(TNS) - Early Sunday morning the ground started to rattle in Alaska, and those who didn’t sleep through the 7.1-magnitude earthquake reacted in many different ways.
Some people ran outside of their homes, while others pressed themselves into doorways. Some people hurried down the stairs of hotels in their underwear, while others squatted under kitchen tables.
But what’s the best thing to do when you feel the floors start to sway?
Emergency officials have a few tips and one of them is stay inside.
(TNS) - A month after tornadoes ravaged North Texas, mental-health experts are warning survivors to be on the alert for another problem: post-traumatic stress disorder.
Though many people associate that syndrome with soldiers who have been through combat, PTSD can affect about a fifth of people who were directly affected by a natural disaster, medical studies show.
After an ordeal like a tornado or hurricane, people often have trouble sleeping and concentrating, feel jumpy and may be easily startled, or see the disaster replaying in their minds.
OXFORD, Miss. – State and federal disaster survivor assistance teams are now working in three more Mississippi counties, helping residents recover from destructive tornadoes, severe storms and flooding in late December.
The teams are made up of disaster specialists from the Mississippi Emergency Management Agency and the Federal Emergency Management Agency. They are canvassing neighborhoods in Monroe, Panola and Prentiss counties, which were designated for disaster assistance last week.
Affected survivors in Monroe and Prentiss counties can also visit applicant service centers now open at the:
- Chancery Clerk Building (across from the courthouse), 110 N. Main St., Booneville, MS 38829;
- The Becker Community Center, 52246 Highway 25 South, Amory, MS 38821.
Survivors in Panola County can visit the disaster recovery center in neighboring Quitman County, which is located at the Marks Fire Department, 108 W. Main St., Marks, MS 38646 or any other center in a county designated for assistance after the December storms.
The teams can register survivors and electronically submit a request for federal assistance. Team members can be easily identified by photo identification and FEMA or MEMA clothing. Mississippi residents are encouraged to ask for official identification before providing personal information.
Federal disaster assistance for qualified applicants may include:
- Grants to rent a temporary place to live, as needed.
- Grants for essential home repairs not covered by insurance.
- Grants for disaster-related needs not covered by insurance — such as medical, dental, transportation, funeral expenses, moving and storage fees, personal property loss and child care.
- Low-interest disaster loans from the U.S. Small Business Administration to homeowners, renters and businesses of all sizes to cover losses not fully compensated by insurance.
In addition to the registration opportunity offered by recovery teams, survivors can register for assistance by the following methods:
- Visiting DisasterAssistance.gov with a computer, tablet, iPhone, Android or other mobile device.
- Calling 800-621-3362 or (TTY) 800-462-7585 for those who are deaf, hard of hearing or speech impaired. Those who use 711 or Video Relay Services can call 800-621-3362 to register.
- Business owners can find an electronic loan application on the U.S. Small Business Administration’s secure website at disasterloan.sba.gov/ela. Questions can be answered by calling the SBA disaster customer service center at 800-659-2955/ (TTY) 800-877-8339 or visiting sba.gov.
All FEMA disaster assistance will be provided without discrimination on the grounds of race, color, sex (including sexual harassment), religion, national origin, age, disability, limited English proficiency, economic status, or retaliation. If you believe your civil rights are being violated, call 800-621-3362 or 800-462-7585(TTY/TDD).
FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.
FEMA’s temporary housing assistance and grants for public transportation expenses, medical and dental expenses, and funeral and burial expenses do not require individuals to apply for an SBA loan. However, applicants who receive SBA loan applications must submit them to SBA loan officers to be eligible for assistance that covers personal property, vehicle repair or replacement, and moving and storage expenses.
WASHINGTON – The U.S. Department of Homeland Security’s Federal Emergency Management Agency (FEMA) is seeking applicants for its Youth Preparedness Council. FEMA’s Youth Preparedness Council was formed in 2012 to bring together leaders from across the country who are interested and engaged in advocating youth preparedness. Council members are selected based on their dedication to public service, their efforts in making a difference in their communities, and their potential to expand their impact as national advocates for youth preparedness.
The Youth Preparedness Council offers an opportunity for youth leaders to serve on a distinguished national council and participate in the Youth Preparedness Council Summit. During their two-year term, the leaders will complete a national-level group project and share their opinions, experiences, ideas, solutions, and questions regarding youth disaster preparedness with the leadership of FEMA and national youth preparedness organizations.
Council activities and projects center around five areas of engagement: programs, partnerships, events, public speaking/outreach, and publishing. Members represent the youth perspective on emergency preparedness and share information with their communities. They also meet with FEMA on a regular basis to provide ongoing input on strategies, initiatives, and projects throughout the duration of their term.
Individuals in their freshman or sophomore year of high school that are engaged in individual and community preparedness, or have experienced a disaster that motivated him or her to make a positive difference in their community, may apply to serve on the Youth Preparedness Council. Adults working with youth or community preparedness are encouraged to share the application with youth who might be interested in applying.
Youth interested in applying to the Council must submit a completed application form, two letters of recommendation, and academic records. Specific information about completing and submitting the application and attachments can be found in the application instructions. All applications and supporting materials must be received no later than March 1, 2016, 11:59 p.m. PST in order to be eligible. New Youth Preparedness Council members will be announced in May 2016.
For more information about the Youth Preparedness Council and to access the application materials, please visit www.ready.gov/youth-preparedness-council.
FEMA's mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain and improve our capability to prepare for, protect against, respond to, recover from and mitigate all hazards.
The social media links provided are for reference only. FEMA does not endorse any non-government websites, companies or applications.
While the high drama surrounding the proposed acquisition of EMC by Dell continues, EMC’s technology advances continue. Today EMC rolled out an update to its Elastic Cloud Storage (ECS) platform that is at the core of the company’s software-defined storage (SDS) architecture.
Manuvir Das, senior vice president for the Advanced Software unit within EMC’s Emerging Technologies Division, says the latest update adds the ability to search petabytes of unstructured data stored in an object-based storage system using metadata that doesn’t have to be housed in a separate database. Instead, Das says, IT organizations can apply analytics directly against the metadata exposed via ECS.
In addition, DAS says ECS now supports multiple protocols, including AWS S3, OpenStack Swift, HDFS and NFS. That makes it possible for IT organizations to deploy an SDS environment capable of spanning both public and private clouds, Das says.
We had a little snow here in Washington, DC on Friday, and we’re still digging out. The great snowstorm of 2016, a.k.a. Snowzilla, was the kind of outlier event that even the most dysfunctional of local governments must be ready to handle. Even if you think that 2-3 feet of snow in a single day is a “black swan” event, you had better have the snow plows and dump trucks ready for that unlikely scenario.
Software innovators have a much different attitude about black swans. Rather than prepare their response for them, they usually act as though they will never occur. Sure, you might do everything you can to prevent, say, an unexpected architectural glitch to put a critical application into a death-spiral during a period of inconveniently high usage, but there’s only so much risk mitigation that smart design, thorough testing, and other preventive measures can do. The risk of a black swan swooping down to land on your head always exist. (Just look at the painful example of Knight Capital, or the software upgrade that caused a 4-hour outage for the New York Stock Exchange last year.) So what do we do to recover from these events?
Another massive weather system has impacted business operations in large parts of the country. Winter Storm Jonas dumped feet of snow across the northeast, shutting down travel and stalling commerce for days. The storm is considered a “top 10” in the continental U.S., driven by this year’s strong El Nino.
From a business perspective, the storm illustrated the importance of rapid and accurate communications. Emergency or mass notification systems were used throughout the country to keep operations moving during this major disruption. Here are just a few of the ways organizations of all sizes utilized these mission critical systems:
Upgrades to Core Offerings Give Users Streamlined Workspaces, Automated Rollout Projects and Secure Mobile Email
BRACKNELL — Furthering its vision to modernize IT, LANDESK today announced the release of LANDESK Management Suite 2016, LANDESK Security Suite 2016 and the introduction of LANDESK Mobile Security Suite 2016. These updates give users greater visibility, streamline security and increase automation to further empower users and simplify IT.
“LANDESK Management Suite and Security Suite are at the heart of our business and technology strategy. The underlying technologies not only help IT manage and protect the devices in their environment, but they also provide a rich data set that our service management and IT asset management offerings leverage,” said Duane Newman, senior director of product management at LANDESK. “This gives IT unparalleled visibility into what is happening in the environment, and it provides the underlying capabilities required to take action when change is needed. The 2016 updates extend those capabilities to natively support mobile devices, to improve access and visibility and to provide more automation capabilities than ever before.”
Unified Endpoint Management
LANDESK brings users a truly unified endpoint management (UEM) experience with Management Suite 2016. This product now offers full mobile device management capabilities as part of its industry-leading client management solution, allowing organisations to manage devices, packages and workflows for PCs, Macs, Linux, Chromebooks and now iOS and Android devices — all from a single interface and a single server. This allows teams to gather device-related data, quickly assess what is happening in their environments and to streamline management workflows to automatically deliver the appropriate software to each platform.
This simplified administrative workflow allows system administrators to target individuals or groups with specific policies or packages, with UEM capabilities that ensures each device gets the necessary changes and apps. For more security-focused organisations, the new LANDESK Mobile Security Suite comes as an add-on to the UEM platform.
As part of this movement to modernise IT, LANDESK has also improved and expanded the functionality of its Workspaces platform across the portfolio. These improvements empower organisations by providing an intuitive, role-driven experience that changes the way users interact with their tools, and offers a clean, simple user interface. This streamlined approach makes it easier to ensure devices are properly managed without impacting end users.
In addition to other enhancements, Security Suite 2016 introduces LANDESK Workspaces for the Security Admin, which helps connect security and IT operations by providing a view, which highlights the security posture of the devices on the network, and helps prioritise remediation opportunities. It gives deep visibility into devices so admins can see what needs to be patched or where they may be vulnerable.
Automated Rollout Projects
LANDESK further empowers IT by providing features in Management Suite 2016 and Security Suite 2016 that automate the rollout process of both large and small software projects, including software deployments and patching. This feature simplifies repetitive software distribution projects by automating staged rollout processes to progress from smaller pilot groups all the way up to enterprise-wide distributions. It also improves project visibility with a built-in Gantt chart and automated emails, making project timelines simple to manage from within the tool.
Secure Mobile Email, Application Wrapping, Secure Mobile Browser
LANDESK’s Mobile Security Suite delivers several advanced mobile technologies, including secure mobile email, which provides users with protected access to corporate email and any attachments from personal mobile devices, using the native email client for each device type. The solution also gives users secure access to content, such as calendars through the user’s preferred email application.
Along with secure email, Mobile Security Suite also includes app wrapping, which secures corporate native applications and associated data from data leaks and possible malware exposure from end users’ personal applications. The suite also introduces secure web browsing for mobile devices, providing users with easy access to internal corporate websites and intranets without the need for a VPN or additional log-ins and passwords.
To learn more about these new and enhanced offerings, please visit www.landesk.com/uem-security.
About LANDESK Software
LANDESK, the global authority on user-centered IT, enables users to be their most productive while helping IT embrace the speed of change. Through the integration and automation of IT systems management, endpoint security management, service management, IT asset management, and mobile device management, LANDESK empowers IT to balance rapidly evolving user requirements with the need to secure critical assets and data. With offices located across the globe, LANDESK is headquartered in Salt Lake City, Utah. For more information, visit www.landesk.com.
Copyright © 2016, LANDESK. All rights reserved.
Houston acquisition broadens service footprint significantly
“With extensive coverage of the market area, Advanced is recognized as Houston’s largest privately owned and operated record storage business. We are pleased to now be serving our new clients from Advanced but, additionally, to have the capability to meet the needs of clients we currently serve elsewhere, now in Houston.” Alston stated. “This represents an exciting milestone – and a considerable advantage – for us to be available to clients in all major U.S. markets.”
