LOGICnow announced today the integration of the MAX Backup and Disaster Recovery offering into a comprehensive security solution, and its remote management software for managed services providers.
The technology is described as a holistic approach that allows IT professionals to get systems up and running “within minutes” after a data loss or cyber attack, and help companies regain access to locked data following a ransomware disruption.
DENTON, Texas – Cleaning up after a flood? FEMA has some suggestions:
• Check for damage. Check for structural damage before re-entering your home. If you suspect damage to water, gas, electric or sewer lines, contact authorities.
• Remove wet contents immediately. Wet carpeting, furniture, bedding and anything else holding moisture can develop mold within 24 to 48 hours. Clean and disinfect everything touched by floodwaters.
• Tell your local officials about your damages. This information is forwarded to the state so state officials have a better understanding of the extent of the damages.
• Plan before you repair. Contact your local building inspections or planning office, or your county clerk’s office to get more information on local building requirements.
• File your flood insurance claim. Be sure to provide: the name of your insurance company, your policy number and contact information. Take photos of any water in the house and damaged personal property. Make a detailed list of all damaged or lost items.
There are also questions about when Federal Assistance is available after a disaster. In simple terms, here’s the process:
A disaster happens. Local officials and first responders respond. These officials see that their communities need assistance in dealing with it. They ask the state for help. The state responds. Sometimes, the state sees that the response is beyond its resources. That’s when the state reaches out to FEMA for assistance.
Typically, before asking for a Major Disaster declaration, the state asks for a preliminary Damage Assessment. This is done by teams composed of state and federal officials. They arrive in the disaster damaged area and local officials show them the most severely damaged areas that they can access.
Among the items considered are:
• The amount of damage
• How widespread the damages are, and the number of insured and uninsured properties involved
• Special needs populations
• Other disasters the state may be working.
Governors use this information to decide whether to request a disaster declaration. Once a governor decides to request a declaration, it is processed as quickly as possible.
If the President decides there’s a need, he signs a Major disaster declaration for either Individual Assistance, Public Assistance or both, for designated counties.
Individual Assistance means:
Individuals and business owners may be eligible for rental assistance, grants for repairs, or low interest loans from the U.S. Small Business Administration (SBA)for damages to uninsured or underinsured property.
Public Assistance means:
Government entities and certain private non-profit agencies may be eligible to be reimbursed for the cost of repairs to uninsured or underinsured facilities, as well as some costs for labor and materials.
If there is a Major Disaster declaration, survivors may register for assistance at www.disasterassistance.gov, or by calling 1-800-621-3362 or (TTY) 1-800-462-7585.
The Preliminary Damage Assessment teams often take photographs of damaged areas. After a Major Disaster declaration, photographs of your damages are accepted as documentation, in addition to your receipts.
FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards. Follow us on Twitter at http://twitter.com/femaregion6 , and the FEMA Blog at http://blog.fema.gov.
Craig Huitema and Soni Jiandani blogged about Cisco’s latest ASIC innovations for the Nexus 9K platforms and IDC did a write up and video. In this blog, I’ll expand on one component of the innovations, intelligent buffering. First let’s look at how switching ASICs maybe designed today. Most switching ASICs are built with on-chip buffer memory and/or off-chip buffer memory. The on-chip buffer size tends to differ from one ASIC type to another, and obviously, the buffer size tends to be limited by the die size and cost. Thus some designs leverage off-chip buffer to complement on-chip buffer but this may not be the most efficient way of designing and architecting an ASIC/switch. This will lead us to another critical point, how can the switch ASIC handle TCP congestion control as well as the buffering impact to long-lived TCP and incast/microburst packets (a sudden spike in the amount of data going into the buffer due to lots of sources sending data to a particular output simultaneously. Some examples of that IP based storage as the object maybe spread across multiple nodes or search queries where a single request may go out on hundreds or thousands of nodes. In both scenarios the TCP congestion control doesn’t apply because it happens so quickly).
In this video, Tom Edsall summarizes this phenomenon and the challenges behind it.
Helping put people's lives back together is what Interstate Restoration does every day. So when a Chicago elementary school principal found out recently her hometown of Flint, Michigan, had children without access to safe drinking water, she reached out to Interstate Restoration for help in organizing relief.
Lisa Epstein, a principal at Chicago's R.H. Lee Elementary School, contacted Interstate Restoration for help with transporting and delivering bottled water to Flint children. In February, the employees at Interstate Restoration in Chicago and Detroit immediately mobilized trucks and volunteers to transport truckloads of donated water, more than 1,500 cases, to Children’s Dream Center, a shelter in Flint. “We are always willing to help make a positive impact in the community, especially one so close to home,” said Jeff Levine, vice president of Business Development for Interstate Restoration in Southfield, Michigan. “After all, doing the right thing is one of our core values as an organization and we strive to live it out in as many ways as possible.”
Interstate Restoration is a national emergency restoration and reconstruction services provider for commercial enterprises based in Ft. Worth, Texas, and with 16 U.S. locations.
More Than 500 Smart Digital Enterprises Now Stake Their Businesses on the Power and Simplicity of an Avaya Fabric Network
SANTA CLARA, Calif. – Avaya, a global leader of business communications software, systems and services, announced that more than 500 digital enterprises and organizations around the world have deployed Avaya Fabric Networking technology. From the world's tallest building to the busiest commuter railroad in North America, the world is increasingly switching to Avaya networking for smart commerce, industry, education and government.
Avaya Fabric Connect virtualizes the infrastructure of the enterprise by simplifying network design, deployment and management to create a single 'network fabric'. Companies are switching to Avaya Fabric Networking because of its stunningly simple configuration and management, lightning fast time to service and failover, and rock solid reliability and resiliency.
With a lengthy task list and unconditional requirements, Avaya checks off all the boxes for customers. Just a few examples include:
- Saving time and money for Australia's oldest bank and largest banking groups by updating migrating and consolidating their data center and network operations in less than six weeks.
- The busiest commuter railroad in the U.S. moved to Avaya to run its video applications, credit card payment systems, a host of new applications and services.
- To increase car production for one of the world's oldest car manufacturers, Avaya delivered a fully virtualized architecture that increases stability, security and makes it easier to deploy new manufacturing services.
- For numerous airport operations and companies including management offices, concessionaires, cargo and catering, plus retail food and consumer shops Avaya provides multi-tenant capabilities that uses the same physical infrastructure yet securely segments traffic.
- A school system in one of the largest counties in the U.S with more than 115,000 users in 175 different locations and 300,000 BYOD devices created a Smart Campus with Avaya.
A new category of Enterprise Service Platforms, where enterprises are acting like service providers providing more secure data services and a lightning fast delivery model is emerging with Avaya at the lead.
"On the day of the cutover, we were able to take the new network live in just two hours. The executives who were present for the deployment of our new network core were very impressed by the speed and efficiency of the installation, and the fact that the new Avaya equipment performed flawlessly right from the start."
--Michael LaChapelle, Senior Manager - Network Computing Technology, Long Island Rail Road
"High-availability was a crucial parameter for us to take care of multiple airport operations as the network is the backbone for all airport operations. The network has certainly delivered against that goal."
--Francis Rajan, VP- ICT, BIAL
"IP multicast is one of the reasons why we went with Avaya, because it's so easy to implement and use. We run on one, strong, flexible network for all the digital assets we have at the Bell Centre. Regardless of the operation, the Avaya network can handle it. I don't see any limitations."
--Pierre-Eric Belzile, Vice President, Information and Communication Technology at the Canadiens Hockey Club
"Our network has to be 99.99% reliable, yet at the same time be flexible enough to respond quickly to new data center and production-related requirements. We managed to achieve the impossible thanks to Avaya."
--Albert Knoll, Network Operations Manager, Fujitsu Technology Solutions.
"One of the biggest benefits is that the network needs very little maintenance -- we just implement it and forget about it. This is a big bonus for my small team, which doesn't have time to be constantly tinkering with the network."
--Andy Bischoff, Manager, Network Services, York Region District School Board
Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. The Avaya Engagement Environment enables third parties to create and customize business applications for competitive advantage. Avaya's fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.
Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.
Premier Value-Added Distribution Network Opens New Doors for Cybersecurity Platform
MOUNTAIN VIEW, Calif. – UpGuard (https://www.upguard.com/) today announced that its cybersecurity platform is now available to customers through Promark Technology (www.promarktech.com), a premier U.S.-focused value-added distributor (VAD) and wholly-owned subsidiary of Ingram Micro Inc. (NYSE: IM). Under the terms of the distribution agreement, Promark will sell UpGuard to corporate resellers and system integrators through a dedicated distribution sales team across the United States. By aligning with Promark, UpGuard expands its distribution network and further strengthens its channel strategy.
"UpGuard takes an altogether different approach to an issue that's hindered companies and their ability to fully understand their risk for data breaches or unplanned outages. A platform that can not only scan an entire network for critical security gaps and provide actionable insights to help remediate, but also be deployed in as little as a day provides immediate value to our customers," said Dale Foster, executive director and general manager of Promark Technology. "The solution also fits in well with our strategy to offer resellers and solution providers a broad array of best-of-breed products to fit all customer needs in securing systems and minimizing risk against unplanned outages and breaches."
UpGuard's expertise in configuration anomaly and vulnerability detection allows for a complete picture of an organization's cybersecurity preparedness. Its cybersecurity platform tests an organization's IT infrastructure both internally and externally and calculates the potential risk for future intrusions and outages. Upon evaluating the ongoing configuration state of every server, network device and cloud service, companies are given an easy-to-understand score called CSTAR -- a single number which indicates to IT staff, as well as executives, their risk level for data breaches. UpGuard customers can trace changes in their CSTAR evaluation down to the smallest building blocks of information technology and use the full report to then remediate potential risks, creating a safer environment for customer data and lowering insurance costs. Thousands of customers, including ADP, E*TRADE and Cisco Systems, use UpGuard to validate mission-critical infrastructure and continuously detect potential risks.
"Promark has the market expertise, distribution channels and experience required to effectively bring our solutions to market. Our relationship is central to delivering on our go-to-market strategy, accelerating growth and bringing UpGuard to a much wider set of customers. Promark's world-class reseller support infrastructure will also ensure that our partners and customers receive the best support experience possible," said Tony Esposito, vice president of worldwide sales at UpGuard.
For more information, or to become an UpGuard partner, please visit: https://www.upguard.com/partners.
UpGuard is the company behind CSTAR, the world's only comprehensive and actionable cybersecurity preparedness score for enterprises. The score allows businesses to understand the risk of breaches and unplanned outages due to misconfigurations and software vulnerabilities. It also offers insurance carriers a new standard by which to effectively assess client risk and compliance profiles. Thousands of companies, including ADP, E*TRADE and Cisco Systems, use UpGuard to validate infrastructure, continuously detect risks and procure cybersecurity insurance. UpGuard is headquartered in Mountain View, CA with offices in Portland, OR. To see how UpGuard works, or to get your CSTAR rating, visit www.upguard.com.
Subscribe to the UpGuard blog: www.upguard.com/blog
Follow UpGuard on Twitter: @UpGuard
Follow UpGuard on LinkedIn: https://www.linkedin.com/company/upguard
Follow UpGuard on Facebook: www.facebook.com/upguard
TechValidate Survey Respondents Cite Scalability and Operational Simplicity as Top Influencers for Database Investment Decisions
SEATTLE, Wash. – Basho Technologies, the creator and developer of Riak® KV and Riak® TS, the world's most resilient NoSQL databases, today announced results from its customer survey conducted through TechValidate™, an independent researcher that generates and validates customer experience information. The survey illustrates the importance of always-on applications and illuminates how that affects the decision-making process when choosing NoSQL databases.
