Memorizing these 300-715 test prep is sufficient to pass the exam.

We are doing an extraordinary battle to offer you genuine Implementing and Configuring Cisco Identity Services Engine test questions and responses, alongside clarifications. Each 300-715 test prep on has been checked and approved by our 300-715 specialists. They are qualified and confirmed individuals, who have a seriously long encounter seen with the Cisco certificates. They really look at the 300-715 study guide according to PDF Braindumps.

Exam Code: 300-715 Practice exam 2022 by team
Implementing and Configuring Cisco Identity Services Engine
Cisco Implementing information search
Killexams : Cisco Implementing information search - BingNews Search results Killexams : Cisco Implementing information search - BingNews Killexams : Tech Brief: AI general approach, the future of AdTech

Welcome to EURACTIV’s Tech Brief, your weekly update on all things digital in the EU. You can subscribe to the newsletter here

“The Czech EU Council presidency’s final compromise text takes into account the key concerns of the member states and preserves the delicate balance between the protection of fundamental rights and the promotion of uptake of AI technology.”

Ivan Bartoš, Czechia’s Deputy Prime Minister for Digitalisation

Story of the week: The Czech presidency achieved its main victory in the digital sphere this week, as EU ministers adopted its text as a general approach to the AI Act. For those closely following EURACTIV’s coverage, the final text presents no last-minute surprises. Here it is for those looking for an overview of the main changes. With a caveat, as is usually the case, that the Council built some margin of manoeuvre to negotiate with MEPs, especially in law enforcement.

All the eyes are on the Parliament’s timeline now: committee vote in February and plenary vote in March. The governance and enforcement part, which is hardly controversial, has needed four technical and one political meeting so far, and the question of resources and staffing remains. This week, the article on placing AI systems on the market has been closed, and progress has also been made on the subject matter, scope and final provisions. But sceptics point to the fact that some controversial parts of the proposal have hardly been touched yet.

Next Wednesday, a potential item on the agenda could be General Purpose AI. The infamous Annex III on high-risk use cases also needs to be discussed, but hardly anyone wants to open that conversation before Christmas. Another question is whether the centre-right EPP will support the final text. The atmosphere between lawmakers has steadily improved, but the AI definition and biometric recognition might lead large chunks of the conservatives to vote negatively, weakening the Parliament’s position.

Don’t miss: The Commission’s justice and consumer department (DG JUST) has been studying the AdTech sector to prepare for an update of the Unfair Commercial Practices Directive. In an exclusive interview, Commissioner Didier Reynders explained the main problems the EU executive is looking at transparency, unsubscribe process and cookie ‘fatigue’. The idea would be to start with a voluntary initiative as a pilot for some already called the Digital Fairness Act. And DG JUST is not the only Commission service looking at the sector. Read more.

Also this week

  • ETSI has been excluded from the draft standardisation request on the AI Act.
  • MEPs have reached a political agreement on the platform workers’ directive.
  • The Czech presidency obtained a general approach to the European digital identity.
  • The EU Council is moving to exclude Software-as-a-Service from the scope of the Cyber Resilience Act.
  • The EDPB decisions on three cases concerning Meta’s platforms could reportedly have a dramatic impact on their business model.

Before we start: If you just can’t get enough tech analysis, tune in to our weekly podcast.

Auditing algorithms

AI audits are a nascent field due to rapidly developing with the adoption of the EU’s AI Act. But what are the conditions for a robust auditing regime? And what are the risks of so-called ‘audit-washing’? We discuss this and …

 Artificial Intelligence

ETSI’s out of the game. The Commission has excluded the European Telecommunications Standards Institute (ETSI), one of the three European standardisation bodies, from its draft standardisation request for the AI Act. The move comes as part of broader tensions between the EU executive and ETSI, which the Commission has accused of being too dominated by the private sector and non-European influences, the reduction of which Brussels’ standard-setting strategy is centred around. The latest draft text, which downgrades ETSI to a consulting role, also contains some other significant changes. Read more.

Mind your bias. On Thursday, the EU’s Agency for Fundamental Rights released timely research on AI used in predictive policing and content moderation, pointing at their potential risks of perpetuating and reinforcing biases. The agency recommends the implementation of algorithm assessments before and during their deployment to conclude on a case-by-case basis whether these systems are fit for purpose. Read more.

Speaking of risks. The EU’s AI Act must include protections for people on the move, regardless of their migration status, a coalition of over 160 civil society organisations has said in an open letter published this week. The Commission’s original proposal, the group says, failed to adequately address potential harms due to using AI in the context of migration, particularly in areas including predictive systems, biometric identification and emotional recognition technologies.

The Consumers’ Voice. The EU consumer organisation BEUC criticised the general approach, saying that the definition is too narrow, the high-risk list too limited, effective redress is missing, horizontal rules of fairness are lacking, and private entities should be banned from using biometric identification.


Case closed? Amazon has reached a deal to be announced next month to conclude investigations by Brussels antitrust regulators into whether its data use undermined rivals, including pledged measures such as increasing the visibility of rival products and adding an alternative offer for buyers that deprioritises delivery speed.

We don’t trust you. The US Federal Trade Commission said on Thursday that Microsoft’s past behaviour regarding mergers does not bode well for the embattled Activision acquisition currently under scrutiny by numerous competition authorities. For instance, during its purchase of ZeniMax Media in 2020, Microsoft reneged on promises made to the European Commission during its investigation of the deal, casting suspicion on those made about the Activision one, the FTC says.

The telcos’ alternative. Major telecoms companies are facing questions from the Commission about a planned merger that would see giants such as Vodafone, Orange, and Deutsche Telekom join forces to develop a new AdTech to evade tracking restrictions implemented by Apple and Google. The project, which has already been locally trialled, would see the creation of digital tokens that advertisers could use to gain insight into user behaviour, a response to increased privacy measures implemented by tech companies.


Have your say. The Commission has published the public consultation for its recommendation to combat the piracy of live online content, aimed for implementation in the first half of next year. The idea is to put forward a toolbox for combatting the offence and to encourage member states to implement their own measures.


SaaS is out. The Council’s new compromise text on the Cyber Resilience Act attempts to clarify the proposal’s scope. It places Software-as-a-Service (SaaS) firmly outside, contrary to what member states like the Netherlands and Germany have been asking. At the Telecom Council meeting on Tuesday, Commissioner Thierry Breton explained that including services like Spotify and Netflix would go against the regulation’s legal basis. However, the scope still needs to be fully clarified, notably in how web services and mobile apps interact with the new rules. Read more.

Discussing about discussing. During the ministerial discussion on the Data Act, Dutch minister Alexandra van Huffelen hit out at the cybersecurity cloud certification scheme, arguing that its sovereignty requirements could have negative implications for the European economy. The call for a political debate was seconded by Finland, Poland, Ireland, Estonia and… Spain. Madrid stands out since it is the only country supporting the sovereignty requirements, but since it takes the helm of the EU next year, they may have a vested interest in avoiding this hot potato landing on their desk. And yet, these calls elicited no reaction from Breton.

Winter is coming. Preparations should be made for major cyberattacks by Russia this winter, Microsoft has warned. Ongoing trends suggest that the coming months could bring assaults on critical infrastructure and cyber-influence operations in Ukraine and across Europe, the company said this week, setting out a plan to detect, disrupt, defend and deter such efforts in the digital sphere.

Companies’ resilience. Some 62% of organisations surveyed in Cisco’s Security Outcomes Study reported having experienced significant security incidents that jeopardised business operations, and 96% of executives consider cybersecurity a top priority.

Data & Privacy

Starting 2023 with a boom. The European Data Protection Board (EDPB) adopted three dispute resolutions concerning Meta this week, which will be formalised in January. The probe was initiated by Max Schrems’ NOYB, which contested Meta’s approach of not asking users for their consent to process their personal data for advertising purposes, but considered that part of a ‘contract’ since it was included in the platforms’ terms and conditions. According to the Wall Street Journal, the EDPB ruled Meta’s approach illegal. Although the fines are expected to be particularly hefty in these cases, most significantly, if the decisions are confirmed, they would undermine Meta’s entire business model.

Parliamentary discussions. The MEPs working on the Data Act in the Parliament’s industry committee met on Wednesday for the first political discussion on the B2G data-sharing obligations. The political groups started from very distant positions on fundamental aspects of the provisions, such as the type of data and companies that should be involved, but the positions have been slowly converging. Meanwhile, in the internal market committee, lawmakers called for political discussions on functional equivalence, barriers to switching and egress fees.

Not for me to judge. The EU Court of Justice has dismissed an appeal by WhatsApp against an EDPB ruling in August 2021 which found the company had violated the GDPR in its data processing practices, resulting in a €225 million fine. The EU court said the case was not admissible since the decision was not directly addressed to WhatsApp but to the Irish DPA. Still, a case could be brought before a national court.

Just forget it. Search engine operators are required to remove data that can be proven inaccurate by users from online search results, the EU Court of Justice has ruled. In a case brought by two executives seeking to uphold their right to be forgotten online, the court ruled that if the information is proven manifestly inaccurate, operators must de-reference it. Read more.

Clubhouse in hot waters. Italy’s privacy watchdog has fined Clubhouse’s parent company €2 million for numerous violations like a lack of transparency on data use, the ability for users to store and share audio without consent, the indefinite storage of audio recordings by the platform and the sharing of account information without an adequate legal basis.

LIBE’s timeline. The civil liberties committee plans to consider the Data Act amendments next Tuesday. A shadow meeting is scheduled for 12 January, and the committee vote on 30 January.

Digital Markets Act

First workshop done. On Monday, the first DMA workshop took place on self-preferencing. Many media reports focused on the fact that Google’s representative Oliver Bethell had hinted that search services like Maps and Shopping might escape the DMA’s definition of core platform service. However, perhaps more significant is that Google has publicly engaged with stakeholders for the first time showing their hand. More cynically, the workshop initiative might also be seen as the Commission trying to relieve some public pressure as everyone is still waiting for the draft secondary legislation to drop.


eIDs general approach. The Council formalised its position on the European digital identity proposal this week, with compromises met across some areas, from record matching and assurance level to certification and interoperability. The implementation timeline has also been solidified, with the Commission required to adopt acts on the regulation’s technical and operational specifics, along with cybersecurity requirements to be followed within the first six months of it being in place before the two-year deadline is reached. Read more.

You can do better. According to a report by the European Court of Auditors released this week, the Commission has fallen significantly short on its Action Plan for digitalising public services across the EU. A critical flaw in the 2016-2020 eGovernment Action Plan, the auditors said, was that member state action was voluntary, and discrepancies between the digitalisation in various individual countries remain high. Read more.

eGovernance accessibility. This week saw the publication of the Commission’s public consultation on the Web Accessibility Directive, an initiative designed to increase the accessibility of public-sector websites and mobile applications for vulnerable citizens.

Gig economy

EMPL report approaching. Elisabetta Gualmini, the rapporteur for the platform workers’ direction, told EURACTIV that a political agreement had been reached in the Parliament this week, with every side giving up on something. She also said that, while most people were obsessed with the rebuttable presumption, the most significant part of the proposal, in her view, is algorithmic management. While the leading MEP seems confident about Monday’s committee vote, the real question mark remains the plenary. Read more.

No means no. EU labour and social affairs ministers met in Brussels on Thursday (8 December) hoping for an 11th-hour compromise among member states over the platform workers’ directive – but that failed. This follows several setbacks by the Czech presidency, who’d faced a blocking minority in previous COREPER meetings because the compromise wouldn’t bring more legal certainty than what is already the case in case law and national legislation.

Industrial strategy

Not a good year. According to Atomico’s 2022 State of European Tech report, Europe’s start-up scene is falling behind. Despite a strong 2021 and a positive start to the year, the second half of 2022 saw a significant decline in investment, with late-stage companies hit particularly hard and the number of new unicorns dropping sharply. The tech workforce has also been hit hard, and founders are having difficulty raising funds, Atomico found, also pointing to the lack of progress on diversity when it comes to investment.

Law enforcement

No continent for human rights. Last year, a group of NGOs filed a complaint alleging that the EU had been irresponsibly contributing to developing “surveillance” capacities in third countries, particularly in the context of the Commission’s Emergency Trust Fund for Africa. The Ombudsman has concluded that the human rights implications of this project fell short and that more robust efforts must be made in future.

Wiretapping reform. Italy is seeking to reform wiretapping practices in the country due to their costs and potential misuse for political gains. Measures presented by Justice Minister Carlo Nordio would clamp down on wiretapping, rates of which he said are much higher than the European average and which has become a tool of pressure used against both the press and political opponents. Read more. 

Greece’s raging scandal. MEP and leader of Greece’s socialist opposition, Nikos Androulakis, will take his country’s government to the EU Court of Justice to find out why he was under surveillance. Athens has admitted that secret services tapped the politician’s phone but didn’t disclose the reason by shielding behind ‘national interest’. Read more. 

CSAM field trip. MEP Javier Zarzalejos, the rapporteur for the CSAM proposal, visited the UK’s Internet Watch Foundation (IWF) this week to examine how civil society organisations are helping to tackle online child pornography.


Outstanding issues. The Council this week completed its first technical-level revision of the proposed Media Freedom Act, concluding the Czech presidency’s work on the file. The outstanding issues, which are now the upcoming Swedish presidency’s responsibility, were summarised last week in a progress report, including the regulation’s legal basis, scope and definitions, oversight and enforcement and provisions covering media service providers. Read more.

More media bans. Four TV channels have been included in the EU’s latest round of sanctions on Russia. Accused of being part of Moscow’s “propaganda machine”, the broadcasters will be taken off the air and banned from other modes of distribution, much like RT and Sputnik were in March. The channels have not officially been named but were reported by Politico as being NTV/NTV Mir, RENT TV, Rossiya 1 and Pervyi Kanal.

Go away, please. Latvia has blocked independent Russian TV Rain from broadcasting after designating it as a national security threat. The station, which left Russia after being shut down by Moscow following the invasion of Ukraine, was fined last week for showing a map of Russia that included occupied Crimea and describing Russian troops as “our army”. Read more. 

