No more exam failing with C2140-136 study guide by

We now have valid and upwards currently C2140-136 Exam Concerns. provides the specific in addition to most recent C2140-136 braindumps that will practically contain just about all tricky questions. With all the practice of the C2140-136 test dumps, a person Does not have in order to bother about your real C2140-136 exam. Simply, a person needs to devote 10-24 hours in order to memorize our C2140-136 study guide in addition to answers before a person actually face an authentic exam.

Exam Code: C2140-136 Practice test 2022 by team
Rational Application Developer v7
IBM Application download
Killexams : IBM Application obtain - BingNews Search results Killexams : IBM Application obtain - BingNews Killexams : Astadia Publishes Mainframe to Cloud Reference Architecture Series

Press release content from Business Wire. The AP news staff was not involved in its creation.

BOSTON--(BUSINESS WIRE)--Aug 3, 2022--

Astadia is pleased to announce the release of a new series of Mainframe-to-Cloud reference architecture guides. The documents cover how to refactor IBM mainframes applications to Microsoft Azure, Amazon Web Services (AWS), Google Cloud, and Oracle Cloud Infrastructure (OCI). The documents offer a deep dive into the migration process to all major target cloud platforms using Astadia’s FastTrack software platform and methodology.

As enterprises and government agencies are under pressure to modernize their IT environments and make them more agile, scalable and cost-efficient, refactoring mainframe applications in the cloud is recognized as one of the most efficient and fastest modernization solutions. By making the guides available, Astadia equips business and IT professionals with a step-by-step approach on how to refactor mission-critical business systems and benefit from highly automated code transformation, data conversion and testing to reduce costs, risks and timeframes in mainframe migration projects.

“Understanding all aspects of legacy application modernization and having access to the most performant solutions is crucial to accelerating digital transformation,” said Scott G. Silk, Chairman and CEO. “More and more organizations are choosing to refactor mainframe applications to the cloud. These guides are meant to assist their teams in transitioning fast and safely by benefiting from Astadia’s expertise, software tools, partnerships, and technology coverage in mainframe-to-cloud migrations,” said Mr. Silk.

The new guides are part of Astadia’s free Mainframe-to-Cloud Modernization series, an ample collection of guides covering various mainframe migration options, technologies, and cloud platforms. The series covers IBM (NYSE:IBM) Mainframes.

In addition to the reference architecture diagrams, these comprehensive guides include various techniques and methodologies that may be used in forming a complete and effective Legacy Modernization plan. The documents analyze the important role of the mainframe platform, and how to preserve previous investments in information systems when transitioning to the cloud.

In each of the IBM Mainframe Reference Architecture white papers, readers will explore:

  • Benefits, approaches, and challenges of mainframe modernization
  • Understanding typical IBM Mainframe Architecture
  • An overview of Azure/AWS/Google Cloud/Oracle Cloud
  • Detailed diagrams of IBM mappings to Azure/AWS/ Google Cloud/Oracle Cloud
  • How to ensure project success in mainframe modernization

The guides are available for obtain here:

To access more mainframe modernization resources, visit the Astadia learning center on

About Astadia

Astadia is the market-leading software-enabled mainframe migration company, specializing in moving IBM and Unisys mainframe applications and databases to distributed and cloud platforms in unprecedented timeframes. With more than 30 years of experience, and over 300 mainframe migrations completed, enterprises and government organizations choose Astadia for its deep expertise, range of technologies, and the ability to automate complex migrations, as well as testing at scale. Learn more on

View source version on

CONTACT: Wilson Rains, Chief Revenue Officer




SOURCE: Astadia

Copyright Business Wire 2022.

PUB: 08/03/2022 10:00 AM/DISC: 08/03/2022 10:02 AM

Wed, 03 Aug 2022 02:02:00 -0500 en text/html
Killexams : APM Automation Tools Market May See a Big Move | Microsoft, IBM, Oracle

The latest study released on the Global APM Automation Tools Market by AMA Research evaluates market size, trend, and forecast to 2027. The APM Automation Tools market study covers significant research data and proofs to be a handy resource document for managers, analysts, industry experts and other key people to have ready-to-access and self-analyzed study to help understand market trends, growth drivers, opportunities and upcoming challenges and about the competitors.

Key Players in This Report Include:

AppDynamics (United States), New Relic (United States), Dynatrace (United States), Microsoft Corporation (United States), CA Technologies (United States), BMC Software (India), IBM Corporation (United States), Oracle Corporation (United States), Dell Inc. (United States), AppNeta (US),

Download demo Report PDF (Including Full TOC, Table & Figures) @


With growing demand for customized applications and increasing automations will generate vigorous demand for the APM Automation tools. Application performance management (APM) is a front and back end application monitor which manages performance, user experience, and availability of software applications.

Market Trends:

Big data applications

Artificial Intelligence enabled applications

Market Drivers:

Minimized process response time and resource utilization

Competitive advantage in solving, analyzing, and repairing business processes

Smoothens the business processes according to client requirements

Robust growth of smart phones market

Minimizes increasing complexity of IT based applications

The Global APM Automation Tools Market segments and Market Data Break Down are illuminated below:

by Type (App Metrics Based APM, Code Based APM, Network Based APM), Application (BFSI, IT and Telecom, Logistics, Retail, Healthcare, Manufacturing, Chemicals , Oil and Mining, Others)

Global APM Automation Tools market report highlights information regarding the current and future industry trends, growth patterns, as well as it offers business strategies to helps the stakeholders in making sound decisions that may help to ensure the profit trajectory over the forecast years.

Have a query? Market an enquiry before purchase @

Geographically, the detailed analysis of consumption, revenue, market share, and growth rate of the following regions:

  • The Middle East and Africa (South Africa, Saudi Arabia, UAE, Israel, Egypt, etc.)
  • North America (United States, Mexico & Canada)
  • South America (Brazil, Venezuela, Argentina, Ecuador, Peru, Colombia, etc.)
  • Europe (Turkey, Spain, Turkey, Netherlands Denmark, Belgium, Switzerland, Germany, Russia UK, Italy, France, etc.)
  • Asia-Pacific (Taiwan, Hong Kong, Singapore, Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia).

Objectives of the Report

  • -To carefully analyze and forecast the size of the APM Automation Tools market by value and volume.
  • -To estimate the market shares of major segments of the APM Automation Tools
  • -To showcase the development of the APM Automation Tools market in different parts of the world.
  • -To analyze and study micro-markets in terms of their contributions to the APM Automation Tools market, their prospects, and individual growth trends.
  • -To offer precise and useful details about factors affecting the growth of the APM Automation Tools
  • -To provide a meticulous assessment of crucial business strategies used by leading companies operating in the APM Automation Tools market, which include research and development, collaborations, agreements, partnerships, acquisitions, mergers, new developments, and product launches.

Buy Complete Assessment of APM Automation Tools market Now @

Major highlights from Table of Contents:

APM Automation Tools Market Study Coverage:

  • It includes major manufacturers, emerging player’s growth story, and major business segments of APM Automation Tools market, years considered, and research objectives. Additionally, segmentation on the basis of the type of product, application, and technology.
  • APM Automation Tools Market Executive Summary: It gives a summary of overall studies, growth rate, available market, competitive landscape, market drivers, trends, and issues, and macroscopic indicators.
  • APM Automation Tools Market Production by Region APM Automation Tools Market Profile of Manufacturers-players are studied on the basis of SWOT, their products, production, value, financials, and other vital factors.
  • Key Points Covered in APM Automation Tools Market Report:
  • APM Automation Tools Overview, Definition and Classification Market drivers and barriers
  • APM Automation Tools Market Competition by Manufacturers
  • Impact Analysis of COVID-19 on APM Automation Tools Market
  • APM Automation Tools Capacity, Production, Revenue (Value) by Region (2021-2027)
  • APM Automation Tools Supply (Production), Consumption, Export, Import by Region (2021-2027)
  • APM Automation Tools Production, Revenue (Value), Price Trend by Type {App Metrics Based APM, Code Based APM, Network Based APM}
  • APM Automation Tools Market Analysis by Application {BFSI, IT and Telecom, Logistics, Retail, Healthcare, Manufacturing, Chemicals, Oil and Mining, Others}
  • APM Automation Tools Manufacturers Profiles/Analysis APM Automation Tools  Manufacturing Cost Analysis, Industrial/Supply Chain Analysis, Sourcing Strategy and Downstream Buyers, Marketing
  • Strategy by Key Manufacturers/Players, Connected Distributors/Traders Standardization, Regulatory and collaborative initiatives, Industry road map and value chain Market Effect Factors Analysis.

Browse Complete Summary and Table of Content @

Key questions answered

  • How feasible is APM Automation Tools market for long-term investment?
  • What are influencing factors driving the demand for APM Automation Tools near future?
  • What is the impact analysis of various factors in the Global APM Automation Tools market growth?
  • What are the accurate trends in the regional market and how successful they are?

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Middle East, Africa, Europe or LATAM, Southeast Asia.

Contact US:

Craig Francis (PR & Marketing Manager)
AMA Research & Media LLP
Unit No. 429, Parsonage Road Edison, NJ
New Jersey USA – 08837
Phone: +1 (206) 317 1218
[email protected]

Connect with us at

Tue, 02 Aug 2022 20:15:00 -0500 Newsmantraa en-US text/html
Killexams : Quantum Weirdness In Your Browser

I’ll be brutally honest. When I set out to write this post, I was going to talk about IBM’s Q Experience — the website where you can run real code on some older IBM quantum computing hardware. I am going to get to that — I promise — but that’s going to have to wait for another time. It turns out that quantum computing is mindbending and — to make matters worse — there are a lot of oversimplifications floating around that make it even harder to understand than it ought to be. Because the IBM system matches up with real hardware, it is has a lot more limitations than a simulator — think of programming a microcontroller with on debugging versus using a software emulator. You can zoom into any level of detail with the emulator but with the bare micro you can toggle a line, use a scope, and hope things don’t go too far wrong.

So before we get to the real quantum hardware, I am going to show you a simulator written by [Craig Gidney]. He wrote it and promptly got a job with Google, who took over the project. Sort of. Even if you don’t like working in a browser, [Craig’s] simulator is easy enough, you don’t need an account, and a bookmark will save your work.

It isn’t the only available simulator, but as [Craig] immodestly (but correctly) points out, his simulator is much better than IBM’s. Starting with the simulator avoids tripping on the hardware limitations. For example, IBM’s devices are not fully connected, like a CPU where only some registers can get to other registers. In addition, real devices have to deal with noise and the quantum states not lasting very long. If your algorithm is too slow, your program will collapse and invalidate your results. These aren’t issues on a simulator. You can find a list of other simulators, but I’m focusing on Quirk.

What Quantum Computing Is

As I mentioned, there is a lot of misinformation about quantum computing (QC) floating around. I think part of it revolves around the word computing. If you are old enough to remember analog computers, QC is much more like that. You build “circuits” to create results. There’s also a lot of difficult math — mostly linear algebra — that I’m going to try to avoid as much as possible. However, if you can dig into the math, it is worth your time to do so. However, just like you can design a resonant circuit without solving differential equations about inductors, I think you can do QC without some of the bigger math by just using results. We’ll see how well that holds up in practice.

QC doesn’t use bits, but qubits. Unsurprisingly a qubit can take a state of 0 or 1. If that was all, then there wouldn’t be much reason to continue the conversation. However, qubits are quantum, so they have two unique properties that QC can exploit. First, a qubit can be some combination of 0 and 1 at the same time. There are famously multiple interpretations of uncertainty in quantum mechanics, but you can think of it as a probability of the qubit being a 0 or a 1. Those probabilities will always add up to 1 and the idea extends to groups of qubits, too. So four qubits have some probability that their state is 0010. If you add up all the probabilities for all the states, you get one. When a qubit is in a combination of states, each with a given probability, that’s called superposition.

You probably know that in quantum mechanics, the state appears to change based on observation. Qubits are the same. While they can be in a superposed state, the instant you measure that state, it becomes either 0 or 1. If you know about Schrödinger’s cat, it is the same principle. In the thought experiment, until you peek, the cat is half dead and half alive just as our qubits can be both 0 and 1.

The other key concept is entanglement. The idea is you can take one qubit and make its state dependent on another qubit’s state even though we don’t know the state of either of them. As a simple example, we can create a qubit that we don’t know the state of, but we know it is opposite of some other qubit that we might also not know about.

Confused? Good. If this makes sense to you, you are probably ahead of where this post is going anyway. Even [Niels Bohr] once said (paraphrasing from Danish), “Anyone who is not shocked by quantum theory has not understood it.”

What Quantum Computing Isn’t

Quantum computing isn’t going to run wordprocessing applications any time soon, if ever. Like I said, it is more like analog computing where you set up a problem and get an answer. Part of that may be the early stage we are in. Part of it is just how it works.

Speaking of how it works, QC is usually probabilistic. So when you search for something, for example, you get the answer to a certain probability. Again, this is like an analog computer. Maybe that probability is 0.99999, but it isn’t going to be 1.0000.

There aren’t many practical quantum algorithms known, and the ones that are known are sometimes difficult to put into practice. For example, if you read hand-waving explanations of QC, you’ll hear that Grover’s algorithm lets you search an unstructured database using fewer queries. A little thinking would probably convince you that this is unlikely. If you are searching a database of animals for “dog” and there’s no way to access it except by index, how could you mysteriously know which index items to skip? You can’t, and neither does Grover’s algorithm.

We’ll talk more about Grover’s in another post, but what the algorithm actually does is match its state to another state that you don’t know in advance. For example, suppose you had a C program that makes a library call that reads like:

int oracle(int x) { if (x==9) return 1; else return 0; }

However, because it is in a library, we don’t know what x has to be to get the 1 return value. If you wrote a program to find out, you might have to call many times. Even if you restricted x to be between 1 and 16, you might have to call sixteen times. You might have to call one time. Grover’s algorithm would call it four times and have a pretty good guess at the answer. This is still not a perfect analogy because the oracle function in QC provides information about which answer is right, so the practicality of it isn’t “unstructured database” as you often hear. A better analogy might be if the oracle looked like this:

int oracle(int x) { if (x==9) return 0; if (x<9) return -1; else return 1; }

Now, even a classic computer could make smarter guesses.

Enough Theory… For Now

We’ll have some more theory later, but your eyes should be good and glazed over by now. I had thought about doing a video about how to use Quirk, but [Craig] did a fine one, so watch that first. When [Craig] compared his simulator to IBM’s he talked about UI design principles he uses and it shows when you use Quirk.

Each of the horizontal lines each represents a qubit and they start in state 0. Time goes from left to right along the qubit and doesn’t go backward, so you read the circuit that way. All of the boxes in the top and bottom gray zones are gates or components that affect the qubits. To the right of the qubits are several ways to visualize the final state of the system. The green boxes show if they are one or zero (or the chances of it, at least). The other two displays will take a little more theory that we’ll talk about next time.

Straight Logic

For now, I want to focus on just the 0 and 1 (technically, |0> and |1>) states. This is just like regular logic, but you can’t use most of the familiar gates you are used to. One that you can use is the NOT gate: the circle with a plus sign in it. Sometimes this also shows up as an X and is known as an X gate. Try it:

As you’d expect, inverting a 0 once creates a 1 and inverting it twice makes a zero. No surprise. There’s also a controlled not (CNOT) gate that is really an exclusive OR gate. That is, if one input is true, the other input inverts. To create one, you just put a dot on any qubit in the same column as an inverter. Try putting a solid dot (from the Probes section) over the second inverter. Note the output and then delete (middle click) the top left inverter. You’ll see the states change where the bottom right inverter only flips the bit if the top qubit is in the 1 state.

Remember that I said there are a lot of oversimplifications that make things hard to understand? This is one of them. The idea that this is a gate with two inputs and one output is only correct in the case that the inputs are 0 or 1. But once we start dealing with qubits in superposed states, this isn’t true anymore. The “input” dot is perfectly capable of modifying the first qubit and — under the right circumstances, you can flip the inverter and the dot and it wouldn’t matter. QC is strange. However, for “computational states” (|0> and |1>) the gate analogy is a fair one. Just don’t forget that it is wrong.

One note about the simulator. If you see NaN on the outputs (short for Not a Number), try using a different browser. I’ve seen some — but not all — versions of some browsers have trouble with the Javascript. That’s not quantum weirdness, a NaN is a normal software bug.

Toffoli Gate

If you are accustomed to normal logic gates, you know that you don’t need all of them. For example, a NAND gate is sufficient to make any other kind of logic gate you want. The NOT and CNOT gates get us part of the way there. The other gate that is easy to implement in QC is a Toffoli gate, sometimes known as a CCNOT gate. You can think of it as a 3-input gate (say, A, B, and C) that has three outputs (X, Y, Z). Two of the outputs are the same as the inputs (that is, X=A, Y=B). The Z output, however, is A AND B XOR C. That’s a bit rough, but you can make whatever gates you want out of that and the NOT/CNOT gate.

To create a Toffoli gate in Quirk, you simply put two dots over an inverter as seen to the right. The two inverters on the left are there to set the inputs to a 1 state. Try it and you’ll see the output is 1 unless you remove either of the inverters. Putting an inverter on the bottom qubit (under the other two inverters) will invert the answer (that’s the XOR C part).

Obviously, configured like this, we have a two-input AND gate. Inverting the inputs gives you an OR gate. Setting the bottom qubit would give you NAND or NOR. Setting B to 1 would give A XOR C. Just like the CNOT, this gate can affect its inputs when dealing with quantum states, but we aren’t looking at those yet, so, for now, it is OK to think of the top two qubits along with the bottom left as inputs and the right side of the bottom inverter as an output. Except it isn’t in the general case.

By the way, you’ll see when we use the IBM simulator (which is more like the hardware) there’s no way to build this directly. You have to use many CNOT gates to build one (see below). This is one reason you want to start with Quirk.

Instant Gratification

I think that’s enough for this post, even though we haven’t got to the quantum weirdness yet. However, if you want to jump ahead, select the menu from Quirk and click the Quantum Fourier Transform link. That should keep you dizzy until next time when we talk more theory, get into superposition, and tangle with entanglement.

If you are wondering what’s the point? Hang on to that thought. Right now, we only know about how QC can look like regular logic gates. But that’s just a small part of what you can do with a quantum computer.

Sun, 31 Jul 2022 12:01:00 -0500 Al Williams en-US text/html
Killexams : BOB Financial Solutions launches its mobile app ‘bobcard’

BOB Financial Solutions has announced the launch of its credit card servicing mobile app, ‘bobcard’ to help customers with a one-stop solution to manage their Bank of Baroda credit card services. BOB Financial Solutions is a non-banking financial company that is wholly owned by the Bank of Baroda, an Indian public sector bank.

The app has been designed in collaboration with IBM. It is a smart digital platform that offers a battery-saver dark-themed interface along with secured access with face ID, fingerprint lock & PIN, and a smart eye feature to ensure that card details of the customers remain private.

The mobile servicing app, bobcard will help customers manage their card usage limit, redeem reward points instantly, convert high-value transactions into smart EMIs and pay credit card bills on time. As per the press release, customers can obtain the app from the App Store (iOS users)/ Google Play Store (Android users), and start using it after linking it with their registered mobile number.

Shailendra Singh, MD & CEO, BOB Financial, said, “The app has been built as part of our vision to be an impactful credit partner with strong tech infra. We’re already onboarding our new customers through a digital-all process. The app is now available for both iOS & Android users, and we are confident that this new tech delivery will add a lot of convenience to our customers’ day-to-day lives." Rishi Aurora, Senior Partner & FSS Sector Leader, IBM Consulting, India/ South Asia said, “The new digital platform for Bank of Baroda credit card customers leverages our deep industry expertise and is built on an open cloud-based scalable architecture with minimalistic design as its core value proposition. The ‘bobcard’ app is powered by intelligent workflows at the backend to deliver an engaging & secure user experience for the customers."

Catch all the Corporate news and Updates on Live Mint. obtain The Mint News App to get Daily Market Updates & Live Business News.
More Less

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Fri, 29 Jul 2022 04:55:00 -0500 en text/html
Killexams : Persistent Memory Market Future Growth Explored in Latest Research Report by 2030

The MarketWatch News Department was not involved in the creation of this content.

Aug 05, 2022 (Alliance News via COMTEX) -- Key Companies Covered in the Persistent Memory Market Research areIntel, Micron Technology, HPE, Dell, IBM, Microsoft, and other key market players.

Report Ocean recently added a research report on the Persistent Memory Market. The report includes an extensive analysis of the market’s characteristics, COVID-19 impact, size and growth, segmentation, regional and country breakdowns, competitive environment, market shares, trends, and strategies. In addition, it traces the development of the market over time and projects regional market growth. It compares the market to other markets and situates it in relation to the larger market.

Request To obtain Free demo of This Strategic Report:-

Other business intelligence tools include market definition, regional market opportunity, sales and revenue by region, manufacturing cost analysis, industrial chain, market effect factors analysis, global market size forecast, market data and graphs and statistics, tables, bar and pie charts, and more. Obtain a thorough report (with a full TOC, more than 100 tables, figures, and charts). – Extensive Analysis Impact Analysis of the Pre- and Post-COVID-19 Market Outbreak.

