SCE Charge Ready Transport

Looking for a proven way to keep your fleet running at maximum efficiency while reducing your cost of ownership? Go electric. By making the move to an electric fleet you’ll realize a world of real sustainable benefits for your fleet operations and the environment, while driving the kind of change that puts you miles ahead. Southern California Edison’s Charge Ready Transport program provides the guidance and resources you need to accelerate and simplify your transition to an electric fleet. Right now, SCE will pay a significant porCon of what’s needed to bring power from the pole to the charging staCon and we will provide substanCal construcCon and logisCcal support, including site design and permiKng. Plus, depending on your location and vehicle types, you may qualify for additional rebates on your EV charging stations. Bottom line, your upfront infrastructure costs could be reduced significantly, and you could see ongoing fuel cost savings over equivalent gas and diesel alternatives. To get started, go to and fill out an interest form. You’ll be connected to one of our EV fleet support team members who will guide you through the many consideraCons of electrifying your fleet such as finding the right vehicles and financial incenCves to lower the total cost of ownership. Then when the time is right, we’ll conduct a site visit to develop preliminary designs and cost estimates. We’ll also finalize designs, obtain permits, and build out the infrastructure to meet your specific needs. That’s it. Your system is now fully operaConal, and you’re […]

Cequence API Sentinel

Driven by mobile device ubiquity and the move towards modular applications, organizations are using APIs to enable application business logic, and facilitate integration efforts while accelerating innovation and simplifying development. However, APIs are a double-edged sword. On one hand, APIs accelerate innovation. On the other hand, they are an increasingly targeted attack vector for a number of reasons. Errors are made in API coding, QA tests missed, specifications not followed, shadow APIs are deployed - all of which can introduce security gaps that that lead to fraud or data loss. To ensure your APIs and the transactions they enable are protected, you need to first confirm you have complete visibility into all your APIs. Next, you need to prevent and correct API coding errors that may inadvertently expose too much data and finally, you need inline threat prevention to stop attacks in their tracks. Unfortunately, when evaluating how to protect their APIs, organizations are faced with a fragmented mix of silo-based security offerings that provide partial solutions for detecting APIs and protecting them from conformance errors.   API Sentinel from Cequence Security provides enterprises with the only API security solution that delivers continuous discovery, monitoring and inline protection of all APIs, including shadow APIs, across on-premises and cloud deployments. Discovered APIs are assessed to ensure API specification conformance and are continually analyzed to prevent threats hiding in plain sight. With API Sentinel, enterprises gain runtime insights that can be used to efficiently prioritize per-API level fixes to mitigate security risks [...]

Zingbox Explainer

Every day, your company’s IT department, facilities or operational team, or business units bring different types of IoT devices into the enterprise. Is any team managing or securing them? If your answer is NO, you are not alone. Factories, offices, hospitals, and cities worldwide face the same challenges. The unpleasant fact is, more than half of enterprise assets are not managed today.  That leads to under-utilization, over-spending, and a network that is vulnerable to cyberattacks. Not to mention “Compliance Anxiety”. IoT is about innovation and transformation, but concerns like these get in the way. An unmanaged IoT asset becomes a liability. Under-utilization leads to poor capital planning and low ROI. Cyber-attacks can cost millions in dollars and trust. And untapped IoT data is a missed opportunity. It’s time to Take Command of all your IoT assets.   Introducing Zingbox IoT Command Center, the industry’s only IoT lifecycle management solution. The MOST comprehensive way to orchestrate and automate  the IoT lifecycle, With PATENTED Artificial Intelligence algorithms applied to Petabytes of data every day. And the BEST way to extend IT best practices to IoT, for better integration and higher quality. Whether it’s Device Discovery, Onboarding, Security, Business optimization, Ongoing management, or even Upgrades and Retirement Zingbox IoT Command Center delivers. All in a cloud-based solution that is non-intrusive, agentless, and out-of-band. Join thousands of customer deployments in choosing Zingbox IoT Command Center To  provide Trust in your devices, their services, and their business impact. Welcome to Zingbox IoT Command Center –the Internet of Trusted, Managed, and Optimized Things.

Who The Hell Am I?

