Visionary standards | Innovative solutions | Reliable services | Challenges met | Black Horse offers a full line of managed and professional network security solutions, including vulnerability assessments, penetration testing, incident response and customized services to help our clients identify, understand, and effectively deal with security issues before and after they occur.
Thursday, December 31, 2009
Farewell, EDS
EDS, known originally as Electronic Data Systems, was one of the creators of the market for outsourced IT services, particularly data centers. The name survived for 47 years, including a stint of ownership by General Motors.
But there are a lot of reasons for the change, such as creating a single company culture and presenting a single face to the market.
Dropping the name EDS also signaled that integration of the acquisition was over. It's now time for the billions spent to start paying off.
And that's not going to be easy.
From Paul Boutin's article at VentureBeat, before the World Wide Web, working for Ross Perot’s IT outsourcing firm EDS was one of the most prized and prestigious jobs in tech. EDS, which Perot founded in 1962, defined the outsourcing business and made Perot a hero to both businessmen and techies.
Perot resigned in 1986, but his brash, I-always-win style continued as part of EDS’s professional brand. Perot ran for president as an independent candidate in 1992 and won over an impossible 39 percent of voters in polls, before dropping from the race.
Last year, HP acquired EDS and its 137,000 worldwide employees for $13.9 billion. Now, some of the acquired staffers have told NBC Bay Area reporter Randy McIlwain that HP has slashed salaries from 29 to 47 percent among the people from whom McIlwain got numbers. HP has made several rounds of cuts since the purchase.
Sunday, December 27, 2009
Blackberry Holiday Outages
In a statement e-mailed to some users and news services, RIM said that "based on preliminary analysis, it currently appears that the issue stemmed from a flaw in two recently released versions of BlackBerry Messenger." RIM has issued a fix for the versions believed to have caused the issue -- 5.0.0.55 and 5.0.0.56 -- but the company was careful to explain it was still investigating the root cause.
RIM apologized for the inconvenience, but refused to comment further, leaving plenty of questions unanswered. For one, with outages becoming more and more frequent (Is this the third or fourth in the last two months?), does the company have an actionable plan to prevent future disruptions? Are the recent spate of outages connected in any way? And how does it plan to stave off pressure from Apple and Google when it can't even keep its mobile e-mail service (its supposed strong suit) up and running?
For more information visit RIM, PC World, Canada.com, Wall Street Journal, or PC Magazine.
Wednesday, December 23, 2009
USAF Confirms Sentinel In Afghanistan
The jet-powered UAV, which features a tailless flying wing with sensor pods built into the surface of each wing, is known as the RQ-170 Sentinel. Several photos purported to show the RQ-170 have been posted on the Web.
“The Air Force “is developing a stealthy unmanned aircraft system to provide reconnaissance and surveillance support to forward deployed Combat Forces,” Air Force officials said in a statement e-mailed to journalists and reproduced in full text in an article by Stephen Trimble at Flight Global. The RQ-170 was built by Lockheed Martin’s Advanced Development Program, the officials said.
Lockheed Martin’s Skunk Works, as the Advanced Development Program is also known, designed such revolutionary reconnaissance and fighter aircraft as the U-2, SR-71, F-117 and F-22.
For more details, visit Defense Systems.
Tuesday, December 1, 2009
Cisco Phone In 4-Hour Replacement Arena
To go along with the one-year milestone, the network giant is trotting out a fresh stable of small business-oriented products and upgrades — along with some additional support programs for the army of resellers that Cisco relies upon to reach baby biz customers.
Beginning on the hardware side, Cisco is debuting what it claims to be the industry's first 802.11n dual-band clustering access point built for small businesses (and we suppose those qualifications are specific enough to be true). The clustering kit allows for easier setup and installation of wireless access points when there's multiple units involved, explains Andrew Sage, veep of Cisco's small business worldwide sales.
Earlier incarnations of Cisco's access points require individual configuration for each unit or alternatively, moving to a more expensive, controller-based technology better suited for the mid-to-enterprise, he said. The AP 541N lets users configure just one access point, then add up to 10 other units that draw upon the configuration of the existing access point to expand the network.
The AP 541N has a US list price of $500. The device is currently available in the US, Canada, Europe, Australia, and New Zealand.
Next up, Cisco's SPA 525G IP phones are receiving a firmware update that allows easy tele-snooping over its LCD display, plus an instant connection to a company's VoIP network no matter where the phone is plugged in.
New to the SPA 525G is the ability to use the phone to display a live video feed from any Cisco small business security camera. Apparently this function works nicely when attaching a camera at the front door of an office so any phone on the network can get an eyeful of arriving visitors. The phone even has a feature to open a door's deadbolt remotely, said Sage. What haunted house is complete without one?
The IP phone is also being outfitted with integrated VPN technology. The new functionality allows a worker to connect to a company's private branch exchange (PBX) securely over almost any broadband network.
"You can take the phone, plunk it down on a desk, connect it to any broadband connection, and it will find its way back to your main office PBX and become an extension on that PBX system — for all intents and purposes as if you were local to it," said Sage.
Cisco is also rolling out four-hour hardware replacement service and 24-hour technical support that covers all of the company's Small Business Pro products, not just the phones.