IDC estimates that the average cost of a critical application failure per hour is $500,000 to $1 million. Basho's survey findings echo the industry's concern about the egregious costs of downtime. Highlights from the Cost of Downtime survey include:
- Organizations are feeling the burn. Of the respondents who felt monetary losses related to application downtime, 30 percent cited losses of $100,000 or more for each hour of downtime they experienced.
- The cost of downtime extends beyond a company's bottom line. Respondents cited "brand bruising or lost credibility" and "cost of time and resources to respond to a crisis" as the two biggest costs of application downtime.
- Resiliency is Riak's great differentiator. Seventy-one percent of respondents cited the fact that "when one Riak node goes down the cluster still serves requests" as the most significant differentiator between downtime in a Riak cluster and downtime in a different NoSQL cluster.
- Forty percent of responses cited "no noticeable impact" on an application when Riak loses a node due to hardware or network failures.
The survey findings are reflective of reasons why companies like OpenX, Concur Technologies and the National Health Service (NHS) have moved to Riak over the years. Read more about the survey findings and customer feedback in today's blog post.
"OpenX serves hundreds of billions of ad requests monthly, distributed across five international data centers," said Matt Davis, Senior Site Reliability Engineer, OpenX. "To handle the high volume of requests across geographically disparate locations, we knew we needed a database that offered resiliency and high availability. Riak enables OpenX to provide an efficient and reliable high-quality programmatic advertising exchange experience."
To learn more about the ways OpenX has benefitted from using Riak, watch this video case study.
About Basho Technologies
Basho, the creator of the world's most resilient databases, is dedicated to developing disruptive technology that simplifies enterprises' most critical distributed systems data management challenges. Basho has attracted one of the most talented groups of engineers and technical experts ever assembled devoted exclusively to solving some of the most complex issues presented by Big Data and IoT. Basho's distributed database, Riak® KV, the industry leading distributed NoSQL database, is used by fast growing Web businesses and by one-third of the Fortune 50 to power their critical Web, mobile and social applications. Built on the same foundation, Basho introduced Riak TS, which is the first enterprise-ready NoSQL database specifically optimized to store, query and analyze time series data. The Basho Data Platform helps enterprises reduce the complexity of supporting Big Data applications by integrating Riak KV, Riak TS and Riak S2 with Apache Spark, Redis, and Apache Solr.
Riak is the registered trademark of Basho Technologies, Inc.
JEFFERSON CITY, Mo. – Almost three months ago, heavy rains brought flooding and storms to cities along the Mississippi, Missouri and Meramec Rivers. Since that time, more than $75 million has been approved in the form of disaster grants to individuals and families, flood insurance payments, and low-interest loans to renters, homeowners and businesses.
It isn’t too late to receive assistance. The deadline to register for federal assistance is Monday, March 21, 2016. Those who register with FEMA can be referred to national and locally-active voluntary, faith-based and non-governmental agencies when federal assistance cannot meet all of their needs.
A few milestones from the Missouri flood disaster:
- $11,828,408 in FEMA grants to nearly 2,300 individuals and families for emergency home repairs, repair or replacement of essential personal property, rental assistance, and help with funeral, medical, dental, legal and other disaster-related expenses.
- $11,649,800 in U.S. Small Business Administration low-interest disaster loans to more than 270 homeowners, renters and businesses.
- $52,118,027 in National Flood Insurance Program (NFIP) payments.
- More than 1,700 survivors visited 15 disaster recovery centers to get one-on-one counseling on survivor assistance, flood insurance, mitigation methods, low-interest loans and other information.
- FEMA floodplain management specialists fielded 335 technical assistance calls and questions from NFIP participating communities.
- FEMA floodplain management specialists worked with the state on substantial damage software and inspection training for local officials in NFIP participating communities.
