a user selection.” While IBM argued that the claims make “specific asserted improvement[s] in computer capabilities,” specifically, “an improved [graphical user interface] for displaying, filtering, and interacting with geospatial data on a map and list display” and that the patent “improves ‘the ability of users to identify and analyze relevant data in otherwise large data sets,’” the CAFC said this does not satisfy step one:

“Identifying, analyzing, and presenting certain data to a user is not an improvement specific to computing….. We have repeatedly held claims ‘directed to collection of information, comprehending the meaning of that collected information, and indication of the results, all on a generic computer network operating in its normal, expected manner’ to be abstract. In re Killian, 45 F.4th 1373, 1380 (Fed. Cir. 2022); see also Intell. Ventures I LLC v. Cap. One Fin. Corp., 850 F.3d 1332, 1340 (Fed. Cir. 2017) (describing cases). The claims here recite similarly abstract steps: presenting a map, having a user select a portion of that map, and then synchronizing the map and its corresponding list to display a more limited data set to the user. Using a computer to ‘concurrently update’ the map and the list may speed up the process, but “mere automation of manual processes using generic computers does not constitute a patentable improvement in computer technology.”

The CAFC further agreed that the patent is “result-oriented,” and written in “result-based functional language” that “does not sufficiently describe how to achieve these results in a non-abstract way” under Two-Way Media Ltd. v. Comcast Cable Commc’ns, LLC, 874 F.3d 1329, 1337 (Fed. Cir. 2017).

At Alice step two, the majority dismissed IBM’s argument that under Aatrix Software Inc., v. Green Shades Software, Inc. “if there are allegations that the features of a patent are inventive, the District Court must accept that on a Rule 12 motion and cannot weigh the evidence or make credibility determinations.” The CAFC explained that “only ‘plausible and specific factual allegations that aspects of the claims are inventive are sufficient,’” and that the court’s own precedent in Cellspin Soft, Inc. v. Fitbit, Inc. reiterates that “we do not read Aatrix to say that any allegation about inventiveness, wholly divorced from the claims or the specification, defeats a motion to dismiss.” IBM’s arguments for the claims’ inventiveness failed because the relevant limitations “use functional language, at a high level of generality and divorced from any computer technology, to recite the claimed functions. The limitations simply describe the abstract method without providing more.”

‘389 Patent

As to the ‘389 patent, the CAFC again agreed with the district court that the patent “is directed to the abstract ideas of categorizing and displaying information, as well as altering the manner of display upon user demand.” IBM said the district court was oversimplifying the patent by “drawing inaccurate analogies to manual methods,” but the CAFC, citing Interval Licensing LLC v. AOL, Inc. said that “the collection, organization, and display of two sets of information on a generic display device is abstract absent a ‘specific improvement to the way computers [or other technologies] operate.’” Since all the ‘389 patent claims do is organize visual results into layers and then present the layers on a screen, even if the claims speed up the process by using a computer, “they do not recite an improvement in any computing technology,” said the CAFC. IBM also attempted to liken its invention to the one at issue in Core Wireless Licensing S.A.R.L. v. LG Electronics, Inc., which was held patentable, but the CAFC said IBM’s representative claim 1 of the ‘389 patent “is much broader than the asserted claims in Core Wireless” and, unlike the Core Wireless claims, was not “limited to computer screens or any device at all.” Ultimately, said the majority, the method recited “has long been done by cartographers creating paper maps” and the solution of layering “could be accomplished using colored pencils and translucent paper, as the district court noted.”

At Alice step two, the CAFC Again found no inventive concept, rejecting IBM’s argument that “in the computer context, ‘dynamically altering visual characteristics to Boost salience and reduce the effect of a cluttered screen’ is inventive.” The court explained:

“[T]hat dynamic relayering or rematching could also be performed by hand, though more slowly—one would have to shuffle paper layers or erase and redraw objects on new layers, but it could be done. Any of the patent’s improved efficiency comes not from an improvement in the computer but from applying the claimed abstract idea to a computer display.”  

 Judge Stoll agreed with the majority’s finding that the ’789 patent claims and several of the ’389 patent claims were ineligible under 35 U.S.C. § 101 and judgment on the pleadings was proper but dissented as to claims 9 and 13 of the ‘389 patent, which are directed to the same subject matter – a “layered data display tool.” Stoll said that there were plausible factual allegations made in IBM’s second amended complaint as to the eligibility of these claims and that the district court committed legal error in holding them patent ineligible and the majority held the claims “at too high a level of abstraction.”

Mon, 17 Oct 2022 07:15:00 -0500 en text/html https://www.ipwatchdog.com/2022/10/17/federal-circuit-hands-zillow-win-ruling-ibm-map-display-patents-cover-abstract-ideas/id=152195/
Killexams : Juniper Research: Security Information & Event Management Spend to Exceed $6.4 Billion by 2027 Globally, as IBM, Rapid7 & Splunk Lead the Market

BASINGSTOKE, England, October 17, 2022--(BUSINESS WIRE)--A new study from Juniper Research has found that the total business spend on SIEM (Security Identity & Event Management) will exceed $6.4 billion globally by 2027, from just over $4.4 billion in 2022. It predicts that this growth of 45% will be driven by the transition from term licence (where businesses can use SIEM for specific licence lengths) to more flexible SaaS (Software-as-a-Service) models (where SIEM solutions are purchased via monthly subscription). This will enable small businesses to access previously unaffordable services.

