Continuity Logic’s Frontline Live 5™ is the first leader in Gartner’s Magic Quadrant Business Continuity (BCMP) software category that has effectively converged continuity, risk and compliance in a one easy to use cloud-based solution.

Fall World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Spring Journal

Volume 28, Issue 2

Full Contents Now Available!

Jon Seals

New product release and Eyefreight Mobile expand platform capabilities and deliver unique planning and transportation intelligence for shippers and carriers


Eyefreight (www.eyefreight.com), a leading provider of transportation management systems (TMS), today announced a new product release known as Ceylon incorporating updated functionality for its Software-as-a-Service (SaaS) solution, including enhanced support for transportation planning and reporting, along with the availability of Eyefreight's customisable mobile application, Eyefreight Mobile.


With the Ceylon product release, Eyefreight offers new and improved functionality, including:

  • Increased collaboration on shipment planning - Allows updates to be made to shipments by third parties, decreasing the dependency on the original shipper
  • Quick-start spot carrier functionality - Enables planners to create new shipments without all the required data integrations, allowing shipments to be submitted for new carriers with greater efficiency
  • Real-time GPS integration and map visualisation - Eyefreight can read location data sent from GPS equipment on the Eyefreight mobile app and display shipment locations instantly on a driver's map, allowing the shipper to mitigate delivery risks by knowing carrier locations at key points of the transport
  • Enhanced reporting capabilities with MicroStrategy - Leveraging integrated business intelligence support from MicroStrategy, any end user can now extract data using drag and drop functionality to create and deliver key performance indicator (KPI) management reports with greater ease and efficiency

With Eyefreight Mobile, shippers and carriers receive an up-to-the-minute, 360-degree view of supply chain operations. Regardless of location, all supply chain parties have instant access to TMS data at their fingertips and can exchange information in real time. Eyefreight Mobile empowers users to improve customer service with real-time communication between shipping partners, including the ability to view products in transit, send event alerts and upload images, track packages by GPS, plan routes via Google maps, sign for receipt, and upload proof of delivery.


"The ever-changing global landscape of transportation and logistics can create challenges to effective communications; Eyefreight Ceylon and Eyefreight Mobile directly address these issues by providing advanced visibility, optimisation and collaboration features supported by real-time data," said Ken Fleming, CEO of Eyefreight. "With our nimble product releases, Eyefreight continues to keep clients ahead of the competition with more enhancements to improve performance and reduce costs across the board."


Please visit Eyefreight.com/solutions and Eyefreight.com/Eyefreight-Mobile to learn more about Eyefreight's transportation management solutions.


About Eyefreight
Eyefreight provides a command centre for shippers, reducing net landed cost of goods while improving business margins. An accessible SaaS solution, Eyefreight deploys its transportation management system (TMS) and inventory visibility rapidly and integrates with existing transportation workflows to reduce total cost of distribution by as much as 30 percent, while improving performance. Eyefreight offers the only transportation management system with inventory allocation algorithms and automated decision-making, weighing variables and calculations much faster than competitors that rely on manual human analysis, calculations and scenario planning.

Founded in 2009 by industry veterans dedicated to transforming the logistics function into a true profit centre for any organisation, Eyefreight's clientele spans multiple verticals worldwide. Headquartered in Utrecht, the Netherlands with U.S. headquarters in Evanston, Ill. Eyefreight is backed by De Hoge Dennen Capital and Global Cleantech Capital. Please visit www.eyefreight.com for more information.

New LoadMaster™ Series scales to meet the needs of growing enterprises


KEMP Technologies has announced a new family of high performance Application Delivery Controllers (ADCs), enabling enterprise customers to easily scale up as their business application performance and security needs evolve.


The new LoadMaster 5000 Series targets medium to  large enterprises with high transaction intranet and backend workflow applications, while the  8000 Series scales up to 30Gbps of application throughput and 30,000 SSL Transactions Per Second (TPS), to meet the needs of larger environments, service providers and web scale deployments. Both the 5000 and 8000 Series come standard with multiple 10Gb interfaces and are the only load balancers with native SDN adaptive traffic steering capabilities. This enables the KEMP LoadMaster to seamlessly integrate in software defined networks and provide optimal application quality of experience.


"We've engineered our LMOS - the ADC operating system driving our appliances - to take full advantage of the latest advancements in Intel® Xeon® processors, including increased core count and performance," said Peter Melerud, Chief Marketing Officer for KEMP. "This allowed us to eliminate the use of proprietary FPGAs and reduce the dependency on custom ASICs to deliver ultra-high performance and scale for demanding application environments. These cost savings translate directly into significant reduction in TCA and TCO for our customers that require high performance Layer 7 load balancing, SSL encryption processing, high capacity IPS/IDS and Web Application Firewall (WAF) capabilities, which are all CPU-intensive tasks."

KEMP LoadMaster™ is an advanced Layer 4-7 ADC with web application firewall and SDN functionality.


Flexible deployment options are available on all major hypervisors and cloud platforms, as well as dedicated KEMP appliances and third-party, best-in-class 'bare metal' servers. LoadMaster™ provides enterprise application integration and acceleration services that intelligently accelerates and secure client traffic flows for optimized user experience in virtualized and hybrid cloud architectures.


About KEMP Technologies
KEMP Technologies is a leading provider of load balancer software with over 26,000 deployments for enterprises and organizations that demand highly available, scalable and secure e-commerce, web and collaboration applications. KEMP empowers customers to rapidly scale their operations by delivering applications with Layer 4-7 high availability, optimized performance and secure access -- while offering users platform flexibility across hardware, software, and cloud ADC solutions.

Intel and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries.

Saturday, 16 May 2015 00:00

Risking It

The challenge of planning is significant; anyone who has ever been required to plan anything in detail will know of the problems and issues that even thinking about it planning is difficult and can quite easily spin beyond the controllable. Plans can be effective or useless for various reasons, and the translation of thoughts to realities can be fraught with issues.

In attempting to make informed judgements, the perceived effectiveness of response and protective measures has been traditionally based on a combination of anticipation, information and intelligence assessment and a suitable selection of mitigation measures.  However there is perhaps also an element of chance and luck in detecting and deterring any type of malicious activity and this has served to add to the range of variables which can complicate an attempt to manage risks.   The most thorough risk analysis will not be able to address all variables which will hamper the effectiveness of managerial processes in providing an adequate contribution to pre-emptively managed protective efforts.



Editor’s Note: This is part of a series on the factors changing data analytics and integration. The first post covered cloud infrastructure.

It’s a truism that technology changes quickly and ages fast — and yet, despite massive network and computer evolutions, not much changed for data until Big Data came along.

To be fair, for all practical purposes, Big Data was first seen as a natural extension of the relational database, but with larger amounts of data and faster processing speed. Almost immediately, though, vendors like IBM and research firms like Gartner pushed the definition of Big Data to include other data types — semi-structured and unstructured data, delivered at high speeds, which can mean real time, near-time and streaming or, as I privately call it, all time data.



CHICAGO – May is Building Safety Month, a public awareness campaign to help individuals, families and businesses understand what it takes to create safe and sustainable structures by increasing awareness about how building codes and code officials improve and protect the places where we live, learn, work, worship and play.

“We’re all at some level of disaster risk,” said Andrew Velasquez III, FEMA Region V administrator.  “It is important that we prepare now for the impacts that disasters can have on our homes, our businesses and in our communities.”

The power of natural disasters can be overwhelming. While you can't stop natural disasters from happening, there are steps you can take to increase your home's chance of survival, even in the face of the worst Mother Nature can dish out.

1. Reinforce your Residence. Consider retrofitting options, or steps to improve your home’s protection from natural disasters, including high wind events. One of the most common types of wind damage to a structure is called “uplift”— which occurs when a roof lifts and collapses back down on the house causing costly damage. Fortunately, you can minimize the chances of this happening by installing straps connecting the structural members of your roof to the wall studs or columns.

Other risk reduction ideas include:
a. Use shingles rated for 90+ mph wind and use a minimum of four nails per shingle.
b. Make sure windows and doors are properly shimmed and nailed into the framed opening, tying the window and door frames into the adjacent studs, and 
c. Install a garage door that is designed for higher wind speeds.

FEMA recommends consulting with a certified home inspector to determine if these are viable options for your home. For even more home strengthening options, click here.

2. Fortify Your Home’s Floors. Homeowners can secure their structure to the foundation by using anchors or metal straps. Your builder should ensure there are properly installed anchor bolt connections between the plate and the foundation at least every four feet to ensure maximum fastening to the foundation.

Consult with your local building code official as well as a certified home inspector to determine the best options for you. For more information on wind-resistant home construction techniques, click here.

3. Trim & Tighten. High velocity winds from thunderstorms and tornadoes can turn patio furniture, grills and tree branches into destructive missiles. In addition, if the area immediately surrounding your house contains trees, outbuildings, trash cans, yard debris, or other materials that can be moved by the wind, your house will more likely be damaged during a tornado or windstorm.