Media strike. Two private broadcasters in Serbia – N1 Srbija and Nova, known to be highly critical of the authorities – stopped broadcasting for 24 hours on Tuesday in protest at the poor state of media freedom in the Western Balkan EU candidate country. Read more


Committees’ competition. The European Parliament’s Conference of Committee Chairs also recently authorised the internal market (IMCO) committee to conduct an own-initiative report on “Virtual worlds: opportunities, risks and policy implications for the Single Market”. The initiative received the support of the EPP and S&D groups, but who will take the lead is still to be decided. The legal affairs (JURI) committee will also host a hearing on the metaverse. These initiatives a part of a strategy to position the committee as the point of reference in this increasingly hot topic.

Investment announcement. On Wednesday, Meta’s top lobbyist Nick Clegg was in Brussels to sing the praises of the metaverse and announce a €2.4 million investment in independent academic research on the topic. Perhaps more significantly, UK’s former deputy PM admitted that the metaverse would be much more about AR and VR.


Online Safety Bill version 34356. The Online Safety Bill, the UK’s answer to the DSA, was reintroduced into Parliament on Monday after being shelved in the summer following Boris Johnson’s exit from office. A fundamental change has been made to the latest version of the draft bill, however, following criticism from some that its provisions concerning “legal but harmful” material would lead to the over-removal of content by platforms, posing a threat to freedom of speech. Last week, the government announced that these bill elements would be removed, meaning companies would no longer be required to have policies covering this material concerning adult users. However, they will still apply to children.

Empowering consumers. A new study by the Consumer Empowerment Project, backed by Euroconsumers and Google, has found that consumers overall feel that the role of digital services in their lives is a positive one. Still, that lack of awareness or trust in providers were two of the most significant barriers to utilising services, and that generational and socio-economic gaps remain.

Research & Innovation

Next two years’ programme. The main Horizon Europe work programme 2023-24 was adopted this week, providing approximately €13.5 billion in funding for researchers and innovators across Europe.

EIC in 2023. The 2023 work programme of the European Innovation Council (EIC) has been adopted, making €1.6 billion worth of funding available for scientists and innovators.

Defence funding. The Commission this week gave the green light to an investment of around €1.2 billion to fund research projects focused on high-end defence capabilities.


Another week, another letter. Germany, Austria, Estonia, Finland, Ireland and the Netherlands have all joined a call for the Commission to clarify its plans to make Big Tech companies contribute to telecoms network costs, notably asking for it to be dealt with separately from the revision of the Broadband Cost Reduction Direction – which EURACTIV understands was already the case. Read more.

Transatlantic ties

Trade war or not? At the post-TTC press conference, anyone agreed an EU-US trade war should be avoided. Still, the question remains that the US Congress’ intention is precisely that of subsidising the American industry – and it is indeed the only thing US lawmakers seem able to agree on. The EU’s Cyber certification scheme was discussed at the accurate transatlantic Trade and Technology Council, US Secretary of Commerce Gina Raimondo confirmed without giving any details.

Biden’s trade ambitions. Boldened by the mid-term elections, US President Joe Biden is said to be poised to ask Congress for the powers to negotiate trade agreements – which seems unlikely. The Biden administration is thirsty for foreign policy victories, and its plan would turn the TTC into a platform to negotiate a new trade agreement with the EU. However, Europeans have shown little appetite for that.

Twin transitions

Apple’s version of Right2Repair. Apple launched a self-service repair programme in eight European countries this week, making manuals and product parts available to customers wishing to undertake their own repairs. The Right to Repair campaign has hit back at the measure, which follows a similar pilot in the US, arguing that its scope is narrow and geographically limited, its costs extensive and procedures complex.

What else we’re studying this week:

A globally critical chip firm is driving a wedge between the U.S. and Netherlands over China tech policy (CNBC)

The Brilliance and Weirdness of ChatGPT (The New York Times)

Theo Bourgery-Gonse contributed to the reporting.

Thu, 08 Dec 2022 22:21:00 -0600 en-GB text/html
Killexams : Tech Layoffs in U.S. Send Foreign Workers Scrambling to Find New Jobs

“Not only are tech companies laying people off in unprecedented numbers, but they are also implementing hiring freezes,” she said, “and thus, there are likely few alternative jobs for immigrant workers.”

Mr. Jain, who lost his job at Microsoft in October, is among tens of thousands of Indian engineers who for years have been creating software at information technology companies like Cisco, social-media platforms like Meta and online retailers like Amazon. Because of their crucial role, and a dearth of American STEM graduates, many foreign workers are being sponsored by their employers for U.S. permanent residency.

While parked in the backlog waiting for approval, the immigrants have built lives in the United States: They have had American children, taken out mortgages and become rooted in their communities.

Most are on high-skilled worker visas known as H-1Bs. More than 500,000 people, are in the United States under the visas, the largest number hailing from India, followed by China, with the majority in science and technology fields.

Demand for such talent has soared as the U.S. economy has become increasingly reliant on technology. Between 2000 and 2019, the number of tech workers in the United States jumped by 44 percent, to 10.8 million from 7.5 million. For their programming, coding and other skills, many receive six-figure salaries.

As of 2019, foreign-born workers made up almost a quarter of all STEM workers in the country, up from about 16 percent in the year 2000, according to an analysis of census data by the American Immigration Council.

The visa holders are concentrated in California, home to Twitter, Meta and Apple, and in Washington state, home to Amazon, Microsoft, Zillow and Expedia. But they are also in states like Arkansas, toiling at the headquarters of Tyson, the poultry processor, to Improve production efficiencies, and at Walmart, to design systems for self-checkouts.

Thu, 08 Dec 2022 20:00:00 -0600 en text/html
Killexams : Cisco Announces December 2022 Events with the Financial Community

SAN JOSE, Calif., Nov. 29, 2022 /PRNewswire/ -- Cisco today announced that it will participate in the following conferences with the financial community during the month of December. These sessions will be webcast.  Interested parties can view these events on Cisco's Investor Relations website at

Cisco Logo (PRNewsfoto/Cisco)

Raymond James Technology Investors Conference
December 6, 2022
6:45 a.m. PT / 9:45 a.m. ET
Kip Compton, SVP, Strategy & Business Development, Cisco Networking

Barclays Global Technology, Media and Telecommunications Conference
December 7, 2022
12:10 p.m. PT / 3:10 p.m. ET
Bill Gartner, SVP and General Manager, Optical Systems and Optics Group

About Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in technology that powers the Internet. Cisco inspires new possibilities by reimagining your applications, securing your data, transforming your infrastructure, and empowering your teams for a global and inclusive future. Discover more on The Newsroom and follow us on Twitter.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Investor Relations Contact: Press Contact:
Marty Palka Robyn Blum
Cisco                           Cisco
408-526-6635 (408) 853-9848


Cision View original content to obtain multimedia:

SOURCE Cisco Systems, Inc.

Mon, 28 Nov 2022 23:14:00 -0600 en text/html
Killexams : How the Security Enterprise Agreement on GEMSS Secures the Army

Perimeters have disintegrated. Boundaries have blurred. It's hard to say where a network begins and ends – because it doesn't. BYOD, IoT, APIs and a host of other acronyms have changed the way we compute. And the way we defend our computing … well, castle-and-moat cybersecurity doesn't work when there's no moat.

Modern cybersecurity has to be scalable and flexible. This need is codified in Executive Order (EO) 14028, "Improving the Nation's Cybersecurity," which requires agencies to adopt Zero Trust architectures. In response to this EO, the Cybersecurity Infrastructure Security Alliance (CISA) has provided guidance to help government organizations build security architectures that work reliably, even in dynamic networks.

