(TNS) - Suvella Garza sometimes found it difficult to breathe in her water-scarred living room, where the air was thick and dank.
Mold test kits were set out on her child's plastic table, the family's latest effort to assess the health risks of continuing to live in an apartment where Garza felt, for now, stuck.
"We can't find an apartment in our price range. We can't move into a house. Where else are we going to live?" Garza asked as her 4-year-old son slept in the next room.
Rachel Stephens at the market-research firm RedMonk has some good analysis and charts showing price differences among various cloud Infrastructure-as-a-Service providers, mapping out how pricing wars appear to be pushing service costs generally down even as providers flesh out their offerings.
Her findings also show that providers are starting to be wary of focusing on simply being the cheapest offering, with many vendors aligning closely around one price point and instead.
One interesting exception: Google, which far undercuts the pack in memory pricing as well as compute units.
There are a lot of caveats to Stephens’ data, as she notes: She compares list — not actual — prices, apples to apples comparisons between providers are impossible, and a number of non-pricing factors are completely ommitted.
Dedicated, full-time developers know that, as with all forms of software development, security should be a top priority when building mobile apps. Yet increasingly, mobile development within enterprises is being done by what Gartner calls "citizen developers": business-line employees who create apps using approved tools but outside the traditional IT process. Unfortunately, far too many of them have an insufficient understanding of what needs to be done to protect their users' data.
The seriousness of this issue cannot be overstated. For an individual, the financial consequences of identity theft due to a mobile data breach could be devastating. And when a business's data is leaked by a flawed app, the potential cost is incalculable.
Still, ignorance about mobile app security remains widespread. Even when a mobile app is revealed to contain a major security flaw, its users often simply don't understand the risk well enough to uninstall it. Even worse, they remain completely unaware of security flaws present in their apps.
Last year's Ponemon’s Varonis-sponsored security study had users and IT practitioners agreeing that managing confidential information was inadequate at their organizations. Since then, the number and depth of attacks have significantly increased.
Let’s look as the study results and see how badly we are screwed.
The Ponemon survey involved 3,000 employees and IT practitioners and it was international in scope (U.S. and Europe). The interviews were conducted in April and May of 2016 with 1,371 end users and 1,656 IT and security professionals. Industries were diverse but a special focus was on financial services, public sector organizations, health care firms, life sciences companies, retail firms, and firms in the industrial, software, and tech segments.
As we approach the one year anniversary of the explosions at the Port of Tianjin, China, a new report finds that a port’s size and its catastrophe loss potential are not strongly correlated.
Based on the 1-in-500 year estimated catastrophe loss for earthquake, wind and storm surge perils, the surprising analysis by catastrophe modeler RMS, shows that it’s not just the biggest container hubs around the world that have a high risk of insurance loss.
For example, smaller ports such as the U.S. ports of Plaquemines, Louisiana, and Pascagoula, Mississippi, as well as Bremerhaven, Germany rank among the top 10 ports at highest risk of marine cargo loss.
If you've got a career in IT, 2016 has most likely been a stable year for you. That's because the IT sector has been adding jobs all year long, even in a presidential election year full of uncertainty.
A new report from CompTIA that analyzes some of this job growth attributes the trend to growing tech areas such as big data and cloud computing.
What do the numbers say?
The IT sector added 47,100 jobs total during the first seven months of 2016 for a total of 4,392,800. But July saw just 4,000 new jobs added, as the pace of job growth slowed.
CHARLESTON, W. Va.— Registering with the Federal Emergency Management Agency (FEMA) is the first step in qualifying for disaster assistance. If you have homeowners’ or renters’ insurance, your next step is to contact your insurance agent to see if your damage is covered.
In the aftermath of the June 22-29 severe storms, flooding, landslides and mudslides, FEMA is advising survivors who experienced property damage to contact both FEMA and their insurance company. Wednesday, Aug. 24, is the last date to apply to FEMA.
If you live in Clay, Fayette, Greenbrier, Jackson, Kanawha, Lincoln, Monroe, Nicholas, Pocahontas, Roane, Summers or Webster county you may qualify for assistance from FEMA – even if you have insurance.
If you are a homeowner or renter; your home or personal property was damaged by the storms; you have insurance, and you have registered with FEMA for disaster assistance:
You must contact your insurance agent to file a claim with your insurance company.
You should be prepared to fully describe to your agent the damage caused by the storms.
You should keep a record of all contacts you have with the agent and the insurance company.
You should keep a record of the claim number and the date you called to make the claim.
FEMA will send you a letter requesting insurance claim documentation, such as a decision letter (settlement or denial) from your insurance company, in order to further process your application.
FEMA will not duplicate benefits that are covered by insurance, but you may be eligible for help with losses not covered or those in excess of your insurance coverage. However, you will not be considered for this assistance until FEMA receives a decision letter from your insurance company.
If you experience an excessive delay (30 days or more) in receiving an insurance settlement after filing a claim, you may be eligible for an advanced one-time “rental assistance award” payment. If you fail to file an insurance claim, you will not be considered for advanced rental assistance. Your request for advanced rental assistance must be in writing.
For more information about delayed or insufficient insurance settlements, click on the “What If I Have Insurance?” section at https://www.fema.gov/individual-disaster-assistance# .
Homeowners and renters may be eligible for FEMA Other Needs Assistance (ONA) grants to help with uninsured or underinsured expenses and serious needs caused by the disaster, including:
Moving and storage expenses;
Disaster-related funeral, dental and medical expenses, such as wheelchairs, canes and prescriptions;
Repair or replacement of personal property lost or damaged in the storm, including furniture and appliances; and
Primary vehicles, approved second vehicles and modified vehicles damaged by the disaster.
FEMA encourages both insured and uninsured survivors who sustained disaster-related damage or losses to apply by phone (voice, 711 or relay service) at 800-621-3362 (TTY users should call 800-462-7585) or online at DisasterAssistance.gov . The toll-free lines are available 7 a.m. to 10 p.m. seven days a week. Multilingual operators are available. Aug. 24 is the last day for survivors to file an application.
Additional information on West Virginia’s disaster recovery can be found by visiting
fema.gov/disaster/4273, twitter.com/femaregion3, twitter.com/FEMA, facebook.com/FEMA, fema.gov/blog and the flood information pages at http://wvflood.com/Pages/default.aspx .
When Boone County, Mo., emergency dispatcher Chuck Mastalski answered the phone, it was clear the caller was in distress. Unable to breathe, the man could not confirm his location or describe the crisis.
Enables Hybrid Enterprises to Access and Deliver Applications Quickly, Securely and Cost-Effectively
SAN JOSE, Calif. – Brocade (NASDAQ: BRCD) today announced the availability of the Brocade® Virtual Application Delivery Controller (vADC) solution on the Microsoft Azure Marketplace. With just a few clicks, customers can now deploy the Brocade vADC solution to optimize and secure applications in the Microsoft Azure cloud platform, paying only for the specific resources they use.
Brocade's solution is the industry's first software-based Layer 7 application delivery controller with integrated capabilities for web content optimization and application firewall. Designed to work within cloud environments, it is easily integrated into an application stack. Deployed via a template that utilizes Azure Scale Sets, the Brocade vADC solution is already integrated with Azure Key Vault to enable fast, reliable and secure application delivery to users anywhere.
"Brocade is expanding its commitment to delivering greater choice and flexibility in the cloud today, meeting customers where they are so they can do more with their hybrid cloud deployments," said Kelly Herrell, senior vice president and general manager, Software Networking, Brocade. "The availability of the Brocade vADC solution on Microsoft Azure offers customers hourly billing and bring-your-own-license models while providing an optimal cloud platform for running business-critical applications on the Microsoft Azure cloud platform."
"We're pleased that customers looking to extend their application workloads on Microsoft Azure now have access to the Brocade vADC solution," said Reshmi Yandapalli, principal program manager, Azure networking, Microsoft Corp. "By implementing the Brocade vADC solution, enterprises can help manage security challenges while taking advantage of the cost savings and agility offered by Microsoft Azure."
Price and Availability
The Brocade vADC solution is available today from the Microsoft Azure Marketplace. Customers can purchase hourly pay-as-you-go or bring-your-own-license subscriptions with a range of editions to suit different features and throughput requirements.
Brocade (NASDAQ: BRCD) networking solutions help the world's leading organizations turn their networks into platforms for business innovation. With solutions spanning public and private data centers to the network edge, Brocade is leading the industry in its transition to the New IP network infrastructures required for today's era of digital business. (www.brocade.com)
© 2016 Brocade Communications Systems, Inc. All Rights Reserved.
Brocade, Brocade Assurance, the B-wing symbol, ClearLink, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, VCS, VDX, Vplane, and Vyatta are registered trademarks, and Fabric Vision is a trademark of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of others.
LEXINGTON, SC – Avtec, Inc., the nation's leading independent provider of mission-critical, standards-based Radio over Internet Protocol (RoIP) dispatch console systems, demonstrates interoperability with EF Johnson Technologies' ATLAS® P25 system solution. Existing and new ATLAS P25 system users will enjoy the option of deploying Avtec's Scout™ console in their next-generation dispatch communications center with the assurance that it operates with a wide variety of P25-compatible radios.
"We continue to invest in Scout to ensure its interoperability with the leading radio technology platforms," said Mike Ridge, director of strategic partnerships for Avtec. "This is another example of why Scout should be the first technology chosen for a next-generation communications center, because we leverage the power of standards to assure compatibility, today and into the future."
"EF Johnson is excited to announce the integration of our ATLAS P25 system solutions with Avtec Scout dispatch consoles via the P25 CSSI standard interface," said Karthik Rangarajan, senior vice president of strategy and products, EF Johnson. "This integration expands a growing ecosystem of standards-based, vendor solution offerings. It strengthens the viability and capability of using standards-based interfaces to enhance P25 system capabilities for radio users and dispatch operators."
The interoperability between these two systems illustrates the benefits of selecting standards-based equipment which enable system designers to make flexible decisions about the radios, interfaces, and networking equipment that are best suited for their particular application.
"We're empowering public safety and utility organizations with greater flexibility when designing and implementing their P25 systems," said Rangarajan. "They can choose industry-leading solutions from different vendors that best fit their needs rather than being locked into any one vendor's proprietary architecture."
More information about the collaboration between EF Johnson and Avtec can be viewed here: www.avtecinc.com/efjohnson.
About Avtec, Inc.
Avtec, Inc. provides pure Internet Protocol (IP) dispatch console solutions for the transportation, public safety, utility, business and industry, and government markets. For more than 35 years, customers have chosen Avtec's award-winning technology for their mission-critical dispatch centers. There are thousands of Scout Voice over Internet Protocol (VoIP) consoles installed worldwide. Visit www.avtecinc.com to learn more.
About EF Johnson Technologies, Inc.
EF Johnson Technologies, Inc. is an independent subsidiary of JVCKENWOOD Corporation. Headquartered in Irving, Texas, EF Johnson focuses on innovating, developing and marketing the highest quality secure communications solutions to organizations whose mission is to protect and save lives. The Company's customers include first responders in public safety and public service, federal government, and industrial organizations. The Company's products are marketed under the EF Johnson and KENWOOD brands. For more information, visit www.efjohnson.com.