Save M8060-730 Free PDF downloaded from killexams.com and read
Guarantee that you have IBM M8060-730 cram of genuine inquiries for the IBM B2B Integration-Network Sales Mastery Test v2 Exam prep before you step through the genuine examination. We give the most refreshed and legitimate M8060-730 Dumps that contain M8060-730 actual test questions. We have gathered and made a data set of M8060-730 Exam dumps from real
Exam Code: M8060-730 Practice exam 2022 by Killexams.com team IBM B2B Integration-Network Sales Mastery Test v2 IBM Integration-Network questions Killexams : IBM Integration-Network questions - BingNews
Search resultsKillexams : IBM Integration-Network questions - BingNews
https://killexams.com/exam_list/IBMKillexams : 3 IBM employees share how mentorship and connection to their heritage helped shape their careers
In honor of National Hispanic Heritage Month, we asked three IBM employees to share their experiences. Romelia Flores is an IBM distinguished engineer and a master inventor currently on IBM's client engineering team based in Dallas, Texas. Robert Loredo is the IBM quantum ambassador worldwide lead and a master inventor based in South Florida. Catherine Treviño is a z Hardware brand technical specialist based in Poughkeepsie, New York.
In this Q&A, these three employees open up about how mentorship has benefitted their careers and share the importance of giving back to fellow members of the Hispanic community.
Tell us about your journey at IBM.
Flores: I joined IBM over 30 years ago as an intern and student at the University of Texas at Austin where I obtained a degree in computer science. As a software developer, I thrive on leveraging technology to accelerate business and collaborate with clients to drive app modernization. IBM has superlative talent around the world, many of whom have guided my journey. Being a strong technologist means being a continuous learner of technology as well as establishing a strong network.
Loredo: I joined IBM in 2004 and am fortunate to have a successful career because of IBM's network and community. I have 20 years of experience in enterprise product development leveraging leading-edge technologies, most recently with quantum computing, a technology that's expected to solve intractable problems that today's most powerful classical supercomputers find challenging to solve.
Treviño: My journey at IBM has been short but accomplished! I joined in 2020 as an intern and rising senior from the University of Texas – Rio Grande Valley. Upon completing my internship, I accepted an offer and returned in 2021. I've since switched roles to a different business unit, thanks to the guidance of fellow volunteers of Hispanics@IBM, the community for Hispanic IBM employees.
How has mentorship impacted your career?
Treviño: Networking led to a new opportunity within my first year at IBM. When I first joined full-time, I quickly realized the role was not the right fit. As a first-generation professional, I wasn't sure how to navigate the situation. I chatted with Alan, IBM D&I leader for the Hispanic community, who connected me with Cleo, a Hispanic executive council leader, who brought up an open role. I'm grateful for that connection! Long story short, I'm now part of Cleo's global sales team, where I help financial market clients find solutions with our z Systems.
Loredo: I'm grateful for the mentor who saw my potential and found a unique way to teach me complex subjects. While at Miami-Dade College, I struggled with the courses for engineering majors. My professor knew I enjoyed music and began teaching me mathematics using music as an analogy. That was my 'aha!' moment. My grades improved, allowing a transfer to the University of Miami, where I completed my bachelor's and master's degrees in computer engineering. That moment, when my professor found an unconventional way to teach, had a profound impact on me. I use that technique today. I wrote a book that teaches quantum computing implementation and I use analogies to explain it.
As a mentor, what advice do you share with mentees?
Flores: I've mentored hundreds of college students and IBM employees, including distinguished engineers and technologists. I've been told— especially by females and underrepresented minorities — that they've never seen a technologist with my level of impact, and they ask, "What's your secret to success?" This inspired me to develop the "Eight Cs: Blueprint for Success" which I believe are key attributes for attaining success: competence, communication, commitment, creativity, collaboration, confidence, community, and chuckle – we often forget about this last one, but our work should be fun!
IBM continues to spend millions to buy hybrid cloud companies, as the company makes its sixth acquisition in 2022 with Dialexa.
IBM continues to spend millions on buying hybrid cloud companies with the unveiling of its acquisition of engineering consulting specialist Dialexa to boost its cloud charge.
Since IBM CEO Arvind Krishna took the reins in April 2020, IBM has acquired more than 25 companies, including many hybrid cloud businesses.
In February alone, IBM acquired cloud consultant services standout Sentaca, as well as Microsoft Azure consultancy all-star Neudesic—with the two purchases squarely aimed at boosting IBM’s hybrid and multi-cloud services capabilities.
Looking at the Armonk, N.Y.-based company’s purchase of Dialexa, IBM will gain 300 skilled product managers, designers, full-stack engineers and data scientists. Dialexa will become part of IBM’s Consulting business unit, which spearheads the company’s digital product engineering services in the Americas.