A SIEM system is a combination of SIM (Security Information Management) & SEM (Security Event Management), which results in real-time automated analysis of security alerts generated by applications and network hardware; leading to improved corporate cybersecurity.

IBM Tops Juniper Research Competitor Leaderboard

The research identified the world’s leading SIEM providers by evaluating their offerings, and the key factors that have led to their respective success, such as the breadth and depth of their platforms.

The top 3 vendors are:

  1. IBM

  2. Rapid7

  3. Splunk

Research co-author Nick Maynard explained further: "Juniper Research has ranked IBM as leading in the global SIEM market, based on its highly successful analytics platform and its ease of integration. SIEM vendors aiming to compete must design scalable solutions that are accessible to smaller businesses, which can provide easy-to-understand, actionable insights for less experienced cybersecurity teams."

Transition to SaaS Accelerating Rapidly

Additionally, the research found that SaaS business models within SIEM are gaining traction; accounting for almost 73% of global business spend on SIEM in 2027, from only 37% in 2022. This significant increase represents an opportunity for newer vendors to break into the market with appealing SaaS-based models, but SIEM vendors must be careful not to leave larger enterprises, which still prefer term licences, behind.

View the SIEM market research: https://www.juniperresearch.com/researchstore/key-vertical-markets/security-information-event-research-report

Download the whitepaper: https://www.juniperresearch.com/whitepapers/why-siem-is-critical-to-cybersecurity-processes

Juniper Research provides research and analytical services to the global hi-tech communications sector; providing consultancy, analyst reports, and industry commentary.

View source version on businesswire.com: https://www.businesswire.com/news/home/20221016005001/en/

Contacts

Sam Smith, Press Relations
T: +44(0)1256 830002
E: sam.smith@juniperresearch.com

Sun, 16 Oct 2022 18:00:00 -0500 en-US text/html https://www.yahoo.com/now/juniper-research-security-information-event-060000938.html
Killexams : IBM subsidiary Red Hat names new chief operating officer No result found, try new keyword!Red Hat Inc. has named Carolyn Nash senior vice president and chief operating officer. Nash most recently served as the IBM software subsidiary’s senior vice president and chief financial officer and ... Wed, 12 Oct 2022 03:01:00 -0500 text/html https://www.bizjournals.com/bizwomen/news/latest-news/2022/10/ibm-subsidiary-red-hat-names-new-chief-operating.html Killexams : IBM: The Most Innovative and Prizewinning Tech Company

Founded in 1911 as a Computing-Tabulating-Recording Company, International Business Machines (IBM) needs to keep its finger on the pulse of the development of information technology not to be ousted by younger tech giants like Google, Microsoft, Apple, and Amazon. With the advent of the internet, IBM needed to widen the spectrum of its products and services to retain its strong position in the tech field. Although the company lost its dominance, having only a 5% market share in 2021, as opposed to 68% shared by Microsoft, Amazon, and Google, it has many spectacular achievements to its credit. IBM holds more patents than any other technology company and takes pride in employees who have earned five Nobel Prizes, four Turing Awards, five National Medals of Technology, and five National Medals of Science. And it had been the top tech company for longer than any of the titans dominating the market now. 

Also called “Big Blue,” IBM indeed has an impressive pedigree. After starting to produce hardware at the beginning of the last century, it thrived in this business for decades and became the leading supplier of mainframe computers worldwide. IBM’s gross income had inexorably grown in the last part of the twentieth century, expanding from $14.450 billion earned in 1975 to $71.940 billion made in 1995. The company’s revenue skyrocketed to the record level of $106.9 billion in 2011, after which it has steadily been declining amidst its transition into new technologies and lines of business. To move with the times and survive the competition from other tech titans, IBM gradually shifted its focus from hardware to software and services. It began to devote more energy and money to cloud-based services and cognitive computing. IBM focuses now on offering primarily network services, application services, cloud services, digital workplace services, business processes and operations, technology consulting services, and AI services. IBM Watson, a cognitive system capable of answering questions posed in natural language, has become the company’s high-visibility offering in the technology field. IBM has a strong faith in Watson, promoting the system as a benevolent digital assistant that would help hospitals, offices, factories, and farms. The company’s white paper referred to Watson as “the future of knowing.”

To see how well IBM has prepared for, what it calls, the new age of understanding, study the statistical data presented below.

