New Fiber Build at 200 Prospect Ave. in Cleveland Improves Interconnection, Reliability and Security for vXchnge and Fibertech Customers like CMS
CLEVELAND, Ohio – vXchnge, a leading, next-generation, software-defined, intelligent data center services company operating data centers in multiple markets across the U.S., announces today that Fibertech Networks , a premier fiber optic network service provider, has completed its fiber build at vXchnge’s Cleveland data center at 200 Prospect Avenue. The new fiber build provides improved performance, interconnection, reliability and security for vXchnge and Fibertech customers alike.
Catastrophe Management Solutions, Inc. (CMS), a customer of vXchnge, is an independent insurance adjusting firm. CMS required a more reliable and secure connection that would better support its network needs. Fibertech is able to service CMS through vXchnge’s neutral marketplace.
“Companies such as CMS are looking for high performance fiber connectivity between facilities and to back-up their business-critical applications,” states Mike Hurley, VP of Sales & Marketing for Fibertech Networks. “We are excited to expand our metro-area fiber network footprint into one of vXchnge’s top-tier data centers, and to provide Cleveland-area businesses, like CMS, with access to our high-speed optical solutions. Additionally, our clients benefit as well; for example, by connecting with vXchnge’s high performance infrastructure platform, our Fibertech customers can easily expedite their cloud service deployments.”
“As Fibertech continues to expand its services throughout growth metro areas like Cleveland, our customers have more connectivity choices,” states Ernest Sampera, CMO and Senior Vice President at vXchnge. “With our design for performance approach, we are providing carriers and service providers a platform of infrastructure services that complement high capacity network services that will support the increasing application demands for our customers. vXchnge is future proofing our customers’ needs of today and tomorrow. vXchnge provides a neutral marketplace and high performance infrastructure platform to best support growth, therefore enabling companies like CMS to focus on their core offerings. This is the value of having a neutral, all-encompassing marketplace.”
Located within Cleveland’s top carrier hotel in the heart of downtown, vXchnge’s Cleveland Data Center offers a platform where companies in financial services, healthcare, IT, and media can interconnect and serve the Cleveland Market. Sixty percent of all U.S. Fortune 500 headquarters are within 500 miles of Cleveland. The vXchnge Cleveland Data Center is strategically positioned and designed to provide increased security and enhanced redundancy to vXchnge’s regional network of New York-area data centers.
To learn more about vXchnge, visit www.vxchnge.com. For more information on its Cleveland data center facility, visit http://www.vxchnge.com/data-centers/locations/cleveland-oh/.
vXchnge operates leading, next-generation, software-defined, intelligent data centers. Designed for Performance®, vXchnge delivers high-density infrastructures and choice of carriers. Our data centers incorporate the latest technologies and monitoring systems. A performance-driven infrastructure provider, vXchnge’s facilities offer infrastructure designs, densities and networks that are operated by industry-leading technical teams required to support today’s network-enabled businesses.
Peak’s White-Label Cloud Helps Service Providers Deliver On-Demand Resources to End-Users and Move at the Speed of Business
DENVER, Colo. – Peak® (formerly PeakColo), an enterprise-class IaaS Cloud provider for channel partners, announces Komodo Cloud LLC powers its managed service and cloud offerings with Peak’s white-label cloud. Komodo Cloud, similar to other Peak resellers, distributors and VARs, chooses Peak to help them deliver enterprise class cloud services to their end-users atop Peak’s platform.
Komodo Cloud offers professional services, IT consulting and lifecycle solutions designed to help businesses become more agile. By utilizing Peak’s cloud as the foundation for its applications and managed services, Komodo effectively helps their customers realize the value they seek.
“Komodo identifies the best tools and forges the most optimal partnerships so we can be extremely flexible and deliver what customers want,” states Eric Hughes, CEO for Komodo Cloud. “That’s why Peak is a perfect partner for us – their approach is radically different from their competitors. With their expertise and patented private Layer 2 direct connectivity, we can move our clients to the cloud extremely fast. There is a transformation going on in the marketplace and using cloud, powered by Peak, allows us to adapt and move at the speed of business.”