“Dialexa’s product engineering expertise, combined with IBM’s hybrid cloud and business transformation offerings, will help our clients turn concepts into differentiated product portfolios that accelerate growth,” said John Granger, senior vice president of IBM Consulting, in a statement.
Krishna:Hybrid Cloud A ‘Competitive Advantage’
Dialexa marks IBM’s sixth purchase in 2022 with the goal of boosting its hybrid cloud and artificial intelligence abilities.
Along with buying Dialexa, Sentaca and Neudesic, IBM has also acquired Randori, an attack surface management cybersecurity specialist that helps protect hybrid cloud environments.
Earlier this year, IBM’s CEO said hybrid cloud and artificial intelligence are top of mind for his company in terms of investment and the future.
“We are integrating technology and expertise—from IBM, our partners and even our competitors—to meet the urgent needs of our clients, who see hybrid cloud and AI as crucial sources of competitive advantage,” Krishna said in March. “And we are ready to be the catalyst of progress for our clients as they pursue the digital transformation of the world’s mission-critical businesses.”
In 2021, IBM’s hybrid cloud revenue jumped 19 percent compared with 2020, comprising 35 percent of its total revenue.
IBM’s Acquisition Of Dialexa
Based in Dallas and Chicago, Dialexa delivers a suite of digital product engineering services to help customers create transformative products to drive business outcomes.
Dialexa’s 300-strong engineers and skilled IT experts advise and create custom digital products for customers, which include Deere & Company, Pizza Hut U.S. and Toyota Motor North America. Financial terms of the Dialexa deal were not disclosed.
IBM said Dialexa provides deep experience delivering end-to-end digital product engineering services consisting of strategy, design, build, launch and optimization services across cloud platforms including Amazon Web Services and Microsoft Azure.
“Digital product engineering represents the tip of the spear for competitive advantage,” said Dialexa CEO Scott Harper in a statement. “IBM and Dialexa’s shared vision for delivering industry-defining digital products could be a game-changer.”
Mark Haranas is an assistant news editor and longtime journalist now covering cloud, multicloud, software, SaaS and channel partners at CRN. He speaks with world-renown CEOs and IT experts as well as covering breaking news and live events while also managing several CRN reporters. He can be reached at email@example.com.
Fri, 23 Sep 2022 09:04:00 -0500entext/htmlhttps://www.crn.com/news/cloud/ibm-s-cloud-acquisition-charge-continues-with-dialexaKillexams : Third-party risk: What it is and how CISOs can address it
Did you miss a session from MetaBeat 2022? Head over to the on-demand library for all of our featured sessionshere.
In today’s world where business processes are becoming more complex and dynamic, organizations have started to rely increasingly on third parties to bolster their capabilities for providing essential services.
However, while onboarding third-party capabilities can optimize distribution and profits, third parties come with their own set of risks and dangers. For example, third-party vendors who share systems with an organization may pose security risks that can have significant financial, legal and business consequences.
According to Gartner, organizations that hesitate to expand their ecosystem for fear of the risks it can create will likely be overtaken by organizations that boldly decide to seize the value of third-party relationships, confident in their ability to identify and manage the accompanying risks effectively. Therefore, it’s critical to handle third-party security risks efficiently and effectively.
Risk and compliance
Third parties can increase an organization’s exposure to several risks that include disrupted or failed operations, data security failures, compliance failures and an inconsistent view of goals for the organization. According to an Intel471 threat intelligence report, 51% of organizations experienced a data breach caused by a third party.
Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today.
“Organizations often grant third parties access to networks, applications, and resources for legitimate business reasons. However, when doing so with a legacy VPN, they often provide overly broad access to an entire network, rather than granular access to the specific apps and resources needed to do their job,” John Dasher, VP of product marketing, Banyan Security told VentureBeat.
Third-party risks have grown so much that compliance regulations have become essential to an organization’s processes and policies. Despite evolving regulations and an increase in confidence for risk programs across the board, a report by Deloitte found that third-party risk estimates have also concluded that more than 40% of organizations do not do enhanced due diligence on third parties.
The rising cybersecurity threat
As the need for third-party risk management becomes more apparent to organizations, risk management teams have begun going to great lengths to ensure that vendors do not become liabilities when they become a crucial part of business operations.
However, when organizations often incorporate a third party into their business operations, they unknowingly also incorporate other organizations, whether now or in the future. This can cause organizations to unknowingly take numerous forms of risk, especially in terms of cybersecurity.
“It’s a huge concern as companies can’t just stop working with third parties,” said Alla Valente, senior analyst at Forrester. According to her, as businesses shifted from “just-in-time” efficiency to “just-in-case” resilience after the pandemic, many doubled the number of third parties in their ecosystem to Boost their business resilience.
“Third parties are critical for your business to achieve its goals, and each third party is a conduit for breach and an attack vector. Therefore, if your third parties cannot perform due to a cyberattack, incident, or operational disruption, it will impact your business,” explained Valente.
