The Pipeline

Word up; Without a trace

Word up
During an emergency such as a natural disaster or terrorist attack, it’s essential to quickly disseminate information to authorities and first responders. Emergency notification service providers fill this role by sending messages to the appropriate parties’ cellular phones, pagers, handheld devices or satellite phones.

Many providers send alerts only via e-mail messages, which can be problematic if the system experiences glitches or delays — as any e-mail user knows can happen often. Providers that use only e-mail messages cannot offer receipt confirmation or priority message delivery.

Send Word Now, an emergency notification service provider, recently announced premium global Short Message Service capabilities that provide a reliable new method of communication to supplement the company’s e-mail capabilities.

“We’ve been dependent on e-mail, but that’s not as reliable as SMS,” said Michael Sher, the company’s co-founder and executive vice president.

Sher explained that SMS messages go directly to the carrier instead of through a server, and that makes them less prone to failure.

“We can get a message to any cell phone that has a signal anywhere in the world,” he said. “It’s a much more reliable and efficient way to get a message to the phone.”

During a crisis, phone lines can get clogged because too many people are trying to use them at once. SMS is not subject to those bottlenecks. In addition, SMS uses less bandwidth than voice calls.

Without a trace
Tracking the location of a lost or stolen computer is no longer enough. Thieves have plenty of time to access and copy valuable data before authorities can apprehend them, even if they are able to pinpoint the computer’s location fairly quickly.

The new Computrace Data Protection service from Absolute Software helps remedy this problem by remotely deleting data. The service can delete files, folders and an entire operating system. Here’s how it works: When users discover a loss or theft, they contact Absolute Software’s monitoring center to report it. Then they specify what they would like deleted by choosing individual files or directories, all of the data on the machine, or the operating system.

An important aspect of the deletion process is that it takes place silently to prevent detection. For added protection, the Computrace agent can survive accidental or deliberate attempts to remove or disable it.

When Computrace finishes deleting the data, it records an audit log detailing the process. The log becomes part of the customer’s account and can aid with policy and regulatory compliance.

Computrace Data Protection is priced based on volume and service terms. A three-year subscription costs $79.95. Customers can buy the service through Gateway, Hewlett-Packard or directly from Absolute.

Rising Stars

Meet 21 early-career leaders who are doing great things in federal IT.


  • SEC Chairman Jay Clayton

    SEC owns up to 2016 breach

    A key database of financial information was breached in 2016, possibly in support of insider trading, said the Securities and Exchange Commission.

  • Image from

    DOD looks to get aggressive about cloud adoption

    Defense leaders and Congress are looking to encourage more aggressive cloud policies and prod reluctant agencies to embrace experimentation and risk-taking.

  • Shutterstock / Pictofigo

    The next big thing in IT procurement

    Steve Kelman talks to the agencies that have embraced tech demos in their acquisition efforts -- and urges others in government to give it a try.

  • broken lock

    DHS bans Kaspersky from federal systems

    The Department of Homeland Security banned the Russian cybersecurity company Kaspersky Lab’s products from federal agencies in a new binding operational directive.

  • man planning layoffs

    USDA looks to cut CIOs as part of reorg

    The Department of Agriculture is looking to cut down on the number of agency CIOs in the name of efficiency and better communication across mission areas.

  • What's next for agency cyber efforts?

    Ninety days after the Trump administration's executive order, FCW sat down with agency cyber leaders to discuss what’s changing.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group