An Ancestry Show With A Funny Pedigree   “Who The Hell Am I?” is a straight-up parody of the enormously popular ancestry-type shows, like “Who Do You Think You Are?” In place of celebrities seeking to unlock the mysteries of their ancestors, our show features actors portraying complete unknowns seeking to unlock the mysteries of their ancestors.     We envision our version as both a comedy and a mystery. Each subject’s story will unfold in four episodes. And each will have a cliffhanger moment to hook the audience in and entice them to return. Pilot Episode DescriptionFailed actor and writer Jimmy Marcus discovers that the father he never knew—Marv Tollman—was a renowned self-help guru in the 1970s. A documentary explains that Marv was a failed actor and writer who eventually found success as the writer of the self-help book, “The Failure Fallacy.” From there, he moved to Hollywood where he thrived as the “self-help guru to the stars.” But at the height of his success, Marv disappeared. There was no shortage of rumors about what happened to him and Jimmy is determined to get to the truth. Interviews with Marv’s brother and an ex-girlfriend turn up several clues that set the story in motion.   Episode Two DescriptionArmed with the knowledge that Marv moved to Italy with his Italian girlfriend after flaming out as an actor in Hollywood, Jimmy travels to Rome. There he meets his half-sister who explains how Marv ended up doing odd jobs for his girlfriend’s [...]

Zettaset Explainer

When it comes to protecting yourself and your family, you take many precautions. You lock your house. You lock up the valuables in your house. You put a lock on everyone’s phone to block access. You do the same for everyone’s personal data. Yet when it comes to your business data, the door is wide open, and the house is now an ever-expanding mansion. Consider how rapidly the mansion is growing. 90% of the world’s data was created in the past 2 years. The amount of that data was 1 zettabyte in 2013. Currently, it’s 16 zettabytes, and forecasted to be 175 zettabytes in 2025-That’s 2.8 quadrillion gigabytes. This wealth of data is providing valuable insights across all facets of people and businesses. This can be seen by the rise of data-driven companies. So much so that the top 5 data companies have a market cap of over $4 trillion. Which has made data the most valuable commodity and the most desired target for theft globally.   None of this should be surprising. That’s because in 95% of all breaches, the data was unencrypted. So, what exactly is preventing you from protecting your business data.   Zettaset can help you conquer those concerns. Our software-defined encryption solution encrypts data from bare metal through containers, from the edge to the cloud and in all virtual and physical environments. It begins with a cryptographic algorithm approved by the National Institute of Standards and Technology and continues with granular policy management, extensive key administration […]

Friends of Haiti Documentary

Doing Good Feels Good! NetApp, like many corporations, affords its employees an opportunity to take paid time off to volunteer their services in a charity of their choosing. It’s a great way to do good and, in turn, feel good about making a difference in the world. Recently, I had the pleasure of working with one of their employees on a very moving video project. Dave Botterill, Account Manager in NetApp’s Calgary office, is the founder of Friends of Haiti - Canada, which delivers everything from laptops and cell phones to soccer uniforms and medicine to the impoverished country. It was a 10-day endeavor that took me from Calgary, where I captured Dave packing up 28 bags of equipment that was donated by generous community members, to Jacmel, Haiti, which was devastated during the 2010 earthquake, leaving nearly 70 percent of the homes damaged, mostly in the poorer neighborhoods.   This is a story that practically tells itself. A caring human being looks to make a difference in the world, to help those less fortunate, and, in the process, is rewarded with a sense of purpose along with newfound relationships that have enhanced his already blessed life. The keyword here is “practically.” Telling a good story is more than just showing up with a camera and hitting the record button. It takes years of experience to know how to put together a narrative that could easily spill over into the maudlin category and keep it focused on its simple message—we all [...]

PG&E EV Fleet

Looking for a proven way to keep your fleet running at max efficiency—while reducing your cost of ownership? Go electric. By making the move to an electric fleet, you’ll realize a world of real, sustainable benefits for your fleet operations and the environment. And drive the kind of change that can put you miles ahead. PG&E’s EV Fleet program is here with the guidance, resources and incentives you need to speed and simplify your transition to an electric fleet. Right now, we’ll pay a significant portion of what’s needed to bring power from the pole to the charger. Along with substantial construction and logistical support. This includes site design and permitting. Plus, depending on your location and vehicle types, you may qualify for additional rebates on your EV charging stations. And with new commercial EV rates, fueling your fleet will become simpler and likely less expensive. Bottom line: your upfront infrastructure costs could be reduced anywhere from 50 to 100%! And you could see ongoing fuel costs savings of 30-50% over equivalent gas and diesel alternatives.   To get started, go to to fill out an Interest form. You’ll be connected to our EV Fleet specialists who will guide you through the many considerations to electrifying your fleet, such as finding the right vehicles and financial incentives to lower the total cost of ownership. Then, when the time is right, we’ll conduct a site visit to develop preliminary designs and cost estimates. Once you’ve decided to participate in the program, […]