Third-parties that provide vital services to an organization often have some form of integration within their network. As a result, any vulnerability within their cybersecurity framework can be exploited and used to access the original organization’s data if a third party does not effectively manage or follow a cybersecurity program.
Again, this becomes a growing concern, especially when a complex web of various vendors is created through third-party relationships that are all connected throughout their network.
Adam Bixler, global head of third-party cyber risk management at BlueVoyant, says that threat actors use the weakest touchpoint to gain access to their target and, often, it is the weakest link in a third-party supply chain that threat actors focus on to navigate upstream to the intended company.
“In general, we have seen that cyberthreat actors are opportunistic. This has been a highly successful technique, and until security practices are implemented systematically and equally throughout the entire third-party ecosystem, all involved are at risk of this type of attack,” said Bixler.
Bixler told VentureBeat that when BlueVoyant surveyed executives with responsibility for cybersecurity across the globe, it was found that 97% of surveyed firms had been negatively impacted by a cybersecurity breach in their supply chain.
A large majority (93%) admitted that they had suffered a direct cybersecurity breach because of weaknesses in their supply chain, and the average number of breaches experienced in the last 12 months grew from 2.7 in 2020 to 3.7 in 2021 — a 37% year-over-year increase.
It is not only cybersecurity that poses a severe risk, but any disruption to any business across the web of third parties can cause a chain reaction and thus greatly hinder essential business operations.
“The real danger lies in accepting third-party files from unauthorized or authorized vendors who don’t know they have been compromised. Over 80% of attacks originate from weaponized office and PDF files that look legitimate. If those files are allowed inside your organization, they pose a threat if downloaded,” says Karen Crowley, director of product solutions at Deep Instinct.
Crowley said that multistage attacks are low and slow, with threat actors willing to wait for their moment to get to the crown jewels.
Hazards of a third-party data breach
Enhancing access and data sharing can provide social and economic benefits to organizations while showcasing good public governance. However, data access and sharing also come with several risks. These include the dangers of confidentiality or privacy breaches, and violation of other legitimate private interests, such as commercial interests.
“The primary dangers of sharing information with undocumented third parties or third-party vendors is that you have no way of knowing what their security program consists of or how it is implemented, and therefore no way to know how your data will be maintained or secured once you share,” said Lorri Janssen-Anessi, director, external cyber assessments at BlueVoyant.
According to Anessi, it’s critical to safeguard your proprietary information and to demand the same level of security from third parties/vendors you engage with. She recommends that while sharing data with a third party, enterprises should have a system to onboard vendors that include knowing the third party’s cyber-risk posture and how these risks will be mitigated.
Organizations that do not take proper precautions to protect themselves against third-party risk expose their businesses to both security and non-compliance threats.
These data breaches may be incredibly disruptive to your organization and have profound implications, including the following:
Monetary losses: Data breaches are costly regardless of how they occur. According to the Ponemon Institute and IBM’s cost of a data breach report, the average cost of a data breach is $3.92 million, with each lost record costing $150. The reason for the breach is one aspect that increases the cost of the breach, and a breach costs more if a third party is involved. Based on the analysis, the price of a third-party data breach often rises by more than $370,000, with an adjusted average total cost of $4.29 million.
Exposure of sensitive information: Third-party data breaches can result in the loss of your intellectual property and consumer information. Several attack vectors can expose a company’s private information and inflict considerable damage, ranging from data-stealing malware to ransomware attacks that lock you out of your business data and threaten to sell it if the ransom is not paid.
Damaged reputation: Reputational harm is one of the most severe repercussions of a data breach. Even if the data breach was not your fault, the fact that your clients trusted you with their information and you let them down is all that matters. This might also have a significant financial impact on your company.
Potential for future attacks: When cybercriminals access your data through a third party, that breach may not be their endgame. It may simply be the beginning of a more extensive campaign of hacks, attacks and breaches, or the information stolen might be intended for use in phishing scams or other fraud. The collected data might be used in later attacks.
Best practices to mitigate third-party risk
Philip Harris, director, cybersecurity risk management services at IDC, says that to mitigate third-party risks more effectively, it is important to work with the appropriate teams within an organization that have the most knowledge about all the third parties the company deals with.
“Doing so can not only help create an inventory of these third parties, but also help classify them based upon the critical nature of the data they hold and/or if they’re part of a critical business process,” said Harris.
Jad Boutros, cofounder and CEO of TerraTrue, says it is important for organizations to understand the security posture of all of their third parties by asking questions during due diligence and security certification reviews.
According to Boutros, a few strategic guidance points that CISOs can follow to avoid third-party security hazards are:
Understand what data is shared between the organization and the third party. If it is possible to avoid sharing susceptible data or transform it (i.e., with bracketing, anonymizing or minimizing) to defend against certain misuses, such mitigations are worth considering.