Sources: IBM, Wikipedia

 IBM’s Outstanding Achievements

  • In 1891, IBM, then called CTR, invented the computing scale that could show both the weight and the proportionate price of the product simultaneously.
  • In 1888, the company invented the Time Clock, a device that records start and end times for hourly employees. Then, it designed the punch card base data processing machines. IBM is also responsible for inventing the magnetic stripe technology and the Universal Product Code.
  • IBM designed and developed the first smartphone in the world, launching it in November 1992. Designed by IBM and manufactured by Mitsubishi Electric, the device had a touchscreen, a calculator app, email capability, 2 MB RAM, and 2 MB internal storage. There were about 50,000 of these smartphones sold for $899 a unit.
  • IBM also revolutionized the computer industry, inventing DRAM, floppy disk, SQL programming language, ATMs, and hard disk drives.
  • IBM also invented the first personal computer, known as the IBM PC. It was launched in August 1981 and acquired by many companies before PCs were commercialized.
  • Since 1920, IBM has received 151,302 US patents. In 2019, the company received a staggering amount of 9,262 US patents. A year later, IBM beat the record of most US patents received by a business for 27 consecutive years. In 2021, IBM had 1,811 patents granted, while this year it has so far received 492 patents.
  • IBM has long worked with NASA. Although IBM contributed to many missions, the most memorable is landing on the Moon in 1969. IBM’s responsibility was to develop the software and various programs, build computers, and streamline the mission for NASA.
  • One of the fascinating inventions of IBM is the Scanning Tunnelling Microscope developed in 1981 for imaging at the atomic level. Gerd Binnig and Heinrich Rohrer received the Noble Prize in Physics in 1986 for the invention. 
  • IBM developed several chess computers, the most popular of which is Deep Blue. In 1996, Deep Blue beat the chess world champion, Garry Kasparov, who accused IBM of cheating. IBM declined Kasparov’s offer of a rematch. 
  • IBM invented the ASME (The Anatomic and Symbolic Mapper Engine) that offers a 3D interactive avatar of the human body to doctors in real-time, helping them visualize patients’ medical records.
  • Big Blue made LASIK eye surgery mainstream.
  • The company invented the IBM 2990 Blood Cell Separator, designed to harvest white blood cells from blood donors to support patients with leukemia. Later, IBM engineers improved the device, introducing its more sophisticated version, IBM 2997.
  • IBM offers the IBM LinuxONE for cloud computing solutions. This powerful computer system can manage the work of 1000×86 servers simultaneously on a single platform.  

IBM Statistics in 2022

  • Over 90% of credit card transactions are processed by IBM mainframes.
  • About 80% of global retailers use IBM retail solutions in their stores and for online sales.
  • Over 80% of travel reservations are processed through an IBM product.
  • Nearly 97% of banks worldwide use IBM products.
  • There are 245,000 IBM employees worldwide in 2022.
  • IBM employees live in 170 countries.
  • There are 130,000 IBM employees in India.
  • 3,000 researchers are working in IBM’s fifteen laboratories around the world.
  • During the pandemic, between 2020 and 2021, IBM reduced the number of its employees by around 0.24%.
  • Over 29% of IBM managers are women.
  • There are an average of 108 applications per available job position at the company. 
  • Every day, IBM handles 70 billion security events.
  • Every second, it manages 8.18 million security events.
  • Over 27.3 million people use the IBM website every month.
  • The IBM website has a bounce rate of 52.66%.
  • In 2020, IBM’s earnings hit about $73 billion.
  • In 2021, its global revenue diminished by 22%.
  • Almost half of IBM’s revenue is generated in the North American market.
  • IBM bought Red Hat for $33.4 billion.
  • Cognos was purchased by IBM for $4.9 billion in 2008.
  • Big Blue acquired SoftLayer Technologies in 2013 reportedly for $2 billion.
  • To date, IBM has acquired more than 183 companies.

Facts about IBM’s Incumbent CEO, Arvind Krishna

  • Arvind Krishna became IBM’s CEO in 2020, arriving with the mission to reverse the company’s decline. He is expected to create a new line of business that would rediscover IBM’s former glory.
  • Before becoming the company’s CEO, Krishna worked as the Senior Vice President for IBM’s cloud and cognitive software. He developed IBM’s security software business.
  • Krishna was the general manager of IBM Systems and Technology Group’s development and manufacturing organization. He also managed IBM’s acquisition of Red Hat and supervised its synergy with IBM.
  • Krishna is the co-author of 15 patents and has been the editor of IEEE and ACM journals. He has received distinguished alumni awards from IITK and the University of Illinois, where he completed his PhD. His scholarly articles appear in numerous journals.
  • Krishna leads the IBM business unit that provides the cloud and data platform. His responsibilities include IBM Research, IBM Cloud, and IBM’s security and Cognitive Application business.
  • Krishna guides IBM’s overall strategy in core and emerging technologies including AI, quantum computing, blockchain, cloud platform services, data-driven solutions, and nanotechnology.
  • IBM Chairman and CEO Arvind Krishna was paid $17.5 million for 2021, up from $17 million paid in the year before, according to IBM’s 2022 Notice of Annual General Meeting and Proxy Statement.
  • In 2021, IBM’s board approved an annual incentive payment of $2.9 million to Krishna for the 2021 performance, which was 98% of the target.
  • The estimated net worth of Arvind Krishna was about $27.4 million in June 2022. He also owns over 21,803 units of International Business Machines stock worth over $23,629,581.

Source: Fortune

IBM’s Annual Revenue since 2000

Once an unparalleled tech giant, IBM has been struggling for the last decade. It had to adjust to the changing world by selling its low-margin businesses and investing in high-margin ones. To implement its strategies, Big Blue sold IBM WebSphere Commerce to HCL Technologies in 2018 and a part of the Watson Health business at the beginning of this year. Although IBM’s earnings are still high, they do not reach the levels hit between 2006 and 2012. The company’s annual revenue skyrocketed to $106.9 billion in 2011, whereas it was only $57 billion last year. In the second quarter of 2022, IBM’s earnings dropped below expectations. IBM’s falling fortune is reflected in the table below:

IBM’s Annual Revenue since 2000 (in $US Billion)

Year Annual Revenue (in $US Billion)
2000 $88.4
2001 $83.07
2002 $81.19
2003 $89.13
2004 $96.29
2005 $91.13
2006 $91.42
2007 $98.79
2008 $103.63
2009 $95.76
2010 $99.87
2011 $106.92
2012 $104.51
2013 $99.75
2014 $92.8
2015 $81.74
2016 $79.92
2017 $79.14
2018 $79.59
2019 $57.71
2020 $55.18
2021 $57.35
2022 (Q1; Q2) $14.2 billion; $15.5 billion

Source: Statista; IBM

IBM’s Annual Revenue by Segment for 2020-2021

Big Blue has repeatedly changed the segment reporting to reflect its move away from being hardware, software, and service company towards becoming a cognitive solutions and cloud platform company. It changed its segment reporting in 2016, 2019, and 2021. The last change was dictated by IBM’s need to align its segment reporting with its platform-centric approach to hybrid cloud and AI. There are presently six segments in IBM’s business: Technology Services and Cloud Platforms, Infrastructure, Software, Consulting, Financing, and Other. In 2021, IBM’s software segment generated $24.14 billion of its global revenue of $57.35 billion. In 2022 so far, the Software division earned $5.77 billion and $6.2 billion, in the first and second quarters, respectively. The Consulting sector brought the company $4.83 billion in Q1 and $4.8 billion in Q2 of the current year. The revenue earned by the Infrastructure segment amounted to $3.22 billion in the first quarter and $4.0 billion in the second quarter. Revenues generated by IBM’s segments in the last two years are shown in the table below:

IBM’s Annual Revenue by Segment for 2020-2021 (in $US billion)

Segment 2020 2021
Software $22.93 $24.14
Consulting $16.26 $17.84
Infrastructure $14.53 $14.19
Financing $0.98 $0.77
Technology Services and Cloud $25.00 $28.00
Other  $0.49 $0.41

Source: Statista

Worldwide Market Share of Cloud Infrastructure Providers in Q2 2022

In the second quarter of 2022, IBM’s Cloud Infrastructure had only a 4% share of the worldwide market, lagging behind Amazon, Azure, and Google Cloud. The spending on global cloud infrastructure services soared to $55 billion and thus brought the industry’s total for the twelve months to more than $203.5 billion. Outshining IBM, Amazon and Microsoft together accounted for more than half of cloud infrastructure revenues in the three months that ended on June 30.

These figures show how much Big Blue fell from grace because, in the past, it used to enjoy the leading position. In 2017, IBM reported cloud revenue growth of 33% year-over-year in its first quarter earnings. In that quarter, its cloud revenue jumped to $3.5 billion. IBM’s total cloud revenue over the past 12 months that year hit $41.6 billion and catapulted IBM to the top of the list in the field of enterprise cloud.  In the first quarter of 2017, today’s winners were obliged only to trail behind with lower earnings: Microsoft with $14 billion, Amazon with $12.20 billion, and Google with $10 billion. The latest market share of the main providers of cloud infrastructure can be seen in the table below:

Worldwide Market Share of Cloud Infrastructure Providers in Q2 2022

Company Market Share
AWS 34%
Azure 21%
Google Cloud 10%
Alibaba Cloud 5%
IBM Cloud 4%
Salesforce 3%
Tencent Cloud 3%
Oracle Cloud 2%

Sources: Statista, IBM

IBM’s Annual Net Income since 2009

Net income is defined as a company’s net profit or loss after it has accounted for all its revenues, income items, and expenses. IBM’s net income for the quarter ending on June 30, 2022, was $1.292 billion, which constituted a 5.06% jump year-over-year. The company’s net profit for the 12 months ending on June 30, 2022, was $5.588 billion, demonstrating an increase of 4.76% year-over-year. Last year, IBM’s annual net income reached $5.743 billion, a 2.74% surge from 2020. The first year of the pandemic brought IBM a net income of $5.59 billion, which was a whopping 40.73% drop from 2019. In 2019, IBM’s annual net profit was $9.431 billion, an 8.05% advance from 2018. The uneven trajectory of IBM’s annual net income is drawn in the table below:

IBM’s Annual Net Income since 2009 (in $US Billion)

Year Net Income in $US Billion
2009 $13.425
2010 $14.833
2011 $15.855
2012 $16.604
2013 $16.483
2014 $12.022
2015 $13.190
2016 $11.872
2017 $5.753
2018 $8.728
2019 $9.431
2020 -$5.590
2021 $5.743

IBM’s Number of Employees Worldwide from 2000 to 2022

IBM is the fifth largest employer in the United States. In 2021, the company employed 282,000 people worldwide. This year, the number of people working for Big Blue dipped to 245,000. As the company has lately been struggling, experiencing drops in its revenues, it is trying to restructure its business and be on par with such tech giants as Amazon, Microsoft, Google, and Apple. Hence the decline in the number of its employees this year. The table below shows how the number of IBM’s employees has changed over the years:

IBM’s Number of Employees Worldwide from 2000 to 2022 (in 1,000s) 

