Fall World 2014

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

Jon Seals

October 29, 2013

Crossing boundaries

John Robinson
INONI

Our BCM World Conference presentation is an illustration of how BCM can pleasantly surprise business leaders with the value it brings. Our case study will be about Reed and MacKay, a £200M turnover top-end executive travel firm located in Farringdon close to the heart of London’s legal, media and financial district. This is a multi-faceted, time-pressured and highly successful business and illustrates perfectly the importance of accurate and decisive BIA. The following explains why I believe they found it so valuable, noting that Reed and Mackay subsequently gained accreditation to ISO 22301 at the first attempt.

...

http://thebceye.blogspot.com/2013/10/crossing-boundaries.html

The ‘new normal’ propounded by management gurus a few years back was that ‘change is the only constant’. Companies, said the gurus, must constantly change, innovate and reinvent themselves in order to remain competitive and successful. They applied their mantra to everything from marketing to manufacturing to supply chain – with varying results. Victories included moves to lean and green manufacturing that saved money and the planet at the same time. Less fortunate changes have included Microsoft Windows 8 and (some time ago) Coca-Cola’s new Coke. Sometimes continuity itself is the best business continuity there is, but how can you tell?

...

http://www.opscentre.com.au/blog/if-it-aint-broke-dont-fix-it-when-change-is-not-the-only-constant/

FEMA Helping Survivors and Communities Rebuild

WASHINGTON – On the evening of October 29, 2012, Hurricane Sandy made landfall in southern New Jersey, with impacts felt across 24 states. The storm battered the East Coast, particularly the densely-populated New York and New Jersey coasts, with heavy rain, strong winds, and record storm surges.  In Sandy’s immediate aftermath, more than 23,000 people sought refuge in temporary shelters, and more than 8.5 million customers lost power. The storm flooded numerous roads and tunnels, blocked transportation corridors, and deposited extensive debris along the coastline.

At the direction of President Barack Obama, the U.S. Department of Homeland Security's Federal Emergency Management Agency (FEMA) and its federal partners are worked closely with disaster survivors to ensure they received all the assistance for which they are eligible under the law. Over the course of the year, more than $1.4 billion in Individual Assistance has been provided to more than 182,000 survivors, and an additional $2.4 billion in low-interest disaster loans have been approved by the U.S. Small Business Administration.  More than $7.9 billion in National Flood Insurance Program (NFIP) payments have been made to policy holders.

Over the last twelve-months, more than 11,900 grants totaling over $3.2 billion have been approved for emergency work, to remove debris and rebuild or replace public infrastructure in the hardest hit areas.  This includes more than $1.3 billion for first responder costs for personnel overtime, materials and equipment used to save lives and protect property; more than $400 million obligated toward repairs to storm damaged homes so that disaster survivors could safely remain in their homes; and more than $19 million toward the costs to repair storm flooded and damaged schools.  FEMA has been working in concert and integrating with all levels of government, private and nonprofit sectors, faith-based organizations, communities and individuals to provide a whole community approach to recovery and leverage the capabilities of the entire nation. 

While supporting disaster survivors and communities on their road to recovery, FEMA has been aggressive in its implementation of new authorities granted in the Sandy Recovery Improvement Act of 2013 (SRIA). In many ways, the passage of SRIA represents the most significant legislative change to the FEMA’s substantive authorities since the enactment of the Robert T. Stafford Disaster Relief and Emergency Assistance Act.  The changes have nationwide impact and provide greater flexibility to state, local, tribal and territorial governments, allow FEMA to operate more effectively and efficiently, and provide tribal nations options for seeking emergency and disaster declarations for their tribes.  To date, 13 of the 17 provisions outlined in this legislation have been completed, implemented via a pilot program, or are otherwise immediately available.

FEMA is encouraging everyone to take steps to become better prepared for an emergency, whether or not the event occurs while they are at home, at work, at school, or in the community. For more information on preparing for severe weather events and other disasters, visit www.Ready.gov or www.listo.gov on the Internet. Information regarding emergency preparedness and what to do before and after a disaster can also be found at m.fema.gov or by downloading the FEMA app from your smartphone’s app store.

FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.