Some third parties may also expose particularly risky functionalities (e.g., transferring data over insecure channels, or exposing additional power-user functionality); if not needed, finding ways to disable them will make for a safer integration.
Lastly, regularly reviewing who in the organization has access to the third party and/or elevated access helps reduce the blast radius of an internal account compromise.
Other preventive solutions
A few other solutions that organizations can implement to prevent third-party risks are:
Third-party risk management (TPRM) program
With increased exposure due to cooperating with third parties, the necessity for an effective third-party risk management (TPRM) program has grown significantly for organizations of all sizes. TPRM programs can help analyze and control risks associated with outsourcing to third-party vendors or service providers. This is especially true for high-risk vendors who handle sensitive data, intellectual property or other sensitive information. In addition, TPRM programs enable organizations to ensure that they are robust and have 360-degree situational awareness of potential cyber-risks.
Cyberthreat intelligence (CTI) architectures
Another preventive security measure is implementing cyberthreat intelligence (CTI) architectures. CTI focuses on gathering and evaluating information concerning present and future threats to an organization’s safety or assets. The advantage of threat intelligence is that it is a proactive solution, i.e., it can inform businesses about data breaches in advance, reducing businesses’ financial expenditures of clearing up after an occurrence. Its goal is to provide businesses with a thorough awareness of the dangers that represent the most significant risk to their infrastructure and to advise them on how to defend their operations.
Security ratings, often known as cybersecurity ratings, are becoming a popular way to assess third-party security postures in real time. They enable third-party risk management teams to undertake due diligence on business partners, service providers, and third-party suppliers in minutes — rather than weeks — by analyzing their external security posture promptly and objectively. Security ratings cover a significant gap left by traditional risk assessment approaches like penetration testing and on-site visits.
Traditional methods are time-consuming, point-in-time, costly, and frequently rely on subjective evaluations. Furthermore, validating suppliers’ assertions regarding their information security policies might be difficult. Third-party risk management teams can obtain objective, verifiable and always up-to-date information about a vendor’s security procedures by employing security ratings with existing risk management methodologies.
Future challenges and important considerations
Harris says that third parties have always been an area where the attack surface has grown, but this hasn’t been taken too seriously and companies have taken a blind eye to it instead of seeing it as a real potential threat.
“Third parties need to be a board-level Topic and part of the overall security metrics created to manage security holistically. There are various solutions, but these unfortunately require humans as part of the assessment process,” said Harris.
Gartner’s survey found that risk monitoring is a common gap in third-party risk management. In such cases, an enterprise risk management (ERM) function can provide valuable support for managing third-party risks. Organizations that monitor changes in the scope of third-party risk relationships yield the most positive risk outcomes, and ERM can support monitoring changes in third-party partnerships to manage the risk better.
According to Avishai Avivi, CISO at SafeBreach, most third-party risk solutions available today only provide an overview of cybersecurity, but the problem is much more profound.
Avivi said third-party breaches through supply chains are another growing risk vector that CISOs need to consider. To prevent attacks through supply chain endpoints, he highly recommends that companies that work with a significant amount of customer-sensitive data consider developing a full privacy practice.
“Solutions still need to evolve to support third-party assessments of the vendor’s privacy posture. While there are plenty of third parties that get SOC 2 and ISO 27001 audits, they are still not enough to get their privacy practices audited. Most companies do not look for the “privacy” category of SOC 2 or the ISO 27701 certificate. The solutions available today still need to mature before they can match the need,” Avivi explained.
VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.
Wed, 21 Sep 2022 08:10:00 -0500Victor Deyen-UStext/htmlhttps://venturebeat.com/security/third-party-risk-what-it-is-and-how-cisos-can-address-it/Killexams : IBM Assimilates Red Hat Storage Technology Into Own Storage Business
IBM, which three years ago acquired Red Hat, is now moving Red Hat OpenShift Data Foundation and Red Hat Ceph, along with their development teams, into IBM Storage as part of a move to make a bigger play in the software-defined and open-source storage worlds.
IBM Tuesday said it has absorbed storage technology and teams from its Red Hat business to combine them with IBM’s own storage business unit as a way to help clients take advantage of the two without requiring extra integration or having to deal with multiple sales teams.
IBM is integrating Red Hat OpenShift Data Foundation with its IBM Spectrum Fusion and will offer Red Hat Ceph-based storage technologies to its clients in a move to continue Big Blue’s software-defined storage leadership, said Brent Compton, senior director of Data Foundation for Red Hat’s hybrid cloud business.
“OpenShift Data Foundation and Ceph will become a big part of IBM Storage,” he said. “IBM has been looking for a way to take advantage of Ceph and ODF, and now it can.”
Ceph is an open-source software-defined object storage technology with interfaces for object, block and file storage. Red Hat OpenShift Data Foundation is a software-defined container-native storage that provides cluster data management capabilities as part of the OpenShift container platform.