All storage sheds and other outbuildings should be securely anchored, either to a permanent foundation or with straps and ground anchors. The straps and ground anchors used for manufactured homes can be used as anchoring systems for outbuildings, such as garden sheds, which are not placed on a permanent foundation. Outdoor furniture and barbecue grills can be secured by bolting them to decks or patios or by attaching them to ground anchors with cables or chains. Trees should also be trimmed so they’re at a safe distance away from your home.
4. Elevation is a Smart Renovation. Flooding is a real risk, and elevating your home and its critical utilities can significantly reduce the risk of water damage. Elevating your home may even reduce your flood insurance premiums. Contact your local floodplain manager to learn the flood risk and elevation requirements for your residence. For more information on elevation techniques to protect your home from flood damage, click here

5. Assure You’re Fully Insured. Take the time to review your insurance coverage. Are you adequately insured for the risks your community faces? Are you covered for wind, flood and sewer backup? Has your policy been updated to reflect the value of your home? For a list of questions to ask your insurance agent, click here. Many homeowners find out too late that their insurance coverage has not increased with the value of their home. Contact your insurance agent to get these questions answered and ensure your home is financially protected.

To learn more about Building Safety Month and how you can protect your home, business and valuables, visit www.iccsafe.org.  For even more readiness information follow FEMA Region V at twitter.com/femaregion5 and facebook.com/fema. Individuals can always find valuable preparedness information at www.Ready.gov or download the free FEMA app, available for Android, Apple or Blackberry devices.

FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.

Follow FEMA online at twitter.com/femaregion5, www.facebook.com/fema, and www.youtube.com/fema.  Also, follow Administrator Craig Fugate's activities at twitter.com/craigatfema. The social media links provided are for reference only. FEMA does not endorse any non-government websites, companies or applications.

The prevailing wisdom holds that cloud architectures will float comfortably on a layer of virtualization that itself will rest on commodity hardware. As long as underlying bulk resources are available in sufficient amounts, all of the fine-tuning and optimization for higher-level applications and services can be done on abstract, software-defined planes.

This isn’t necessarily wrong, but it isn’t the whole truth either – at least according to those who are developing next-generation, cloud-optimized hardware.

For the current crop of hardware vendors to survive much longer, it is hard to see how they can avoid devising cloud-facing product lines. According to IDC, about 30 percent of the IT hardware spend is in support of cloud infrastructure, up more than 14 percent from a year ago. The private cloud alone accounts for some $10 billion in revenue, generating annual growth of about 20 percent, while public infrastructure spending tops $16.5 billion and is growing at 17.5 percent per year.



(TNS) — The ER was already busy, close to full — gunshots, car wrecks, strokes — when the “get ready” call came in at 9:45 p.m.

By 10:30, they began arriving by police car, ambulance, anything.

By midnight, 54 had made it to Temple University Hospital, which treated more passengers from Amtrak’s Tuesday night disaster than any other emergency room.

The most critical patients were rushed into one of the three trauma bays just inside the ER door. Teams of doctors and nurses were assigned to each bay, responsible for stabilizing patients and moving them through with skill and speed, making room for the next.



Most IT organizations provide services to the business in several forms. According to author Terry Critchley, services are comprised of three things:

  • Products
  • Processes
  • People

Each of these things come together to ensure that required business functions are available. But every service has the potential for failure and outages even though today’s world demands that uptime be as close to 100 percent as possible. In this scenario, IT must use all of its technologies to provide this availability, including virtualization, cloud computing, disaster recovery, business continuity and strong security. Still, human factors can prevent services from being available, too.



When drive-by drills, known as lockdown in most of the country, were widely used in response to school shootings with little or no adaptation of tactics, we began down a path that ultimately led to the tragic shooting at Sandy Hook that took 26 innocent lives. There were stops along the way in places called Columbine, Virginia Tech, Aurora and many others. These were all opportunities to learn that our model for response was at great risk from those who would seek to use our plan (or lack of plan) against us.

Plans continued to emphasize single-option lockdown, with location dependency on classrooms for a response. Vague and largely unworkable mentions of reverse evacuations or reverse fire drills back to classrooms for active threats or terrorism inside the building, over facility evacuation, continued to be widely used. The single-option hiding concept became common practice in buildings, though every room was occupied. Shoving people into bathrooms, closets, under desks and into corners became recommended, despite the tragic effects of limiting movement. Being mobile in a crisis equals increasing survivability.



(TNS) — Disaster recovery just from extreme weather and wildfires cost American taxpayers $300 billion in the past decade, the White House's former "resilience" specialist told the general session of the 29th annual Florida Governor's Hurricane Conference.

"That is just what Uncle Sam spent," Josh Sawislak told the conference. He said the figure doesn't count billions in insured and uninsured losses by individuals, businesses and local governments. Nearly half of that was just from 2011 to 2013.

"So when someone tells me, 'We can't afford to pay for resilience,'" Sawislak said, "I immediately ask, 'How can we afford not to?'"