Year Number of Employees (in 1,000s)
2000 316.3
2001 319.88
2002 315.89
2003 319.27
2004 329
2005 329.37
2006 355.77
2007 386.56
2008 398.46
2009 399.41
2010 426.75
2011 433.36
2012 434.25
2013 431.21
2014 379.59
2015 377.76
2016 380.3
2017 366.6
2018 350.6
2019 352.6
2020 345.9
2021 282.1
2022 245

Source: Statista

Conclusion

As the world is facing a probable recession, analysts believe that the enterprise tech sector will still continue going strong. People who are tech-savvy will turn to IBM in these unpleasant times to help them survive in a tighter economic environment and use the company’s software, consulting, and infrastructure to work productively during an economic decline. Big Blue can definitely provide the products and services people will need in the near future. IBM’s Q2 2022 results signify that technology spending in such spheres as AI, cloud, automation and networking is steady. The company beat anticipated results in the second quarter and boasted its first double-digit quarterly revenue growth in more than a decade. Automatic calculations conducted at Coinpriceforecast.com inspire faith in the company’s future and the cost of its stock. At the beginning of the year, IBM’s stock price was $116.92. At the time of writing, IBM is trading at $118.81, thus demonstrating a 2% jump from January 2022. Coinpriceforecast.com foresees that by Christmas, IBM will surge to $138. In the first half of 2023, the price of the stock might advance to $145 and end the next year at $155, adding 30% to today’s price. Whether or not these predictions prove to be correct, IBM will surely continue pushing technology and innovation forward, as it has spectacularly done since the beginning of the twentieth century.

Mon, 10 Oct 2022 00:38:00 -0500 Daniel Shvartsman en-US text/html https://www.investing.com/academy/statistics/ibm-facts/
Killexams : ForgeRock, Ping, IBM, Okta Top KuppingerCole CIAM Tech Eval

Customer Identity & Access Management (CIAM) , Security Operations

Consumerization of IT Has Brought CIAM Methods, Technologies to Workforce IAM Space
ForgeRock, Ping, IBM, Okta Top KuppingerCole CIAM Tech Eval

Perennial leaders ForgeRock, Ping Identity and IBM, along with a surging Okta, set themselves apart from the pack of CIAM vendors in the latest report by KuppingerCole analysts.

See Also: Building a Secure IoT Deployment Using 5G Wireless WAN

Ping Identity leapfrogged ForgeRock to capture the gold in product leadership, and IBM once again took the bronze. ForgeRock, Ping Identity and IBM maintained the gold, silver and bronze, respectively, in innovation leadership. And in the market leadership category, Microsoft again took gold, Auth0 catapulted from seventh to second place in market leadership due to becoming part of Okta, and SAP fell from second to third since the last report in late 2020, KuppingerCole found.

"The trend toward digitalization of consumer experiences was well underway in the late 2010s, and the COVID pandemic forced more businesses and other organizations to expedite digital transformation," John Tolbert wrote in the 120-page report. "With every iteration of this report, we observe significant acquisitions of CIAM certified by others in the market, and entry into the market of new vendors."

Microsoft, Okta and IBM were the three market share leaders in the broader $13.6 billion identity and access management category last year, while Ping Identity and ForgeRock captured ninth and 10th place, according to IDC. Thoma Bravo has acquired SailPoint and plans to buy Ping and ForgeRock. Should the three companies be combined, it would take the bronze in market share, narrowly edging out IBM.

"Innovation in CIAM drives the wider IAM market," Tolbert wrote. "The 'consumerization of IT' is exemplified by the push to use CIAM methods and technologies for registration, authentication, and authorization in workforce IAM. Features that were considered innovative in the previous edition of this report are going mainstream."

Outside of the top four, here's how KuppingerCole sees the CIAM market:

  • Leader: SAP, LoginRadius, Microsoft, Transmit Security, OneWelcome, WSO2;
  • Challenger: Cisaas, Cloudentity, Optimal IDM, 1Kosmos, Simeio, Synacor, CoffeeBean, Xayone, Nevis Security, NRI, ReachFive, Fusion Auth, DruID.

The latest rankings represent a drop for SAP and WSO2, which fell from third to fifth and eighth to 10th, respectively. Microsoft and OneWelcome leapt from ninth to seventh and 10th to ninth, respectively. LoginRadius held steady in sixth place, while Transmit Security - which raised $543 million last year - is new to the list.

"The CIAM market is growing and there is room for much further expansion, with many vendors offering mature solutions providing standard and deluxe features to support millions of users across every industrial sector," Tolbert wrote. "Some vendors have about every feature one could want in a CIAM product, while others are more specialized, and thus have different kinds of technical capabilities."

How the CIAM Leaders Climbed Their Way to the Top

Company Name Acquisition Amount Date
ForgeRock None N/A N/A
IBM Lighthouse Security Group Not Disclosed August 2014
Okta Auth0 $5.67B May 2021
Ping Identity UnboundID Not Disclosed August 2016

ForgeRock Looks to Thwart Account Takeover Fraud

ForgeRock in April refreshed the user interface around its authentication app to Boost the customer experience, add functionality for facial biometrics, and leverage capabilities from Apple and Android, according to CEO Fran Rosch. He says ForgeRock has sought smarter ways to identify legitimate users and supply them access by leveraging AI to collect signals of typical user and device behavior.