“We were first introduced to Komodo through one of our large distributors, Arrow Electronics,” states Dave Woodward, Senior Vice President of Sales for Peak. “Peak’s 100% channel-centric model means we do whatever it takes to help every Peak partner succeed in the cloud business. Every partner receives comprehensive sales training, dedicated sales support, lead generation resources, and an array of marketing tools - positioning them for success.”
“Peak is at the forefront of driving business and making things happen using not only technology but a very unique operations model,” comments John Austin, Cloud Services Practice Manager at Arrow. “Peak’s 100% channel model allows our resellers to deliver competitive cloud infrastructure designed to support enterprise IT customer needs.”
Peak’s cloud nodes are located in Atlanta, Chicago, Denver, London, New York, New Jersey, Santa Clara, and Seattle and support hybrid, production, and disaster recovery environments. Peak offers three levels of partner programs: white label, reseller, and agent to meet the needs of a diversified reseller community.
Peak® is an enterprise-class Infrastructure-as-a-Service (IaaS) cloud service provider to channel partners. White-labeling Peak’s cloud services as their own, resellers and agents rapidly enter the cloud marketplace under their own brand without capital expenditure, enjoying a faster route to profitability. Peak operates Type II SSAE 16 and SOC 1 & 2 compliant cloud nodes in eight geographies across the United States and in Europe (Silicon Valley, Seattle, Denver, Chicago, New Jersey, New York, Atlanta, and the United Kingdom). Its VMware vCloud® Powered cloud environment contains tens of thousands of virtual machines and multiple petabytes of storage for public, private, hybrid and disaster recovery solutions. Peak offers both Cisco UCS and Open Compute platforms, and is a Platinum-level NetApp Service Provider. For more information, visit www.poweredbypeak.com call (855) 532-4734; or follow us on Twitter or LinkedIn.
About KOMODO CLOUD
Komodo Cloud, LLC is a provider of IT transition and transformation services. Born in the cloud, Komodo enables its enterprise clients to set up cloud assets, provides subscription-based compute and storage services, and provides IT business processing and subscription-based software solutions. The Company is headquartered in Rolling Hills Estates, CA with satellite offices in Chicago and San Jose. For more information, visit www.komodocloud.com call 310.626.0463, or email email@example.com
1st Touch (www.1sttouch.com) the UK’s leading developer of mobile systems for the social housing and local authority sectors has launched a tenant self-service app. The app, which can be fully integrated in real-time with all leading Housing Management Systems, enables a social housing organisation’s tenants to submit requests online for a wide range of services. These can range from repairs and maintenance or estate management concerns through to arranging visits from housing officers or conducting rent account queries. The system greatly reduces the pressure on the social housing organisation’s call centre staff, whilst significantly enhancing positive client engagement with tenants.
When residents are using the app to report a repair for example, the app will raise a request and ask the resident to choose an appointment from 3 or 4 available time slots. Once selected, the app will then auto-schedule the repair and send it to the maintenance operative’s mobile device when they are due to attend. Should a tenant need to report an issue like graffiti, the app will raise the request with the appropriate operative or contractor and inform the tenant when the graffiti is due to be removed. It will also inform them when the job has been completed. All the requests and actions generated through the app are automatically fed through to the social housing provider’s back-office housing management system.
The app, which integrates seamlessly with all existing 1st Touch systems, also represents significant value for money. 1st Touch research estimates that typically on average, each call to a social housing organisation’s call centre costs somewhere between £5 and £6 and that each personal visit costs around £14. As many of the issues handled by these call centres can be dealt with online, the potential savings from the self-service tenant app are huge.