In all, Individual Assistance was extended to 33 counties. The counties receiving IA were Barry, Barton, Camden, Cape Girardeau, Cole, Crawford, Franklin, Gasconade, Greene, Hickory, Jasper, Jefferson, Laclede, Lawrence, Lincoln, Maries, McDonald, Morgan, Newton, Osage, Phelps, Polk, Pulaski, Scott, St. Charles, St. Francois, St. Louis, Ste. Genevieve, Stone, Taney, Texas, Webster and Wright.
For breaking news about flood recovery, follow FEMA Region 7 on Twitter at https://twitter.com/femaregion7 and turn on mobile notifications or visit the FEMA web pages dedicated to this disaster at www.fema.gov/disaster/4250.
FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.
All FEMA disaster assistance will be provided without discrimination on the grounds of race, color, sex (including sexual harassment), religion, national origin, age, disability, limited English proficiency, economic status, or retaliation. If you believe your civil rights are being violated, call 800-621-3362 or 800-462-7585(TTY/TDD).
The SBA is the federal government’s primary source of money for the long-term rebuilding of disaster-damaged private property. SBA helps businesses of all sizes, private non-profit organizations, homeowners and renters fund repairs or rebuilding efforts and cover the cost of replacing lost or disaster-damaged personal property. These disaster loans cover losses not fully compensated by insurance or other recoveries and do not duplicate benefits of other agencies or organizations. For more information, applicants may contact SBA’s Disaster Assistance Customer Service Center by calling 800-659-2955, emailing firstname.lastname@example.org, or visiting SBA’s website at www.sba.gov/disaster. Deaf and hard-of-hearing individuals may call 800-877-8339.
“It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.” – Warren Buffett
For Volkswagen, the second largest auto manufacturer in the world, it took 78 years to build its reputation and one day to lose it. Volkswagen Group has about 340 subsidiary companies. It has operations in 150 countries, including 100 production facilities. The company sells passenger cars under the Audi, Bentley, Lamborghini and Porsche brands, and motorcycles under the Ducati brand.
VW admitted installing software in diesel cars to dupe emissions control tests by making them test cleaner than they actually were—even using this information in their marketing campaign to promote these cars. Unfortunately for them, in 2014 a team of researchers at West Virginia University ran separate tests both in the lab and on the road and to their surprise the road tests showed 40 times more emissions. After 14 months of denials VW admitted they had installed “defeat” software that detected when the car’s emission system was being monitored in the lab and altered the results. As a result of the fallout, the company’s CEO resigned, criminal charges were filed, and losses are estimated to be in the billions.
No one will know for sure how much this lapse in judgment will cost Volkswagen in the long run. It makes you wonder who made the decision to cheat. Was it just one engineer, or a team of engineers? How far up the chain of command did it go? Did the CEO know? It doesn’t matter because he was forced to resign and the damage had been done.
When it comes to security and reports like those I’ve just read, I have to wonder if CEO stands for Chief Executive Ostrich, because there are a lot of them with heads buried in the sand, ignoring reality.
Take this new study by Cyphort and Ponemon Institute, for example. The email announcement I received regarding the study warned that CEOs are “completely clueless” about cyberattacks on their company, with a little more than one third of respondents saying they are never updated about security incidents. Why aren’t they learning about the attacks? The report, which surveyed 597 IT leaders in the private sector, found that 39 percent said the company didn’t have the intelligence data available to present to CEOs and convince them of the security risk. In turn, not only are companies being attacked, but it is taking way too long to detect that attack, with nearly a quarter saying it can take up to two years.
This could be because C-level executives make productivity a greater priority than security, according to the newest report from Barkly. The study found that while IT professionals want to put more emphasis on security, only 27 percent of executives want to prioritize security. Another big disconnect between IT and executives when it comes to security: The C-level suite thinks more software is the solution to improved security while IT professionals want to bump up employee education. The most ironic result of the survey was that IT pros say the uninformed employee is the network’s biggest threat while executives say it is insider threats. It’s almost like comparing green apples and red apples, isn’t it? But it does show that there is a serious lack of communication and understanding when it comes to security. As Jack Danahy, co-founder and CTO of Barkly, said in a formal statement: