Daily Archives: June 7, 2022

Zero Trust Edge Cloud Security Leader iboss Named Winner of The Coveted Global InfoSec Awards During RSA Conference 2022 – Yahoo Finance

Posted: June 7, 2022 at 1:47 am

iboss Wins Most Innovative Cloud Security & Best Product SaaS/Cloud Security At 10th Annual Global InfoSec Awards at #RSAC 2022

BOSTON, June 6, 2022 /PRNewswire-PRWeb/ -- iboss, the leading Zero Trust Edge cloud security provider, is proud to announce it has been named Most Innovative Cloud Security & Best Product SaaS/Cloud Security by Cyber Defense Magazine (CDM), the industry's leading electronic information security magazine:

"We're thrilled to be recognized as an innovator and leader by Cyber Defense Magazine," said Paul Martini, CEO and co-founder of iboss. "Our best-in-class Zero Trust Edge platform is designed to meet the security and productivity challenges posed by today's highly-distributed modern workforces by making sensitive resources completely inaccessible to attackers while ensuring fast, direct connections for trusted users."

The iboss Zero Trust platform is a purpose-built, patented, cloud delivered security platform and has more than 100 points of presence globally. A Zero Trust Architecture built on iboss consolidates network security technologies (SWG, CASB, DLP, IPS, malware defense, browser isolation, firewall) into a single unified cloud platform and eliminates the need for a VPN while securing any device, regardless of location. By making all applications private, iboss eliminates the top three initial ransomware infection vectors as identified by the Cybersecurity and Infrastructure Security Agency (CISA). With applications, data and services made accessible only through the iboss Zero Trust Edge, cyber risk is greatly reduced, breaches and data loss are prevented, and visibility and security are delivered consistently throughout an organization.

"We scoured the globe looking for cybersecurity innovators that could make a huge difference and potentially help turn the tide against the exponential growth in cyber crime. iboss is absolutely worthy of this coveted award and consideration for deployment in your environment," said Yan Ross, Editor of Cyber Defense Magazine.

Story continues

Visit iboss at the RSA Conference in the South Hall, booth 455. At the iboss theater, you will learn how to implement Zero Trust as defined by NIST, iboss integrations with identity partners and integrations with Microsoft's security portfolio.

About iboss, Inc. iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust service designed to protect resources and users in the modern distributed world. Applications, data and services have moved to the cloud and are located everywhere while users needing access to those resources are working from anywhere. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, browser isolation, CASB and data loss prevention to protect all resources, via the cloud, instantaneously and at scale. This shifts the focus from protecting buildings to protecting people and resources wherever they are located. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies. iboss was named one of the Top 25 Cybersecurity Companies by The Software Report, one of the 25 highest-rated Private Cloud Computing Companies to work for by Battery Ventures, and CRN's Top 20 Coolest Cloud Security Companies of 2022. To learn more, visit https://www.iboss.com/

About Cyber Defense Magazine Cyber Defense Magazine is the premier source of cyber security news and information for InfoSec professions in business and government. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives. Join a webinar at https://www.cyberdefensewebinars.com and realize that infosec knowledge is power.

Media Contact

Jake Klein, Goldin Solutions for iboss, 646-660-8644, iboss@goldin.com

Twitter

SOURCE iBoss

Original post:

Zero Trust Edge Cloud Security Leader iboss Named Winner of The Coveted Global InfoSec Awards During RSA Conference 2022 - Yahoo Finance

Posted in Cloud Computing | Comments Off on Zero Trust Edge Cloud Security Leader iboss Named Winner of The Coveted Global InfoSec Awards During RSA Conference 2022 – Yahoo Finance

Atos, UCL and Arm team up to offer wider cloud computing possibilities for life sciences applications – B – Benzinga

Posted: at 1:47 am

Atos and UCLannounced having successfully run the virus sequencing tool, Viridian, which is used to detect mutation of the SARS-Cov-2 strain of the coronavirus, using an Arm-based Ampere Altra processor in a cloud native environment with Atos' integration expertise. This proof of concept (PoC) was coordinated byAtos' Life Sciences Center of Excellencewhich aims to foster a culture of exploration, discovery and co-creation to harness the power of digital technologies in order to advance precision health and accelerate the discovery and development of drugs.

With data growing exponentially and becoming more difficult to process for life sciences applications, data, scientists rely on high-performance computing and parallel computing to quickly process and analyse massive amounts of data.

The Arm Neoverse-based platform, the Ampere Altra, is dedicated to cloud native workloads, meaning the simulation and the results can be achieved not only on-premises but directly on the cloud, on any type of HPC platforms and from anywhere.

This will be even easier with the use of Atos'Nimbix Supercomputing Suite; offering researchers and scientists flexible, scalable, and easy-to-use cloud solutions for compute-intensive workflows.

With more and more laboratories using Arm-based solutions, this successful PoC means that they will now be able to run Viridian on their systems, enabling them to study life science workflows and to detect various mutations in the SARS-CoV-2 genome, in order to ultimately help combat COVID-19.

This work has combined expertise skills from a team of Atos and Arm experts focusing on hardware and software optimizations, together with a scientific team from UCL dedicated to scientific applications for these specific use cases. This collaboration has enabled the optimization of both software and hardware in this co-designing effort to meet the demands of impactful and cutting-edge genomics workflows, which are already deployed in clinical settings.

Emmanuel Le Roux, Group SVP, Global Head of HPC, AI & Quantum at Atos,commentedBeing the undisputed European leader in HPC is not only about delivering the most systems to European HPC centers in terms of PetaFlops but also about working closely with numerous European research and scientific institutions to empower various crucial data productions and simulations daily. This work, under the umbrella of theAtos Life Sciences Center of Excellence, demonstrates that collaboration between academia and industry through the power of supercomputing is creating new avenues for scientific breakthroughs. Today, we have once again shown the importance of hybrid computing to foster innovation and provide scientists with tangible life sciences applications.

Alex Wade, Research Associate at UCL,said: This codesign effort between Arm, Atos and UCL has allowed for the optimization of both new Arm hardware and cutting-edge genomics software, fortifying both for real world life science applications. Collaborating with industry partners has demonstrated a key idea for the future of HPC applications whereby hardware and software are tuned for performance in tandem, as opposed to the typical story of software continuously being updated to match new hardware releases. This work has been performed as part of the Centre of Excellence in Computational Biomedicine (CompBioMed) and was possible because of CompBioMed's wide interdisciplinary expertise. Arm and Atos were valuable partners in this work and we hope this work leads to future collaborations and can act as a template for other codesign activities.

***

About Atos

Atos is a global leader in digital transformation with 111,000 employees and annual revenue of c. 11 billion. European number one in cybersecurity, cloud and high performance computing, the Group provides tailored end-to-end solutions for all industries in 71 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea), listed on Euronext Paris and included in the CAC 40 ESG and Next 20 Paris Stock indexes.

