Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

New WhatsUp Gold Release with TotalView Enables IT Teams to Monitor and Securely Control Applications, Network Devices, Servers, Storage and Network Traffic with One Software License


LONDONIpswitch, the leader in easy to try, buy and use IT management software, today announced the launch of its new Ipswitch WhatsUp Gold 2016 unified infrastructure and application monitoring software. WhatsUp Gold 2016 gives modern IT teams the ability to monitor their entire environment with one piece of cost-effective software. It also delivers the flexibility to adapt monitoring approaches based on changing business priorities without the need to re-evaluate and purchase new licenses. By enabling IT teams to monitor and manage their entire environment with one simple license, customers get the maximum value out of their investment without the waste, headaches and complex artificial license limitations imposed by other vendors.


88% of IT professionals are dissatisfied with their current monitoring approach and 78% are challenged to secure the budget needed to meet business goals, according to a recent international survey of 1,700 IT professionals entitled, “The State of Monitoring 2016.” Ipswitch WhatsUp Gold 2016 alleviates both of these problems with a single flexible software product that provides a unique total view of the entire network and gives IT teams secure control of business transactions, applications and infrastructure. This enables IT teams to:

  • Find and fix performance problems
  • Monitor critical applications and infrastructure
  • Optimise bandwidth utilisation
  • Manage network configurations

“I like that WhatsUp Gold 2016 allows me to optimise my under-utilised licenses and use them for features I don’t own today.”, says Dan Hochman, Manager of Information Technology at ArQule. "With TotalView and the new point tiers, I can enhance the monitoring capabilities for our infrastructure while controlling license costs.”


“IT teams need to instantly know what is happening with their entire infrastructure; their jobs are too demanding to constantly jump from one IT management tool to another,” said Austin O’Malley, Chief Product Officer at Ipswitch. “The new WhatsUp Gold 2016 not only gives IT teams a single, comprehensive view of their network, servers, applications and storage devices, but the new TotalView pricing model removes hassles by including all of the important features in one simple package. This means IT teams can focus on keeping their organisations running smoothly and not worry about complicated purchase decisions, waste, or licensing issues.”


WhatsUp Gold 2016 Editions

Ipswitch WhatsUp Gold 2016 is now available in easy to purchase editions that allow IT teams to choose the solution that best fits their requirements:

  • ProView – Core network monitoring capabilities for environment of all sizes plus advanced monitoring including wireless and in-depth server monitoring
  • TotalView – Includes all ProView features, plus virtualisation (VM) monitoring, application performance monitoring (APM), storage monitoring, and network traffic analysis (NTA)
  • TotalView Plus – The highest-value edition includes all the functionality of TotalView as well as configuration management and additional pollers to scale to the largest networks

David Perkins, Sales Manager at Level 8 Solutions, WhatsUp Gold Partner Of The Year, commented, “Many of our customers come to us having previously over-spent and under utilised multiple monitoring tools. They are frustrated with the lack of flexibility to shift monitoring priorities. WhatsUpGold 2016 from Ipswitch changes this by giving IT teams the monitoring flexibility they need to support 24/7 business critical applications, services and infrastructure while avoiding overbuying and waste.”


WhatsUp Gold 2016 New Features

In addition to the new flexible and scaleable licensing options, WhatsUp Gold 2016 also offers a number of new features to allow IT teams to easily manage IT complexity, including:

  • Flexible, Scaleable Licensing – Makes it easy to purchase a solution that optimises value for any use case and easily monitor any and all devices and applications without complex licensing and the need for additional expenditures
  • NetApp Storage Monitoring – Extends visibility keeping IT teams ahead of storage device problems
  • Improved Security – Now HTTPS content and SSL monitors support TLS 1.2, giving IT teams the ability to monitor the most secure protocol for compliance requirements such as PCI
  • Improved MIB Walker Performance – A faster MIB walker loads large MIB files in seconds, rather than minutes. An improved tree view makes it easier to navigate between the different levels of the MIB file when exploring the MIB hierarchy

To learn more about WhatsUp Gold 2016, visit https://www.ipswitch.com/application-and-network-monitoring/whatsup-gold/whats-new


About Ipswitch

Today’s hard-working IT teams are relied upon to manage increasing complexity and deliver near-zero downtime. Ipswitch IT management software helps them succeed by enabling secure control of business transactions, applications and infrastructure. Ipswitch software is powerful, flexible and easy to try, buy and use. The company’s software helps teams shine by delivering 24/7 performance across cloud, virtual and network environments. Ipswitch powers more than 150,000 networks spanning 168 countries, and is based in Lexington, Mass., with offices throughout the U.S., Europe, Asia and Latin America. For more information, please visit http://www.ipswitch.com/, or connect with us on LinkedIn and Twitter.

Everybody loves a hardware upgrade, be it a smartphone, a tablet, a laptop or even a smart new server. It’s something shiny and new.

When we talk about upgrades or data migration though, it’s often more of a ‘must-do’ than a ‘nice-to-have’, whether it’s updating back office ERP systems, moving users from desktops to laptops or simply introducing a new back-up system.

So while not the most exciting part of an IT team’s workload, data migration is a necessary part of day-to-day maintenance and management. It is also not without its risks, including loss of data.



With the recent White House order of a federal data center construction freeze, government agencies are now forced to do even more with less, including complying with growing regulation and accountability. The new Data Center Optimization Initiative mandates stricter goals and rules meant to reduce the government’s sprawling data center inventory and the money it takes to maintain it.

All too often, IT leaders find themselves constrained by legacy in-house data centers and connectivity options that fail to deliver required reliability and uptime, while meeting the mission’s budget.

Successful government agencies employ enterprise data center services to ensure mission-critical IT needs are met:



There is something special about round tables. It gets people to open up, collaborate, and talk to everyone that sits at the table. Be it at home, in political discourse or in business, round tables help to solve problems, and foster the open exchange of ideas and thoughts.  It eliminates side or siloed conversations at the other end of the table. This is especially important when you put top experts together on a topical, and sometimes, a controversial subject.

It was with this spirit in mind that we accepted the Robert Frances Group (RFG) offer to join “The Rounds”, a new series of industry experts from users and vendors collaborating with RFG in the development of Open Cloud frameworks. Cisco has embraced open conversations, the sharing of ideas and participation in industry bodies and forums for a long time. As such, “The Rounds” was a perfect fit – so when RFG invited to join in, we gladly accepted.



AUSTIN, Texas – Disaster recovery experts today urged applicants for federal assistance to complete a disaster loan application from the U.S. Small Business Administration. Taking a loan is not required; completing the application can open the door to all federal assistance, including possible additional grants from the Federal Emergency Management Agency. If approved, and a survivor does not accept the loan, it may make them ineligible for additional federal assistance.

Many Texans who register for disaster assistance with FEMA will receive an automated call from SBA with information on how to complete the loan application process. These low-interest SBA loans are the major source of funding for disaster recovery.

SBA provides low-interest loans to businesses of all sizes (including landlords) and to homeowners, renters and eligible private nonprofit organizations that sustained disaster damage. There is no cost to apply for a loan.

Assistance from FEMA is limited to help jump-start the recovery; it may not cover all damage or property loss. Completing the SBA loan application may make FEMA assistance available to replace essential household items, replace or repair a damaged vehicle, or pay for storage costs.

Interest rates can be as low as 4 percent for businesses, 2.625 percent for private nonprofit organizations and 1.813 percent for homeowners and renters with terms up to 30 years.

  • Eligible homeowners may borrow up to $200,000 for home repair or replacement of primary residences, and eligible homeowners and renters may borrow up to $40,000 to replace disaster-damaged or destroyed personal property, including a vehicle. 
  • Businesses of all sizes can qualify for up to $2 million in low-interest loans to help cover physical damages.
  • Small businesses and most private nonprofits suffering economic impact due to the severe weather and flooding can apply for up to $2 million for any combination of property damage or economic injury under SBA’s Economic Injury Disaster Loan program.

Applicants may apply online using the Electronic Loan Application via SBA’s secure website at DisasterLoan.sba.gov/ela.

Disaster loan information and application forms are available online at SBA.gov/disaster, from SBA’s Customer Service Center by calling 800-659-2955 or emailing DisasterCustomerService@sba.gov. Individuals who are deaf or hard of hearing may call 800-877-8339. Meet with an SBA representative at a Disaster Recovery Center to learn more about disaster loans, the application process or for help completing an SBA application.

Completed applications should be mailed to:

U.S. Small Business Administration

Processing and Disbursement Center

14925 Kingsport Road

Fort Worth, TX  76155


People with storm losses, who still need to register with FEMA, can go online anytime at DisasterAssistance.gov. Survivors also can register with FEMA by phone (voice, 711 or video relay service) at 800-621-3362, TTY 800-462-7585. The toll-free lines are open 7 a.m. to 10 p.m. local time, seven days a week. Multilingual operators are available.

Federal disaster assistance is available to residents of Erath, Gregg, Harrison, Henderson, Hood, Jasper, Limestone, Marion, Newton, Orange, Parker, Shelby and Tyler counties that suffered damage in the severe storms, tornadoes and flooding, March 7-29.