CISA's guidance stresses the need for Zero Trust architecture. Zero Trust is the current gold standard for the defense of a distributed computing environment, so commands seeking to modernize their network architecture should be evaluating Zero Trust solutions as they plan their journey. 

What you need to know about Zero Trust

Zero Trust is a network architecture that assumes no user or device can be trusted. Legacy cybersecurity solutions focused solely on controlling access to the network. Defenses were located on the perimeters – but once inside, an entity could move fairly freely.

Bad actors took advantage of this by planning attacks that leveraged lateral movement, where they entered through a weak point, often acquired by stealing credentials from a legitimate user. They then moved deeper into the network in search of valuable information – the payload.

Zero Trust is intended to thwart this technique by wrapping each asset in its own security policy and authenticating every entity before allowing access to the asset. It's similar to visiting the Pentagon. Anyone can get into the lobby, but only some people are badged into the outer offices, fewer into the inner offices, and only the most essential personnel into a SCIF (sensitive compartmented information facility).

What does Zero Trust mean for the Army?

Zero Trust is a high-priority initiative in the Army's Digital Modernization Strategy, intended to support dependable mission execution in an environment of escalating cyber threats. The foundation for Zero Trust is already in place, according to Maj. Gen. Matthew Easley, director for cybersecurity and CISO in the office of the Army CIO, but there is still work to be done. The goal, Easley said, "is to develop the capabilities to Improve that [foundation], to really be able to use that technology to increase the way we defend our networks."

Zero Trust supports the Army's mission to overmatch in multi-domain battlespaces. It secures data without eroding accessibility, so warfighters and staff can communicate safely and acquire information when they need it, where they need it. Paul Puckett, principal cloud strategy advisor to the CIO/G-6 and other senior Army leaders, said, "In order for us to compete and fight, we need to be able to share data from the foxhole to the enterprise and back." No other security architecture has been able to reliably provide this critical capability.

Commands seeking direction on prioritizing a Zero Trust implementation should look to CISA for guidance. 

The path to Zero Trust maturity

The CISA Zero Trust Maturity model defines a path to achieving Zero Trust and provides the means to periodically assess progress. In broad terms, organizations should constantly be moving toward automating as much network management as possible, integrating security across the pillars, and implementing dynamic security policy enforcement. The order and extent to which these steps are accomplished will be different for different commands. Still, at a high level, CISA defines three categories of maturity: traditional, advanced and optimal.

Traditional is where everyone was a few years ago – manual configurations, static security policies, inflexible policy enforcement, manual incident response, etc. Manual processes are the source of most breaches and are also extremely inefficient, so commands should be striving to automate as much as possible. As of today, most commands have automated some functions but not all.

The advanced level focuses largely on centralizing management. That's why automation is so important: manual processes tend to record data in spreadsheets, which are then stored in discrete repositories. There is no big picture available. Advanced organizations that have automated a majority of their network functions can centralize the management of visibility, identity control, policy enforcement, and more, which means that insights can be captured, threat trends recognized and decisions made with greater speed.

The pinnacle of maturity is the optimal level. At this stage, full automation is achieved. All policy management is automated. Dynamic, open standards are in use, so interoperability between systems is the norm. And visibility is complete enough to capture point-in-time recollection of state, which speeds the process of forensic investigation, incident response, and mitigation. 

Achieving optimal CISA maturity through Security EA

In an optimal state of Zero Trust, security is focused on five pillars and how each one accesses information. The five pillars are:

  • Identity - Identities are continuously validated and subjected to real-time machine learning analysis.
  • Devices - Devices are constantly monitored and validated.
  • Network and environments - Networks and environments are set up with micro-perimeters, all traffic is encrypted and machine-enabled threat protection is in effect.
  • Application workloads - Application workloads are authorized continuously, and security is integrated into each workload.
  • Data - All data is encrypted.

Building a modern network around these five pillars can seem overwhelming at first glance. But the technology and expertise necessary to Improve maturity are available to every command through an innovative, pre-paid contract called the Cisco Security Enterprise Agreement (Security EA). 

Security EA provides access to software across tech portfolios. It supports financial predictability through a "not to exceed" pricing guarantee and provides access to new software capabilities as they are released. The Security EA also delivers visibility into all licenses procured, deployed, and up for renewal.

Solutions available through Security EA include:

  • AnyConnect - Secures endpoint access to the enterprise network and apps through multi-factor authentication (MFA), dynamic trust, adaptive authentication, and secure single sign-on (SSO). AnyConnect is managed with other Cisco solutions through a single pane of glass, which supports the CISA advanced maturity level.
  • Identity Services Engine (ISE) - A security policy management solution that delivers visibility into who and what is on the network and enables access control across wired, wireless VPN and 5G networks. It also provides contextual data that helps identify potential threats and vulnerabilities and can be fed into any security solution offered by Cisco's technology partners.
  • Umbrella Roaming - Protects users even when they're off the VPN. This cloud-delivered service provides security without the need to install or manage additional agents. Users are protected from malware, phishing and command-and-control attacks, no matter where they are located.

With Security EA, users get easier budgeting and planning through co-term licensing and usage-based allocation and management. License usage is optimized through the ability to integrate and track sites as renewals arise. 

Security EA has a five-year term, a time frame determined by the DoD to be an ambitious pace at which to achieve Zero Trust but a realistic one. John Sherman, DoD CIO, said, "the adversary capability we're facing leaves us no choice but to move at that level of pace."

The Army's Cisco inventory is already strong

The Army already has contracts in place for Cisco hardware and software, as well as access to a deep bench of Cisco support, consulting and training services.

The Army's portfolio of Cisco software includes DNA Advantage SD-WAN, Switching, Wireless and Secure Remote Worker, all of which are essential technologies for the network segmentation and prioritization at the heart of Zero Trust. Other solutions include Cisco Firepower Threat Defense, Secure Network Analytics, Cisco Workload and more. These solutions all work together to support optimal CISA maturity.

Full-time, on-site resources for CONUS and OCONUS, high-touch technical and operations management and triage support are also on tap for Army projects. Army personnel can up their skills through access to Cisco's Digital Learning Library, Cisco Network Academy and Cisco Live.

Helping the Army with security needs

Security EA is available through the Global Enterprise Modernization Software and Services (GEMSS) agreement, which is a procurement vehicle developed to help the Army meet its network transformation goals.

GEMSS expands Army access to technical services, including unlimited software licenses for Cisco routing, switching, wireless technology and other foundational technologies essential to building Zero Trust architectures.

As a DoD prime contractor, WWT helps Army technology leaders understand what is needed, what is already in their environment and how to implement the next level of maturity by administering GEMSS to support Army needs and goals.

Contact us today to see how we can help you leverage the CISA vision to support your mission.

Mon, 28 Nov 2022 07:12:00 -0600 en text/html
Killexams : IBM On Track To Achieve Quantum Advantage By 2026 Using Error Mitigation

Noise is currently quantum computing’s biggest challenge as well as its most significant limitation. IBM is working to reduce that noise in the next few years through various types of quantum error management until true quantum error correction (QEC) is attained.

Here is why reducing noise is so important. A quantum bit (qubit) is the basic unit of information for quantum computers, and the longer a qubit can maintain its quantum state, the more computational operations it can perform. Unfortunately, qubits are very sensitive to environmental noise, which can come from a quantum computer’s control electronics, wiring, cryogenics, other qubits, heat, and even external factors such as cosmic radiation. Noise is problematic because it can cause a qubit’s quantum state to collapse (a condition called decoherence) and thus create errors. An uncorrected error can cascade into an avalanche of errors and destroy an entire computation.

This type of noise originates at the atomic level, and even though it can't be completely eliminated, it can be managed.

Quantum advantage and noise

Despite media hype, there is no documented evidence that current quantum computers are more powerful than classical supercomputers. Even so, there is no question that quantum computers have an indisputable advantage. Most experts believe it's only a matter of time before quantum computing demonstrates its superiority compared to classical supercomputers. When that occurs, quantum computing will have achieved what is commonly referred to as “quantum advantage.”

IBM defines quantum advantage as a significant improvement in quantum algorithm runtime for practical cases over the best classical algorithm. Its blog further states that the algorithm needed to prove quantum advantage must have an efficient representation as quantum circuits, and there should be no classical algorithm capable of simulating those circuits efficiently.

But here’s the dilemma: For quantum computers to achieve quantum advantage, besides improving qubit coherence, gate fidelities, and speed of circuit execution, we must also significantly increase computational qubit counts. But upping the number of qubits also increases noise and qubit errors. Therefore, managing noise and qubit errors is critical to the long-term success of quantum computing.

Although error correction is common in classical computers and in certain types of memory hardware, we can’t use the same techniques in quantum computers because the laws of quantum mechanics make it impossible to clone unknown quantum states.

Quantum error correction (QEC) is a complex engineering and physics problem. And despite its importance and the number of years that have been invested thus far in the search for a solution, quantum error correction remains elusive and still appears to be many years away. Until full error correction becomes available, IBM is researching other error management solutions.

Quantum error management

The above IBM chart compares the exponential scaling of error-mitigated quantum circuits to the exponential scaling of classical computers. The crossover point is where quantum error mitigation becomes competitive with classical solutions.

IBM has a long history of error correction research, beginning with David DiVincenzo’s investigations in 1996. In 2015, it developed the first system to detect quantum bit flip and phase flip errors. Today, almost every corporate and academic quantum computing program has some form of error correction research in progress because of the importance of quantum error correction.

IBM currently looks at quantum error management through the lens of three methods: error suppression, error mitigation, and error correction. Setting aside error correction for the moment, let’s consider the other two approaches.

Error suppression is one of the earliest and most basic methods of handling errors. It typically modifies a circuit, uses pulses of energy to keep a qubit in its quantum state longer, or directs pulses at idle qubits to undo any unwanted effects caused by neighboring qubits. These types of error suppression are known as dynamic decoupling.

Error mitigation is the method that IBM believes will bridge the gap between today’s error-prone hardware and tomorrow’s fault-tolerant quantum computers. Error mitigation’s interim purpose is to enable early achievement of quantum advantage.

IBM has done more continuous error mitigation research than any other institution. Through that work, IBM has developed multiple approaches to error mitigation, including probabilistic error cancellation (PEC) and zero-noise extrapolation (ZNE).

  • PEC functions much like noise-canceling headsets where noise is extracted and analyzed, then inverted before being mixed with the original noise signal to cancel it out. One significant difference for PEC is that, rather than using single samples as in audio noise-canceling algorithms, PEC uses averages calculated from a collection of circuits.
  • ZNE reduces noise in a quantum circuit by running the quantum program at different noise levels, then extrapolating the computation to determine an estimated value at a zero-noise level.

Effective quantum error correction would eliminate almost all noise-related errors. It is worth noting that QEC exponentially suppresses errors with increasing code size. At any finite code size, errors will always be present. For optimum results, it will be important to pick a code size that suppresses errors just enough for the target application.

But until QEC becomes available, it appears that quantum error mitigation provides the fastest path to quantum advantage.

Dialable error reduction

IBM recently announced the integration of error suppression and error mitigation into Qiskit Runtime primitives Sampler and Estimator. As beta features, these allow a user to trade speed for fewer errors. IBM's roadmap projects the final release of these features in 2025.

There is overhead associated with compiling, executing, and classical post-processing of error mitigation techniques. The amount of overhead varies depending on the type of error mitigation used. IBM introduced a new simplified option for the primitives called a “resilience level” that allows users to dial in the cost/accuracy tradeoff needed for their work. Sampler and Estimator will automatically apply dynamical decoupling error suppression to circuits at optimization levels 1 through 3. Resilience 0 offers no error mitigation, Resilience 1 is measurement error mitigation, Resilience 2 provides biased error mitigation (via ZNE), and Resilience 3 enables unbiased estimators (via PEC).

Error mitigation will be available on all cloud-accessible IBM systems. As the resilience number increases, so does the cost. Resilience 3 produces the fewest errors but could require 100,000X more computation time.

Dr. Blake Johnson, IBM Quantum Platform Lead, explained the rationale for IBM’s implementation of this option for error mitigation services.

“We have some very advanced users that want to do everything themselves,” Dr. Johnson said. “They don't want us touching their circuits. That’s fine with us, so we make that possible. But we are seeing more and more users who look at a quantum computer like you would look at a toaster. They don’t understand how it works. They just want to push a button and make the right thing happen. So, we decided to enable certain things as defaults if it doesn’t have a sampling overhead and if there isn’t an additional cost to run it.”

Quantum error correction

Thanks to error correction research conducted by the entire quantum computing community, significant progress has been made on QEC over the past decade. Even so, it is likely that years of more research will be required to find a workable solution.

One of the early challenges of quantum error correction was determining if an error had been made without destroying a qubit's quantum state by measuring it. In 1995, Peter Shor developed a breakthrough solution to circumvent the problem. Rather than storing the quantum state in a single qubit, Shor’s system encoded quantum information in a logical qubit distributed across nine physical qubits. The scheme enabled errors to be detected by monitoring the system's parity rather than destroying the quantum state with direct measurements.

IBM is currently investigating many approaches to quantum error correction, including some similar to Shor’s code. This class of error correction code is called quantum Low-Density Parity Check (qLDPC). LDPC is not new. It is used in many classical error correction applications, such as Wi-Fi and 5G.

According to IBM, qLDPC offers the following advantages:

  • Only a few physical qubits are needed for each logical qubit, rather than the hundreds that are needed for 2-D surface code.
  • Only a limited number of qubits are exposed if a faulty operation occurs.

The research opportunities and diverse methods for quantum error correction are too numerous to cover here, but having many options is a good problem to have. If a fault-tolerant quantum computer is ever to be realized, we must find a solution for error correction, and the more options we have, the better our chances.

IBM’s quantum roadmap reflects the complexity of the problem. It shows an error correction solution becoming available sometime beyond 2026. Indeed, it will likely take several years beyond that.

Wrapping up

As quantum hardware continues to improve, there is a high probability that quantum error mitigation, as implemented by IBM's roadmap, will facilitate the early achievement of quantum advantage. Presently, error mitigation has an exponential runtime influenced by how many qubits are needed and the circuit depth. But improvements in speed, qubit fidelity, and error mitigation methods are expected to considerably reduce that overhead.