Once ForgeRock has collected patterns around a typical positive user experience, the company develops a risk score to supply customers more confidence about whether a legitimate user is attempting to log in. To prevent account takeover fraud, ForgeRock has factored in both known threats and threats projected via AI into its risk score and has incorporated more information about device behavior into its app (see: Thoma Bravo Identity Push Continues With $2.3B ForgeRock Buy).

"CIAM has got a strong security component, but also a strong usability component," Rosch tells Information Security Media Group. "And we've always worked to embed that capability of self-service and ease of use into the platform."

KuppingerCole criticized ForgeRock for implementation challenges around the on-premises version and a lack of native marketing analytics, marketplace integrations and certification around FIDO. Rosch says ForgeRock has focused on simplifying the deployment of its on-premises offering by crafting DevOps capabilities for implementation, simplifying upgrades and creating new configurable AI for the platform.

"Every company's got room to improve," Rosch says. "Generally, we would agree with those areas identified by KuppingerCole. We're continuing to work and to improve."

Ping Identity Embraces CIAM in the Cloud

Over the past five years, Ping Identity has migrated all of its core capabilities to the cloud, meaning customers don't have to deal with infrastructure, management or upgrades and can focus on the user experience, says Dustin Maxey, vice president of product and solutions marketing. Having everything available as a multi-tenant, SaaS-based offering means Ping can support customers' various deployment options, he says.

Maxey says Ping has defined and developed workflows for CIAM scenarios such as account registration and fraud detection that incorporate both native and third-party capabilities and are easy for customers to use. Over the past year, Ping has made real progress on decentralized identity and combining multiple fraud signals in one place so that risk and fraud can be assessed at the point of authentication, he says (see: Ping Identity to Go Private in $2.8B Thoma Bravo Acquisition).

"A lot of competitors will have orchestration platforms, but Ping really differentiates in that we fully embrace this open mentality," Maxey tells ISMG. "If you want to use competitive services - if you want to use ForgeRock authentication or Okta authentication - we can plug that authentication service into our orchestration platform that we created."

KuppingerCole criticized Ping for its inability to collect device attributes, customization requiring for consent handling, and lack of simple connectors for BI, CRM, marketing analytics and automation. Maxey says Ping has focused on building the most important connectors first and wants to create deep integrations within its existing connectors before pivoting to construct new connectors.

"We are on a tear to build connectors that are deep, that are numerous and that are the ones that represent the services that our customers work with," Maxey says. "And we are moving very, very fast at that."

IBM Ensures Legacy Apps Don't Get Left Behind

IBM has actively participated in committees and bodies that manage protocol support to help clients better manage API and authentication requests in applications, says Wesley Gyure, director of product management for IBM Security. Offering support for both old and new protocols gives clients a seamless experience across apps in legacy infrastructure as well as modern web-based applications in the cloud.

Gyure says the company has integrated its CIAM offering with threat intelligence to get more visibility into everything from compromised passwords to potential malicious account takeover and the opening of fraudulent accounts. Identity threat detection and response starts with determining whether to block or challenge a registration request based on if the IP address is known and if the device could be malicious (see: IBM Buys Startup Databand.ai to Address Data Quality Issues).

"We have very large Fortune 500 clients that are using our systems, both legacy and off-prem," Gyure tells ISMG. "Auto manufacturers, retail, state and local government - they all have millions of users that are authenticating to our system, and they're doing so in a frictionless way and they're doing so with high throughput."

KuppingerCole chided IBM for complicated licensing, limited configurations for family management, and no built-in identity proofing or out-of-the-box consumer device management portals. The complexity stems from thousands of customers already using CIAM in large deployments, and Gyure says a pricing calculator for the latest tools should supply clients visibility and transparency into how IBM licenses.

"We're not going to be the experts in every area," Gyure says. "Customers already have investments in solutions that they're using, and those investments have to integrate into whatever CIAM solution they may choose. This is not a rip-and-replace conversation. We want to make this easy and consumable, and to do that means to leverage capabilities and investments that they may already have."

Okta Scales Authentication to the Masses

Okta has made strides to enable app builders to better manage user authentication at scale by enabling developers to add another layer of access controls that's more fine-grained and consistent across apps, says Matt Duench, senior director of product marketing. The company's flow editor allows for no-code integration with firms such as Duo directly into the platform by leveraging a drag-and-drop interface.

Duench says the company has debuted a deployment option in Microsoft Azure so that customers in Europe and elsewhere can deploy in the environment that makes the most sense for them. Okta has strengthened its account takeover prevention capability through investments in Credential Guard and has reduced bot attacks by 79% by incorporating machine-learning upgrades in its bot detection engine (see: Okta-Auth0 Sales Integration Falters, Fueling Staff Turnover).

"We were born in the cloud, and so we're really well suited for companies that are focused on digital transformation and cloud migration versus more of an on-prem system," Duench tells ISMG. "And that's because a lot of the flexibility that now you get from a cloud-based system you can get within our platform as well."

KuppingerCole criticized Okta for a lack of built-in behavioral biometrics, FIDO certification, and ability to collect device intel via mobile SDK. Okta says there are regulatory, privacy and technology constraints around capturing device intel via mobile SDK in consumer applications and that the company chose to allow customers to integrate Okta's CIAM tool with the behavioral biometrics technology of their choice.

"You need a cloud-based platform that is extensible, that is unified and that is neutral so that you can really allow the application builder to build those use cases in the way and using the methodologies that they're traditionally used to," Duench says.

Thu, 13 Oct 2022 12:00:00 -0500 en text/html https://www.healthcareinfosecurity.com/forgerock-ping-ibm-okta-top-kuppingercole-ciam-tech-eval-a-20269 Killexams : IBM Streamlines Red Hat Storage Products Within the IBM Storage Business Unit

IBM announced it will add Red Hat storage product roadmaps and Red Hat associate teams to the IBM Storage business unit, bringing consistent application and data storage across on-premises infrastructure and cloud.

With the move, IBM will integrate the storage technologies from Red Hat OpenShift Data Foundation (ODF) as the foundation for IBM Spectrum Fusion. This combines IBM and Red Hat's container storage technologies for data services and helps accelerate IBM's capabilities in the burgeoning Kubernetes platform market.

In addition, IBM intends to offer new Ceph solutions delivering a unified and software defined storage platform that bridges the architectural divide between the data center and cloud providers. This further advances IBM's leadership in the software defined storage and Kubernetes platform markets, according to the vendor.

"Red Hat and IBM have been working closely for many years, and today's announcement enhances our partnership and streamlines our portfolios," said Denis Kennelly, general manager of IBM Storage, IBM Systems. "By bringing together the teams and integrating our products under one roof, we are accelerating the IBM's hybrid cloud storage strategy while maintaining commitments to Red Hat customers and the open-source community."

Benefits of the software defined portfolio available from IBM will include:

  • A unified storage experience for all containerized apps running on Red Hat OpenShift: Customers can use IBM Spectrum Fusion (now with Red Hat OpenShift Data Foundation) to achieve the highest levels of performance, scale, automation, data protection, and data security for production applications running on OpenShift that require block, file, and/or object access to data. This enables development teams to focus on the apps, not the ops, with infrastructure-as-code designed for simplified, automated managing and provisioning.
  • A consistent hybrid cloud experience at enterprise levels of scale and resiliency with IBM Ceph: Customers can deliver their private and hybrid cloud architectures on IBM's unified and software defined storage solution, providing capacity and management features. Capabilities include data protection, disaster recovery, high availability, security, auto-scaling, and self-healing portability, that are not tied to hardware, and travel with the data as it moves between on-premises and cloud environments.
  • A single data lakehouse to aggregate and derive intelligence from unstructured data on IBM Spectrum Scale: Customers can address the challenges that often come with quickly scaling a centralized data approach with a single platform to support data-intensive workloads such as AI/ML, high performance computing, and others. Benefits can include less time and effort to administer, reduced data movement and redundancy, direct access to data for analytics tools, advanced schema management and data governance, all supported by distributed file and object storage engineered to be cost effective.
  • Build in the cloud, deploy on-premises with automation: Customers can move developed applications from the cloud to on-premises services, automate the creation of staging environments to test deployment procedures, validate configuration changes, database schema and data updates, and ready package updates to overcome obstacles in production or correct errors before they become a problem that affects business operations.

"Red Hat and IBM have a shared belief in the mission of hybrid cloud-native storage and its potential to help customers transform their applications and data," said Joe Fernandes, vice president of hybrid platforms, Red Hat. "With IBM Storage taking stewardship of Red Hat Ceph Storage and OpenShift Data Foundation, IBM will help accelerate open-source storage innovation and expand the market opportunity beyond what each of us could deliver on our own. We believe this is a clear win for customers who can gain a more comprehensive platform with new hybrid cloud-native storage capabilities."

Under the agreement between IBM and Red Hat, IBM will assume Premier Sponsorship of the Ceph Foundation, whose members collaborate to drive innovation, development, marketing, and community events for the Ceph open-source project.

IBM Ceph and Red Hat OpenShift Data Foundation will remain 100% open source and will continue to follow an upstream-first model, reinforcing IBM's commitment to these vital communities, according to the company.

Red Hat and IBM intend to complete the transition by January 1, 2023, which will involve the transfer of storage roadmaps and Red Hat associates to the IBM Storage business unit.

Following this date, Red Hat OpenShift Platform Plus will continue to include OpenShift Data Foundation, sold by Red Hat and its partners.

Additionally, Red Hat OpenStack customers will still be able to buy Red Hat Ceph Storage from Red Hat and its partners. Red Hat OpenShift and Red Hat OpenStack customers with existing subscriptions will be able to maintain and grow their storage footprints as needed, with no change in their Red Hat relationship.

Forthcoming IBM Ceph and IBM Spectrum Fusion storage solutions based on Ceph are expected to ship beginning in the first half of 2023.

For more information about this news, visit www.ibm.com.


Tue, 04 Oct 2022 02:02:00 -0500 en text/html https://www.dbta.com/Editorial/News-Flashes/IBM-Streamlines-Red-Hat-Storage-Products-Within-the-IBM-Storage-Business-Unit-155227.aspx
Killexams : As NIST Prepares For Quantum Safe Security, IBM Rolls Out Support

The world of cryptography moves at a very slow, but steady pace. New cryptography standards must be vetted over an extended period and therefore new threats to existing standards need to be judged by decades-long timelines because updating crypto standards is a multiyear journey. Quantum computing is an important threat looming on the horizon. Quantum computers can solve many equations simultaneously, and based on Shor’s Algorithm, crypto experts estimate that they will be able to crack asymmetric encryption. In addition, Grover’s algorithm provides a quadratic reduction in decryption time of symmetric encryption. And the question these same crypto experts try to answer is not if this will happen, but when.