Follow FEMA online at www.fema.gov/blog, www.twitter.com/fema, www.facebook.com/fema, and www.youtube.com/fema.  Also, follow Administrator Craig Fugate's activities at www.twitter.com/craigatfema.The social media links are provided for reference only. FEMA does not endorse any non-government websites, companies or applications.

http://www.fema.gov/news-release/2013/10/28/hurricane-sandy-year-recovery

Hurricane/Superstorm Sandy hit the east coast of the United States a year ago this week. It’s a time to take a quick look backward to some pretty dire days and then look ahead to assess whether readiness has improved in the areas impacted by the storm.

At a luncheon presentation at last week’s Cable-Tec Expo ’13 in Atlanta—a technical conference sponsored by The Society of Cable Telecommunications Engineers (SCTE)—Time Warner Cable Chief Security Officer Brian Allen took a look back at how the operator handled the storm.

The big lesson, according to Leslie Ellis’ report on the presentation at Multichannel News, is to create plans and put them in place ahead of time. Her story touches on the two big issues: fuel and power. The story concludes with Allen’s point that post mortems—figuring out what worked and what didn’t—are important.

...

http://www.itbusinessedge.com/blogs/data-and-telecom/has-anything-changed-a-year-after-sandy.html

Computerworld — Most people suffer from the delusion of privacy. They think it can be guaranteed somehow for their various electronic gadgets. But that is a delusion, and sadly even many in the information security field don't know it. Still, it's surprising how strong the desire to believe otherwise is, and how tech companies will sometimes try to feed that illusion.

Take the news that the encryption in Apple's iMessage can potentially be cracked. I was surprised, but not because the encryption could be cracked. That's a given, no matter the encryption algorithm. I was surprised because I didn't know that iMessage used point-to-point encryption. I just assumed that Apple could always read my messages. Call me uninformed for having missed that news, but what I think is that I was actually better informed than those people who saw Apple's promise that it couldn't decrypt iMessage traffic and let the delusion of privacy lull them into thinking that was really true. Believe me, we'd all be better off if we just acted on the theory that there is likely to be a back door every time.

Don't get me wrong. The fact that iMessage uses encryption is refreshing. Such encryption will do a lot to protect most of us in most of what we do (but more on that later). What is not refreshing is that Apple at best implied and at worst misrepresented that its encryption was uncrackable. Any computer professional in this day and age who thinks that any form of electronic communications is completely secure really doesn't know his profession.

...

http://www.cio.com/article/742123/Electronic_Privacy_There_s_No_Such_Thing

LINCROFT, N.J. – The devastating aftermath of Superstorm Sandy left survivors and businesses in New Jersey with large-scale recovery needs. Throughout the year, the state’s private sector has made significant contributions to the recovery process and continues to play a key role.

FEMA Private Sector Specialists discuss disaster mitigation with business ownersMore than 600 businesses, utility companies, banks, insurance companies, colleges and universities, and professional organizations stood with local, state and federal agencies, voluntary agencies and faith-based organizations to strengthen the recovery efforts.

They disseminated information about disaster assistance to 7.2 million New Jersey residents through bill inserts, newsletters, signage and other means.

“One fast-food chain, which asked to remain anonymous, distributed 7,000 sandwiches with disaster-assistance information at 32 distribution points in three counties,” said Federal Coordinating Officer Gracia Szczech of the Federal Emergency Management Agency. “That’s just one example of how essential the private sector is to a strong recovery effort.”

Immediately after Sandy struck, specialists with FEMA’s Private Sector Division in External Affairs deployed to New Jersey to work with chambers of commerce, industry associations, individual companies, colleges and universities and other organizations.

Kathy Cook, Public Information Officer, explains her role in assisting Sandy survivors to roundtable of federal and insurance industry partners

Response was immediate. Utility companies inserted messages in billing statements, reaching 3.3 million customers. The South Jersey Transportation Authority featured registration information on its Vehicle Messaging Systems at toll plazas, and the ticker messaging system on its website, reaching an estimated 2.9 million people a month.

Chambers, associations and businesses shared FEMA’s electronic newsletter (the E-News Update) for the private sector stakeholders with their memberships and contacts. The access to recovery information proved invaluable to their members and had far-reaching effects.

“To have the opportunity to interact directly with representatives, ask questions and get answers has helped not only members, but their clients as well,” said New Jersey Association of Realtors Chief Executive Officer Jarrod Grasso. “The recovery process in the aftermath of Sandy has not been easy, but getting the correct facts to our members has relieved a great deal of the uncertainty related to flood maps, insurance and elevation that so many New Jersey residents felt."

Home Depot Hurricane Workshop

Two FEMA program areas, Private Sector and the Federal Disaster Recovery Coordination group, facilitated an Insurance Industry Roundtable. The resulting public-private partnership engaged the insurance industry in a series of four meetings to explore how to enhance and expedite the disaster assistance process. A roundtable work group identified issues impeding the process and then developed recommendations that were submitted to President Obama’s Hurricane Sandy Rebuilding Task Force.

The private sector reached out in more basic ways as well. Sometimes it was as simple as offering a space to work. Operation Photo Rescue, a nonprofit organization of volunteer photojournalists from around the country, wanted to help Sandy survivors restore treasured photos. The organization began helping disaster survivors during Hurricane Katrina recovery. Volunteers need to set up a temporary shop close enough for survivors to access the free services.

“Finding a place for us to host our copy run was turning into a major problem as we could not secure a building close enough to where Sandy hit,” said Operation Photo Rescue President Margie Hayes. “We were coming up empty handed until Chris Spyridon, regional pro sales manager for Home Depot, offered us space at a Home Depot in Seaside Heights.”

The business of recovery is long-term, and an important part of that is preparedness, which not only helps individuals survive a disaster but can help businesses endure as well. FEMA’s Private Sector specialists have covered the state to help executives and officials understand the need for a continuity plan so work continues once the emergency is over. Montclair State University recorded FEMA’s preparedness webinar to share with all of New Jersey’s colleges and universities.

Amy Ferdinand, the university’s director of Environmental Health and Safety, said, “With the recent trend of ever-increasing disasters – whether natural or manmade – being the ‘new normal,’ there is a definite need among business leaders and stakeholders to become better informed on the topic of continuity and business planning.”

Next in the One Year Later series: the role of Environmental and Historic Preservation in disaster recovery.

FEMA's mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.

Follow FEMA online at www.fema.gov/blog, www.twitter.com/fema, www.facebook.com/fema, and www.youtube.com/fema. Also, follow Administrator Craig Fugate's activities at www.twitter.com/craigatfema

The social media links provided are for reference only. FEMA does not endorse any non-government websites, companies or applications.

http://www.fema.gov/news-release/2013/10/28/new-jersey-private-sector-gets-down-business-sandy-recovery

 

C7 Data Centers Incorporates AssuredSAN™ Pro 5000 System to Offer Affordable Storage for Cloud Environments

 

LONGMONT, Colo. – Dot Hill Systems Corp. (Nasdaq: HILL), a leading provider of SAN storage products, today announced that C7 Data Centers, a leader in outsourced IT solutions, has selected Dot Hill’s AssuredSAN Pro 5000 Series 100 terabyte offering ,with real-time automated tiering for single tenant private cloud solutions. C7 Data Centers is incorporating the AssuredSAN Pro 5000 Series into its recently introduced private cloud configuration which provides affordable cloud-based redundancy for physical and virtual production environments.

“Many companies are looking at cloud implementations to grow IT resources without increasing support and hardware costs,” said Jim Jonez, senior director of marketing, Dot Hill. “C7 Data Centers and Dot Hill are working together to provide a responsive, reliable, and cost-effective infrastructure. The Dot Hill AssuredSAN Pro 5000 Series allows cloud customers to increase capacity without having to purchase additional licenses, providing savings to their bottom line.”

“We’re confident that in our FuseApp Private Cloud and Private Cloud Suite solutions we’ve found the right mix of technologies to provide a robust, affordable failover solution for physical and virtual production environments that is easy to scale,” said Wes Swenson, CEO, C7 Data Centers. “The Dot Hill AssuredSAN Pro 5000 Series provides 99.999 percent availability and real-time tiering – features that meet the performance requirements of a production site.”

The AssuredSAN Pro 5000 Series features built-in intelligence that responds to data access needs autonomically, or without human intervention or policy setting. The AssuredSAN Pro Series, with RealStor™ software takes tiered storage to a new level – beyond other automated tiered storage systems using off-hours batch migration, and into a new era of autonomic, real-time data tiering.

The AssuredSAN Pro 5000 Series is a high-performance, highly available and reliable integrated storage array that delivers consistently faster access to current data with built-in, real-time autonomic tiered storage and virtualization. The AssuredSAN Pro Series detects priorities for data access immediately to optimize the delivery of priority/high demand data in real time. Faster I/O is achieved in part through real-time, automated data tiering, which prioritizes data files, volumes or blocks between tiered storage using built-in analysis and data scoring.

 

About Dot Hill

Leveraging its proprietary Assured family of storage solutions, Dot Hill solves many of today’s most challenging storage problems – helping IT to improve performance, increase availability, simplify operations, and reduce costs. Dot Hill’s solutions combine breakthrough software with the industry’s most flexible and extensive hardware platform and automated management to deliver best-in-class solutions. Headquartered in Longmont, Colo., Dot Hill has offices and/or representatives in China, Germany, India, Japan, Singapore, the United Kingdom, and the United States.

For more information, visit us at www.dothill.com.

About C7 Data Centers

A privately held Utah corporation, C7 Data Centers is the largest colocation provider in the State of Utah. C7 builds and operates state of the art multi-tenant, carrier neutral, high-density data centers using ambient air cooling systems in America’s lowest disaster-risk region. C7 delivers cloud solutions and flexible, customized data storage with personalized managed IT services to both local and global customers; serving clients from small business start-ups to Fortune 1000 companies. For more information about C7 Data Centers, call 801-822-5300 or visit www.c7dc.com. For press relations, contact Jennifer Johnson at 202-841-1171.

Statements contained in this press release regarding matters that are not historical facts are "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act. Because such statements are subject to risks and uncertainties, actual results may differ materially from those expressed or implied by such forward-looking statements. The risks that contribute to the uncertain nature of the forward-looking statements include, among other things, those that are set forth in Dot Hill's most recent Form 10-Q and Form 10-K filings with the Securities and Exchange Commission. All forward-looking statements contained in this press release speak only as of the date on which they were made. Dot Hill undertakes no obligation to update such statements to reflect events that occur or circumstances that exist after the date on which they were made.

 

Alongside its new global branding, multi award-winning business continuity and emergency communications specialist Vocal will launch its new website in time for the BCM World Conference and Exhibition, taking place on November 6-7 2013.

The new website has been designed with the user experience in mind, including dedicated news and blog feeds, an interactive user forum, live online assistance, and social interaction. A streamlined navigation system will enable visitors to search and access information based on their industry and desired application, relevant to Vocal’s extensive product range.

Natalie Cooper, Vocal’s Commercial Services Manager explains: ‘We’re taking massive steps forward in developing our products to meet the changing face of global business continuity. iModus was born out of emergency communication but it has evolved as a market leader in business continuity and incident management that has proven its ability to consistently deliver across a diverse range of sectors. Feedback from our customers tells us how user friendly iModus is and we wanted to replicate that ease of use in a highly informative and accessible website.’

Visitors to Vocal’s new website at www.vocal.co.uk will be able to access information on solutions tailored to their specific industry, instantly download contracts, product presentations and documents, access dedicated industry news and information feeds, and join an interactive online user forum. The new live help facility offers instant online assistance with sales and support enquiries.

‘Interaction with our customers is hugely important to us,’ continues Natalie. ‘Our customer user group has been a great success and we wanted to create an interactive online version within our new website. The resulting Vocal Customer E-forum is an extension of our Vocal user group that will allow people within the industry to share practice tips, advice and information and discuss relevant topics with their peers. The experts from Vocal will be online too, with dedicated areas to share useful information and news posts.’

Meet the Vocal team on Stand 46 at the 2013 BCM World Conference and Exhibition, taking place from 6-7 November 2013.

Visit the new Vocal website at www.vocal.co.uk

 

Integration with Optical Transport Network in Asia-Pacific Expands Capacity
 
  • Pacnet today announced the successful deployment of an optical mesh network with 100 Gigabits per second (Gbps) technology between Asia and the United States on its EAC Pacific fiber optic cable system integrated with Optical Transport Network (OTN) switching over its Asia-Pacific region’s high-capacity submarine cable systems.
  • “We are the first carrier to support 100G service between Asia and the United States,” says Andy Lumsden, Chief Technology Officer of Pacnet.
  • The new backbone integrates subsea fiber infrastructure and terrestrial backhaul links supporting pure packet technology and OTN switching in the optical core, enhancing Pacnet’s capability to offer customers a seamless set of network services between its inventory of interconnected data centers located in 14 cities across Asia-Pacific.

 
HONG KONG – Pacnet today announced the successful deployment of an optical mesh network with 100 Gigabits per second (Gbps) technology between Asia and the United States on its EAC Pacific fiber optic cable system integrated with Optical Transport Network (OTN) switching over its Asia-Pacific region’s high-capacity submarine cable systems.  Pacnet can now offer its Carrier and Enterprise customers 10Gbps, 40Gbps and 100Gbps services between Asia-Pacific and the U.S.
 
Pacnet’s 100G network upgrade is a significant move to address the increasingly growing demand for bandwidth throughout the Asia-Pacific region and all over the world.  In 2017, global IP traffic is expected to reach 1.4 Zettabytes per year, or 120.6 Exabytes per month, growing at a compound annual growth rate (CAGR) of 23 percent from 2012 to 2017.  IP traffic in Asia-Pacific will reach 43.4 Exabytes per month by 2017, at a CAGR of 26 percent.  
 
“We are the first carrier to support 100G service between Asia and the United States,” says Andy Lumsden, Chief Technology Officer of Pacnet.  “With this successful upgrade, we have significantly boosted our bandwidth capacity and scalability to serve the dynamic needs of carriers and enterprises that support compute-intensive operations in the region.”
 
The new backbone integrates subsea fiber infrastructure and terrestrial backhaul links supporting pure packet technology and OTN switching in the optical core, enhancing Pacnet’s capability to offer customers a seamless set of network services between its inventory of interconnected data centers located in 14 cities across Asia-Pacific.  The upgrade supports both Ethernet and OTN interfaces at a location, allowing flexible selection of whether to multiplex, scale up and down, amplify, groom, optically express, or switch individual data streams.  Customers can enjoy improved quality of service without increasing the cost of ownership.
 
Pacnet owns and operates EAC-C2C, Asia’s largest privately-owned submarine cable network at 36,800 km, as well as EAC Pacific, which spans 9,620 km across the Pacific Ocean.  EAC-C2C is the leading state-of-the-art fiber optic submarine cable network in Asia, connecting to cable landing stations throughout the region including Hong Kong, Singapore, Japan, Taiwan, Korea, the Philippines and China.  With multiple landing points in most locations, EAC-C2C provides Pacnet’s customers with network resilience through increased route diversity.  EAC Pacific is a trans-Pacific cable system providing connectivity between Chikura, located off the coast of Japan near Tokyo, to Los Angeles, California and other network Points of Presence (PoPs) on the West Coast of the United States.  The two fiber pairs, collectively known as EAC Pacific, provide up to 1.92 Terabytes per second (TBps) of capacity across the Pacific Ocean.
 

About Pacnet
Pacnet is Asia-Pacific’s leading provider of managed data connectivity solutions to major telecommunications carriers, large multinational enterprises and government entities in the Asia-Pacific region.  Ownership of the region’s most extensive high-capacity submarine cable systems with over 46,000 km of fiber and connectivity to interconnected data centers across 14 cities in the Asia-Pacific region gives Pacnet unparalleled reach to major business centers in key markets including China, India, Japan and the United States.  Combined with a comprehensive set of managed network and value-added data center services, its assets and experience in the region have helped Pacnet service large businesses worldwide including Fortune 500 companies.  Pacnet is headquartered in Hong Kong and Singapore, with offices in all key markets in the Asia-Pacific region and North America.  For more information, please visit: www.pacnet.com.

 

Most people suffer from the delusion of privacy. They think it can be guaranteed somehow for their various electronic gadgets. But that is a delusion, and sadly even many in the information security field don't know it. Still, it's surprising how strong the desire to believe otherwise is, and how tech companies will sometimes try to feed that illusion.

Take the news that the encryption in Apple's iMessage can potentially be cracked. I was surprised, but not because the encryption could be cracked. That's a given, no matter the encryption algorithm. I was surprised because I didn't know that iMessage used point-to-point encryption. I just assumed that Apple could always read my messages. Call me uninformed for having missed that news, but what I think is that I was actually better informed than those people who saw Apple's promise that it couldn't decrypt iMessage traffic and let the delusion of privacy lull them into thinking that was really true. Believe me, we'd all be better off if we just acted on the theory that there is likely to be a back door every time.

...

http://www.computerworld.com.au/article/530218/electronic_privacy_there_no_such_thing/