It is IBM's goal for error mitigation to provide a continuous development path to error-correction. Once QEC is attained, it will enable us to build fault-tolerant quantum machines running millions of qubits in a quantum-centric supercomputing environment. These machines will have the ability to simulate large many-body systems, optimize complex supply chain logistics, create new drugs and materials, model and react to sophisticated financial market behavior, and much more.

Fault-tolerant quantum computers will signal that a new era of quantum-centric scientific investigation has arrived. And with that new capability will come the potential to responsibly change the world.

Analyst notes

  1. Despite media hype about the power of quantum computers, it has yet to be demonstrated that quantum has a clear computational superiority over classical supercomputers.
  2. Quantinuum recently published two important QEC proofs-of-concept. Its researchers developed a logical entangling circuit with higher fidelity than its physical counterparts. Researchers also entangled two logical qubit gates in a fully fault-tolerant manner.
  3. IBM announced that dynamic circuits will also be available its systems along with error mitigation. Dynamic circuits are expected to play an important role in quantum Low-Density Parity Check (qLDPC) error correction codes.
  4. In preparation for quantum advantage, IBM began scaling up its processors with the recently announced 433 Osprey qubit processor. The Osprey has 3X more qubits than the current 127-qubit Eagle processor.
  5. In addition to IBM’s error suppression and error mitigation initiatives, these are the major highlights in IBM's quantum roadmap that provide a path to quantum advantage:
  • 2023 — Further scaling occurs with the release of the Condor processor, with 1121 qubits. Work also continues on initiatives to Improve system-wide speed and quality.
  • 2024 — IBM will begin to integrate and test key technologies that enable future scaling such as classical parallelization, couplers, multi-chip quantum processors, and quantum parallelization.
  • 2025 — Implementation of modular quantum hardware, new control electronics, and cryogenic infrastructure are the final near-term hardware pieces needed for attaining quantum advantage.
  • 2026 — IBM will have the capability of scaling up future systems to 10K–100K qubits. By then, it should also have significantly increased the system speed and quality. A mature implementation of quantum error mitigation will make it possible to attain quantum advantage. Significant advances in quantum error correction will also have been made.

Follow Paul Smith-Goodson on Twitter for current information and insights about Quantum, AI, Electromagnetics, and Space

Moor Insights & Strategy, like all research and tech industry analyst firms, provides or has provided paid services to technology companies. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking, and speaking sponsorships. The company has had or currently has paid business relationships with 8×8, Accenture, A10 Networks, Advanced Micro Devices, Amazon, Amazon Web Services, Ambient Scientific, Anuta Networks, Applied Brain Research, Applied Micro, Apstra, Arm, Aruba Networks (now HPE), Atom Computing, AT&T, Aura, Automation Anywhere, AWS, A-10 Strategies, Bitfusion, Blaize, Box, Broadcom, C3.AI, Calix, Campfire, Cisco Systems, Clear Software, Cloudera, Clumio, Cognitive Systems, CompuCom, Cradlepoint, CyberArk, Dell, Dell EMC, Dell Technologies, Diablo Technologies, Dialogue Group, Digital Optics, Dreamium Labs, D-Wave, Echelon, Ericsson, Extreme Networks, Five9, Flex,, Foxconn, Frame (now VMware), Fujitsu, Gen Z Consortium, Glue Networks, GlobalFoundries, Revolve (now Google), Google Cloud, Graphcore, Groq, Hiregenics, Hotwire Global, HP Inc., Hewlett Packard Enterprise, Honeywell, Huawei Technologies, IBM, Infinidat, Infosys, Inseego, IonQ, IonVR, Inseego, Infosys, Infiot, Intel, Interdigital, Jabil Circuit, Keysight, Konica Minolta, Lattice Semiconductor, Lenovo, Linux Foundation, Lightbits Labs, LogicMonitor, Luminar, MapBox, Marvell Technology, Mavenir, Marseille Inc, Mayfair Equity, Meraki (Cisco), Merck KGaA, Mesophere, Micron Technology, Microsoft, MiTEL, Mojo Networks, MongoDB, MulteFire Alliance, National Instruments, Neat, NetApp, Nightwatch, NOKIA (Alcatel-Lucent), Nortek, Novumind, NVIDIA, Nutanix, Nuvia (now Qualcomm), onsemi, ONUG, OpenStack Foundation, Oracle, Palo Alto Networks, Panasas, Peraso, Pexip, Pixelworks, Plume Design, PlusAI, Poly (formerly Plantronics), Portworx, Pure Storage, Qualcomm, Quantinuum, Rackspace, Rambus, Rayvolt E-Bikes, Red Hat, Renesas, Residio, Samsung Electronics, Samsung Semi, SAP, SAS, Scale Computing, Schneider Electric, SiFive, Silver Peak (now Aruba-HPE), SkyWorks, SONY Optical Storage, Splunk, Springpath (now Cisco), Spirent, Splunk, Sprint (now T-Mobile), Stratus Technologies, Symantec, Synaptics, Syniverse, Synopsys,Tanium, Telesign,TE Connectivity, TensTorrent, Tobii Technology, Teradata,T-Mobile, Treasure Data, Twitter, Unity Technologies, UiPath, Verizon Communications, VAST Data, Ventana Micro Systems, Vidyo, VMware, Wave Computing, Wellsmith, Xilinx, Zayo, Zebra, Zededa, Zendesk, Zoho, Zoom, and Zscaler.

Moor Insights & Strategy founder, CEO, and Chief Analyst Patrick Moorhead is an investor in dMY Technology Group Inc. VI, Dreamium Labs, Groq, Luminar Technologies, MemryX, and Movand

Note: Moor Insights & Strategy writers and editors may have contributed to this article.

Wed, 07 Dec 2022 03:21:00 -0600 Paul Smith-Goodson en text/html
Killexams : Converge Technology Solutions Corp. Named Cisco Multiple Region Partner of the Year for 2022

TORONTO, ON and GATINEAU, QC, Nov. 15, 2022 /PRNewswire/ - Converge Technology Solutions Corp. ("Converge" or "the Company") (TSX: CTS) (FSE: 0ZB) (OTCQX: CTSDF) a services-led, software-enabled, IT & Cloud Solutions provider, is pleased to announce it has been named Cisco's Multiple Region Partner of the Year for 2022.

Converge Technology Solutions (CNW Group/Converge Technology Solutions Corp.)

Converge was given this award in recognition for driving Cisco bookings in 43 of 50 US states, while booking over $1M in 31 sales regions. This award was announced at the annual Cisco Partner Summit, which is dedicated to celebrating Cisco partners' accomplishments and recognizing top-performing partners and their respective achievements.

"Converge is proud of our strong Cisco partnership and the incredible accomplishments of our joint teams in 2022," stated Shaun Maine, CEO of Converge. "The results are a testament to our strategy of building a platform across North America and driving the right level of value for our clients in every region. We are excited to have been recognized as Cisco's Multiple Region Partner of the Year and look forward to more success in 2023 and beyond."

About Converge

Converge Technology Solutions Corp. is a services-led, software-enabled, IT & Cloud Solutions provider focused on delivering industry-leading solutions. Converge's global approach delivers advanced analytics, application modernization, cloud platforms, cybersecurity, digital infrastructure, and digital workplace offerings to clients across various industries. The Company supports these solutions with advisory, implementation, and managed services expertise across all major IT vendors in the marketplace. This multi-faceted approach enables Converge to address the unique business and technology requirements for all clients in the public and private sectors. For more information, visit

Cision View original content to obtain multimedia:

SOURCE Converge Technology Solutions Corp.

Mon, 14 Nov 2022 23:42:00 -0600 en text/html
Killexams : Remote workers losing laptops are bigger threat to companies than hackers Remote Work © Provided by The Telegraph Remote Work

Laptops lost by remote workers returning to the office are a bigger financial threat to British industry than ransomware hackers, according to new figures.

Data assembled by Cisco Systems shows that businesses were fined a total of £26m after employees mislaid their work-issued laptops and phones.

Over the last two years the Information Commissioner’s Office received more than 3,000 reports of lost devices that contained personal data.

Companies whose staff lost laptops and phones contain customer information are much more likely to be fined than businesses targeted by ransomware criminals.

Yet over the same period just one business, a law firm, was fined for security failings that allowed a ransomware attack to take place.

Martin Lee, a technical lead for cyber security with Cisco, said that office staff getting to grips with returning to regular commuting could be causing a rise in lost or stolen devices containing sensitive corporate information.

He said: “Going to the office might not be an everyday routine any more, where you put your laptop in your backpack and get in the car and drive off, or get on the bus.

“With remote workers travelling between locations, they're carrying their laptops with them as working practices have changed.”

“Leaving your laptop, in the bus, in a cafe, having it stolen or something is entirely predictable.”

Data protection laws say that if an employee loses a device containing or capable of accessing personal data of customers or suppliers, the loss must be reported to the ICO.

Ransomware has been named as one of the top cyber threats facing the UK by Lindy Cameron, the chief executive of the National Cyber Security Centre.

Ransomware is a type of computer virus that scrambles files. The criminal gang deploying the virus contacts the victim and demands payment in return for unscrambling the files.

In March this year the ICO fined Tuckers Solicitors £98,000 for failing to “implement appropriate technical and organisational measures” on its computer networks to shut out ransomware hackers.

Online criminals broke into the London-based criminal law firm’s systems and stole thousands of files, some of which were later dumped online for anyone to read.

Sign up to the Front Page newsletter for free: Your essential guide to the day's agenda from The Telegraph - direct to your inbox seven days a week.

Sat, 03 Dec 2022 23:15:00 -0600 en-GB text/html
Killexams : 10 Information Technology Stocks With Whale Alerts In Today's Session

This whale alert can help traders discover the next big trading opportunities.

Whales are entities with large sums of money and we track their transactions here at Benzinga on our options activity scanner.

Traders often look for circumstances when the market estimation of an option diverges away from its normal worth. Abnormal amounts of trading activity could push option prices to hyperbolic or underperforming levels.

Below are some instances of options activity happening in the Information Technology sector:

Symbol PUT/CALL Trade Type Sentiment Exp. Date Strike Price Total Trade Price Open Interest Volume
AAPL PUT SWEEP BEARISH 12/02/22 $150.00 $25.2K 4.3K 10.5K
MSFT PUT SWEEP BULLISH 12/02/22 $240.00 $34.2K 2.4K 2.1K
AMD PUT SWEEP BEARISH 12/09/22 $70.00 $44.0K 1.0K 1.9K
NVDA CALL TRADE NEUTRAL 12/02/22 $162.50 $25.0K 1.4K 1.4K
HPQ CALL SWEEP BEARISH 11/25/22 $29.00 $33.5K 1.3K 910
AMAT PUT TRADE BULLISH 01/19/24 $100.00 $562.0K 2.7K 403
CSCO PUT TRADE BULLISH 01/19/24 $47.50 $146.9K 2.9K 334
MA CALL TRADE BULLISH 07/21/23 $470.00 $69.0K 0 200
ENPH PUT TRADE BEARISH 12/02/22 $320.00 $134.3K 156 188
QCOM CALL TRADE BEARISH 03/17/23 $135.00 $30.8K 1.9K 133

These itemized elaborations have been created using the accompanying table.

• For AAPL AAPL, we notice a put option sweep that happens to be bearish, expiring in 9 day(s) on December 2, 2022. This event was a transfer of 102 contract(s) at a $150.00 strike. This particular put needed to be split into 4 different trades to become filled. The total cost received by the writing party (or parties) was $25.2K, with a price of $248.0 per contract. There were 4324 open contracts at this strike prior to today, and today 10597 contract(s) were bought and sold.

• Regarding MSFT MSFT, we observe a put option sweep with bullish sentiment. It expires in 9 day(s) on December 2, 2022. Parties traded 200 contract(s) at a $240.00 strike. This particular put needed to be split into 6 different trades to become filled. The total cost received by the writing party (or parties) was $34.2K, with a price of $171.0 per contract. There were 2441 open contracts at this strike prior to today, and today 2195 contract(s) were bought and sold.

• For AMD AMD, we notice a put option sweep that happens to be bearish, expiring in 16 day(s) on December 9, 2022. This event was a transfer of 500 contract(s) at a $70.00 strike. This particular put needed to be split into 11 different trades to become filled. The total cost received by the writing party (or parties) was $44.0K, with a price of $88.0 per contract. There were 1099 open contracts at this strike prior to today, and today 1947 contract(s) were bought and sold.

• For NVDA NVDA, we notice a call option trade that happens to be neutral, expiring in 9 day(s) on December 2, 2022. This event was a transfer of 50 contract(s) at a $162.50 strike. The total cost received by the writing party (or parties) was $25.0K, with a price of $500.0 per contract. There were 1465 open contracts at this strike prior to today, and today 1417 contract(s) were bought and sold.

• Regarding HPQ HPQ, we observe a call option sweep with bearish sentiment. It expires in 2 day(s) on November 25, 2022. Parties traded 390 contract(s) at a $29.00 strike. This particular call needed to be split into 32 different trades to become filled. The total cost received by the writing party (or parties) was $33.5K, with a price of $86.0 per contract. There were 1377 open contracts at this strike prior to today, and today 910 contract(s) were bought and sold.

• For AMAT AMAT, we notice a put option trade that happens to be bullish, expiring in 422 day(s) on January 19, 2024. This event was a transfer of 400 contract(s) at a $100.00 strike. The total cost received by the writing party (or parties) was $562.0K, with a price of $1405.0 per contract. There were 2702 open contracts at this strike prior to today, and today 403 contract(s) were bought and sold.

• For CSCO CSCO, we notice a put option trade that happens to be bullish, expiring in 422 day(s) on January 19, 2024. This event was a transfer of 323 contract(s) at a $47.50 strike. The total cost received by the writing party (or parties) was $146.9K, with a price of $455.0 per contract. There were 2970 open contracts at this strike prior to today, and today 334 contract(s) were bought and sold.

• For MA MA, we notice a call option trade that happens to be bullish, expiring in 240 day(s) on July 21, 2023. This event was a transfer of 200 contract(s) at a $470.00 strike. The total cost received by the writing party (or parties) was $69.0K, with a price of $345.0 per contract. There were 0 open contracts at this strike prior to today, and today 200 contract(s) were bought and sold.

• Regarding ENPH ENPH, we observe a put option trade with bearish sentiment. It expires in 9 day(s) on December 2, 2022. Parties traded 100 contract(s) at a $320.00 strike. The total cost received by the writing party (or parties) was $134.3K, with a price of $1343.0 per contract. There were 156 open contracts at this strike prior to today, and today 188 contract(s) were bought and sold.

• For QCOM QCOM, we notice a call option trade that happens to be bearish, expiring in 114 day(s) on March 17, 2023. This event was a transfer of 45 contract(s) at a $135.00 strike. The total cost received by the writing party (or parties) was $30.8K, with a price of $685.0 per contract. There were 1993 open contracts at this strike prior to today, and today 133 contract(s) were bought and sold.

Options Alert Terminology
- Call Contracts: The right to buy shares as indicated in the contract.
- Put Contracts: The right to sell shares as indicated in the contract.
- Expiration Date: When the contract expires. One must act on the contract by this date if one wants to use it.
- Premium/Option Price: The price of the contract.

For more information, visit our Guide to Understanding Options Alerts or read more about unusual options activity.

This article was generated by Benzinga's automated content engine and reviewed by an editor.

© 2022 Benzinga does not provide investment advice. All rights reserved.

Wed, 23 Nov 2022 04:03:00 -0600 text/html
Killexams : Democrat Cisco Aguilar defeats Trump-backed election denier Jim Marchant in Nevada secretary of state race

Republican Jim Marchant, a prominent election denier, has lost Nevada's secretary of state race to Democrat Cisco Aguilar, NBC News projected Saturday.

Aguilar, a lawyer and former staff member for the late Sen. Harry Reid, will make history as Nevada's first Latino secretary of state. He will succeed Republican Barbara Cegavske, who is term-limited and has served in the role since 2015.

The race for the Nevada’s top elections official has been closely watched in the days since voting concluded Tuesday, as former President Donald Trump’s allies have continued to cast doubt over the 2020 presidential election results in a battleground state where the winner will oversee the 2024 presidential election.

Marchant, a former Nevada state legislator, has been a prominent promoter of some of those claims, and has continued to insist that President Joe Biden did not win the state, raising concerns among some Democrats that a victory would pave the way for him to use the power of the office to influence the outcome of the 2024 race.

In 2020, Marchant pushed for a slate "alternate electors" in the presidential election, and has since expressed the possibility of making a similar push in future elections.

Jim Marchant speaks at a Republican election night watch party on Nov. 3, 2020, in Las Vegas.John Locher / AP file

In an interview with NBC News earlier this year, Marchant said if he held office in 2024, he wouldn’t rule out advocating for an alternate slate of Trump electors if the former president were on the ballot.

Election deniers like Marchant ran in congressional races and for statewide offices that have significant power over elections, such as governorsecretary of state and attorney general.

Marchant's loss comes on the heels of losses by several other election deniers, such as Arizona's Mark Finchem, who were defeated this month.

The failed bids were for governor, secretary of state and attorney general in Michigan; governor and Senate in Pennsylvania; Senate in New Hampshire and Wisconsin; and secretary of state in Minnesota and New Mexico, among others.

Aguilar, who had been locked in a tight race with Marchant, declared victory in a statement Friday evening.

“Nevada’s voters used their voices to protect our democracy and the fundamental right to vote,” he said. “This campaign was about defending democracy for all Nevadans and I’m humbled so many Nevadans put partisanship aside and stood up for free and fair elections. We must continue to reject extremism and those who threaten our democracy.”

Aguilar's win was lauded by Colorado Secretary of State Jena Griswold, who chairs the Democratic Association of Secretaries of State, ahead of NBC News projecting the race.

“Cisco Aguilar will be the next Secretary of State for Nevada — a resounding win for democracy," Griswold said in a statement. "This victory means Nevada will have a Secretary of State who believes that voters should decide election results, not politicians. We know that Cisco Aguilar will serve his constituents by protecting their elections, and defending their right to vote.”

Adam Edelman contributed.

Sat, 12 Nov 2022 13:11:00 -0600 en text/html
Killexams : General Dynamics, Amazon, Cisco form coalition to spur 5G adoption

WASHINGTON — General Dymanics said it’s teaming up with Amazon and four other information technology, software and telecommunications companies to develop 5G technologies and accelerate their adoption across sectors including the U.S. military.

General Dynamics Information Technology, or GDIT, announced the partnership with Amazon Web Services, Cisco, Dell Technologies, Splunk and T-Mobile on Nov. 10.

The potential of fifth-generation wireless networks, with vastly improved connectivity over 4G, has been promised for years, but 5G that lives up to the hype has yet to arrive for many. The slow rollout is often blamed on squabbles between the industry and Congress over the designation of space on public airwaves. The announcement comes as control of the House is still in the air following midterm elections.

“We share a common vision of how 5G, edge and advanced wireless technologies can transform government operations,” Ben Gianni, GDIT’s senior vice president and chief technology officer, said in a statement. “Forming this coalition will help us bring our collective strengths together to provide technical differentiation and the most beneficial solutions for our government customers.”

5G pledges exponentially faster speeds as well as the capacity to accommodate more and more-advanced devices, which can pay dividends for defense, health care, trade and more. The gear also brings with it a host of concerns, cybersecurity, privacy and price chief among them.

The U.S. Department of Defense, specifically, is interested in 5G as a means to rapidly share information — on and off the battlefield — and Improve logistics, like at so-called smart warehouses, where artificial intelligence and remote observation come into play. The department’s 2020 strategy described 5G as “far more disruptive” than its predecessors, noting that high-speed connectivity will “transform the way militaries operate.”

The efforts of the GDIT 5G and Edge Accelerator Coalition stem from the Advanced Wireless Emerge Lab, where work is already underway to identify the best applications for 5G and how related kit can be cost-effectively implemented across federal, state and local agencies.

GDIT in its announcement said it would “design, deploy and maintain secure end-to-end 5G solutions” while leveraging Amazon’s cloud assets. Cisco will chip in computing and data processing capabilities and Dell will furnish software as well as AI-enhanced devices and sensors. Splunk will handle cybersecurity. And T-Mobile will provide bandwidth and expertise.

“In today’s landscape, 5G solutions provide a wealth of benefits for the federal government and we are committed to helping them adopt and maximize these innovative technologies to best achieve their missions,” Bethann Pepoli, a group vice president at Splunk, said in a statement. “Security is a top concern when it comes to implementing these new technologies and we are focused on helping to ensure the government has the correct tools and support to maximize their cybersecurity operations and threat response.”

The Defense Department secured nearly $338 million for 5G and microelectronics in fiscal 2022 and requested $250 million for fiscal 2023.

The department in previous years invested in test beds at a dozen military installations. It is also studying 5G networking for overseas operations at Idaho National Laboratory, a massive Department of Energy nuclear reservation, and over the summer committed $1.77 million to an industry-university research effort known as Open6G.

General Dynamics is the fifth largest defense contractor in the world based on revenue, earning some $30.8 billion in 2021, according to a Defense News analysis.

Colin Demarest is a reporter at C4ISRNET, where he covers military networks, cyber and IT. Colin previously covered the Department of Energy and its National Nuclear Security Administration — namely Cold War cleanup and nuclear weapons development — for a daily newspaper in South Carolina. Colin is also an award-winning photographer.

Sat, 26 Nov 2022 00:04:00 -0600 en text/html
300-715 exam dump and training guide direct download
Training Exams List