Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Druva inSync Free Trial
Druva inSync with DLP,
analytics & secure file sharing.

druva.com/inSync-Trial
Disaster Recovery
Is your endpoint data protected?
Average Rating:
Rate this article:  
Tech Tips for East Coasters Dealing with Sandy

Tech Tips for East Coasters Dealing with Sandy
By Barry Levine

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Wireless carriers are asking East Coast customers during Sandy to limit non-emergency voice calls and use text messages instead, which will limit battery use and help ease up network congestion, giving needed bandwidth to emergency communications. Be aware that cell service can still be up, but either overloaded or diminished by heavy rain from Sandy.
 

Related Topics

Sandy
Disaster Recovery
Apps



For East Coasters, weathering Sandy the Monster Storm involves more than just stocking up on water, food that doesn't need cooking, and flashlights. There are also tech things you can do to keep yourself and your data safe.

There are the basic ones, of course. Charge all your mobile devices -- phones, tablets, laptops. Hopefully, you regularly back up your data, including backup to an off-site location such as the cloud.

To conserve battery power, lower screen brightness on any device. Some devices offer voice-oriented accessibility features that allow you to interact even if the screen is dimmed to the lowest possible level. Airplane mode on any device also minimizes battery use, and you can turn off any unneeded automated or background apps or notifications.

Text, Unless Emergency

Wireless carriers are asking customers to limit non-emergency voice calls and use text messages instead, which will limit battery use and help ease up network congestions, giving needed bandwidth to emergency communications. Be aware that cell service can still be up, but either overloaded or diminished by heavy rain. If you can't complete a cell phone call, the carriers recommend waiting 10 seconds before redialing, in order to help alleviate network congestion.

Carriers are also advising that people keep phones and all accessories, such as batteries or chargers, in sealed bags to prevent water damage. Add emergency numbers to all phones, and, if you're being evacuated, forward calls to your cell phone. Use your phone's camera to record any valuables for possible insurance use later.

Your cell phone can become a Twitter hub so you can post tweets and monitor others', by texting START to 40404. A text message will be returned, to which you can reply "yes" with your user name, minus the @ symbol. After that, you'll be prompted for your password, and you'll be able to post by sending texts.

Emergency Apps

For users who don't have a Twitter account, one can quickly be set up via your phone by texting START to 40404, and responding with your full name when you're prompted. This will establish a mobile account, after which tweets can be sent by texting to 40404. You can also sign up for text alerts from your state emergency management center and local utility companies.

There are a variety of free or inexpensive apps that can make your smartphone or tablet even more useful, which are available in either Apple's App Store, Google's Android Play store, or both.

The Weather Channel's app, for instance, offers customizable weather maps, detailed forecasts and alerts. The Federal Emergency Management Agency has an app that includes disaster preparedness information, such as a checklist for an emergency kit and tips on how to take cover if needed. You can also get the same preparedness info by texting PREPARE to 43362.

The American Red Cross has a hurricane-specific app, which includes information on open shelters and a "I'm safe" alert you can send to Facebook, Twitter and e-mail to notify family and friends.
 

Tell Us What You Think
Comment:

Name:



AdvertisementToday's CIO needs to adopt an "Everyone's IT" approach to leadership, embracing technology to increase enterprise agility & collaboration. View the free Gartner research report to learn how to adapt your IT leadership style to today's business standards.


 Disaster Recovery
1.   Microsoft Buys InMage Recovery Tech
2.   AWS' First 'City on Cloud' Awards
3.   Druva Debuts eDiscovery Solution
4.   Are Your Enterprise Assets at Risk?
5.   IBM Adds Disaster Recovery to SoftLayer


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study shows that a weakness in the Android mobile operating system can be used to steal sensitive, personal info from unwitting users. Gmail proved to be the easiest app to attack; Amazon, the hardest.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
With businesses wanting computing solutions that do more for less money, Lenovo has unveiled three new desktop PCs that it says offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Bounty Offered to Coders for Oculus Rift Bugs
Coders who find bugs in software for the Oculus Rift VR immersive headset could receive a reward of at least $500 under Facebook's White Hat bounty program. Facebook acquired Oculus in March.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.