Juniper JATP Explainer Video

Every effective enterprise security architecture begins with a strong first line of defense. Firewalls, secure web gateways, intrusion prevention systems – even endpoint security products. They all do a good job preventing most external cyber attacks before they have a chance to start. But what about advanced, unknown threats that can bypass your first line of defense and gain access to your internal network resources and sensitive data? How do you even know if those threats are there?  How can you find threats that have never been seen before? And most important, how can you close this security gap before your business is compromised?   Many organizations rely on a SIEM – a Security Information and Event Management platform – to gain visibility into potentially malicious activity inside the network.  Unfortunately, the events, logs, and alerts generated by a SIEM only provide visibility into symptoms of an advanced threat, rather that detecting the threat itself.  Sifting through the data to identify the underlying root cause can require hours of manual effort. But what if your internal network was protected by a second layer of automated, advanced threat defense? A software fabric distributed across your network, specifically designed to detect the advanced threats that other security devices miss. Introducing the Advanced Threat Prevention solution   from Juniper   Known as JATP, this innovative solution combines an appliance-based detection and analytics engine, along with distributed virtual collectors that ingest web, email, and lateral spread traffic running north, south, east, and west throughout your network.   Working together as an integrated security fabric, theSmartCore analytics engine within the JATP appliance. SmartCore applies advanced, multi-stage detection and analysis technologies to identify advanced, previously unknown threats early in the cyber kill chain – often in as little as 15 seconds.   But its security […]

Marv Tollman: Look Back In Failure.

Contribute Now! Help Support Our Crowdsourcing Film Campaign Made in the style of “Spinal Tap” and “Zelig,” the mockumentary “Marv Tollman: Look Back In Failure” follows the story of a little known 1970s self-help guru whose book, “The Failure Fallacy,” was an enormous hit. The Failure Fallacy A popular PBS special followed along with the undivided attention of Hollywood celebrities who were inexorably drawn to his spot-on failure and success theories. Ironically, he achieved the fame and fortune that eluded him when he came to Tinsel Town a decade earlier as an aspiring actor. However, one year after his meteoric rise, Tollman disappeared. No one knows what happened but there were plenty of rumors surrounding his fairy tale existence. Marv's PBS Special 1982 The most sensational was that he wasn’t a self-help guru at all but rather just playing the role of a lifetime. To uncover the truth, Tollman’s son, Jimmy, who was 10 when his father disappeared, has set out to set the record straight by interviewing everyone and anyone with knowledge of the self-proclaimed “self-help failure guru to the stars.” Marv Tollman Film GalleryWhy are we making “Marv Tollman: Look Back in Failure”?Why are we making “Marv Tollman: Look Back in Failure”? Like all artistic endeavors, it’s a chance to work out issues. And if you’re artistic, you’ve got no shortage of issues. Both Fred and Jeff have had career highs and lows. And both have struggled with the notion of failure and success on and off for [...]

Cequence Explainer

Here’s a shocking fact.   Recent research indicates that malicious bot attacks now account for nearly 1/3 of all traffic on the Internet.  Think about that. A security issue that you might not have paid much attention to in the past, is fast becoming the #1 cyber threat facing every organization doing business in our hyper-connected world. These attacks can be planned and executed quickly using credentials, tools, and infrastructure readily available on the dark web. Financially-motivated attack objectives include fraudulent account takeover, application denial of service, API business logic abuse, and much more. If your organization relies on web, mobile, or API applications to facilitate business processes or engage with customers, you should consider yourself a potential attack target. So, what do you do about it?   Legacy bot defense tools have proven to be either obsolete, complex, ineffective, or all of the above. For example, web application firewalls sit in line and must make quick decisions using outdated signatures to detect outdated threats.  That won’t help much.First-generation bot mitigation tools force you to deal with continuous, time-consuming application modifications that involve JavaScript and mobile SDKs.  Large organizations often have hundreds of applications to support, so this is not a trivial task. Even after all that work, your visibility and protection against bot attacks is still limited. Fortunately, there is a better way.   Cequence Security provides advanced bot defense capabilities you won’t find in legacy products. No signatures, no JavaScript, no SDKs, no black box service, no specialized appliances, none of that nonsense.  Instead, we […]