Microsoft’s mad-scientist data center research crew appears to have liked the results they’ve seen after submerging a relatively small underwater data center pod somewhere off the coast of California last year as a test. The team has stepped up its underwater data center ambitions, the project’s lead told a conference in New York Wednesday.

While still in preliminary planning stages, the next underwater deployment may be about four times the size of the first pod, or about the size of a shipping container, Ben Cutler, the project’s manager, said, according to Data Center Frontier.

The first pod, a 10-by-7-foot cylindrical shell that contained a single rack of servers, went underwater around August of last year. The Project Natick team pulled it out and brought it back to the Microsoft headquarters in Redmond, Washington, in December to collect experimental data.



While space elevators and colonies on the moon are still squarely in the realm of science fiction, developed countries like the United States heavily utilize satellites, so-called space infrastructure, to facilitate and support communication functions, entertainment systems, weather forecasting, search-and-rescue functions, global positioning systems and national defense elements.

As of 2015, there were more than 1,000 active government and private satellites in space with an additional 2,600 devices that no longer function. These nearly 3,700 items range in size from a few pounds to as big as a school bus. More than 15 countries and hundreds of private companies own these satellites. Of the active satellites, there are 502 active American, 188 Russian and 116 Chinese. 

These man-made objects are not the only things in space. In fact, the United States Surveillance Network estimates that there are more than 21,000 objects larger than 10 centimeters (about 25 inches) orbiting the Earth, with an additional 500,000 smaller pieces. All natural and man-made space objects travel at extraordinary speeds even if they are geospatially maintained in many cases. As these items continue to increase in number and interaction, there is a risk to the critical infrastructure systems discussed earlier that are maintained through the multitude of satellites.

In the weeks since the revelation of the Panama Papers, the world of the rich and powerful has been reeling. A single cyberattack against Mossack Fonseca, a quiet Panamanian law firm, has sent a tsunami around the world, toppling one world leader so far, with more turbulence to come.

The attacker absconded with a vast trove of information, consisting of millions of documents, emails, and other information – so much information, in fact, that journalists and other investigators have been poring through it for over a year.

Still a mystery: the identity or identities of the attackers. Perhaps an insider with access to secret passwords? Or maybe a skilled attacker, well-versed in the intricacies of cyberespionage?



Historic flooding has left the Houston metropolitan area inundated once again this week, killing at least seven people, flooding 1,000 homes and causing more than $5 billion in estimated damages in Harris County alone. Gov. Greg Abbott declared a state of disaster for nine counties in and around the Houston area. The widespread nature of the disaster prompted the city of Houston to call this the largest flood event since Tropical Storm Allison, which devastated southeast Texas in 2001, causing $9 billion in damage and $1.1 billion in insured losses.

According to Harris County Judge Ed Emmett, about 240 billion gallons of rain fell on the Houston area this week. That’s the equivalent of 363,400 Olympic-size swimming pools, CNN reported. After 10 inches of rainfall fell in six hours Sunday night into Monday, powerful, slow-moving thunderstorms had paralyzed the region Monday, but storms continued through Wednesday.

Having some of the hardest rainfall overnight helped a bit to mitigate the dangers this week. While this made it difficult to predict, it allowed people to better make choices about going out, as opposed to last year’s floods around Memorial Day, Emmett told the Houston Chronicle. Nevertheless, emergency crews made more than 1,200 high-water rescues, many residents had to evacuate to shelters, and for those who were able to shelter in place, 123,000 homes had no power at the height of the flooding. Officials have also expressed concern about two local dams that have been rated “extremely high risk and are at about 80% capacity, but they are not in immediate danger of failing.



The fight between Apple and the FBI brought the concept of using backdoors to break encryption to the mainstream. The initial battle may have ended with the FBI hiring someone to hack into the phone (and I have to ask – was anyone surprised that an outside hacker was able to do the deed?).

The battle from Apple’s point of view also drew a lot of support from tech companies and IT professionals. A new study from Spiceworks provides some insight as to why IT pros are concerned about backdoors, encryption and overall security. In general, IT pros believe the existence of backdoors, whether they are there for government agencies, law enforcement, or anyone else, puts their company at greater risk of a cyberattack or data breach. The reason, according to the survey, is simple: Hackers are already very good at outsmarting security systems, and if backdoors are provided as a way to help solve legal and national security concerns, it is only a matter of time until hackers are using them for their own nefarious goals. Backdoors, the IT pros believe, put personal and financial data at greater risk.

The survey revealed something else that I found more surprising. Although 57 percent said that they believe encryption actually helped prevent a data breach, encryption isn’t as widely adopted as a security layer as one would think, as the Spiceworks report stated: