Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

vArmour Takes a Non-Cloudwashing Approach to Securing Clouds

MOUNTAIN VIEW, Calif. – vArmour, the data center and cloud security company and leader in application-aware micro-segmentation with advanced security analytics, today announced "Project Ice Cream," the release of its twelve-months-in-the-making new security architecture built for the requirements of cloud for simplicity, massive scale and economics. Built from core functionality of its flagship product, vArmour Distributed Security System (DSS), vArmour is delivering a new architecture based on of the vision it outlined late last year with "Multi-Cloud Security Architecture" to transform data center and cloud security.

Traditional data center security architectures are not easily ported to the cloud, nor should they be. Their original design was to protect the well-defined perimeter, but that notion faded with the advent of digitalization (including cloud computing, mobile, IoT) and the increasing sophistication of attackers. Traditional security controls to protect the network, applications, and data inside the data center and cloud are out of date and no longer valid. Security has to evolve with this sweeping transformation.

"Digitalization breaks the traditional infrastructure trust model. In the old, hardware-centric silos, assets and individuals outside the network perimeter were considered 'bad' while anyone inside was considered 'good,'" said Peter Christy, research director at 451 Group. "In today's cloud environments, security must adapt to a new architecture where trusted vs. untrusted users or workloads are identified at a much more granular level, and also where policies can scale dynamically with the assets being protected. Organizations cannot simply adapt technologies that were built for hardware and hope to make them work in a high-scale, virtualized world. They need to take advantage of new software-defined, virtually-deployed architectures for compute, and apply them to security."

"Hardware-based perimeter security appliances do not fit in clouds," said Marc Woolward, chief technology officer at vArmour. "Clouds are based on speed, scale and economics, which are the antithesis of these legacy systems. Our Ice Cream architecture harnesses the power of advanced distributed systems principles to deliver a fully capable security solution -- one that scales beyond the wildest dreams of legacy data center security technologies, such as NGFWs, and the abilities of weaker security controls based on agent-based packet filters."

Security vendors have attempted to cloudwash their offerings to be relevant in clouds by taking physical hardware-centric products and making virtualized copies. However, these virtualized versions are not simple to deploy and manage, cannot scale within and across clouds, and are based on hardware-centric pricing.

"As we move to a multi-cloud infrastructure, we need built-in security to remain agile and protect our clients' valuable IP," said Kevin Moore, Chief Security Officer at Fenwick & West LLP. "With vArmour DSS, we not only can detect events, but can also do something about it in a fast, simple and economical way."

Project Ice Cream
To extend vArmour's security leadership in data center and cloud, the company announced today the industry's most simple, scalable and economical architecture. Aptly named after something everyone loves, Project Ice Cream ensures:

  • Simplicity

Security should be simple and agile. With Project Ice Cream, vArmour DSS can be downloaded, installed, deployed and micro-segmented in one hour. Security controls are independent of the network, infrastructure and workload. Likewise, they can now be delivered at the same speed of the infrastructure or workload being ordered -- something that traditionally takes days or weeks, with hardware-centric approaches or complex SDN deployments.

  • Coverage 

Organizations require a solution that grows with it, especially at the unprecedented rate of cloud services adoption. With Project Ice Cream, security can scale across the largest data centers and cloud by instantly protecting one to 100,000 workloads across 1,000 hosts from different systems with a single, programmable fabric. One system can secure the approximate size of a Facebook pod. Organizations now have a single pane of glass of visibility to better understand what's happening in their data center and cloud, with their applications and users, to apply appropriate fine-grained controls to prevent threats.

  • Performance

Performance is a key differentiator of effective security. With Project Ice Cream, vArmour's new architecture outperforms the fastest data center security appliances with as much as 10X the throughput while maintaining 100 million concurrent stateful application flows throughout the environment.

  • Effectiveness

Security has to do more, offering a variety of security controls that would be traditionally available in individual point products that do not interoperate well. With Project Ice Cream, vArmour DSS offers a comprehensive, integrated solution that enables organizations to buy fewer products to protect inside their data center and cloud -- there's no more "complexity is the biggest enemy." vArmour's one-click capability enables security analysts to investigate an event and, if suspicious, immediately quarantine it. It's not just about detecting events, but doing something about them.

  • Economical

Security solutions should take advantage of cloud consumption economics, such as pay-as-you-grow -- instead of traditional "buy ahead or buy really ahead" approaches. With vArmour, customers no longer have to bear highly disruptive hardware firewall refresh cycles. vArmour offers its software at less than half the cost** of alternative micro-segmentation approaches that include SDNs and NGFWs.

The need for the capabilities of Project Ice Cream has reached the market at a critical time. As more enterprises adopt a multi-cloud infrastructure, combined with ever increasing attacker sophistication, security professionals must look ahead to build security in via software that trumps existing hardware-based perimeter-centric models.

To see learn more about Project Ice Cream, download a By The Numbers Infographic here or check out our blog here.

* vArmour offers up to 9 Tbps of throughput but may be higher based on configuration.

** Pricing based on list pricing of leading SDN providers.

About vArmour
Based in Mountain View, CA, vArmour is the data center and cloud security company, and the leader in application-aware micro-segmentation with advanced security analytics. The company was founded in 2011 and is backed by top investors including Highland Capital Partners, Menlo Ventures, Columbus Nova Technology Partners, Citi Ventures, Work-Bench Ventures, and Allegis Capital. The vArmour DSS Distributed Security System is deployed in a significant number of the world's largest banks, telecom service providers, government agencies, healthcare providers, and retailers, and is leading the industry with a new patented, distributed approach to data security that allows organizations to deliver IT at the speed of business. Along with partners like Amazon and HPE, vArmour secures many of the largest data center and cloud environments in the world. Learn more at www.varmour.com

Ultimate Helps Make It Dead Simple to Build Office-Inspired, Touch-Enabled, Highly Visual Apps for Desktop, Cloud and Mobile

CRANBURY, NJ – Infragistics, a worldwide leader in providing tools and solutions to accelerate design, development and collaboration, today announced the launch of Infragistics Ultimate 16.1, its enterprise-ready web, mobile and desktop user interface development suite. Ultimate 16.1 incorporates a broad range of additions and enhancements designed to simplify and speed development of amazingly visual native iOS and Android applications, cross platform applications with Xamarin, Web apps with the AngularJS and Hybrid Apps with HTML5 targeting Cordova.

Start using the full toolkit free with a 30-day trial today. Infragistics Ultimate is priced at $1995 for a year subscription, with discounts for volume purchases, and the option to purchase individual products.

"At Infragistics, we believe the choice is simple. Your UX design and UI development solutions should be enterprise grade and comprehensive, offering everything you need with no hidden or add-on costs," said Jason Beres, senior vice president of developer tools at Infragistics. "Developers should be able to deliver a great user experience that their organizations and customers expect -- even if they are not a user experience expert. With our latest release, Infragistics Ultimate 16.1, we enable application development teams to create secure, cost-effective, highly adopted desktop, native mobile, Web and hybrid applications and deploy apps securely to scale on premise, in the cloud or hybrid environments."

Beautiful Design: Use Indigo Studio to build interactive, responsive application prototypes without writing a single line of code, then share and collaborate on indigodesigned.com. New usability testing features provide insights on how well the prototype will perform with real people. Test design alternatives remotely and get concise study summaries, task success rates, completion times and a click-map view to find out how well the design meets user's expectations.

Modern Web Development Tools: Built to meet the highest standards in ease-of-use, style and speed, these tools will have you creating web apps that can do it all.

  • The industry's top performing ASP.NET controls deliver apps with lightning fast processing for massive amounts of data. Flexible and advanced, these controls allow developers to quickly build stylish user experiences with stability and performance.
  • Our JavaScript/HTML5 controls & AngularJS components deliver the speed and responsiveness your customers expect across every browser on any platform or device -- with our market leading data grid and data chart performance leading the way.

Mobile App Development: Created with performance and top-notch user experience in mind, these lightweight toolsets will have your application development teams building great apps for smartphones and tablets in no time.

  • Infragistics Xamarin Forms UI controls allow you to build native apps backed by Infragistics' own outstanding iOS and Android toolsets. No need to learn a new platform; simply use your existing C# and XAML skills to build cross platform native apps using a single code base.
  • Infragistics iOS toolset provides all the essential elements needed to create high performance, highly visual, native iPad and iPhone applications, with an advanced data grid and a powerful set of versatile charts perfect for mobile applications in the enterprise.
  • Infragistics Android controls include a Data Grid, Gauges, Barcodes and more, offering a simple, modular API designed specifically for easy access to chart's functionality, including built-in, natural multi-touch gestures for panning and zooming to see your data any way you need.

Stand Out on the Desktop: Desktop Windows Forms and WPF controls for every platform let you break away from boring to create innovative desktop applications. Touch capabilities, bold styling and lighting fast speed will help your apps stand out. With more than 175 Windows Forms and WPF UI controls you can quickly deliver superior user experiences featuring incredible high-volume, high-performance rendering capabilities and animation support for rich data visualizations, as well as pixel-perfect Microsoft Office experiences for Excel, Word and more. This release includes new QR and 128 barcodes in Windows Forms, along with pie and doughnut charts, a new XAML 3D surface chart and new Windows Forms Excel Spreadsheet control, and more.

ReportPlus Developer & SharePlus Come to Infragistics Ultimate & Pro: With ReportPlus Developer, application developers can embed data visualizations and dashboards into desktop, web and native iOS mobile apps. ReportPlus allows them to provide code-free visualizations to meet their user's needs; match the look and feel of their apps; integrate data directly from over 20+ sources outside the application; set refresh schedules that make sense for their users and empowers users to query and filter data within the application.

Today ReportPlus Developer is available in limited private preview and will release this calendar year. Runtime licensing and pricing options for apps being deployed with ReportPlus Developer will also be available at time of the release. Developers wanting to build applications with ReportPlus Developer can request access to the limited private preview at ReportPlusDev@infragistics.com.

Developers can leverage their existing Web development skills to build native iOS and Android SharePlus solutions with a SharePlus developer license included in Infragistics Ultimate and Pro. SharePlus is the platform agnostic collaboration and productivity application for Microsoft SharePoint on premise and Office 365 on mobile devices. The latest release enables creation of custom mobile workspaces, providing business teams a focused environment tailored to their needs or specific job roles. SharePlus extends centralized access to content and data across the cloud with OneDrive for Business, Dropbox and Google Drive, or on corporate network drives.

About Infragistics

Infragistics is a worldwide leader in providing tools and solutions to accelerate application design and development, insights and collaboration for any organization. Infragistics enterprise-ready UX and UI toolkits are used by over 1 million developers to rapidly prototype and build high-performing applications for the Cloud, Web, Windows, iOS and Android devices. Infragistics Enterprise Mobility solutions ReportPlus and SharePlus, gives business users the latest advancements in self-service business intelligence and collaboration software. Additionally, Infragistics offers expert UX Services and award-winning support.

For additional information on Infragistics, products and services, please call us in the U.S. at +1(800)231-8588; in Europe, the Middle East, or Africa (EMEA) at +44(0) 800 298 9055; in Japan at +81 (3) 54748034; or in APAC at +61 (3) 9982 4545.

 

Organisations in the retail sector experienced almost three times as many attacks as those in the financial sector

 

New research published today in the NTT 2016 Global Threat Intelligence Report reveals that cybercriminals have shifted their focus from traditional financial markets, to targeting the retail sector. Retail organisations experienced nearly three times as many cyberattacks as those in the finance sector which was top of the list of cyberattacks on organisations in the 2015 report. Cyberattacks on financial industry dropped significantly to fourteenth position.

 

NTT’s annual Global Threat Intelligence Report contains security threats gathered during 2015 from 8,000 clients of NTT Group security companies including Dimension Data, Solutionary, NTT Com Security, NTT R&D, and NTT Innovation Institute (NTTi3). This year’s data is based on 3.5 trillion security logs and 6.2 billion attacks. Data is also gathered from 24 Security Operations Centres and seven research and development centres of the NTT Group.

 

The retail sector topped the list of all cybersecurity attacks on all sectors at just under 11% in this year’s report, knocking the finance sector out of first place.

 

Matthew Gyde, Dimension Data’s Group Executive – Security, explains: “The retail and financial sectors process

large volumes of personal information and credit card data. Gaining access to these organisations enables cybercriminals to monetise sensitive data such as credit card details in the black market, which validates that cybercriminals are motivated by the rewards of financial crime.”

 

Rory Duncan, Head of Security Business Unit at Dimension Data UK, said “Retail companies are becoming increasingly popular targets as most process large volumes of personal information, including credit card data, in highly distributed environments with many endpoints and point-of-service devices. Such diverse environments can be difficult to protect.”

