|By Business Wire||
|January 12, 2013 04:16 PM EST||
Hank Asher, visionary, entrepreneur, and philanthropist, died peacefully yesterday in his home at the age of 61. Known as the “father of data fusion,” Hank invented online investigative systems that protect people, search for abducted children, and prevent costly fraud. The world is immeasurably safer because of Hank.
Hank founded three innovative and highly successful companies: Database Technologies, Seisint, and TLO. In addition to revolutionizing how the private sector locates and researches individuals and businesses, his creations are widely used by U.S. law enforcement, intelligence agencies, Interpol, Scotland Yard, and the Royal Canadian Mounted Police. Hank was instrumental in helping law enforcement to identify additional terrorists after the 9/11 attacks.
More than anything else, Hank Asher believed in helping others. He often referred to his philanthropic endeavors as a “paycheck for the soul.” Hank’s close friends, Jules Kroll, founder of the world’s preeminent detective agency, Kroll, Inc., and Tom Glocer, former CEO of Thomson Reuters, fondly agree, “Hank was incredibly talented. What was less well known, other than to his friends, was what a warmhearted, generous, and loyal person he was."
Hank’s private plane was the first on the ground after the Haiti earthquake in 2010, transporting desperately needed doctors to Haiti from Project Medishare and bringing the wounded back to South Florida. Years prior to his sister Sari’s death from cancer, Hank also created JARI Research to support cancer breakthroughs in cooperation with the Mayo Clinic.
Protecting children was particularly dear to Hank. He was the largest financial donor in the history of the National Center for Missing and Exploited Children and also donated his technology to assist in reuniting missing children with their families. In addition, Hank provided TLO’s child protection software at no charge to law enforcement in 40 countries around the world to identify and locate child predators.
John Walsh, host of the popular television series, America’s Most Wanted, credits Asher as having “single-handedly changed the way law enforcement globally hunts for child predators on the Internet.” Walsh adds, “Hank was the most charitable man I ever met. He was larger than life, but the biggest part of Hank was his heart.”
Hank continued to invent new technologies until the very end. His vision will continue to influence the data fusion industry for years to come as Hank’s loyal and talented TLO “tribe” complete and launch the many projects he had in progress at the time of his passing.
Hank was dearly loved by his wife, Judith, their two children, Desiree Asher and Carly Yoost, and his son-in-law, Wally Yoost. The hearts of his TLO colleagues go out to his family and to all who were touched by Hank’s extraordinary gifts.
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Jul. 26, 2016 11:45 AM EDT Reads: 536
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 26, 2016 10:45 AM EDT Reads: 1,712
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Jul. 26, 2016 10:37 AM EDT Reads: 233
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 26, 2016 10:15 AM EDT Reads: 1,174
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Jul. 26, 2016 10:00 AM EDT Reads: 980
The competitive landscape of the global cloud computing market in the healthcare industry is crowded due to the presence of a large number of players. The large number of participants has led to the fragmented nature of the market. Some of the major players operating in the global cloud computing market in the healthcare industry are Cisco Systems Inc., Carestream Health Inc., Carecloud Corp., AGFA Healthcare, IBM Corp., Cleardata Networks, Merge Healthcare Inc., Microsoft Corp., Intel Corp., an...
Jul. 26, 2016 09:45 AM EDT Reads: 923
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Jul. 26, 2016 09:45 AM EDT Reads: 754
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Jul. 26, 2016 09:45 AM EDT Reads: 326
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Jul. 26, 2016 09:30 AM EDT Reads: 1,068
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Jul. 26, 2016 09:15 AM EDT Reads: 1,009
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Jul. 26, 2016 09:02 AM EDT Reads: 217
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Jul. 26, 2016 09:00 AM EDT Reads: 1,692
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Jul. 26, 2016 09:00 AM EDT Reads: 1,953
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Jul. 26, 2016 08:45 AM EDT Reads: 1,526
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 26, 2016 08:45 AM EDT Reads: 1,312