|By Business Wire||
|May 20, 2014 03:44 PM EDT||
As public demand for secure messaging continues, Invisible Text LLC CEO Dez White announced that the company is expanding into new realms of free private mobile communications http://goinvis.com. Beginning today, Invisible Email is available for download on iPhone Devices http://tinyurl.com/n3vsxyc and will be available on Android and Blackberry in the near future. Invisible Call is slated for release on May 22, 2014 and will also be iPhone, Android, and Blackberry compatible.
(Photo: Business Wire)
Invisible Email allows consumers to electronically mail sensitive information that irretrievably disappears after the recipient closes out the message. Emails may include attachments (which may be viewed but not downloaded) for use in the workplace as well as in users’ personal lives. The App requires that users be verified before an email is sent and received, ensuring both parties are the intended recipients.
With Invisible Call, telephone calls placed through the App leave no evidence of a call log. Using the franchise pairing technology, Invisible Call establishes a secure VOIP (Voice Over IP) session between users once both have been verified through their devices.
Invisible Email and Invisible Call join a growing list of free secure mobile applications invented by White. Invisible Text and Invisible Social, which launched in August 2013, and March 2014, respectively, allow users to send timed, permanently disappearing screen-capture protected messages, photos, documents, audio/video files, and GPS locations as well as remotely delete messages anytime before being read. The Invisible applications store no user information on Company servers and cannot be accessed or intercepted by third parties.
White is the youngest African American female tech entrepreneur to develop a suite of applications. The concept for Invisible Text and its progeny arose out of her own professional necessity. A former writer who often relied on source information, White found that as technology evolved, confidantes were increasingly reluctant to share sensitive details digitally. Accordingly, White set out to create a solution that would enable people everywhere to communicate privately and securely across multiple communication platforms.
White hopes that the Applications’ ease, variety, and practicality will attract consumers and corporate executives for use in everyday life and business.
“People correspond in a variety of ways. Offering free secure Email and Call options were the logical next step. We incorporated security features and verification functions so people can feel comfortable transmitting any type of personal information without fear that it will become compromised,” says White.
Planned updates include a video version of Invisible Call and a desktop-friendly edition of Invisible Email.
About Invisible Text LLC
Founded in 2012, Invisible Text and its suite of free multi-platform application products enable private communications between verified users. The Company’s direct pairing technology ensures that messages are transmitted exclusively between the intended parties and disappears after messages have been viewed. Invisible Text launched its first disappearing application iteration in August 2013, and launched version two in March 2014. Invisible Social was released in April 2014.
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Oct. 26, 2016 11:30 AM EDT Reads: 2,518
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU’s GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes.
Oct. 26, 2016 11:30 AM EDT Reads: 1,755
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that ...
Oct. 26, 2016 11:29 AM EDT
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Oct. 26, 2016 11:00 AM EDT Reads: 3,171
Qosmos, the market leader for IP traffic classification and network intelligence technology, has announced that it will launch the Launch L7 Viewer at CloudExpo | @ThingsExpo Silicon Valley, being held November 1 – 3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The L7 Viewer is a traffic analysis tool that provides complete visibility of all network traffic that crosses a virtualized infrastructure, up to Layer 7. It facilitates and accelerates common IT tasks such as VM migra...
Oct. 26, 2016 11:00 AM EDT Reads: 201
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 26, 2016 10:30 AM EDT Reads: 1,121
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
Oct. 26, 2016 10:15 AM EDT Reads: 5,166
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Oct. 26, 2016 10:15 AM EDT Reads: 4,954
operations aren’t merging to become one discipline. Nor is operations simply going away. Rather, DevOps is leading software development and operations – together with other practices such as security – to collaborate and coexist with less overhead and conflict than in the past. In his session at @DevOpsSummit at 19th Cloud Expo, Gordon Haff, Red Hat Technology Evangelist, will discuss what modern operational practices look like in a world in which applications are more loosely coupled, are deve...
Oct. 26, 2016 10:15 AM EDT Reads: 1,886
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Oct. 26, 2016 10:00 AM EDT Reads: 2,020
In his session at 19th Cloud Expo, Nick Son, Vice President of Cyber Risk & Public Sector at Coalfire, will discuss the latest information on the FedRAMP Program. Topics will cover: FedRAMP Readiness Assessment Report (RAR). This new process is designed to streamline and accelerate the FedRAMP process from the traditional timeline by initially focusing on technical capability instead of documentation preparedness. FedRAMP for High-impact level systems. Early in 2016 FedRAMP officially publishe...
Oct. 26, 2016 10:00 AM EDT Reads: 459
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Oct. 26, 2016 10:00 AM EDT Reads: 1,807
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
Oct. 26, 2016 10:00 AM EDT Reads: 480
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Oct. 26, 2016 10:00 AM EDT Reads: 2,619
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
Oct. 26, 2016 09:45 AM EDT Reads: 1,837