 

Other highlights in the NTT 2016 Global Threat Intelligence Report include:

  • 65% of attacks originated from IP addresses within the US. However, the hackers behind these attacks could be located anywhere in the world. Cybercriminals are adopting low-cost, highly available, and geographically strategic infrastructure to perpetrate malicious activities.
  • Cybercriminals are increasingly leveraging malware to breach the perimeter defences of organisations. In 2015 there was an 18% increase in malware across all industries, excluding the education sector.
  • The frequency and complexity of malware is becoming more stealthy and sophisticated: while organisations are developing [1]sandboxes to better understand cybercriminal’s tactics to protect themselves from attacks, at the same time, malware developers are aggressively developing anti-sandbox techniques.
  • Analysis of [2]honeynet attacks in organisations reveals that attackers are making use of telcos and hosting providers to conduct their operations.

Visit www.dimensiondata.com/globalthreatreport to download the Executive Guide to the 2016 NTT Global Threat Intelligence Report.

 

[1]sandbox: software that executes suspicious code in a highly protected environment and examines its activities sandboxes

[2]honeynet & honeypot: Honeypot: decoy systems set up to gather information about an attack or attacker and to potentially deflect that attack from a corporate environment. Honeynet: a network containing honeypot systems

 

About Dimension Data

Dimension Data harnesses the transformative power of technology to help organisations achieve great things in the digital era. As a member of the NTT Group, we focus on digital infrastructure, hybrid cloud, workspaces for tomorrow, cybersecurity, and network as the platform. With a turnover of USD 7.5 billion and offices in 58 countries, we deliver services wherever our clients are, at every stage of their technology journey. Accelerate your ambition. Go to dimensiondata.com

Twitter: @didatasecurity#globalthreatreport

LinkedIn: Dimension Data Security

www.dimensiondata.com/GlobalThreatReport

LONDON, U.K.My Home Move Ltd (myhomemove), the UK’s largest provider of mover conveyancing services, has chosen to deploy LexisOne™, an enterprise resource planning solution for legal, powered by Microsoft Dynamics® AX, from LexisNexis® Enterprise Solutions, a provider of technology solutions to professional services firms. LexisOne will deliver a modern business management platform enabling myhomemove to adopt best practice methodologies to manage its multi-site and multi-entity operation and support the firm’s ambitious growth plans. myhomemove is building its new headquarters in Leicester and plans are afoot to recruit 100 more staff taking the number of employees to 850 across the firm’s seven offices.

 

A strategic investment by the organisation, LexisOne will be initially deployed within myhomemove’s finance department, creating a common data structure and seamless environment across its business areas to ensure a ‘single version of the truth’. The department will support doubling in size of business volume in tune with growth plans, with only a minimal increase in headcount. This will be facilitated by the automated processes and advanced, dynamic reporting capabilities offered by LexisOne.

 

“We need a solution that is more than just an accounts system,” explained Paul Tennant, IT Director at myhomemove. “To support our business expansion plans, we need complete visibility of our operation and to this end it is imperative that all the financial areas are integrated. LexisOne will give us a single business management system to help us streamline the various components of the operation. Additionally, it will give us a development platform to create new applications within LexisOne to help meet evolving business requirements immediately and in the long term.”

 

myhomemove is already a current user of next generation legal workflow and case management system, Lexis® Visualfiles™. With both Visualfiles and LexisOne integrated, myhomemove will benefit greatly from processing efficiency across multiple business areas and enhanced business continuity.

 

“Organisations today need flexibility to adapt in a changing business environment,” Andy Sparkes, General Manager at LexisNexis Enterprise Solutions commented. “This in turns requires quick decision making based on real-time, accurate business data. Visualfiles and LexisOne will provide myhomemove a compelling and reliable platform upon which to conduct business operation and achieve its business growth goals. myhomemove’s adoption of LexisOne further cements our already long standing partnership with the firm. We are delighted.”

 

LexisOne is an ERP solution for legal, which goes beyond traditional practice management. LexisOne helps firms proactively manage costs, prepare and track matter budgets, improve control, make informed decisions and optimise resources to deliver greater value to clients. Powered by Microsoft Dynamics AX, LexisOne harmonises financial, human resources, productivity and performance management to provide the insight, flexibility and scalability that firms need to rapidly adapt in an ever changing world.

 

About LexisNexis Legal & Professional

LexisNexis Legal & Professional is a leading global provider of content and technology solutions that enable professionals in legal, corporate, tax, government, academic and non-profit organisations to make informed decisions and achieve better business outcomes. As a digital pioneer, the company was the first to bring legal and business information online with its Lexis® and Nexis® services. Today, LexisNexis Legal & Professional harnesses leading-edge technology and world-class content to help professionals work in faster, easier and more effective ways. Through close collaboration with its customers, the company ensures organisations can leverage its solutions to reduce risk, improve productivity, increase profitability and grow their business. LexisNexis Legal & Professional, which serves customers in more than 175 countries with 10,000 employees worldwide, is part of RELX Group, a world-leading provider of information and analytics for professional and business customers across industries.

As a leading provider of software platforms, LexisNexis® Enterprise Solutions (www.lexisnexis-es.co.uk) works with customers to drive productive, efficient and reliable business decisions. Its solutions include Lexis® Visualfiles™, for legal workflow and case management; Lexis® InterAction® for customer relationship management; and LexisOne™, powered by Microsoft Dynamics® AX, for enterprise resource planning.

  • 57% most concerned about damage to corporate or brand reputation
  • 68% unaware of EU General Data Protection Regulation

Cyber risk research carried out by Noddle Protect and YouGov* amongst senior decision-makers in large businesses, has revealed that 51% are being kept awake at night by the threat of a data breach caused by a cyber-attack; and 49% are having sleepless nights about a data breach resulting from data theft or irresponsible action.

 

Noddle Protect, which launches today, is a data breach solution from Callcredit Consumer Markets, which helps safeguard businesses from the reputational damage of a data breach and safeguard consumers’ digital identity.

 

Loss of reputation a bigger concern than fall in share price

If businesses were to fall victim to a data breach, 57% say their biggest concern would be damage to their reputation, ahead of a loss of customers (17%), fine by a regulator (8%) or fall in share price (7%).

“Managing strategic risk and reputation has become a high priority for executives operating in today’s digital plc,” said Jacqueline Dewey, Managing Director, Callcredit Consumer Markets. “Noddle Protect can help safeguard businesses from the reputational damage of a data breach and safeguard consumers’ digital identity,” she continued.

 

Businesses prepared for a data breach

A significant 81% of business decision-makers say their business is prepared to tackle a data breach compared to 12% who say they are not. In order to protect themselves against a data breach, 53% say their business has put in place a business continuity plan, whilst 43% have a crisis management plan; but only 39% have put in place a security monitoring team and only 38% had appointed a board director with responsibility for IT security such as a Chief Risk Officer or Chief Data Officer.

 

Low awareness of proposed EU General Data Protection Regulation

Changes in EU data protection law mean all organisations at risk of a data breach need to be prepared to safeguard their consumers. The biggest impact on regulation will be seen in mid-2016, when the proposed EU General Data Protection Regulation (GDPR) will be adopted by the EU. From mid-2018, if organisations fall victim to a data breach, under the GDPR, they will have to inform their customers when a serious data breach occurs and could be fined up to a maximum of 4% of their global turnover. Worryingly, 68% of business decision makers surveyed have not heard of the GDPR.

Noddle Protect enables businesses to put in place a fast and effective remediation plan to help safeguard their customers who may have had their personal data compromised following a data breach. The service can be available within 48 hours of a breach occurring and consumers who sign up to the service can identify and respond to fraudulent activity, helping them to mitigate any damage to their credit profile caused by criminals. Noddle Protect allows consumers to review their credit report for free and check that no-one else is applying for credit in their name or using their details fraudulently, giving them peace of mind and ensuring they continue to trust in your brand.

 
 
 

When it comes to meeting the challenges of preserving, protecting, and recovering data and infrastructure, organizations today need to control IT expenditures and reduce business risk while improving operational efficiency and increasing resilience.

The focus of TI 2050: Critical Environments Technology Professional, is on how to align IT resources with business objectives, deliver relevant and reliable IT service, manage risk, and optimize operational efficiency.
In addition, the course focuses on computing resources, data and data storage resources, and network & communication resources. The course concludes by exploring key infrastructure initiatives for organizations today such as virtualization, clustering, cloud computing, mobility, big data, reiliency, green IT, and resource commoditization.

Course Outline
 
1.Critical Environments Concepts
2.Understanding Storage Management
3.Availability Concepts, Challenges, & Solutions
4.Addressing IT Risk: ICT Continuity & Disaster Recovery
5.Understanding & Protecting Against Security Breaches
6.Endpoint Management & Troubleshooting
Topics
  • IT Frameworks
  • Total Cost of Ownership - cost of outages
  • Recovering critical activities
  • Availability concepts: replication, virtualization, clustering & mirroring
  • Storage concepts: management, efficiency, deduplication, & managing cost
  • Data loss prevention
  • Cloud computing
     
Learning Objectives
As result of successfully completing TI 2050, students should show competence in
and an understanding of the following areas:
  • Understand key business & IT priorities for organizations today
  • Describe major challenges in managing the IT systems in a critical environment
  • Identification of IT Frameworks such as ITIL and COBIT
  • Understand storage management concepts and challenges
  • Define key concepts, challenges, and approaches related to availability
  • Describe design principles for clustering and machine virtualization
  • Describe key concepts related to IT Risk, ICT Continuity & Disaster Recovery
  • Understand the purpose and implementation of RPO, RTO, and how they are used to determine risk mitigation solutions
  • List common sources for security breaches and the importance of enforcing strong IT security policies
  • Identification of backup components, architectures and media
  • Define endpoint management technologies, troubleshooting, and gathering information about problems.
  

Target Audience 

Intended for the IT Disaster Recovery Professional, IT Technician, IT Team Lead, Technology Manager, Business Continuity Professional, Risk Manager, Internal Auditor, Compliance Auditor, and Technical Support.

Course Schedule and Exam
TI 2050 is a two-day instructor-led course. It begins each day at 8:00 AM and concludes at 5:00 PM. There is a one hour break each day for lunch.
There is a 3 hour exam on Day 2 or you can take the exam online anytime. It consists of multiple choice and short answer questions that examine your understanding of Information Communication Technology Continuity & Disaster Recovery requirements knowledge for the Critical Environments Technology Professional.

Successful completion of the course materials and a passing score of 75% or higher on the exam (in each of the 6 competency areas) earns attendees the Critical Environments Technology Professional Certification and the CETP designation accredited by ICOR.
Course fees include all course materials, continental breakfast, lunch, and all day beverages and snacks. The exam is also included in the course fee.
 
2016 Schedule   
July 27-28:  Seattle, WA
September 21-22:  Phoenix, AZ  (after DRJ conference)
October 5-6: Boston, MA
 
*Also offered in Mexico City and South America.  Contact education@theicor.org for dates and locations. 

$1,495.00 USD 

Questions?  Contact Education@theicor.org or call toll free (North America) 1.866.765.8321 or +1.630.705/0910 (outside North America)

It's up to those in the resiliency profession to help companies be in a position to continuously deliver their services.

In the cognitive era, organizations are using technology to process data more quickly than ever and correlate results that could be difficult to imagine in the past. These capabilities are crucial for resiliency.

Cognitive computing is changing how industries do business by providing access to data that enables critical decision-making, reduces time frames for key business deliverables, and ensures products get to market efficiently and effectively.

...

http://www.informationweek.com/partner-perspectives/ibm/resiliency-in-the-era-of-cognitive-computing/a/d-id/1325179

Oracle is beefing up its services to marketing and advertising-focused customers with the acquisition of an Israeli company that tracks how users engage with advertising and media.

Oracle announced that it will buy Crosswire, a provider of machine-learning based cross-device data that can help marketers track cross-device advertising, personalization, and analytics.

Oracle did not disclose the conditions of the deal, but press reports say Oracle paid approximately $50 million for the venture-funded startup founded in 2013.

...

http://www.informationweek.com/big-data/software-platforms/oracle-buys-crosswise-for-cross-device-tracking-marketing-cloud/d/d-id/1325176

(TNS) - It has been nearly a year since heavy storms and rains in late spring of 2015 brought widespread damage and flooding to the region. With the floods on Father’s Day, which saw high water in areas not known for flooding, still a recent memory to many, city officials are looking for ways to prevent similar events from occurring again.

City officials are currently working on updates to Denison’s Flood Damage Prevention Ordinance, which presents guidelines for development about how to prevent flooding issues at the site and further downstream.

“Our goal is to reduce the probability of flood damage happening around our drainage areas,” City Manager Jud Rex said on Thursday, referring to drainage ditches, culverts and other features designed to handle runoff from storms.

...

http://www.emergencymgmt.com/disaster/How-Denison-is-trying-to-mitigate-future-flood-damage.html

Virtualisation continues to grow in popularity as it offers different ways of backing up our data, in addition to being able to ensure that business-critical systems remain online in the event of an emergency.

Some people have even hailed virtualisation as the next frontier of computing. But do you know what is computer virtualisation and how can you or your clients benefit from it? Let’s take a step back and first review what virtualisation is and how it works.

...

http://blog.krollontrack.co.uk/the-world-of-data/virtualised-tape-library-silver-bullet-business-continuity/