According to this latest study, the 2021 growth of Persistent Memory will have significant change from previous year. By the most conservative estimates of global Persistent Memory market size (most likely outcome) will be a year-over-year revenue growth rate of % in 2021, from US$ million in 2020. Over the next five years the Persistent Memory market will register a % CAGR in terms of revenue, the global market size will reach US$ million by 2026.

This report presents a comprehensive overview, market shares, and growth opportunities of Persistent Memory market by product type, application, key players and key regions and countries.

Get a demo Report:

Segmentation by type: breakdown data from 2016 to 2021 in Section 2.3; and forecast to 2026 in section 10.7.
128 GB
256 GB
512 GB

Segmentation by application: breakdown data from 2016 to 2021, in Section 2.4; and forecast to 2026 in section 10.8.
Consumer Electronics
Aerospace & Defence
Enterprise Storage

This report also splits the market by region: Breakdown data in Chapter 4, 5, 6, 7 and 8.
United States
Southeast Asia
Middle East & Africa
South Africa

Download demo Report, SPECIAL OFFER (Avail an Up-to 30% discount on this report) :-

Table of Content:

  • Market Definition and Overview
  • Research Method and Logic
  • Market Competition Analysis
  • Product and Service Analysis
  • Strategies for Company to Deal with the Impact of COVID-19
  • Market Segment by Type, Historical Data and Market Forecasts
  • Market Segment by Application, Historical Data and Market Forecasts
  • Market by by Region, Historical Data and Market Forecasts
  • Market Dynamic Analysis and Development Suggestions

Key Benefits for Industry Participants & Stakeholders

  • The Market Research allows the investors to understand the market size, dynamics, risks, and opportunities in the industry.
  • The market research report provides market sizing and forecast over major currencies - USD, EUR, JPY, GBP, and CHF.
  • This Market Research Report helps to forecast the revenues and analyze the market trends based on region, product type, and end-use.
  • The Market analysis of the market share of the can prove beneficial in terms of profit to the industry's participants and stakeholders.

Key Questions Answered in the Market Report

What will the market size be in 2030 and what will the growth rate be?

What are the main trends that are positively impacting the growth of the market?

What growth strategies are the players considering to stay in the market?

Which regional market will emerge as a pioneer in the years to come?

Which application segment will experience strong growth?

Who are the key suppliers in this market space?

What are the market opportunities and threats faced by the key vendors?

What are the strengths and weaknesses of the key vendors?

Request full Report-

About Report Ocean:
We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in today's competitive environment. Report Ocean is a 'one-stop solution' for individuals, organizations, and industries that are looking for innovative market research reports. Get in Touch with Us:
Report Ocean:
Address: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 - UNITED STATES
Tel:+1 888 212 3539 (US - TOLL FREE)


The MarketWatch News Department was not involved in the creation of this content.

Fri, 05 Aug 2022 01:49:00 -0500 en-US text/html
Killexams : Appeals Court Affirms That IBM Fired Manager For Reporting Racial Discrimination and Upholds Multi-Million Dollar Award

SEATTLE, Aug. 4, 2022 /PRNewswire/ -- The U.S. Court of Appeals for the Ninth Circuit affirmed on Monday that Scott Kingston, who won a jury verdict against IBM last year for wrongful termination after he accused the company of racial bias, had proven his case and is entitled to economic damages totaling $5 million (along with attorneys' fees and other damages of three million dollars). Kingston is represented by Milberg attorneys Matthew E. Lee, Mark R. Sigmon, and Jeremy Williams, along with Toby Marshall of the Terrell Marshall Law Group.

Milberg Coleman Bryson Phillips Grossman PLLC Logo (PRNewsfoto/Milberg Coleman Bryson Phillips Grossman PLLC)

Kingston, a longtime sales manager at IBM, was fired by the company in 2018 for alleged gross incompetence. But Kingston claimed he was fired in retaliation for voicing concerns that IBM had, in an apparent act of racial discrimination, capped the sales commission of a black salesman while awarding uncapped commissions to a white salesman. Kingston sued IBM, claiming that IBM has an internal policy against capping commissions and that his termination violated Washington State law.

A jury awarded Kingston $11.1 million in April 2021, which included $5.1 million in economic damages and $6 million in noneconomic damages, and the court awarded almost $3 million more in attorneys' fees and other damages. IBM appealed to the Ninth Circuit, arguing that there was no evidence it fired Scott in retaliation for his complaints about the black employee's reduced commissions. The court rejected that argument, finding that the jury reasonably inferred that "Kingston was opposing or reporting what he believed to be employer misconduct in the form of race discrimination and withholding of earned wages" and that his opposition activity, which was known by IBM decisionmakers, was "a substantial factor" in the company's decision to fire him.

While the court did vacate the $6 million non-economic damage award and order that it be reduced in some amount, Kingston will ask the trial court to award most of that amount again. Most importantly, the jury, the trial court, and now the appellate court have all found that IBM fired Kingston for complaining about race discrimination at IBM. Furthermore, the appellate ruling is in line with a string of past cases in which Milberg attorneys have established that IBM violated its own policy and wrongly reduced salespersons' commissions.

