Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

(TNS) - With an uptick in active shooter incidents nationwide, emergency medical personnel are increasingly faced with the decision of standing by until police clear the scene or jumping in and potentially saving more lives.

“As a rule … we wait for police to arrive on scene, and they let us know when it's safe to enter,” Acting EMS Chief Robert Farrow said.

He said sending paramedics into potentially unsafe scenes would require careful calculation.

“The benefit is you save more lives,” Farrow said. “The downside for public safety… is you put yourself at a higher level of high risk.”



Severe thunderstorms accounted for the lion’s share of U.S. natural disaster losses in the first half of 2016, according to Munich Re.

Of the $17 billion in U.S. economic losses ($11 billion insured) caused by natural catastrophes in the first half of 2016, some $12.3 billion ($8.8 billion insured) were due to a series of storms in Texas and neighboring states, including destructive hailstorms in Dallas and San Antonio, and severe flooding in the Houston metro area.

Winter storms and cold waves were the next most costly U.S. peril in the first half causing insured losses of $1.5 billion, followed by flood and flash flood events with $1 billion in insured losses.



Wednesday, 13 July 2016 00:00

Matching the Cloud to the Workload

Cloud providers want enterprise workloads, and the enterprise wants to push more data and applications to the cloud. Sounds like a perfect match, doesn’t it?

Well, yes and no. While it is true that enterprise-class cloud deployments are expanding at a steady clip, and more of these are taking on real production workloads rather than bulk storage and data backup, many organizations are still struggling with the generic nature of cloud resources.

For decades, the enterprise has had the luxury of crafting highly customized infrastructure whenever it was necessary. It was one of the perks of building and maintaining your own data environment. This is certainly possible in the cloud, of course, but it often comes at a higher cost, since the economies of scale are not the same as with generic workloads. Where there is a need in business, however, there is usually someone willing to fulfill it, and the cloud industry is rapidly transitioning from a basic level of functionality that caters to consumer tastes toward the more specialized requirements of the enterprise.



(TNS) - Senon Selgado’s family rode out floods before in their home near Texas' Blanco River, but Memorial Day weekend of 2015 was different. The water rose too high, too quickly. By the time his granddaughter and her children threw on their clothes and called 911, emergency workers had advised them to climb onto the roof.

But they couldn’t — not with Senon’s wife, Maria Isabel Selgado, in a wheelchair.

Tim and Elizabeth Darnell, neighbors and leaders of the nearby Hill Country Church, helped rescue the Selgados from the floodwaters. But the family is among hundreds who have been unable to rebuild since then, according to the Blanco River Regional Recovery Team, the nonprofit helping survivors of the May 2015 floods that killed 14 in Central Texas and left more than 2,100 Hays County homes damaged or destroyed.

The Selgados received $18,000 from FEMA and, desperate to find cheap fixes for a destroyed home, found a couple of guys on Craigslist to do tiling and roofing, they said.



(TNS) - When a Virginia Beach woman’s abusive ex-boyfriend showed up at her house shortly after she applied for an emergency restraining order, she wasn’t sure how to get help.

A call to 911, or an attempt to get away, might trigger a violent reaction from him. So she texted the emergency number instead. She included her address, a description of the man, and the fact that she had just filed for the order and he had not been served with it.

Police arrived within minutes, and a potentially violent situation was averted in February, said Stephen Williams, Virginia Beach’s director of Emergency Communications and Citizen Services.



The Zika virus recently claimed its first victim in the Continental US, taking the life of an as-yet-unidentified pensioner in Salt Lake County, Utah. Although Zika has been around since the 1940s, it is only during the last few years that it has really exploded, and its spread across Americas has been a tremendous cause for concern, particularly with the Rio Olympics coming up.

As with all contagions, one of the most pressing challenges for its containment is understanding where it will spread. Obviously, it is not enough simply to deal with a disease once it has infected an area. Infectious disease physician at Toronto-based St. Michael’s Hospital, Kamran Khan notes that one thing is true of the spread of infectious diseases: ‘If you start to analyze the situation when an outbreak occurs, you’re already too late.’

This is particularly true of Zika, as there is still so little known about the disease. The disease is often symptomless, with just 1 in 4 of those with the disease developing them. The most worrying aspect of the virus is the birth defects it causes, such as abnormally small heads and brain damage. From what we know about the disease so far, it is transmitted by the Aedes aegypti and Aedes albopictus mosquito, neither of which are found in Utah. The majority of cases in America have been travel related, which means finding a pattern to its spread is exceptionally difficult. The only treatment available at the moment is also ‘mosquito management’ - an indiscriminate, costly, and wasteful program of insecticide spraying in areas with a large population of the mosquitos in question, the environmental impact of which is hard to ascertain.


Like energy, growth in data center water consumption in the US has slowed down since about a decade ago.

A recent US government study for the first time made an attempt to quantify water consumption of all data centers in the country. The study focuses primarily on data center energy consumption, but it also uses its electricity consumption estimates to extrapolate the amount of water it takes to power and cool data centers.

Water is one of two major resources data centers consume, and this fact drew a lot of public attention last summer, as the drought in California grew especially acute. While, thanks to this past winter’s El Niño, water levels in the state’s reservoirs are higher than they have been in years, the drought continues, and water consumption by the state’s various industries, including the high-tech industry, continues to be an important issue.



Wednesday, 13 July 2016 00:00

Cognitive Risk Framework for Cybersecurity

Cybersecurity has gotten a great deal of attention these days for two reasons: 1) billions of dollars are being spent in response to a growing threat in cybersecurity and 2) there has been a real lack of meaningful and sustainable success in preventing hackers from stealing data.

Every organization is vulnerable to attack and no matter the amount of money spent hardening the enterprise, threats continue to escalate. This phenomenon is called the Cyber Paradox. The definition of a paradox: “something (such as a situation) that is made up of two opposite things and that seem impossible but is actually true or possible.” How is it that incremental investments in security have not impacted the marginal cost of cyber risk? The answer may surprise you:



Additional complicating factors include the necessary balances between different parts of the chain and the extension of supply chains to include many different external partners.

However, as supply chains are the way many enterprises differentiate themselves from competitors, managers will have to take the bull by the horns and ensure supply chain resilience. But what kind of resilience?

There are different definitions of what resilience in supply chains concerns. One point of view is that a supply chain will break at some time and that building in resilience is about minimising the damage through:

  • Resistance. The impact of a disruption is either avoided or contained. For example, you organise different modes of transport to avoid being blocked by a rail strike (avoiding a general problem) or you reroute all your truck deliveries to contain the impact of major roadworks (containing a specific problem).
  • Recovery. You repair a breakdown or fix a problem, stabilise your supply chain and return to normal or at least steady performance, as soon as possible. For example, having decided to use just one supplier for a certain good or service, if the supplier stops supplying, you scramble to find and bring on board an alternative supplier.



Wednesday, 13 July 2016 00:00

How data corruption works

Modern drives have advanced at an astounding rate in recent years, but despite all these innovations, media corruption still remains an issue in today’s data recovery industry. Before we delve into the deeper issues associated with media corruption, we need to understand what causes corruption and how it can be diagnosed within the context of data recovery.

What is media corruption?

Media corruption can be described as the loss or change of computer data during transmission or retrieval.

What causes media corruption?

Corruption is often caused when the data transfer process is interrupted or disturbed. This can be caused by electronics failure, power surges or internal mechanical problems.