Commenting on the new system, Robert Dent CEO of 1st Touch noted, “We are constantly exploring ways in which we can help social housing organisations to enhance their customer service. Our new tenant self-service app is just such a development. By allowing tenants to sort out issues themselves 24/7 online and at their own convenience, it provides a better customer experience for them whilst reducing the service delivery costs for their social housing provider. As customer service and value for money considerations are of paramount importance to social housing organisations, we expect demand to be strong.”
COUNTER TERROR EXPO 2014, 29-30 APRIL 2014 AT OLYMPIA, LONDON
From government facilities, military bases and critical national infrastructure to the offices of global corporations and safe city projects, there is a critical need to look beyond single, stand-alone security solutions to an integrated approach that ‘joins the dots’ from all the available intelligence and data.
In response to this need, Counter Terror Expo 2014 will be featuring an Integrated Security in Action area which this year is being sponsored by Synectics, a leading name in the design and delivery of integrated surveillance solutions. As Karen Churchill, Sales Manager for Synectic Systems commented: “Counter Terror Expo attracts such a broad range of experts showcasing the latest innovations. It’s a melting pot for ideas and developments that are geared towards tackling threats impacting now and those predicted in the future”.
Synectics will be demonstrating the latest evolution of its field-proven command and control platform, Synergy 3. An open security software platform that mitigates risk and improves operational efficiency, Synergy 3 reflects the company’s continued commitment to customisable ‘hardware-agnostic’ security management systems that intelligently integrate with third-party products. In addition, Synectics will be exhibiting its range of IP and industrial-grade COEX cameras.
Also exhibiting will be ASSA ABLOY Security Solutions and ASSA ABLOY Security Doors. Tina Hughan, Head of Marketing for ASSA ABLOY, commented: “As the global leader in door opening solutions, ASSA ABLOY has a history of specification work on large and complex projects across commercial, public and industrial projects. The Counter Terror Expo provides the ideal platform to showcase our capacity to protect against manual attacks, as well as providing bullet, blast and fire resistance. The event also provides a perfect opportunity for our specification team to meet it’s customers, potential buyers and decision makers in the industry.”
In addition to a wide range of locks and doors, ASSA ABLOY will be displaying its innovative CLIQ™ Remote solution designed for organisations with a geographical spread of operations, including remote sites. Enabling the commissioning, programming and full administration of security management centrally via web-based software, the system can eliminate the need to service and monitor locks on site.
For Martin Lomberg, General Manager – Europe, Southwest Microwave, Counter Terror Expo “is clearly focused at professional bodies with a genuine interest in securing critical national infrastructure with the appropriate technologies and intrusion detection systems”. Southwest Microwave will be showcasing its latest IP Network intrusion detection modules and system interface capabilities, encompassing fence, covert buried cable and digital microwave technologies.
There will be live systems on display as well as a team of experts to provide demonstrations and answer specific project or system questions.
David Thompson, Event Manager, Clarion Defence & Security, commented: “The Integrated Security in Action area will feature all of the latest CCTV, access point, perimeter protection and control room security technologies as well as providing an interactive, educational showcase for integrated security platforms in action”.
To register for either a free Exhibition Only Pass or a full Conference Delegate Pass, visit: www.counterterrorexpo.com/register
The MSc Organisational Resilience (OR) at Buckinghamshire New University is loading up with students very rapidly. The MSc OR is designed to meet the requirements of business, public and private sectors globally and the professionals who are either currently employed in its disciplines or who seek to develop advanced capability. Our approach has been to design and deliver an accessible postgraduate programme that reflects sector currency and assists in the drive towards further professionalism and research capabilities. This, we believe, is crucial to developing fluency what is becoming recognised as a coherent, rather than distinct and completely separable, group of linked subjects. In this programme; the development of mastery in understanding of these links, in their applicability to organisations and business, and the high-level knowledge, confidence and capability necessary to be fully effective as an OR professional are considered to be essential and explicit educational outcomes.
To support and as an adjunct to these requirements, the MSc OR is also designed to meet the needs of students who are, or who aspire to be, employed as managers and as sector influencers in the wide subject area of OR. There are many currently working in the sector that have long-term experience and are seeking validation and evidence of this through the achievement of postgraduate qualification. In particular, applied postgraduate programmes and awards are considered to be the most desirable and required awards by companies and employers. Industry also requires, because of the growing inter-relationship and blurred boundaries between the various elements, and the constant development of new risks and the need to mitigate them; the development of organisational and individual capability and knowledge across a range of contributing areas. Therefore, this programme is designed to educate those with a specialist interest in the following areas and sub-disciplines:
CIO — It's hard to resist the sparkly nirvana that big data, leveraged appropriately, promises to those who choose to embrace it. You can transform your business, become more relevant to your customers, increase your profits and target efficiencies in your market all by simply taking a look at the data you probably already have in your possession but have been ignoring due to a lack of qualified talent to glean value from it.
Enter the data scientist — arguably one of the hottest jobs on the market. The perfect candidate is a numbers whiz and savant at office politics who plays statistical computing languages like a skilled pianist. But it can be hard to translate that ideal into an actionable job description and screening criteria.
This article explains several virtues to look for when identifying suitable candidates for an open data scientist position on your team. It also notes some market dynamics when it comes to establishing compensation packages for data scientists.
Computerworld — The IT response to Heartbleed is almost as scary as the hole itself. Patching it, installing new certificates and then changing all passwords is fine as far as it goes, but a critical follow-up step is missing. We have to fundamentally rethink how the security of mission-critical software is handled.
Viewed properly, Heartbleed is a gift to IT: an urgent wake-up call to fundamental problems with how Internet security is addressed. If the call is heeded, we could see major improvements. If the flaw is just patched and then ignored, we're doomed. (I think we've all been doomed for years, but now I have more proof.)
Let's start with how Heartbleed happened. It was apparently created accidentally two years ago by German software developer Robin Seggelmann. In an interview with the Sydney Morning Herald, Seggelmann said, "I was working on improving OpenSSL and submitted numerous bug fixes and added new features. In one of the new features, unfortunately, I missed validating a variable containing a length."
So what will you choose: public cloud, private cloud – or perhaps a solution in between? The flexibility and scalability of the cloud have also made it well suited to partial use, namely the hybrid cloud solution. Those who can’t quite make up their mind can have as much or as little of the cloud as suits them. However, it’s better still to approach this resource with a clear IT strategy in mind and to make a hybrid cloud solution a deliberate choice, rather than a vague default. Here are two possibilities that could drive a hybrid cloud decision.
IDG News Service (San Francisco Bureau) — Canada's tax authority and a popular British parenting website both lost user data after attackers exploited the Heartbleed SSL vulnerability, they said Monday.
The admissions are thought to be the first from websites that confirm data loss as a result of Heartbleed, which was first publicized last Tuesday. The flaw existed in Open SSL, a cryptographic library used by thousands of websites to enableA encryption, and was quickly labeled one of the most serious security vulnerabilities in years.
The Canada Revenue Agency (CRA) blocked public access to its online services last Tuesday in reaction to the announcement, but that wasn't fast enough to stop attackers from stealing information, it said on its website.
IDG News Service (Washington, D.C., Bureau) — More U.S. Internet users report they have been victims of data breach, while 80 percent want additional restrictions against sharing of online data, according to two surveys released Monday.
While nearly half of all U.S. Internet users avoid at least one type of online service because of privacy concerns, according to a survey by marketing research firm GfK, 18 percent reported as of January that important personal information was stolen from them online, a poll from the Pew Research Center's Internet and American Life Project found. That's an increase from 11 percent last July.
"As online Americans have become ever more engaged with online life, their concerns about the amount of personal information available about them online have shifted as well," Mary Madden, a senior researcher at Pew, wrote in a blog post. "When we look at how broad measures of concern among adults have changed over the past five years, we find that internet users have become more worried about the amount of personal information available about them online."