"IBM fired Scott Kingston for calling out IBM's racism and wage theft; that's now judicially established," said attorney Matthew E. Lee in a press statement. "We're pleased that the Ninth Circuit, like our jury, saw through IBM's dissembling, smoke, and mirrors. Over the last several years, IBM, once held up as a paragon of ethics and professionalism, often finds itself in headlines alongside the word 'discrimination.' We trust that this verdict and opinion have sent a powerful message to IBM that this type of unethical behavior is unacceptable in this day and age."

About Milberg Coleman Bryson Phillips Grossman, PLLC:

For over 50 years, Milberg and its affiliates have been fighting to protect victims' rights and have recovered over $50 billion for clients. A pioneer in class action litigation, Milberg is widely recognized as a leader in defending the rights of victims of corporate wrongdoing.

Media Contact:
Angel Persaud

Cision View original content to obtain multimedia:

SOURCE Milberg Coleman Bryson Phillips Grossman PLLC

Thu, 04 Aug 2022 00:53:00 -0500 en-US text/html
Killexams : Court nixes 'shocking' $6 mln distress award for former IBM manager

A man stands near an IBM logo at the Mobile World Congress in Barcelona, Spain, February 25, 2019. REUTERS/Sergio Perez

Register now for FREE unlimited access to
  • Firing stemmed from his concerns about race bias -sales manager
  • He did not suffer enough distress to merit $6M award -panel
  • Majority did uphold $5 mln award for economic damages

(Reuters) - A U.S. appeals court has ruled that a $6 million pain and suffering award for a former IBM Corp sales manager who claimed he was fired for calling out bias against a Black salesman was "shockingly excessive," while upholding a slightly smaller award for economic damages.

The 9th U.S. Circuit Court of Appeals in a 2-1 ruling on Monday said Scott Kingston, who claims he refused supervisors' demands to cap the salesman's commissions, had not shown that his firing caused him sufficient anguish to justify the jury award that IBM had appealed.

But the majority rejected the company's bid to toss out a $5 million award for economic damages, saying Kingston had proven that his concerns about potential race discrimination played a role in his firing.

Register now for FREE unlimited access to

"Although we do not question that Kingston suffered psychological distress because of his termination, his distress does not appear to have been significantly greater than what anyone might suffer from being fired," the court said in an unsigned opinion.

IBM, which is represented by Jones Day, did not immediately respond to a request for comment on Tuesday.

Matthew Lee, a lawyer for Kingston, said he was pleased that the 9th Circuit "saw through IBM's dissembling, smoke and mirrors."

"We’re all fortunate, even IBM, to have people like Scott around to stand up against toxic corporate culture like this," Lee said in an email.

Kingston sued IBM in Seattle federal court in 2019, alleging violations of Washington state law. He said he had been fired a year earlier for refusing to lower a seven-figure commission owed to a Black salesman.

Kingston said he told a supervisor that capping the salesman's commission "might have been racial discrimination" because a white salesman had just received his full commission of more than $1 million. IBM said that Kingston was fired for improperly approving a commission for another salesman. Washington law, like federal antidiscrimination law, prohibits retaliation against workers who oppose discrimination in the workplace.

In dissent on Monday, 9th Circuit Judge Sandra Ikuta said IBM should not have been held liable at all. Kingston failed to show that the managers responsible for firing him knew about his concerns involving the sales commissions, Ikuta said.

The 9th Circuit sent the case back to the district court to hold a new trial on non-economic damages.

The panel included Circuit Judge Eric Miller and 6th Circuit Judge Ronald Gilman, who sat by designation.

The case is Kingston v. IBM Corp, 9th U.S. Circuit Court of Appeals, No. 21-35548.

For Kingston: Mark Sigmon and Matthew Lee of Milberg Coleman Bryson Phillips Grossman

For IBM: Anthony Dick of Jones Day

(NOTE: This article has been updated to include a statement from Matthew Lee.)

Register now for FREE unlimited access to

Our Standards: The Thomson Reuters Trust Principles.

Thomson Reuters

Dan Wiessner (@danwiessner) reports on labor and employment and immigration law, including litigation and policy making. He can be reached at

Tue, 02 Aug 2022 07:29:00 -0500 en text/html
Killexams : CIOReview Names Cobalt Iron Among 10 Most Promising IBM Solution Providers 2022

LAWRENCE, Kan.--(BUSINESS WIRE)--Jul 28, 2022--

Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that the company has been deemed one of the 10 Most Promising IBM Solution Providers 2022 by CIOReview Magazine. The annual list of companies is selected by a panel of experts and members of CIOReview Magazine’s editorial board to recognize and promote innovation and entrepreneurship. A technology partner for IBM, Cobalt Iron earned the distinction based on its Compass ® enterprise SaaS backup platform for monitoring, managing, provisioning, and securing the entire enterprise backup landscape.

This press release features multimedia. View the full release here:

Cobalt Iron Compass® is a SaaS-based data protection platform leveraging strong IBM technologies for delivering a secure, modernized approach to data protection. (Graphic: Business Wire)

According to CIOReview, “Cobalt Iron has built a patented cyber-resilience technology in a SaaS model to alleviate the complexities of managing large, multivendor setups, providing an effectual humanless backup experience. This SaaS-based data protection platform, called Compass, leverages strong IBM technologies. For example, IBM Spectrum Protect is embedded into the platform from a data backup and recovery perspective. ... By combining IBM’s technologies and the intellectual property built by Cobalt Iron, the company delivers a secure, modernized approach to data protection, providing a ‘true’ software as a service.”

Through proprietary technology, the Compass data protection platform integrates with, automates, and optimizes best-of-breed technologies, including IBM Spectrum Protect, IBM FlashSystem, IBM Red Hat Linux, IBM Cloud, and IBM Cloud Object Storage. Compass enhances and extends IBM technologies by automating more than 80% of backup infrastructure operations, optimizing the backup landscape through analytics, and securing backup data, making it a valuable addition to IBM’s data protection offerings.

CIOReview also praised Compass for its simple and intuitive interface to display a consolidated view of data backups across an entire organization without logging in to every backup product instance to extract data. The machine learning-enabled platform also automates backup processes and infrastructure, and it uses open APIs to connect with ticket management systems to generate tickets automatically about any backups that need immediate attention.

To ensure the security of data backups, Cobalt Iron has developed an architecture and security feature set called Cyber Shield for 24/7 threat protection, detection, and analysis that improves ransomware responsiveness. Compass is also being enhanced to use several patented techniques that are specific to analytics and ransomware. For example, analytics-based cloud brokering of data protection operations helps enterprises make secure, efficient, and cost-effective use of their cloud infrastructures. Another patented technique — dynamic IT infrastructure optimization in response to cyberthreats — offers unique ransomware analytics and automated optimization that will enable Compass to reconfigure IT infrastructure automatically when it detects cyberthreats, such as a ransomware attack, and dynamically adjust access to backup infrastructure and data to reduce exposure.

Compass is part of IBM’s product portfolio through the IBM Passport Advantage program. Through Passport Advantage, IBM sellers, partners, and distributors around the world can sell Compass under IBM part numbers to any organizations, particularly complex enterprises, that greatly benefit from the automated data protection and anti-ransomware solutions Compass delivers.

CIOReview’s report concludes, “With such innovations, all eyes will be on Cobalt Iron for further advancements in humanless, secure data backup solutions. Cobalt Iron currently focuses on IP protection and continuous R&D to bring about additional cybersecurity-related innovations, promising a more secure future for an enterprise’s data.”

About Cobalt Iron

Cobalt Iron was founded in 2013 to bring about fundamental changes in the world’s approach to secure data protection, and today the company’s Compass ® is the world’s leading SaaS-based enterprise data protection system. Through analytics and automation, Compass enables enterprises to transform and optimize legacy backup solutions into a simple cloud-based architecture with built-in cybersecurity. Processing more than 8 million jobs a month for customers in 44 countries, Compass delivers modern data protection for enterprise customers around the world.

Product or service names mentioned herein are the trademarks of their respective owners.

Link to Word


Photo Caption: Cobalt Iron Compass ® is a SaaS-based data protection platform leveraging strong IBM technologies for delivering a secure, modernized approach to data protection.

Follow Cobalt Iron

View source version on

CONTACT: Agency Contact:

Sunny Branson

Wall Street Communications

Tel: +1 801 326 9946

Web:www.wallstcom.comCobalt Iron Contact:

Mary Spurlock

VP of Marketing

Tel: +1 785 979 9461



SOURCE: Cobalt Iron

Copyright Business Wire 2022.

PUB: 07/28/2022 09:00 AM/DISC: 07/28/2022 09:03 AM

Thu, 28 Jul 2022 01:29:00 -0500 en text/html
Killexams : IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High

60% of breached businesses raised product prices post-breach; vast majority of critical infrastructure lagging in zero trust adoption; $550,000 in extra costs for insufficiently staffed businesses

CAMBRIDGE, Mass., July 27, 2022 /PRNewswire/ -- IBM (NYSE: IBM) Security today released the annual Cost of a Data Breach Report,1 revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the report, the findings suggest these incidents may also be contributing to rising costs of goods and services. In fact, 60% of studied organizations raised their product or services prices due to the breach, when the cost of goods is already soaring worldwide amid inflation and supply chain issues.

60% of breached businesses studied stated they increased the price of their products or services due to the data breach

The perpetuality of cyberattacks is also shedding light on the "haunting effect" data breaches are having on businesses, with the IBM report finding 83% of studied organizations have experienced more than one data breach in their lifetime. Another factor rising over time is the after-effects of breaches on these organizations, which linger long after they occur, as nearly 50% of breach costs are incurred more than a year after the breach.

The 2022 Cost of a Data Breach Report is based on in-depth analysis of real-world data breaches experienced by 550 organizations globally between March 2021 and March 2022. The research, which was sponsored and analyzed by IBM Security, was conducted by the Ponemon Institute.

Some of the key findings in the 2022 IBM report include:

  • Critical Infrastructure Lags in Zero Trust – Almost 80% of critical infrastructure organizations studied don't adopt zero trust strategies, seeing average breach costs rise to $5.4 million – a $1.17 million increase compared to those that do. All while 28% of breaches amongst these organizations were ransomware or destructive attacks.
  • It Doesn't Pay to Pay – Ransomware victims in the study that opted to pay threat actors' ransom demands saw only $610,000 less in average breach costs compared to those that chose not to pay – not including the cost of the ransom. Factoring in the high cost of ransom payments, the financial toll may rise even higher, suggesting that simply paying the ransom may not be an effective strategy.
  • Security Immaturity in Clouds – Forty-three percent of studied organizations are in the early stages or have not started applying security practices across their cloud environments, observing over $660,000 on average in higher breach costs than studied organizations with mature security across their cloud environments.
  • Security AI and Automation Leads as Multi-Million Dollar Cost Saver – Participating organizations fully deploying security AI and automation incurred $3.05 million less on average in breach costs compared to studied organizations that have not deployed the technology – the biggest cost saver observed in the study.

"Businesses need to put their security defenses on the offense and beat attackers to the punch. It's time to stop the adversary from achieving their objectives and start to minimize the impact of attacks. The more businesses try to perfect their perimeter instead of investing in detection and response, the more breaches can fuel cost of living increases." said Charles Henderson, Global Head of IBM Security X-Force. "This report shows that the right strategies coupled with the right technologies can help make all the difference when businesses are attacked."

Over-trusting Critical Infrastructure Organizations
Concerns over critical infrastructure targeting appear to be increasing globally over the past year, with many governments' cybersecurity agencies urging vigilance against disruptive attacks. In fact, IBM's report reveals that ransomware and destructive attacks represented 28% of breaches amongst critical infrastructure organizations studied, highlighting how threat actors are seeking to fracture the global supply chains that rely on these organizations. This includes financial services, industrial, transportation and healthcare companies amongst others.

Despite the call for caution, and a year after the Biden Administration issued a cybersecurity executive order that centers around the importance of adopting a zero trust approach to strengthen the nation's cybersecurity, only 21% of critical infrastructure organizations studied adopt a zero trust security model, according to the report. Add to that, 17% of breaches at critical infrastructure organizations were caused due to a business partner being initially compromised, highlighting the security risks that over-trusting environments pose.

Businesses that Pay the Ransom Aren't Getting a "Bargain"
According to the 2022 IBM report, businesses that paid threat actors' ransom demands saw $610,000 less in average breach costs compared to those that chose not to pay – not including the ransom amount paid. However, when accounting for the average ransom payment, which according to Sophos reached $812,000 in 2021, businesses that opt to pay the ransom could net higher total costs - all while inadvertently funding future ransomware attacks with capital that could be allocated to remediation and recovery efforts and looking at potential federal offenses.

The persistence of ransomware, despite significant global efforts to impede it, is fueled by the industrialization of cybercrime. IBM Security X-Force discovered the duration of studied enterprise ransomware attacks shows a drop of 94% over the past three years – from over two months to just under four days. These exponentially shorter attack lifecycles can prompt higher impact attacks, as cybersecurity incident responders are left with very short windows of opportunity to detect and contain attacks. With "time to ransom" dropping to a matter of hours, it's essential that businesses prioritize rigorous testing of incident response (IR) playbooks ahead of time. But the report states that as many as 37% of organizations studied that have incident response plans don't test them regularly.

Hybrid Cloud Advantage
The report also showcased hybrid cloud environments as the most prevalent (45%) infrastructure amongst organizations studied. Averaging $3.8 million in breach costs, businesses that adopted a hybrid cloud model observed lower breach costs compared to businesses with a solely public or private cloud model, which experienced $5.02 million and $4.24 million on average respectively. In fact, hybrid cloud adopters studied were able to identify and contain data breaches 15 days faster on average than the global average of 277 days for participants.

The report highlights that 45% of studied breaches occurred in the cloud, emphasizing the importance of cloud security. However, a significant 43% of reporting organizations stated they are just in the early stages or have not started implementing security practices to protect their cloud environments, observing higher breach costs2. Businesses studied that did not implement security practices across their cloud environments required an average 108 more days to identify and contain a data breach than those consistently applying security practices across all their domains.

Additional findings in the 2022 IBM report include:

  • Phishing Becomes Costliest Breach Cause – While compromised credentials continued to reign as the most common cause of a breach (19%), phishing was the second (16%) and the costliest cause, leading to $4.91 million in average breach costs for responding organizations.
  • Healthcare Breach Costs Hit Double Digits for First Time Ever– For the 12th year in a row, healthcare participants saw the costliest breaches amongst industries with average breach costs in healthcare increasing by nearly $1 million to reach a record high of $10.1 million.
  • Insufficient Security Staffing – Sixty-two percent of studied organizations stated they are not sufficiently staffed to meet their security needs, averaging $550,000 more in breach costs than those that state they are sufficiently staffed.

Additional Sources

  • To obtain a copy of the 2022 Cost of a Data Breach Report, please visit:
  • Read more about the report's top findings in this IBM Security Intelligence blog.
  • Sign up for the 2022 IBM Security Cost of a Data Breach webinar on Wednesday, August 3, 2022, at 11:00 a.m. ET here.
  • Connect with the IBM Security X-Force team for a personalized review of the findings:

About IBM Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned IBM Security X-Force® research, enables organizations to effectively manage risk and defend against emerging threats. IBM operates one of the world's broadest security research, development, and delivery organizations, monitors 150 billion+ security events per day in more than 130 countries, and has been granted more than 10,000 security patents worldwide. For more information, please check, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.

Press Contact:

IBM Security Communications
Georgia Prassinos

1 Cost of a Data Breach Report 2022, conducted by Ponemon Institute, sponsored, and analyzed by IBM
2 Average cost of $4.53M, compared to average cost $3.87 million at participating organizations with mature-stage cloud security practices

IBM Corporation logo. (PRNewsfoto/IBM)

Cision View original content to obtain multimedia:


Tue, 26 Jul 2022 16:38:00 -0500 en-US text/html
C2140-136 exam dump and training guide direct download
Training Exams List