Scott Baker, chief marketing officer and vice president of IBM hybrid cloud portfolio and product marketing, told CRN the move to combine Red Hat and IBM storage technologies sets the stage for growth in the combined software-defined storage portfolio.
“Customers not only get a choice of where storage runs—at the edge, in the cloud, or on-prem—but will find storage software releases will no longer be tied to the timing of storage hardware releases,” Baker said. “For instance, IBM normally enhances its Spectrum Virtualize or Spectrum Scale with new versions of the IBM FlashSystem. But with software-defined storage, we can drive changes quicker if they’re not tied to hardware releases.”
By bringing Red Hat OpenShift Data Foundation and Ceph into IBM, customers get the opportunity to access unified block, file, and object storage without regard to the genuine underlying hardware, Baker said.
“They can use Ceph to add the right type of storage depending on the protocol they need,” he said. “Ceph and ODF also simplifies how IBM provides data storage and protection. To do all that with IBM’s storage portfolio takes time. With CEF and ODF as part of IBM Storage, this can get done immediately.”
It really is the best of both worlds, as Red Hat customers will also see strong benefits from IBM Storage, Compton said.
“It’s important to note that IBM will continue to offer OpenShift Data Foundation inside the Red Hat OpenShift Platform Plus hybrid cloud platform,” he said. “So if a customer gets pre-integrated OpenShift Data Foundation inside Red Hat OpenShift Platform Plus, it accelerates their time to market. There’s no need to integrate the storage. This will not change.”
Also, Red Hat OpenShift customers have used Ceph to accelerate their time to scale for years, and Red Hat will continue to sell Ceph, Compton said.
“But by moving Ceph to IBM Storage, IBM will accelerate development of the storage-specific features,” he said. “Red Hat is not a storage company. So this will accelerate development of unified capabilities.”
IBM’s storage move makes good on the potential many saw with the company’s acquisition of Red Hat, said John Teltsch, chief revenue officer at Converge Technology Solutions, a Gatineau, Quebec-based solution provider and channel partner to both IBM and Red Hat that ranked No. 36 on CRN’s 2022 Solution Provider 500.
“This is something the channel has been waiting for ever since IBM acquired Red Hat,” Teltsch told CRN. “IBM has been doing a lot around software-defined storage. And when you add in Red Hat, it gives us an integrated solutions play. It lets us build an integrated sales team. We don’t have to first talk about IBM storage capabilities, and then bring in our Red Hat team to talk about Red Hat.”
Converge Technology Partners’ IBM and Red Hat sales teams are currently two separate teams, said Teltsch, who joined the company in March from IBM, where he held numerous sales leadership roles, including two years as Big Blue’s channel chief.
“Once IBM and Red Hat storage are together, it gets more simple to sell,” he said. “And it simplifies our training while IBM will have one integrated set of offerings for its clients. This lets us bring the best of Red Hat open-source capabilities with IBM storage. We’re living in a data-driven world. This move simplifies our go-to-market, as well as simplifies the client experience, client engagement, and client adoption.”
Joseph F. Kovar is a senior editor and reporter for the storage and the non-tech-focused channel beats for CRN. He keeps readers abreast of the latest issues related to such areas as data life-cycle, business continuity and disaster recovery, and data centers, along with related services and software, while highlighting some of the key trends that impact the IT channel overall. He can be reached at firstname.lastname@example.org.
Tue, 04 Oct 2022 19:00:00 -0500entext/htmlhttps://www.crn.com/news/storage/ibm-assimilates-red-hat-storage-technology-into-own-storage-businessKillexams : IBM’s former CEO downplays the importance of a college degree for six-figure earning ‘new collar’ jobs that now make up half of its workers
A four-year bachelor’s degree has long been the first rung to climbing America’s corporate ladder.
“I really do believe an inclusive diverse workforce is better for your company, it’s good for the business,” Ginni Rometty, former IBM CEO, told Fortune Media CEO Alan Murray during a panel last month for Connect, Fortune’s executive education community. “That’s not just altruistic.”
Under Rometty’s leadership in 2016, tech giant IBM coined the term “new collar jobs” in reference to roles that require a specific set of skills rather than a four-year degree. It’s a personal commitment for Rometty, one that hits close to home for the 40-year IBM veteran.
When Rometty was 16, her father left the family, leaving her mother, who’d never worked outside the home, suddenly in the position to provide.
“She had four children and nothing past high school, and she had to get a job to…get us out of this downward spiral,” Rometty recalled to Murray. “What I saw in that was that my mother had aptitude; she wasn’t dumb, she just didn’t have access, and that forever stayed in my mind.”
When Rometty became CEO in 2012 following the Great Recession, the U.S. unemployment rate hovered around 8%. Despite the influx of applicants, she struggled to find employees who were trained in the particular cybersecurity area she was looking for.
“I realized I couldn’t hire them, so I had to start building them,” she said.
