Given the high profile of Big Data, mobile and data analytics, marketing should be a huge fan of data integration. “More data, more profit,” should be marketing’s motto.
However, if you happen to be working with the most backward marketing division in the world, you might want to send them this recent post, “How Data Integration Tools can Turbocharge Your Marketing.”
The post, by a freelance writer who boasts some programming experience, makes an excellent case for the value of data integration. The post casts a wide net, touting data integration’s ability to:
- “Reduce friction” in sales cycles.
- Develop a “customer-centric approach to data.”
- Improve relationships with customers by maximizing demographic information.
- Combine basic demographic data with sentiment data to help create calls-to-action.
- Break down data silos, so you know more about life-long customers.
BURLINGTON, Wash. – RSA has now completed The Complete Guide to Cleaning and Restoration, a comprehensive textbook for its restoration, cleaning and remediation classroom courses.
A successor to the New Guide to Restorative Drying published in 2006, the new 600-page full-color book covers all courses offered by RSA. This includes courses in trauma scene cleanup, water restoration and applied structural drying, upholstery cleaning, fire and smoke restoration, odor control, microbial remediation, and carpet cleaning.
Extensively peer-reviewed by industry experts before publication, the book will be provided to all paid class participants, a valuable bonus. Participants in the July 31 Trauma Class will be the first to use it, then it will be rolled out to all other RSA classroom courses over the next couple of months.
“The Complete Guide is a summary of everything we’ve learned in the past 40 years about cleaning, restoring and remediation,” notes Kevin Fisher, Legend Brands Technical Education Manager. “We decided to make the entire book available to every class to show our commitment to the professionalism and growth of our industry.”
The original restorative drying book, first published by Dri-Eaz in the 1980s, was written by Dri-Eaz Founder Claude Blackburn and Dri-Eaz education staff. In 2006 the book was updated and expanded quickly became the standard reference for the restorative drying industry. In 2009, Purdue University selected the New Guide to Restorative Drying to be one of the textbooks for its newly established disaster restoration and reconstruction program.
“The Complete Guide is the definitive collection of RSA expertise,” says John Ormsby, president of Dri-Eaz Products. “It stands alone as the premier guide for today’s restoration, remediation and cleaning challenges.”
For more information about The Complete Guide and RSA’s course offerings, visit www.restorationsciencesacademy.com.
Restoration Sciences Academy provides real-world restoration training in dynamic and engaging learning environments taught by industry experts. RSA offers both classroom-based training courses and online courses. RSA courses teach proven techniques that help restorers work more efficiently and grow their businesses.
As compelling an IT opportunity as Big Data can be, it’s not without its challenges—not the least of which is securing all that data.
Looking to make it easier to apply encryption to distributions of Hadoop, Zettaset today announced it is making its encryption software available independently of the Orchestrator platform it created to manage Big Data security.
Zettaset CEO Jim Vogt says the Big Data encryption tools that Zettaset developed are compatible with Apache-based Hadoop distributions available from Hortonworks, Cloudera, MapR, Pivotal, Teradata, and IBM as well as Cassandra and Couchbase NoSQL databases. The tools can also now be accessed via third-party management consoles. That’s critical, says Vogt, because it allows IT organizations to apply encryption to Big Data at rest using the management tools in which they have already invested.
Last winter heavy rain, storm force winds and large waves combined with high spring tides presented England with unprecedented flooding from the sea, rivers, groundwater and surface water.
Thousands of properties were flooded, infrastructure was damaged and tragically, eight people lost their lives. The full impact of these events has not yet been calculated but we do know that 175,000 businesses in England are at risk of flooding.
In 2012 flooding cost affected businesses an average of £60,000, so it is not surprising that flooding is a national priority. In fact the National Risk Register of Civil Emergencies cites coastal flooding as the second highest priority risk after pandemic flu and ahead of catastrophic terrorist attack (taking both likelihood and impact into account) .
No news is good news, or so the saying goes. But when equipment malfunctions and services are interrupted, no news can mean intense frustration for customers and end-users. In today’s quality and satisfaction-oriented business world, you might think that major corporations had understood the importance of good crisis communication. And to be fair, many now make efforts to keep customers informed of the causes of business interruption, the solutions being put in place, and the estimated time when normal service will be resumed. That’s what makes behaviour around a recent outage by one of the top IT and cloud service vendors so hard to fathom.
Ted Julian describes five steps that will help ensure that your incident response plans work when they are required.
Even in the most carefully thought out incident response (IR) plans, there is room for continual improvement. Anyone who has put a response plan into action knows there is a gulf between the theoretical plan and what actually happens given all the variables and complexities that inevitably occur. Because of this, plans often break down; particularly if they haven't been stress-tested based on different real world scenarios.
Whilst not everything will go according to schedule, a thoroughly tested and validated plan will minimise the impact of an incident which, in turn, leads to faster business recovery times. Indeed, no plan is complete until it has been tested with fire drills and functional exercises that assess its effectiveness and identify potential gaps.
Here we outline some practical steps to improving your incident response plan:
In situations where the fastest possible access to data is required – trading floors, for example – CIOs have traditionally turned to flash-based storage systems. No one disputes the performance advantages of flash over traditional disk or tape storage methods, but cost has always been a barrier to a wider adoption. Today, however, the flash technology that once made sense only when extreme high performance was required is now priced to attract the attention of CIOs from a wide range of mid-sized to large companies. To help CIOs determine if flash might be the right solution for their companies, Logicalis US has outlined six key reasons flash storage makes sense for fast access to mission-critical data in mainstream applications:
1. Boosting performance: purpose-built flash storage systems can deliver performance boosts in application response times, accelerated access to information, and increased power efficiency when compared to conventional spinning disks. And, because flash storage is powerful enough to support an organization’s most demanding virtualized cloud environments, along with online transaction processing (OLTP), client virtualization, and business analytic applications, it is garnering attention from performance-hungry CIOs looking for new ways to speed access to business information.
Over the last 12 months, global fatalities from acts of terrorism have risen 30% compared to the previous five year average, according to a new security monitoring service from global risk analytics company Maplecroft, which also identifies China, Egypt, Kenya and Libya as seeing the most significant increases in the risk of terrorist attacks.
The Maplecroft Terrorism and Security Dashboard (MTSD) recorded 18,668 fatalities in the 12 months prior to 1 July, up 29.3% from an annual average of 14,433 for the previous five years. Over the same period the MTSD recorded 9,471 attacks at an average of 26 a day, down from a five year average of 10,468, revealing that terrorist methods have become increasingly deadly over the last year.
The MTSD classifies 12 countries as ‘extreme risk,’ many of which are blighted by high levels of instability and weak governance. These include: Iraq (most at risk), Afghanistan (2nd), Pakistan (3rd), Somalia (4th), Yemen (6th), Syria (7th), Lebanon (9th) and Libya (10th). However, of particular concern for investors, the important growth economies of Nigeria (5th), the Philippines (8th), Colombia (11th) and Kenya (12th) also feature in the category.
Pioneering technology services company, telent Technology Services Ltd, has increased its IT security capability by acquiring a 25% stake in CNS Group, the London-based information assurance and cyber security specialists.
IT Security is an increasingly critical component of services provided across the telent portfolio of service solutions, including Blue Light, Rail, Business and Traffic.
CNS will continue to be run and managed as a separate entity but the two organisations will work closely together.
"This deal is strategically beneficial to both telent and CNS, and enables us to build solutions bringing together telent's scale and ability to deliver end-to-end ICT solutions with CNS's specialist IT security and information assurance capabilities. In addition, this also provides new opportunities for both parties across our combined customer markets, some of which have already been identified and are being jointly developed together," said Chris Metcalfe, Managing Director of telent Technology Solutions.
CNS was established in 1999 and its customers range from FTSE 100 and larger public sector organisations to the SME sector.
CEO of CNS Group, Kevin Dowd, commented: "We are an ambitious firm and we're keen to put this strategic investment to good use, enhancing our customer offering, growing CNS and taking the company to the next level. We'll be looking at better ways of delivering our services, investing in our delivery platform and developing more offerings to sit alongside our existing proprietary technology."
Dowd continued: "Our association with telent will also mean that we can target bigger deals and we're aiming to improve our market share in this sector."
For more information, please visit: www.telent.com.
Company surpasses $60M in run-rate revenue and 2,700 customers
HOUSTON – Alert Logic (www.alertlogic.com), the leading provider of Security-as-a-Service solutions for the cloud, today announced GAAP revenues for the quarter ending June 30, 2014 of $13.8 million, up 36 percent from the second quarter of 2013. Alert Logic’s annualized revenue under contract in the month of June 2014 exceeded $60 million, and is tracking ahead of the company’s plan to reach a $70 million run-rate by the end of 2014. Alert Logic currently has more than 2,700 customers using its Security-as-a-Service solutions to protect their networks and data across cloud, hosted and on-premises environments.
“At the outset of 2014, we felt we had the opportunity to build our business to $60 million in revenue by mid-year, and break through $70 million by year-end,” said Gray Hall, Alert Logic’s CEO. “Our ongoing progress is a testament to strong customer demand for modern security tools and services designed from the ground up to protect cloud-based applications.”
Alert Logic’s notable highlights for Q2 2014 include:
· Product Updates: Alert Logic released new security solutions for the Microsoft Azure platform, making Alert Logic Threat Manager and Alert Logic Web Security Manager available on the Microsoft Azure cloud platform.
· Recognition: Alert Logic was recognized for its innovative approach to cloud security by receiving a Silver Award in the Cloud Security category as part of Network Products Guide’s 9th Annual 2014 Hot Companies and Best Products Awards. Additionally, TMCnet recognized Alert Logic Threat Manager with ActiveWatch as part of its 2014 Cloud Computing Excellence Awards.
· International Expansion: Alert Logic announced its international expansion into EMEA, which will include a UK-based datacenter and Security Operations Center, as well as expanded sales, marketing and support teams. The EMEA presence will address the growing demand for security and compliance solutions from European customers by providing local support for the needs of those businesses and industries.
A privately held company, Alert Logic publicly reports its Generally Accepted Accounting Principles (GAAP) revenue results and growth rates quarterly, in addition to its annualized recurring revenue under contract. Alert Logic’s financial statements have been audited in accordance with GAAP since 2005. All Alert Logic revenue is derived through long-term subscription contracts, consistent with the company’s Security-as-a-Service business model. Alert Logic’s solutions are sold directly to enterprise customers and through a diversified channel of resellers and cloud service provider partners.
Alert Logic specializes in providing a portfolio of Security-as-a-Service solutions for customers of hosting and cloud service providers. More than half of the largest managed hosting and cloud service providers use Alert Logic to secure their customer environments, making Alert Logic the de facto standard for securing infrastructure in hosted and cloud environments. Alert Logic’s Security-as-a-Service solutions provide customers four distinct advantages: market-leading security tools, a fully outsourced and managed Security-as-a-Service delivery model, integrated 24×7 Security Operations Center (SOC) services to monitor and provide expert guidance, and the ability to deploy wherever a customer has IT infrastructure, including the cloud.
Additional Resources Available:
@alertlogic on Twitter
About Alert Logic
Alert Logic provides security and compliance for cloud, hybrid, and on-premises infrastructure, allowing customers to benefit from deep security insight and continuous protection at a lower cost than legacy security offerings. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure is deployed. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 2,700 organizations worldwide. Built for cloud scale, our patented platform manages Petabytes of data, analyzes 255 million security events monthly, and identifies 40,000 incidents a month that are managed by our security operations team. Alert Logic is based in Houston, Texas, and was founded in 2002. Alert Logic recently expanded internationally by establishing UK offices in London and Cardiff. For more information, please visit www.alertlogic.com.