“Advanced Record Storage is a good fit for Access. The company’s high quality record centers and focus on customer service are much like ours,” Access President John Chendo shared. “The former owners of the company, like so many before them, clearly recognized that partnering with a larger, international firm like Access will provide future opportunities for their team members and broadened service capabilities to their clients. These are benefits we are now discussing with similar firms throughout the U.S. and beyond. We expect to acquire several more companies like Advanced in the near future.”
This announcement comes as Access has gathered together more than 150 members of its leadership in San Antonio, Texas for its Annual Summit Meeting. Leif Babin, highly acclaimed co-author of “Extreme Ownership: How U.S. Navy Seals Lead and Win” presented the keynote this morning.
As the largest privately held records and information management services provider in the United States, Access now serves 45 markets across the nation and in Latin America and the Caribbean.
For additional information, visit www.InformationProtected.com.
iSheriff Complete replaces point products for Web, email and endpoint security
iSheriff, a leading cloud security company, today announced the release of iSheriff Complete, a comprehensive cyber security platform designed to provide 360-degree protection of an organisation’s devices and communication channels. iSheriff Complete is the industry’s first comprehensive cloud security platform to provide fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies.
“In order to provide a secure network, a security manager must be able to see and control all communications in and out of that network,” said John Mutch, CEO, iSheriff. “iSheriff Complete provides superior malware protection and full control of Web, email and endpoint vectors, providing the only integrated cloud-based security platform available today. We deliver complete cyber security through the cloud, all controlled by a single, easy-to-use interface. iSheriff Complete implements security policies and schedules reports in minutes, so our customers can get back to running their businesses.”
As a cloud-based platform, iSheriff removes potential malware and viruses before they ever reach the network by providing a ‘clean feed’ to customers for their email and Web traffic.
iSheriff Complete is available now and includes:
Endpoint, Web & Email
Complete vector control and visibility is central to the iSheriff platform, which offers a tightly integrated security solution, unlike ‘best of breed’ point products that often do not work together. iSheriff Complete is designed to enforce common security policies across all vectors, as well as track users both on and off the network.
Threat Detection Engine
Working 24x7x365 to stay ahead of the latest cyber threats on a worldwide basis, iSheriff security operates around the globe, detecting new threats and developing and propagating new signatures in a matter of seconds.
Active Response Console
The console is designed to be easy to use, allowing organisations to control their entire cyber security system from one interface. Threats are displayed instantly, along with what actions have to be taken based on defined policies.
“We’re in an age of fast-moving change and innovation powered by connected mobile devices and cloud computing, which has opened up the influence of technology to everyone, including criminals,” Mutch continued. “Cloud-based services and software of all varieties have been broadly adopted. By eliminating the need for complex and expensive hardware and software installation and offering scalable, per user pricing, cloud-based platforms open access to services that were previously cost-prohibitive for many businesses.”
iSheriff is one of the leading companies providing effective security completely from the cloud. The company delivers the industry’s easiest to deploy and manage Software-as-a-Service (SaaS) solution for protection against today’s multi-vector threats and compliance challenges, combining the power, flexibility and ease of a cloud-based service, offering with a seamlessly integrated suite of critical technologies. For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.
iSheriff is a leading cloud-based, enterprise device security platform used by more than 3,000 organizations around the world. Our global cloud network, award winning security, and SaaS delivery model provide an integrated service to protect all enterprise devices – including laptops, servers, tablets, point of sale devices, industrial equipment and emerging “internet of things” technologies. Simply put, iSheriff delivers more powerful security that is easier to manage and more cost efficient than our competition. We are proud to be recognized by leading analysts and industry publications, including SC Magazine, Network Computing and IDC. In February 2015, Virus Bulletin's VB100 independent comparative testing named iSheriff the most effective solution against new and emerging malware.