Today’s crypto algorithms use mathematical problems such as factorization of large numbers to protect data. With fault-tolerant quantum computers, factorization can be solved in theory in just a few hours using Shor’s algorithm. This same capability also compromises cryptographic methods based on the difficulty of solving the discrete logarithm problems.

The term used to describe these new, sturdier crypto standards is “quantum safe.” The challenge is we don’t know exactly when fault-tolerant quantum computers will have the power to consistently break existing encryption standards, which are now in wide use. There’s also a concern that some parties could obtain and store encrypted data for decryption later, when suitably capable quantum computers are available. Even if the data is over ten years old, there still could be relevant confidential information in the stored data. Think state secrets, financial and securities records and transactions, health records, or even private or classified communications between public and/or government figures.

U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) believes it’s possible that RSA2048 encryption can be cracked by 2035. Other U.S. government agencies and other security-minded entities have similar timelines. Rather than wait for the last minute to upgrade security, NIST started a competition to develop quantum-safe encryption back in 2016. After several rounds of reviews, on July 5th of this year, NIST chose four algorithms for the final stages of review before setting the standard. IBM developed three of them, two of those are supported in IBM’s Z16 mainframe today.

NISTNIST Announces First Four Quantum-Resistant Cryptographic Algorithms

The new IBM crypto algorithms are based on a family of math problems called structured lattices. Lattice problems have a unique characteristic that will make it reasonably difficult to solve with quantum computing. Structured lattice problems require solving for two unknowns – a multiplier array and an offset and is extremely difficult for quantum computing to solve the lattice problems. The shortest vector problem (SVP) and the closest vector problem (CVP) – upon which lattice cryptography is built – is considered extremely difficult to a quantum computer to solve. Each candidate crypto algorithm is evaluated not just for data security, but also for performance - the overhead cannot be too large for wide spread use.

The final selections are expected in 2024, but there’s still a chance there will be changes before the final standards are released.

MORE FROM FORBESIBM Lattice Cryptography Is Needed Now To Defend Against Quantum Computing Future

IBM Supports Quantum Safe in New Z-Series Mainframes

IBM made a strategic bet before the final NIST selections. The recently released IBM Z16 Series computers already support two of the final four quantum safe crypto candidates: the CRYSTALS-Kyber public-key encryption and the CRYSTALS-Dilithium digital signature algorithms. IBM is set to work with the industry to substantiate these algorithms in production systems. Initially, IBM is using its tape drive storage systems as a test platform. Because tape is often used for cold storage, it's an excellent medium for long-term data protection. IBM is working with its client base to find the appropriate way to roll out quantum-safe encryption to the market. This must be approached as a life cycle transformation. And, in fact, IBM is working with its customers to create a crypto-agile solution, which allows the exact crypto algorithm to change at any point in time without disrupting the entire system. It’s not just a rip and replace process. With crypto-agility, the algorithm is abstracted from the system software stack so a new algorithms can be deployed seamlessly. IBM is developing tools making crypto status part of the overall observability with a suitable dashboard to see crypto events, etc.

These new algorithms must be deployable to existing computing platforms, even at the edge. However, it's not going to feasible to upgrade every system; it’s probably going to be an industry-by-industry effort and industry consortia will be required. For example, IBM, GSMA (Global System for Mobile Communication Association), and Vodafone recently announced they will work via a GSMA Task Force to identify a process to implement quantum-safe technologies across critical telecommunications infrastructure, including the networks underpinning internet access and public utility management. The telecommunication network carries financial data, health information, public-sector infrastructure systems, and sensitive business data which needs to be protected as it traverses global networks.

IBM Research BlogHow IBM is helping make the world's networks quantum safe | IBM Research Blog

What’s Next for Quantum Safe Algorithms

Fault-tolerant quantum computing is coming. When it will be available is still a guessing game, but the people who most care about data security are targeting 2035 to have quantum-safe cryptographic algorithms in place to meet the threat. But that’s not good enough. We need to start protecting critical data and infrastructure sooner than that, considering the length of time systems are deployed in the field and data is stored. Systems such as satellites and power stations are not easy to update in the field.

And there’s data that must be stored securely for future retrieval, including HIPAA (for medical applications), tax records, toxic substance control act and clinical trial data, and others.

Even after the deployment of these new algorithms, this is not the end – there may still be developments that can break even the next generation quantum-safe algorithms. The struggle between those that want to keep systems and data safe and those that want to crack them continues and why companies should look to building in crypto agility into their security plans.

Tirias Research tracks and consults for companies throughout the electronics ecosystem from semiconductors to systems and sensors to the cloud. Members of the Tirias Research team have consulted for IBM and other companies throughout the Security, AI and Quantum ecosystems.

Fri, 07 Oct 2022 11:36:00 -0500 Kevin Krewell en text/html https://www.forbes.com/sites/tiriasresearch/2022/10/07/as-nist-prepares-for-quantum-safe-security-ibm-rolls-out-support/
000-556 exam dump and training guide direct download
Training Exams List