Thepurpose of Atosis to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.

WebWireID289887

Here is the original post:

Atos, UCL and Arm team up to offer wider cloud computing possibilities for life sciences applications - B - Benzinga

Posted in Cloud Computing | Comments Off on Atos, UCL and Arm team up to offer wider cloud computing possibilities for life sciences applications – B – Benzinga

Cloud Adoption: 3 Things to Consider – InformationWeek

Posted: at 1:47 am

For virtually every enterprise today, moving to the cloud is no longer a question of if; instead, the question is, which apps and when? There is urgency in the answer. In fact, when asked about their deadlines for embracing and adopting cloud technology, many IT practitioners will quip: Yesterday!

However, while most executives understand the benefits of transition to the cloud for scalability, operational efficiencies, security or cost-savings, many still harbor understandable concerns. Business executives face not just the technical challenge of cloud migration, but the added hurdle of reaching consensus amongst enterprise finance and technology leaders -- addressing their concerns and easing resistance to enact mission-critical change.

Here are three common areas of concern along with ways to overcome them and, ultimately, build confidence across the enterprise to move forward with a cloud migration.

Shifting to the cloud has a significant impact that most chief financial officers like -- it keeps more cash on hand. It also makes cash planning more predictable. Rather than dealing with spikes of expenditures when new equipment is needed, maintenance is required or updates are implemented, CFOs recognize that the expenditures become smooth. To get this benefit, it is important to move the correct types of applications into the cloud.

Typically cloud costs are based on computing resource usage, data storage, and data transfer. When you move an application to the cloud, you need to understand if it can use compute resources when needed and release them when idle. If the application uses the same compute resources when idle as it does when busy then you should consider local hosting.

Data storage and transfer also impact costs. Are you storing your data efficiently? Do you have unnecessary copies. and are you compressing where possible? Data transfer is another place where surprise costs can occur. Is the application writing and re-writing data unnecessarily?

To prevent unnecessary costs, applications may need to be re-written or new cloud-ready applications licensed. You can also use the cloud service contract to manage costs. When purchasing cloud services, you can secure a committed use discount which ensures discounted prices based on a commitment to use a minimum level of computing resources for a specified term. As organizations mature in their cloud usage, they can begin to forecast cloud costs and pre-buy committed compute usage annually for a discounted rate. In this way, cloud costs can be lowered over time, and become more predictable.

Optimizing compute spend in the cloud is an ongoing engineering challenge. Better application design improves efficiency and lowers costs. In a distinct advantage over the data center model, the cloud makes application costs visible down to the very last application programming interface. That level of visibility empowers engineers to continuously improve cost-efficiency of cloud operations.

In a data center model, internal IT professionals have a time-tested handle on networking, security, data governance and application deployment. The move to the cloud will disrupt that status quo. The best way to mitigate disruption is through employee communications and training.

Common questions IT teams and leadership must tackle when moving to the cloud include how the cloud transition will impact these functions, or whether they even exist in the same form in a cloud environment. Based on our own experiences with this, as well as helping our customers work through these challenges, the most successful approach to these questions takes a perspective of: how does what we know and do today translate to the cloud?

Upfront investment in cloud training for the workforce is a must. Cloud-specific training will help employees understand how basic concepts translate. For instance, to a networking infrastructure lead, virtual LANs (VLANs) become virtual private clouds (VPCs). Training results in a superior system architecture, because the transition team can design the cloud infrastructure to align with cloud best practices versus recreating the exact data center infrastructure in the cloud. Further, cloud training positions the workforce for continued career growth in an increasingly cloud-centric environment. The investment in training will increase employee engagement and build loyalty, which reduces turnover.

While an organization might wish to take a measured and methodical approach to cloud adoption, the clock is ticking when it comes to app modernization. Todays new applications are born in, and designed for, the cloud. Most legacy apps will either shift to the cloud or become obsolete. As many of the apps are business critical, updates can force cloud migration in order to maintain continuity of important apps.

To ease the transition, a hybrid approach often yields the best outcome. This hybrid scenario entails embracing cloud-native apps to take advantage of cloud-only services; redesigning a subset of legacy applications for deployment in the cloud; and migrating remaining apps through a lift and shift approach migrating on-premise virtual machines to identical virtual machines running in the cloud.

This hybrid approach demands careful decision making around which of these approaches to take with each distinct application. While a lift and shift approach is the most straightforward, it is also most expensive and could result in lower performance and efficiency. Selecting a new, cloud-native replacement app may result in the loss of any residual license value on the existing app, the need to port over existing users and data and perhaps the need to learn a new app interface, service/maintenance and integration points. Redesigning legacy apps similarly leads to new interface and integration points and creates a significant workload for IT. Working collectively on a hybrid solution, the IT team weighs the benefits of each approach and decides the right course of action for each application.

As businesses face the pressure and urgency of cloud migration, successfully addressing cost management, employee training and app modernization will help mitigate common causes of resistance from stakeholders and jump-start a transformation. A careful evaluation of technology and business needs in the cloud transition process will help foster a courageous enterprise culture of embracing the latest technologies to drive innovation and operational efficiency.

Link:

Cloud Adoption: 3 Things to Consider - InformationWeek

Posted in Cloud Computing | Comments Off on Cloud Adoption: 3 Things to Consider – InformationWeek

China-GCC Digital Economic Cooperation in the Age of Strategic Rivalry – Middle East Institute

Posted: at 1:47 am

This pieceis part of the series All About Chinaa journey into the history and diverse culture of China through short articlesthat shed light on the lasting imprint of Chinas past encounters with the Islamic world as well as an exploration of the increasingly vibrant and complex dynamics of contemporary Sino-Middle Eastern relations.Read more...

The strategic rivalry between China and the US that has developed over the past decade includes a struggle for control of the global digital economy, particularly the digital infrastructure and information communications technology (ICT) markets. In recent years, China has become a global leader in some areas of the digital economy such as e-commerce, digital payments, and investment in digital technologies. Digital economic cooperation has emerged as an increasingly important element of Chinas relations with the Gulf Cooperation Council (GCC) countries and a focal point of Sino-American great-power competition in the Middle East.

The World Economic Forum (WEF) and the Group of Twenty (G20) define the digital economy as a broad range of economic activities comprising all jobs in the digital sector and digital occupations in non-digital sectors. These include activities that use digitized information and knowledge as the key factor of production; modern information networks as a vital activity space; and ICT to drive productivity growth and optimize economic structures.[1] The digital economy is an increasingly important driver of global economic growth and plays a significant role in accelerating economic development, enhancing the productivity of existing industries, cultivating new markets and industries, and achieving inclusive, sustainable growth.

In recent years, Chinas digital economy has developed rapidly and has gradually become one of the dominant forces in its national development plan. China has not only made the digital economy a cornerstone of its future national development but also introduced various digital-specific strategies initiatives to achieve this goal (e.g., the Digital Silk Road and Jointly Building a Digital Community with A Shared Future Initiative). In January 2022, the Chinese State Council issued a plan for the development of the countrys digital economy, aiming to increase this sectors share of national Gross domestic product (GDP), increase from 7.8 percent in 2020 to 10 percent in 2025 by pushing technologies such as 6G and construction of big data centers.[2]

China ranks 50th out of 131 countries based on the World Bank digital adoption index, 59th out of 139 countries in the World Economic Forum index, and 36th out of 62 in the Fletcher School digital evolution index. Nevertheless, Beijing has become a global leader in several key digital industries, including e-commerce, fintech, online payments, cloud computing, and ICT exports.[3] China is also a leading international investor in key digital technologies (one of the global top three investors). Chinas venture capital (VC) industry has grown rapidly and is increasingly focused on the digital sector. The main industries that attract VC investment include big data, artificial intelligence (AI), and fintech.[4]

Traditionally, the GCC economies have depended primarily on oil and gas resources to drive economic and national prosperity. But this reliance on energy has tapered off in recent years, coinciding with a fall in oil prices and the rise of digital technologies. The Gulf monarchies have diversified efforts to develop their financial sectors and establish knowledge-based economies. They have made considerable progress in adopting digital technologies over the past decade. Indeed, digitalization is vital to the success of their national visions and development plans.[5]

There is great potential and bright prospects for the development of the digital economy in the GCC countries, as the number of young consumers in the region is vast, and the use of internet infrastructure is gaining increasing popularity. The rapid development of digital economy industries and relevant companies (in Saudi Arabia, Bahrain, Kuwait, and UAE) has shown the flexibility of digitization schemes when facing new markets born out of crises. Thus, it is expected that the digital transformation of the economy will play an essential role as Gulf monarchies pursue economic diversification.[6] In 2025, the GCC states will house much of the worlds growing fifth-generation telecommunication networks (5G) subscribers, with a $164 billion annual market for information and communication technology products.[7] The 5G network will positively impact multiple industries in the GCC, specifically energy usage optimization, cloud computing, ultrafast broadband, and internet of things (IoT) innovation, including self-driving cars transportation, and factory equipment.[8]

The COVID-19 pandemic has significantly impacted industries such as tourism, aviation, and hotels in Middle Eastern countries. Still, the digital economy has gained tremendous momentum against this trend, making the GCC governments realize the urgency and necessity of developing their digital economies. The coronavirus pandemic has underscored the importance of furthering the growth of the digital economy, making it a requirement for economic resilience and the development and advancement of every sector of the economy. Several GCC countries have increased policy support to facilitate digital transformation by taking initiatives such as expanding their digital sectors, investing in digital infrastructure, adopting e-government platforms, and launching technology parks and business incubators.[9]

Over the past few years, China and Gulf Cooperation Council (GCC) countries have enjoyed strong relations, and technology and innovation have become a crucial part of their cooperation. The term digital economy has become increasingly commonly used, and digitization is now the engine driving economic growth and transformation of the GCC countries. Their digital economies alone are growing twice as fast as their advanced economy counterparts.[10] Although in the near future energy will remain the central pillar of trade between China and the GCC, the technology sector has emerged as a new and promising area of cooperation.

Growing interest by GCC countries and China in pursuing digital economic cooperation was evident at the World Internet Conference in Wuzhen in December 2017, when several countries, including Saudi Arabia and the UAE, agreed to join forces with Beijing to expand broadband access and take steps to spur the development of e-commerce and other related transnational standards.[11] The outbreak of the COVID-19 pandemic led Gulf economies to bolster their digital economic cooperation with Beijing. Since lifting some of its coronavirus pandemic restrictions, China has undertaken major steps to develop global telecommunications providers industrial internet at far lower prices than their Western competitors.[12]

Through the Digital Silk Road (DSR), a component of Chinas Belt and Road Initiative (BRI), Beijing seeks to put herself in the leading position of technological innovation, helping jumpstart global digital development. Because of its central location in Asia, Africa, and Europe, the Middle East is prominent in the Digital Silk Road implementation. The Chinese government has called on Chinese firms to expand digital infrastructure construction and their respective share of ICT markets in countries participating in the BRI.[13] Under the DSR, Chinese technology companies have been rolling out digital infrastructure that facilitates the gathering, transportation, storage, and processing of massive amounts of data from partner countries. Such infrastructure includes e-commerce platforms, mobile payment systems, intelligent data centers, 5G networks, undersea cables, satellites, cloud storage, smart cities, and AI.[14] For instance, telecommunication companies in Bahrain, Kuwait, Qatar, Saudi Arabia, and the UAE have signed massive 5G contracts with Huawei.[15]

Despite Western efforts to curtail their global expansion, Huawei and other Chinese tech firms have been relentlessly extending their digital footprint across the Gulf region. Saudi Arabia has signed agreements with relevant Chinese companies and institutions cooperating in smart city construction and the development of AI technologies in Arabic. Huawei provides a solution for the worlds largest photovoltaic energy storage project in the kingdoms Red Sea region. Huawei is also working with the Ministry of Hajj and Umrah to develop digital infrastructure designed to streamline the pilgrimage to Mecca, including control rooms in Mecca and Medina reception centers. Jollychics platform, one of the most popular e-commerce apps, has extended its services in Saudi Arabia by creating a digital payment wallet and plans to expand its ecosystem to include on-demand food delivery, online travel, and transportation booking.

Alibaba has also been expanding its presence significantly in the kingdom. The Saudi Data and Artificial Intelligence Authority (SDAIA) hassigned an agreementwith Alibaba Cloud to empower Saudi cities with intelligence-driven smart city solutions. Saudi Arabias National Center for Artificial Intelligence (NCAI) will work with Huawei to train local AI engineers to ensure a skills pipeline to support a diversified and data-driven economy. In contrast, Alibaba Cloud technologies will support Saudi Arabias smart city ambitions. Meanwhile, Alibaba Cloud has agreed to work with the NCAI to develop digital and AI for smart cities. Through Alibaba Clouds AI Platform, they will jointly build safety and security, mobility, urban planning, energy, education, and health.[16] The Saudi Digital Academy signed a memorandum of understanding with Huawei on developing local talent. They will specifically study artificial intelligence, cloud computing, cybersecurity, and 5G internet uses.[17]

In UAE, innovation and technology are important contents of the cooperation with China. The collaboration includes joint work on COVID-19 vaccines and Huawei 5G technology. Huawei is building a Modular Data Centre Complex Project at Dubaiinternational airportand has teamed up withDubai Electricity and Water Authority(DEWA) to support the construction of fiber-optic infrastructure and video surveillance.[18]Huawei also plans to build the largest solar-poweredUptime Tier III-certified data centerin the UAEs Mohammed bin Rashid Al Maktoum Solar Park and is working with the Abu Dhabi City Municipality (ADM) to construct aMunicipal Disaster Recovery Data Center.[19] According to research conducted by theRWR Advisoryin 2020, China has exported smart city technology to 15 countries in the Middle East.[20] The Chinese e-commerce portals are accessible to around 80 percent of internet users in GCC countries.[21]

GCC governments are embracing digital adoption to promote sustainability, accelerate economic diversification, and help ensure that the region is well positioned to power evolve into a power-packed digital economy. According to the international consulting firm Kearney Middle East, the total e-commerce business in Gulf countries will reach more than $29 billion in 2021 and climb to $50 billion by 2025. This provides more opportunities for China-GCC digital economic cooperation.[22]

Overall, the economic influence of China through its oil and gas imports from the Persian Gulf, infrastructure investments, technology transfer, and arms sales provide influence and leverage that runs counter toUSinterests in the region. In the age of strategic rivalry, the question is whether China is already well on its way to becoming the most prominent technology partner of the GCC countries.

As, over the past decade, the United States has reduced its involvement in the Middle East, China has begun to fill the vacuum. Clear evidence of this change can be seen in Chinas increasing role in the development of the GCC digital economy. China provides the GCC a strategic opportunity, as it creates a bigger space for its Gulf partners to hedge their bets between two superpowers. It also places greater pressure on the US to align its strategic plan with the GCC states and reassure them about its commitments to their security. Sino-GCC digital economy cooperation is at the heart of the Gulf monarchies national visions and development plans. Both sides are committed to effectively linking the DSR and their national development plan and seeking opportunities to develop new ways of win-win cooperation.

Chinas growing influence in the GCC digital infrastructure network is a challenge to US dominance in the region. Washington has raised concerns about the Chinese internet giants and telecom companies' growing involvement in the region's digital economy. However, unable to compete with China on the digital economy front, the US began to apply coercive diplomacy tactics to pressure the GCC countries to slow Chinas growing influence. Yet, while the US governments efforts to halt Chinese tech companies expansion have succeeded domestically and in parts of Europe, they have thus far failed in the Gulf market.

Even so, as GCC countries become more entangled in Chinas transnational digital infrastructure network and welcome the many benefits such digital integration affords, they must also confront the possibility that this could threaten their ties with the US while expanding and deepening the strategic rivalry between the two great powers.

[5] Mordechai Chaziza, China and the Persian Gulf: The New Silk Road Strategy and Emerging Partnerships (London: Sussex Academic Press, 2019).

[13] John Chipman, Chinas Long and Winding Digital Silk Road, International Institute for Strategic Studies (IISS), January 25, 2019, https://www.iiss.org/blogs/analysis/2019/01/china-digital-silk-road. Sophie Zinser, Chinas Digital Silk Road Grows With 5G in the Middle East, The Diplomat, December 16, 2020, https://thediplomat.com/2020/12/chinas-digital-silk-road-grows-with-5g-in-the-middle-east/.

[15] John Calabrese, The Huawei Wars and the 5G Revolution in the Gulf, Middle East Institute, July 30, 2019, https://www.mei.edu/publications/huawei-wars-and-5g-revolution-gulf#_ftn1.

[16]Karl Flinders,Saudi Arabian authorities work with Chinese IT giants on digital goals, Computer Weekly, October 22, 2020, https://www.computerweekly.com/news/252490964/Saudi-Arabian-authorities-work-with-Chinese-IT-giants-on-digital-goals.

[21] Zhang Yunbi, China, Arab states upgrade digital collaboration, China Daily, March 3, 2021, https://www.chinadaily.com.cn/a/202103/31/WS6063b015a31024ad0bab29fe.html.

[22] China and the UAE launch digital economic cooperation, Seetao, December 15, 2021, https://www.seetao.com/details/128827.html.

Read more:

China-GCC Digital Economic Cooperation in the Age of Strategic Rivalry - Middle East Institute

Posted in Cloud Computing | Comments Off on China-GCC Digital Economic Cooperation in the Age of Strategic Rivalry – Middle East Institute

The Global High Performance Computing Market is expected to reach a value of USD 66.99 Billion by 2028, at a CAGR of 6.20% over the forecast period…

Posted: at 1:47 am

Fast computingmicro serversor HPC systems, increased performance efficiency, and smarter deployment &management with high quality of service are some of the primary reasons driving the high performance computing market growth.

Read Full Report : https://skyquestt.com/report/high-performance-computing-market

High Performance Computer (HPC) is a way to integrate computing resources to achieve high performance capabilities while dealing with a large number of problems in science, business, or engineering. All sorts of servers and micro servers that are utilized for highly computational or data-intensive tasks are included in HPC systems. HPC is becoming increasingly significant to countries as it has been related to economic competitiveness and scientific progress. According to some studies, 97% of the companieshave implemented supercomputing platforms and claim that they will not be able to exist without them. Academic institutions and other sectors are alsoadopting HPC technology in order to develop reliable and resilient products that will allow them to maintain a competitive edge in the marketplace. Several vendors are aiming to offer high-performance convergent technology solutions. The global high performance computing market is steadily increasing and will continue to develop in the future as this trend gains major traction. Furthermore, increasing focus on hybrid HPC solutions is also one of the major aspects that create lucrative growth opportunities for the high performance computing market during the forecast period.

Organizations are increasingly focused on hybrid HPC solutions in response to the rising demand for HPC solutions and technological improvements. IT departments are constantly attempting to strike a balance between cloud and on-premises HPC options. On-premises HPC resources are being scaled out as needed by businesses. Simultaneously, Cloud Service Providers (CSPs) have begun to offer turn-key HPC solution settings geared to the specific workload requirements of businesses. The efficiency of a hybrid HPC system is improved. In addition, it addresses security and privacy concerns while simultaneously lowering maintenance costs. As a result, the growing emphasis on hybrid HPC solutions is likely to generate great growth prospects for the high performance computing market.

Read market research report, Global High Performance Computing Market is segmented By Component (Solutions (Servers, Storage, Networking Devices, and Software) and Services) By Deployment Type (On-Premise and Cloud) & By Region- Forecast and Analysis 2021-2027 by SkyQuest

Get Sample PDF : https://skyquestt.com/sample-request/high-performance-computing-market

The global high performance computing market is segmented on the basis of component and deployment type. Based on the component, the high performance computing market is segmented into solutions and services. The solution segment is further segregated into servers, storage, networking devices, and software. Based on the deployment type, the high performance computing market is segmented into on-premise and cloud. Whereas, based on region, the global high performance computing market is categorized into North America, Europe, Asia-Pacific, South America, and MEA. Based on the deployment type, the cloud segment holds the most substantial share in the market. Cloud deployment is the most common in the sector, as cloud-computing technologies are widely used by companies across a variety of industries. According to the research, the cloud technology industry is predicted to rise due to its high adoption rate, while on-premise deployment methods are expected to gradually shrink.

While, in the region, the North American region is likely to hold the most substantial share in the market. The North American region is noted for its early acceptance of innovative technologies, owing to the United States and Canadas vigorous technological development. The rise in big data necessitates the adoption of new technologies and the necessity for security, resulting in the deployment of HPC systems. During the projected period, North America is expected to continue to dominate the global high performance computing market. Government investments in R&D activities at the national level are someothermajor sources driving demand in the North American region.

Advanced Micro Devices, Inc. (AMD) (US), Intel Corporation (US), HPE (US), IBM Corporation (US), Dell Technologies Inc. (US), Lenovo (China), Fujitsu Ltd. (Japan), Atos SE (US), Cisco Systems Inc. (US), NVIDIA Corporation (US), Sugon (China), AWS Inc. (US), and Dassault Systems Inc. (France) among others some of the key players operating in the market. The prominent players operating in the market are constantly adopting various growth strategies in order to stay afloat in the market.

For an instance, in June 2021, Travelport has chosen Amazon Web Services (AWS) as its preferred cloud partner, with intentions to use the tech giants portfolio to improve its operations performance and scalability. AWS will employ other technologies, such as HPC, storage, security, analytics, machine learning, and databases, in addition to cloud capabilities, to provide Travelport with a faster, easier, and more personalized trip booking experience. Hence, such activities are likely to drive the global high performance computing industry growth forward.

Speak With Our Analyst : https://skyquestt.com/speak-with-analyst/high-performance-computing-market

The report published by SkyQuest Technology Consulting provides in-depth qualitative insights, historical data, and verifiable projections about market size. The projections featured in the report have been derived using proven research methodologies and assumptions.

Report Findings

Drivers

What does this Report Deliver?

SkyQuest has segmented the Global High Performance Computing Market based on Component, Deployment Type, and Region:

List of Key Players of High Performance Computing Market

SC Johnson &

Visit link:

The Global High Performance Computing Market is expected to reach a value of USD 66.99 Billion by 2028, at a CAGR of 6.20% over the forecast period...

Posted in Cloud Computing | Comments Off on The Global High Performance Computing Market is expected to reach a value of USD 66.99 Billion by 2028, at a CAGR of 6.20% over the forecast period…

End-to-End Cybersecurity in a Cloud-Native World – ETCIO

Posted: at 1:47 am

Organizations all over the world had to accelerate their digital transformation agenda in order to cope with the distinguished challenges raised by the COVID-19 pandemic. In these unprecedented times, technology turned out to be the greatest enabler for businesses in virtually every domain. Businesses of today are leveraging cloud computing, AI & ML, and blockchain-driven solutions to achieve scalability of operations and business efficiency. Cloud in particular, has become a key enabler for companies that are going through a digital transformation journey. From maintaining operational continuity to driving innovation and expansion, cloud is at the core of business growth strategy. However, the ever-expanding cloud footprint has increased their susceptibility to sophisticated cyberattacks.

With this backdrop, Palo Alto Networks in association with ETCIO.com organized a closed-door discussion, wherein industry leaders deliberated on the upcoming cloud security challenges in the face of dynamic and new-age cyber threats, as well as best practices to drive consolidated cloud security.

Shipra Malhotra, Executive Editor, ETCIO.com, moderated this session. While moderating, Malhotra pointed out, Cybersecurity threats are getting increasingly complex and the attacks are becoming more and more sophisticated. This calls for a very consistent and integrated approach that provides complete visibility and a granular control across the entire cloud estate. This can be done by simplifying cloud security through an integrated architecture across the life-cycle of your cloud journey.

What are the challenges in terms of cloud security, especially in multi-cloud environments? Priya Kanduri, Lead - Cybersecurity Practice, Happiest Minds, opined, The biggest challenge facing cloud-computing and security is the lack of a security strategy itself. Some of the organizations that started with legacy systems and then shifted to cloud still face operational challenges linked with cloud-computing and SaaS because they failed to formulate and execute a clear strategy. Additionally, some of the DevSecOps challenges are still not fully resolved due to the lack of understanding and awareness about such technologies. Rudimentary challenges like having security built in from the beginning of cloud adoption, having a clear strategy, finding the right tools and bringing them together in the right manner, and having the right platform to facilitate cloud computing still persist.

Commenting on the concerns of people regarding cloud adoption in legacy companies, Vipin Rustagi, CIO, Duroflex, said Organizations that are a part of the traditional consumer goods setup have to convince their people that cloud is secure, since they are very possessive and particular about their data. The major concern such organizations have regarding adoption of cloud technology are around data security. There are also concerns regarding over-exposure and siphoning of data from the cloud storage, since data stored on cloud is available on public access.

Ensuring data security in multi-cloud environments

Ruchir Patwa, VP - Security and Compliance, MPL, highlighted the correlation between cloud security and visibility by stating, Cloud visibility helps an organization figure out its possible attack surfaces. Once the attack surface has been identified, the organization must start its management to mitigate potential attacks and data breaches. Companies that have taken their operations to the cloud must automate cloud control and security. Trivial processes like rotating keys and revoking access after a certain period of time must be automated.

Accentuating the ways in which data security can be ensured in cloud-computing, Nitin Kotwal, Head - Cybersecurity, MoEngage, said, Three basic rules need to be followed to ensure data security in a multi-cloud environment. First, stick to the basics - cloud security guidelines and procedures must be followed at all cost. Second, integrate security in the cloud life-cycle. The organization must define quality gates for security at every stage of the cloud life-cycle to ensure maximum levels of security. All the compliances, regulations and guidelines related to cloud security can act as quality gates. Third, adapt new and emerging technology solutions to resolve the complexities and challenges that you face.

Navaneethan M, Senior VP & CISO, Groww, said, The development team has to focus on speedy delivery due to which, installing a proper security and enforcement framework might take a back seat. At the same time, the DevOps team is also under pressure to fulfill all the requirements of the developer. Everybody has their own set of requirements due to which, the security aspect might get undermined.

Bhagwan Kommadi, Director - Technology and Product Engineering, Infinity Learn, pointed out how employee negligence can impact information security, Companies must organize sessions and seminars for new joiners highlighting the importance of data and information security. Most of the time, negligence of an insider becomes the root cause for cyberattacks and data breach. People often write passwords and other confidential pieces of information on their tables or on sticky notes. These trivial mistakes can pull down information security. Therefore, employees must be warned against such inadvertencies during the induction.