Through P-TECH, Rometty visited “a very poor high school in a bad neighborhood” that received the company’s support, as well as a community college where IBM was offering help with a technology-based curriculum and internships.
“Voilà! These kids could do the work. I didn’t have [applicants with] college degrees, so I learned that propensity to learn is way more important than just having a degree,” Rometty said.
Realizing the students were fully capable of the tasks that IBM needed moved Rometty to return to the drawing board when it came to IBM’s own application process and whom it was reaching. She said that at the time, 95% of job openings at IBM required a four-year degree. As of January 2021, less than half do, and the company is continuously reevaluating its roles.
For the jobs that now no longer require degrees and instead rely on skills and willingness to learn, IBM had always hired Ph.D. holders from the very best Ivy League schools, Rometty told Murray. But data shows that the degree-less hires for the same jobs performed just as well. “They were more loyal, higher retention, and many went on to get college degrees,” she said.
Rometty has since become cochair of OneTen, a civic organization committed to hiring, promoting, and advancing 1 million Black individuals without four-year degrees within the next 10 years.
If college degrees no longer become compulsory for white-collar jobs, many other qualifications—skills that couldn’t be easily taught in a boot camp, apprenticeship program, or in the first month on the job—could die off, too, University of Virginia Darden School of Business professor Sean Martin told Fortunelast year.
“The companies themselves miss out on people that research suggests…might be less entitled, more culturally savvy, more desirous of being there,” Martin said. Rather than pedigree, he added, hiring managers should look for motivation.
That’s certainly the case at IBM. Once the company widened its scope, Rometty said, the propensity to learn quickly became more of an important hiring factor than just a degree.
Sun, 16 Oct 2022 06:27:00 -0500en-UStext/htmlhttps://finance.yahoo.com/news/ibm-former-ceo-downplays-importance-165139880.htmlKillexams : IBM Acquires Dialexa
IBM (NYSE:IBM) acquired Dialexa, a Dallas TX and Chicago, IL-based digital product engineering services firm.
The amount of the deal was not disclosed. The transaction is expected to close in the fourth quarter of this year and is subject to customary closing conditions and regulatory clearances.
The acquisition is expected to enhance IBM’s product engineering expertise and provide end-to-end digital transformation services for clients. Upon close, Dialexa will join IBM Consulting, strengthening IBM’s digital product engineering services presence in the Americas.
Founded in 2010 and led by CEO Scott Harper, Dialexa delivers a suite of digital product engineering services, enabling organizations to create new products to drive business outcomes. The company has deep experience delivering end-to-end digital product engineering services consisting of strategy, design, build, launch, and optimization services across cloud platforms including AWS and Microsoft Azure. Its team of 300 product managers, designers, full-stack engineers and data scientists, based in Dallas and Chicago, advise and create custom, commercial-grade digital products for clients such as Deere & Company, Pizza Hut US, and Toyota Motor North America.
IBM has announced the latest version of its Linux-focused mainframe - the LinuxOne Emperor 4 as the company leads with promises of reduced energy consumption and increased sustainability.
While the z16 mainframe, which was announced by the company in April 2022, is optimized for IBM’s z/OS operating system, the LinuxOne Emperor 4 is designed to support Linux operating systems in a bid to obtain a significant portion of the Linux market.
Big Blue’s latest mainframe supports 32 Telum processors and can provide up to 40TB of RAIM. The Emperor 4 also provides “seven nines” of availability, which should translate to three seconds of downtime per year.
Mainframes for Linux distros are increasingly popular among financial services organizations, with Citibank being a user of IBM’s LinuxOne mainframes, combined with the MongoDB database.
With its latest iteration, it’s clear that IBM’s focus is on increasing environmental pressures. In a release, it claims that the Emperor 4 “can reduce energy consumption by 75%, space by 50%, and the CO2e footprint by over 850 metric tons annually.”
This expression of commitment towards creating more sustainable products goes hand-in-hand with IBM’s own research which suggests that around half of the CEOs that took part saw sustainability as their highest priority, and indeed one of their greatest challenges.
The integration of artificial intelligence inference should also serve to Boost latency.
Availability for the IBM LinuxOne Emperor 4 is scheduled for September 14, 2022, with entry- and mid-range models set to follow in the first half of 2023.
Tue, 13 Sep 2022 03:17:00 -0500en-UStext/htmlhttps://www.msn.com/en-us/news/technology/ibm-gives-its-linux-mainframe-a-major-update/ar-AA11Mme9Killexams : IBM Research Secures Future Safe From Quantum Attacks
Quantum computing will bring unimagined innovations to the world when it finally arrives in full glory. Still, quantum remains in the research labs at companies like IBM, Google, and Microsoft. While companies and research institutions are investing billions of dollars to increase the capacity of quantum systems, a time will come in the following years, or decades, when researchers will reach "quantum supremacy." But these large quantum marvels could also jeopardize the security of critical information systems. Researchers, including IBM are working to develop new security algorithms that will be resilient to these attacks.