Emphasizing the need for incorporating security at the early stages of cloud development, Sandeep Variyam, Cybersecurity Advisor, Palo Alto Networks, said, A cloud infrastructure must be secure by design. Organizations must have a strong development procedure in place, with security checks at regular intervals that starts with coding and as it moves to the further stages, security automatically helps to resolve the issues that arise. If an organization is able to do a lot of automation in the code to cloud life-cycle then it can save a lot of manual effort as well.

Organizational strategy around cybersecurity and managing cloud apps

Shashwat Singh, CIO, Boat, shared his organizations approach towards cloud infrastructure development and cloud security, We leverage a maker-checker approach to inspect our cloud infrastructure(s). There is one partner who is responsible for setting up the cloud infrastructure, while the other one is responsible for finding all the inconsistencies and inaccuracies in the cloud at each stage of the development process. Their primary KPI for us is to find out any issues that might potentially be in the cloud infra. So, we have two partners working in tandem one is setting things up for us and taking operations to the cloud while the other one is constantly monitoring it. That is how we manage our cloud systems.

During the roundtable discussion, Amit Khandelwal, Senior VP & Head - IT and Digital Business, Visionet Systems Inc, mentioned, We ensure that our developer community is aware of DevSecOps and all the tools and techniques that fall under its ambit. We also run a variety of sessions focusing on the same.

As businesses expand their cloud footprint, adding multiple cloud vendors and creating a hybrid environment, managing cloud security across the entire lifecycle, from inception to build to operations, has become more complex than ever. In order to secure their cloud infrastructure and mitigate the possibility of a potential cyberattack, organizations must institute a strong security framework in the early development stages. With more and more businesses taking their operations to the cloud, the need for cybersecurity is stronger than ever.

View post:

End-to-End Cybersecurity in a Cloud-Native World - ETCIO

Posted in Cloud Computing | Comments Off on End-to-End Cybersecurity in a Cloud-Native World – ETCIO

MOBILESMITH, INC. : Entry into a Material Definitive Agreement, Creation of a Direct Financial Obligation or an Obligation under an Off-Balance Sheet…

Posted: at 1:45 am

Item 1.01 Entry into a Material Definitive Agreement.

On May 31, 2022, MobileSmith, Inc., a Delaware corporation (the "Company"),entered into a Fourth Amendment to Loan and Security Agreement (the "FourthAmendment") with Comerica Bank ("Comerica").

As background, the Company and Comerica are parties to a Loan and SecurityAgreement dated June 9, 2014, as amended (the "Loan Agreement"), wherebyComerica agreed to loan the Company up to $5,000,000. Currently, there is$5,000,000 in principal outstanding under the Loan Agreement and the previouslyextended maturity date of the Loan Agreement was June 9, 2022.

The Fourth Amendment to the Loan Agreement extends the previously extendedmaturity date of the Loan Agreement from June 9, 2022 to June 9, 2024.

Except for extending the maturity date as described above, the Fourth Amendmentdoes not amend any other term of the Loan Agreement in any material respect.

The foregoing description of the Fourth Amendment does not purport to becomplete and is qualified in its entirety by reference to the full text of theFourth Amendment, a copy of which is attached hereto as Exhibit 10.1 and isincorporated herein by reference.

The original Loan Agreement is filed as Exhibit 10.1 to the Company's QuarterlyReport on Form 10-Q for the period ended June 30, 2014 filed with the Securitiesand Exchange Commission on August 13, 2014, a copy of which is attached heretoas Exhibit 10.2 and is incorporated herein by reference.

Item 2.03 Creation of a Direct Financial Obligation or an Obligation under anOff-Balance Sheet Arrangement of a Registrant.

All information set forth in Item 1.01 of this Current Report on Form 8-K ishereby incorporated herein by referenced.

Item 9.01 Financial Statements and Exhibits.

Edgar Online, source Glimpses

See the article here:
MOBILESMITH, INC. : Entry into a Material Definitive Agreement, Creation of a Direct Financial Obligation or an Obligation under an Off-Balance Sheet...

Posted in Fourth Amendment | Comments Off on MOBILESMITH, INC. : Entry into a Material Definitive Agreement, Creation of a Direct Financial Obligation or an Obligation under an Off-Balance Sheet…

Is the SCOTUS Leak Investigation Legal? Maybe, But It Is Also Hypocritical and Potentially Counterproductive – Justia Verdict

Posted: at 1:45 am

Last week, journalist Joan Biskupic reported that Supreme Court Marshal Gail Curleywho heads the internal investigation into the leak of Justice Samuel Alitos draft opinion overruling the constitutional right to abortionwas seeking signed affidavits and mobile phone records from law clerks. Ironically, the very first paragraph of Biskupics article attributes the revelation to three sources with knowledge of the efforts, thus indicating that even the investigation of the leak is leaking.

Irony aside, the leak and the investigation of it should be kept in perspective. Chief Justice John Roberts was not wrong to characterize the opinions leak as a betrayal and an egregious breach of the trust that the Court lodges in its personnel and staff. However, the leak pales in comparison to the much more egregious breach that Justice Alito and four of his colleagues seem poised, even eager, to allow government to undertakea breach of the very bodies of those Americans who find themselves carrying unwanted pregnancies. Accordingly, in focusing todays column on the leak investigation, I do not mean to distract attention from the much larger and imminent betrayal of the Constitution by a majority of Justices sworn to uphold it.

The leaked draft that Politico published last month shows staple marks and was thus likely handed over as hard copy rather than as a computer file. In theory, anyone working at or with access to the Courts restricted areas, including cleaning staff or even an invited guest, could have obtained a printout of the draft from an unmonitored desk or elsewhere, but as a practical matter that seems unlikely. Although Politico published the leaked draft without identifying its source, the initial story attributed further information to a person familiar with the courts deliberations. Subsequent stories, including but not limited to Ms. Biskupics article last week, indicate that several knowledgeable persons have been in contact with journalists. Thus, as a practical matter, Ms. Curleys team can probably focus most of their attention on the law clerks.

Many commentators have speculated about who leaked the draft and why. The leading hypotheses, in my view, are: (1) a liberal law clerk outraged by the decision, hoping to bring negative public attention to the Court, possibly in the further hope of leading one or more Justices to temper the draft or result, and/or possibly seeking to give political actors advance warning in shaping proposed legislation and electoral campaigns; or (2) a conservative law clerk worried that Justice Alitos draft might not end up as the majority opinion and hoping that Justices who voted to overrule Roe v. Wade at conference would have their spines stiffened by public opposition. These competing theories depend on different predictions about the reaction of the Justices to the anticipated public reaction to the leak.

Other possibilities also exist. Perhaps one of the Justices themselves leaked the draft or approved of a law clerks doing so. Or maybe the initial leak was accidentala result of improper handling of a sensitive draft that fell into the wrong handsbut it was followed by someone with knowledge talking to reporters. At this point, we outside observers can only speculate.

So far as I am aware, the leak violated no law. Attorney Mark Zaid, who has represented leakers, confirmed that view to the Washington Post last week. Supreme Court draft opinions are not, after all, classified.

Nonetheless, the leak was a clear breach of a very strong norm. I recall that when I started my year as a law clerk at the Court thirty-one years ago, Chief Justice William Rehnquist admonished all the new clerks to keep the Courts confidences. I do not recall whether he referred us to any formal written policy, but it was made crystal clear that we were not to discuss pending casesor anything involving the Courts workwith journalists or other outsiders. Clearly not everyone heeded that admonition. News stories and books about the Court from time to time report on internal deliberations and changed votes that could only have come from Justices or law clerks. Still, no one doubts that leaking a draft opinion was, as Chief Justice Roberts declared, an egregious breach of the Courts norms.

Nor is the Chief Justice mistaken in his view that leaking a draft opinion undermines trust within the Court as an institution. The argument for confidentiality of judicial deliberations parallels similar arguments in other settings, including within the executive branch of government as well as more mundane contexts, such as the management team of a company making a sensitive hiring decision. The risk of leaks undermines frank deliberations. There is thus nothing problematic about the Chief Justice or other Justices being upset about this leak or wishing to deter future leaks.

The difficulty is that the leak investigation seems to be intensifying the very harm that the leak itself presents. With law clerks freaking out about the investigation and considering hiring attorneys to represent them, the atmosphere at the Court can hardly be harmonious or even conducive to the regular conduct of business. Moreover, the request to turn over mobile phone records is problematic.

Even if leaking a draft opinion were a crime, that would not provide the government with the authority to search the mobile phones of every possible suspect. In the 2014 case of Riley v. California, Chief Justice Roberts wrote for a unanimous Court that police need a warrant based on probable cause to search a mobile phone. Each Justice has four law clerks, plus one for retired Justice Kennedy, for a total of 37. That means that the likelihood that any one law clerk was the leaker is less than 3 percent. Although the courts resist quantifying probable cause, a less-than-three-percent chance of turning up evidence surely does not qualify.

However, Rileys logic might not apply because that case involved searching an entire mobile phone, which, as Chief Justice Roberts observed, contains an enormous quantity and variety of data, amounting to the sum of an individuals private life. By contrast, at least according to Ms. Biskupics reporting, the investigators seek only mobile phone records. If the investigators seek only the phone numbers that law clerks called, the controlling precedent would be the 1979 decision in Smith v. Maryland, which allowed the warrantless use of a pen register, a device that records the numbers a phone dials. Whether Riley or Smith applies could depend on how much mobile phone data the leak investigators seek. If they only seek the numbers that the law clerks called, then Smiths permissive rule governs.

But perhaps the investigators want more information, including incoming as well as outgoing calls and text messages. That would make the case more like Riley, both as a legal matter and in terms of the impact on the law clerks. Even if less intrusive than requiring law clerks to unlock and turn over their entire phones, requiring call and text records is still extraordinarily intrusive. Investigators could learn that a clerk talked to a psychotherapist, exchanged texts revealing their hitherto-private sexual orientation, or communicated with family members about their financial, medical, or other private challenges. Where the government has probable cause to believe that it will find evidence of crime, such interests in privacy may be overridden, but a less than 3 percent likelihood of detecting a non-criminal breach of a workplace norm falls far short of that standard.

Does the fact that the government acts here in the role of employer rather than sovereign make a difference? Yes and no. In National Treasury Employees Union v. Von Raab, decided in 1989, the Supreme Court held that the Fourth Amendment applies to drug tests of government employees. However, the employment rather than law enforcement context meant that the government employer needed to satisfy only a standard of reasonableness; warrants based on probable cause were not required. The Court further held that it was reasonable to subject employees seeking promotion to positions involving drug interdiction or the carrying of firearms to routine drug testing; the Court also said, however, that it would not be reasonable to subject every government employee to such drug testing.

Accordingly, one might think that requiring law clerks to turn over cell phone records need only be subject to a reasonableness standard. To be sure, the individualized nature of the inquiryseeking information about a particular leakmight make the warrant/probable-cause regime more applicable (under Riley, albeit not under Smith), but even if judged only by a standard of reasonableness, the intrusive nature of the mobile-phone-data search and the low probability that any particular set of data will produce evidence of leaking suggest that the requirement to turn over the records is unreasonable.

Now perhaps none of the foregoing legal analysis applies for a different reason. Ms. Biskupics reporting leaves open the possibility that the Court investigators have only requested, rather than required, law clerks to divulge mobile phone records. Yet given the fact that law clerks are essentially employees at willserving at the pleasure of the Justices who hired themthat distinction seems highly formalistic. A law clerk who does not comply with the request risks grave suspicion and even dismissal.

* * *

I have analyzed the request for law clerks mobile phone records in accordance with the Supreme Courts own precedents. As the discussion above reveals, exactly how the legal arguments would play out is somewhat uncertain. But in a sense, that is all beside the point.

Even if legal, the investigation reeks of hypocrisy in two respects. First, it violates the spirit (and perhaps even the letter) of the Courts Fourth Amendment cases. Second, in focusing on law clerks but not Justices, it amounts to self-dealing. If the Courts investigators really want and need mobile phone data, they should also seek it from others who might have had access, starting with the Justices and their spouses.

Read the original here:
Is the SCOTUS Leak Investigation Legal? Maybe, But It Is Also Hypocritical and Potentially Counterproductive - Justia Verdict

Posted in Fourth Amendment | Comments Off on Is the SCOTUS Leak Investigation Legal? Maybe, But It Is Also Hypocritical and Potentially Counterproductive – Justia Verdict

Crypto Bill Will Be Introduced on June 7TH, Could Be Horrendous for Altcoins – Coinpedia Fintech News

Posted: at 1:45 am

U.S. Senator Cynthia Lummis (R-Wyoming) has been working on an action plan for months. Lummis, a long-time proponent of cryptocurrencies, has been working on a proposal that would fully integrate digital assets into the US financial system.

Weve been teasing it for months, but the time is almost here a proposal to fully integrate digital assets into our financial system. Excited to finally unveil this effort next week. Stay tuned

The legislation will be introduced on Tuesday, June 7th, and it is significant because it includes definitions of which coins are commodities, which coins are securities, stable coins, the CBDC framework, and the NFT direction. This legislation will most likely be ideal for bitcoin, but it could also be beneficial to crypto in general.

The much-heated topic is analyzed by Altcoin daily on their channel as to why you should care about this. First and foremost, Cynthia Lummis is the one who is initiating and spearheading this bill.

On June 7th, Cynthia Lummis will introduce legislation to integrate cryptocurrency into the financial system. She has been a strong supporter of bitcoin and cryptocurrencies.

If passed, it would impose a two-year freeze on new and renewed air permits for fossil-fuel power plants that are used for energy-intensive proof-of-work cryptocurrency mining the computing process that records and secures bitcoin and other forms of digital money. Bitcoin and other cryptocurrencies use a blockchain-based mechanism called proof-of-work.

The first member on the panel who is everyones favorite is Michael Saylor. Michaels stance on crypto is unmistakable: securities and bitcoin are the most ethical and most transparent, as he stated during the panel discussion.

The second set of eyes is on Ted Cruz, a Republican from Texas. Cruz has been very positive about bitcoin and crypto, despite the fact that he himself doesnt understand it and is trying to get other politicians to understand it. All in all, he doesnt want to over-regulate it, which is good but is he more biased toward bitcoin? Time will tell.

According to other reports, Cruz now has large crypto donors who run a proof of work network in his state, keeping bitcoin strong and altcoins weak directly benefits Texas, and some of his largest new donors also take benefit. Cruz claims to own bitcoin and everything else is outside his risk profile.

Caitlyn Long blockchain consultant from Wyoming. She is hoping to work with Fed to create a custodial and Slowing Defi momentum that is in her best interest according to the reports.

Now again much like Caitlyn Long, Cynthia Lummis in their opinion has a little libertarian agenda and doesnt want to over-regulate the crypto space so is it in her best interest to slow defi that remains to be seen.

There arent many pro-defi, pro-Ethereum, pro-crypto folks working on this bill, and of course, Cynthia Lummis is spearheading it and has her own interests to pump bitcoin over any other L1s or altcoins. She stated that altcoins will rise from the ashes, reinforcing her belief in bitcoin.

she states burn it all down bitcoin will be the phoenix that rises quick

Bitcoin holders are in great difficulty this week, and the first thing they point out is that commodities vs securities are being resolved by legislation, and Ethereum L1 will fall within the securities umbrella.

So the lesson from all of this is that the folks who worked on this legislation are all very bitcoin oriented and bitcoin-centric, with a small number of Ethereum maximalists, and no defi or NFT types. Bitcoin users, on the whole, have a more libertarian attitude about crypto. Even though this isnt a final bill, it wouldnt be good if ETH, NFT, and crypto were classed as the riskiest securities.

Was this writing helpful?

The rest is here:

Crypto Bill Will Be Introduced on June 7TH, Could Be Horrendous for Altcoins - Coinpedia Fintech News

Posted in Libertarian | Comments Off on Crypto Bill Will Be Introduced on June 7TH, Could Be Horrendous for Altcoins – Coinpedia Fintech News

Special Olympics drops COVID vaccine mandate after Florida threatens …

Posted: at 1:42 am

Florida threatened to fine Special Olympics International $27.5 million for requiring 5,500 participants at the USA Games in Orlando to be vaccinated against COVID, prompting the organization to drop the mandate.

There needs to be a choice in this regard, Gov. Ron DeSantis said at an event in Orlando surrounded by a cheering crowd that included athletes for the games set to begin Sunday. Let them compete. We want everyone to be able to compete.

News of the dispute was first reported by Jay OBrien of ABC News.

In a letter sent to the Special Olympics International on Thursday, the state Department of Health said the organizations requirement that athletes show proof of vaccination violated state law. It said there had been several attempts by health officials to avoid imposing fines and bring the event into compliance by not requiring proof of vaccination.

Surgeon General Joseph Ladapo said he had been negotiating with the organization for the past six months to resolve the issue not for our sake but for the sake of these athletes.

A statement from Special Olympics International, a nonprofit, said Friday it had lifted its vaccination rule based upon the Florida Department of Healths interpretation of Florida law.

[Special Olympics brings 5,500 athletes to Orlando]

Delegates who were registered for the games but unable to participate due to the prior vaccine requirement, now have the option to attend, it said in a released statement.

We dont want to fight, the statement said. We want to play.

The conflict arose after DeSantis signed an executive order last April banning so-called vaccine passports, preventing businesses and state and local governments from requiring proof of vaccination. A month later, the Florida Legislature passed a bill, signed into law by DeSantis, imposing a $5,000 fine for each violation.

A Sarasota business owner sued to have the law blocked, but Leon Circuit Judge Layne Smith rejected the argument that it violated the business owners First Amendment rights.

Judi Hayes, an Orlando attorney whose 11-year-old son has Downs syndrome and sued DeSantis after he banned schools from requiring masks, said she was disappointed that the Special Olympics caved to the governor. She said she would boycott the upcoming games.

We were planning on attending as spectators, said Hayes, whose lawsuit against the governor was voluntarily dismissed. If they wont stand up for us, we wont participate.

People with disabilities, especially those with intellectual disabilities, are more susceptible to getting COVID-19 and more vulnerable to poor outcomes, Hayes said.

The only reason we are alive to discuss this issue is because [the] vaccines work, she said. But he wants to curry favor with the anti-science troglodytes and bullies the Special Olympics. Who does that?

Rubbing salt into the wound, she said, the organization is rewarding him by allowing DeSantis and First Lady Casey DeSantis to continue serving as honorary chairs of the 2022 Special Olympics games.

But there are others in the disability community who are adamantly opposed to vaccines because of potential side effects.

Elaine Valle, of Belle Isle, wants her 25-year-old daughter Isabella, who has cerebral palsy and epilepsy and uses a wheelchair, to participate in the games despite not being vaccinated.

Weekly

Get latest updates political news from Central Florida and across the state.

Valle said her daughters neurologist advised against her being vaccinated because she could get a fever that could cause other complications. She added that the entire family has previously gotten COVID and had antibodies.

We just found out this morning that she will be participating, Valle said at the DeSantis event. Isabella has from the age of 7 competed in swimming, golfing ... and cycling as part of Special Olympics Florida And then they tell us youve got to have these vaccine mandates.

The vaccine protocols were put into effect in June 2020 and updated a year later, according to the Special Olympics website.

Joe Dzaluk, president and CEO of the 2022 Special Olympics USA Games, said the threatened fines have had no impact on the event itself.

The games will proceed as planned, and we are happy to welcome any and all athletes, he said.

Dzaluk, who had no part in the vaccine mandate or the decision to drop it, said only a small percentage of athletes withdrew from the games after having qualified.

The attrition level, compared to previous games, is actually down, he said. Its been in the single digits.

View post:

Special Olympics drops COVID vaccine mandate after Florida threatens ...

Posted in Olympics | Comments Off on Special Olympics drops COVID vaccine mandate after Florida threatens …