The Quantum Threat to Security
While quantum can solve computing challenges far beyond what is possible today, its ability to find the factors of large prime numbers makes it the ideal cybersecurity safe cracker once quantum computing systems mature in their scale, quality, and speed. Every computer system and every bit of "secure" data could become vulnerable to attack from quantum-equipped nefarious actors. The World Economic Forum "estimate(s) that over 20 billion digital devices will need to be either upgraded or replaced in the next 10-20 years to use the new forms of quantum-resistant encrypted communication. We recommend that organizations start planning for this now.”
What constitutes "adequate size" might supply us some false comfort: a 2019 study suggested that a computer with 20 million qubits would take eight hours to break modern encryption. Today's quantum computers are on the order of only 100 qubits. But while that implies that the threat is in the distant future, one must consider that a bad actor doesn't need to wait for the massive quantum system to materialize. The "Steal now, crack later" approach leads to a latent future security threat. Consequently, organizations should deploy quantum-safe security as soon as possible to minimize future risk.
Stopping Quantum Attacks Before They Begin
Consequently, the National Institute of Standards and Technology (NIST), a bureau of the U.S. Department of Commerce, has been conducting an ongoing search for quantum-safe security algorithms that are both secure and efficient. After all, we need our laptops, cars, and mobile phones to also be able to resist attacks from quantum-equipped bad actors. After four rounds of submissions, NIST selected four algorithms from a slate of 82 candidates. IBM Research had submitted 3 of the four chosen algorithms. All submissions have been subjected to research by industry scrutiny by government agencies, academic scientists, and mathematicians. This process is now reaching its conclusion; the NIST is expected to publish standards based on these 4 algorithms sometime in 2024.
The NIST contest covers the two aspects of security that could be vulnerable to quantum computing: public key encapsulation (used for public-key encryption and key establishment) and digital signatures (used for identity authentication and non-repudiation). For the former, NIST selected the CRYSTALS-Kyber algorithm. NIST selected three algorithms for signatures: CRYSTALS-Dilithium, FALCON, and SPHINCS+, with CRYSTALS-Dilithium as the primary algorithm in the signature category.
The Telco Industry Steps Up to Address Quantum Safe
On September 29, GSMA announced the formation of the GSMA Post-Quantum Telco Network Taskforce, of which IBM and Vodafone are initial members, to help define policy, regulation and operator business processes to enhance protections of telecommunications in a future of advanced quantum computing. Since virtually all organizations and sectors conduct commerce on the internet, and the 800 providers whose pipes that carry all the internet traffic, the Telco industry is a good place to start. We expect other sectors to follow suit, perhaps starting with banking, government, and health care.
IBM Adds Quantum-Safe Security to the IBM z16
Given the magnitude of the potential risks, and the predominance of IBM Z systems in security-critical applications, IBM has included future-proof digital signature support in its latest z16 mainframe using CRYSTALS-Kyber and CRYSTALS -Dilithium algorithms selected by NIST. z16 implements this algorithm across multiple layers of firmware to help protect business-critical infrastructure and data from future quantum attacks. IBM has said it is also working to bring these new methods to the broader market.
In addition, IBM has developed a multi-step process to assist clients toward rapidly making institutions quantum safe. The company works with clients to identify where they are vulnerable to quantum-based cryptography attacks, assess cryptographic maturity and dependencies, and identify near-term achievable cryptographic goals and projects. The risks clients may face vary substantially based on the type of applications and data an organization handles and the state of its current cryptography.
Quantum computing's potential threat to global information security may seem to be a distant and abstract risk. However, the inevitable advances of quantum technology and the "Steal now, crack later" approach bad actors are undertaking to make quantum-safe a genuine and pressing matter for vendors and IT organizations. IBM wasted no time bringing that technology to market in the IBM z16. IBM Research has contributed three of the four algorithms the NIST quantum-safe contest has selected to be the most viable, secure, and efficient of the 70 techniques evaluated.
Beyond the NIST-approved algorithms, IBM Is working to provide “crypto agility”, helping organizations not only replace the soon-to-fail existing algorithms but also transform their security practices to remain resilient as new threats emerge in the post-quantum world. Creating crypto observability, enabling ongoing monitoring and actions on crypto-related security items, will help keep the world safer from bad actors with virtually unlimited computing capacity at their disposal.
Disclosures: This article expresses the opinions of the authors, and is not to be taken as advice to purchase from nor invest in the companies mentioned. Cambrian AI Research is fortunate to have many, if not most, semiconductor firms as our clients, including Blaize, Cerebras, D-Matrix, Esperanto, FuriosaAI, Graphcore, GML, IBM, Intel, Mythic, NVIDIA, Qualcomm Technologies, Si-Five, SiMa.ai, Synopsys, and Tenstorrent. We have no investment positions in any of the companies mentioned in this article and do not plan to initiate any in the near future. For more information, please visit our website at https://cambrian-AI.com.
Thu, 29 Sep 2022 06:16:00 -0500Karl Freundentext/htmlhttps://www.forbes.com/sites/karlfreund/2022/09/29/ibm-research-prepares-for-a-world-safe-from-quantum-attacks/Killexams : IBM, Vodaphone, GSMA form group to promote quantum-safe networks
The Global System for Mobile Communications Association (GSMA), IBM and Vodaphone are teaming up to form a task force that will promote quantum-safe cryptography standards for telco networks and, ultimately, enterprise cloud service environments.
The idea behind the new group, called the GSMA Post-Quantum Telco Network Taskforce, is to define requirements and create a standards-based roadmap to implement quantum-safe networking and mitigate anticipated security risks.
“Telco networks are the underpinning of all enterprise services, regardless of what industry they are in, so it is critical that those networks [get] out in front of the security challenges quantum brings,” said Ray Harishankar, IBM Fellow, vice president, and leader of Big Blue’s Quantum Safe strategy. “The idea of the group is to start to develop a quantum-safe plan now, because the components and standards of that roadmap won’t be developed overnight.”
The task force will have to prioritize what it believes are critical technologies and what needs to be done to protect switches, network devices, and endpoints that are connected to that, Harishankar said. “After that, you’d move up the stack into protecting the applications that run on the network, and service provider platforms, and so on,” he said.
The task force expects other players to join its standards-setting efforts, and it expects to work with standards-setting groups such as the Internet Engineering Task Force (IETF) and U.S. National Institute of Standards and Technology (NIST) in the future.
While a world of quantum networking and services is years away, the more immediate concern for enterprise and telcos is protecting against the “harvest now decrypt later” attack scenario, in which attackers steal encrypted data in present time with the idea that they can decrypt it later with a quantum computer.
“A bad actor can get the information today and sit on it for 13 years and then wait for it to be easily cracked open in the future,” Harishankar said. “Enterprise need to be certain the data they have today, that they usually keep for years, or may transmit today to a financial institution or to the SEC, or I may transmit today, is not going to be compromised sometime in the future.”
There's work being done across the industry to develop quantum-computing systems, services, security and networking technology.
For example, NIST selected four algorithms earlier this year to create a post-quantum cryptography (PQC) standard to protect against future quantum processor-based attacks. IBM was deeply involved in the building of those algorithms.
The NIST algorithms are designed for two of the main tasks for which public-key cryptography is typically used: public key encapsulation, which is used for public-key encryption and key establishment; and digital signatures, which are used for identity authentication and non-repudiation, according to Anne Dames, Distinguished Engineer, Cryptographic Technology at IBM, who wrote a blog about the technology.
In addition, Amazon Web Services recently teamed with Harvard University to further quantum-networking research and development. The AWS Center for Quantum Networking and Harvard Quantum Initiative will look to cultivate projects to develop quantum memory, integrated photonics, and quantum applications that could help underpin future quantum networks and a quantum internet.
In the future, networking quantum computers will bring a variety of new applications with clustered computers. In the near term, quantum security and privacy applications are relevant, AWS stated.
Thu, 29 Sep 2022 19:56:00 -0500entext/htmlhttps://www.networkworld.com/article/3675370/ibm-vodaphone-gsma-form-group-to-promote-quantum-safe-networks.htmlKillexams : IBM set to buy Dialexa, adding to list of more than 25 acquisitions since April 2020
RESEARCH TRIANGLE PARK – In a move to enhance its hybrid cloud and AI capabilities, IBM will buy the digital product engineering consulting services firm Dialexa in a deal that will close later this year.
IBM announced the deal in a statement, which also notes that the purchase of the firm will “deepen IBM’s product engineering expertise and provide end-to-end digital transformation services for clients.”
When the deal closes, Dialexa will become the sixth company bought by IBM in 2022.
But Big Blue has been on a buying frenzy since April 2020, when Arvind Krishna became the company’s CEO. According to the company, IBM has acquired more than 25 other firms, with 13 to bolster IBM Consulting.
The latest acquisition of Dialexa points toward how IBM may grow its consulting services presence.
“In this digital era, clients are looking for the right mix of high-quality products to build new revenue streams and Boost topline growth,” said John Granger, senior vice president, IBM Consulting, in a statement. “Dialexa’s product engineering expertise, combined with IBM’s hybrid cloud and business transformation offerings, will help our clients turn concepts into differentiated product portfolios that accelerate growth.”
The company’s 300 employees are based in Dallas and in Chicago, and will join IBM Consulting, according to the statement. Among the firm’s clients is Toyota Motor North America, which will invest $2.5 billion in North Carolina to build the company’s first U.S. electric battery manufacturing plant in Randolph County.