For more of this article, visit The Register.
Wednesday, November 18, 2009
Network Sevices
Tuesday, November 10, 2009
Computing & Mobile
Black Horse is ready to become your premier provider of diversified business process and information technology outsourcing solutions. Insured and certified consultants, with well over two decades of experience in Information Technology, Commercial Software, Software Development, Help Desk Support, and Network Consulting.
Wednesday, October 28, 2009
Server Management
And that means at peak all the time, not just when you're IT organization can pencil you in. That means your IT should be telling you how your servers are doing, how your firewalls are doing, and how your internet is doing.
And do it 365/24/7.
When you have a problem, does your IT organization notify you? Or, do you notify them? And hope they have a technician available to address your problem?
Black Horse incorporates remote monitoring and proactive management to ensure that you maintain your competitive edge, increases your server availability, and helps keep you agile and responsive to changes in your marketplace.
Wednesday, October 21, 2009
Disaster Recovery
Black Horse can assist you with any of the following: Criticality Analysis, Business Continuity Planning, Crisis Management, Emergency Preparedness.
Monday, October 19, 2009
Information Security
Black Horse offers a full line of managed and professional network security solutions, including vulnerability assessments, penetration testing, incident response and customized services to help our clients identify, understand, and effectively deal with security issues before and after they occur.
Thursday, October 15, 2009
Hacking: Delta Airlines Sued
Tuesday, October 13, 2009
ODIN Off To Slow Start
From February 2007 to January 2008, the original ODIN, based in Iraq, helped take out more than 2,400 enemy bombers. Many credit the group with being one of the decisive forces in drastically reducing what had been a horrific roadside explosive campaign in Iraq. ODIN brought together IT gurus, image analysts, and drone pilots with attack helicopter forces charged. The networked operation was able to spot bomb planters, transmit the coordinates quickly, and strike.
Tuesday, October 6, 2009
Online Crime: Up 600%
The Anti Phishing Working Group's (APWG) latest report shows that rogue anti-malware programs, infected computers and crimeware broke new records in the first half of 2009. The report shows that criminals are innovative and have "apparently unchecked ambition" with crimeware designed to target financial institutions' customers.
Most disturbing for financial institutions are the attacks against corporate bank accounts, says APWG's Chairman Dave Jevans. "These attacks target the CFOs and then attempt, sometimes successfully, to take over the corporation's online banking credentials to make corporate wire transfers."
This attack trend has grown to the level that industry associations, including the Financial Services Information Sharing and Analysis Center (FS-ISAC) and NACHA along with banking regulators, sent out alerts to their financial services members this summer.
"Before this, phishers targeted individual users, not corporate accounts," Jevans says.
The report also shows:
- The number of unique phishing websites detected in June rose to 49,084 -- the highest since April, 2007's record of 55,643, and the second-highest recorded since APWG began reporting this measurement.
- The number of hijacked brands ascended to an all-time high of 310 in March and remained at an elevated level to the close of the half in June.
- The total number of infected computers rose more than 66 percent to 11,937,944 - now more than 54 percent of the total sample of scanned computers.
- Payment Services became phishing's most targeted sector, displacing Financial Services. Jevans notes that institutions' customers still are a primary target of electronic criminals.
"The Internet has never been more dangerous," Jevans says. "In the first half of 2009, phishing escalated to some of the highest levels we've ever seen."
Of even greater concern is the skyrocketing sophistication and proliferation of malicious software designed to steal online passwords and user names. The number of banking trojan/password-stealing crimeware infections detected increased more than 186 percent. "New malicious software such as the Zeus trojan exhibit a level of sophistication that would make the best software programmers envious," he says.
This post is excerpted from the BankInfoSecurity article, Online crime up nearly 600% in '09, by Linda McGlasson, October 5th, 2009.
Monday, October 5, 2009
Lack of eHealth Standards Costing Lives
Hundreds of billions of gigabytes of health information are now being collected in EMRs, and three-quarters (76%) of more than 700 healthcare executives recently surveyed by PricewaterhouseCoopers LLP agree that mining that information will be their organization's greatest asset over the next five years, both for saving patient lives and saving money.
The executives surveyed cited "legal implications" as their greatest concern when it came to their organizations' use of secondary data, followed by privacy implications and public relations ramifications. Nearly two-thirds (62%) of executives surveyed agreed that individual and/or identifiable data can be re-used if it is in the best interest of the patient.
When asked about the barriers to secondary use of EMR data, the majority of those surveyed cited problems surrounding data, including access to electronic health records, transparency, quality and management. Fewer than half of providers, for example, have fully implemented all but the most basic functions of electronic health record.
An insufficient level of detail and integration tied with data timeliness were cited as the next two biggest problems in using secondary data. Variability in data entry makes many stakeholders, especially doctors, question the quality of the information being generated by the IT system.
While the portability of electronic patient data is most often hyped as the greatest benefit to implementing EMR systems, mining healthcare databases to track national health trends as well as to alert physicians to a particular patient's pending health problems will not only save lives, but cut long-term costs by catching diseases and infections early. By catching them early, the impact can either be negated all together or minimized.
For example, since implementing a sepsis alert system more two years ago, about 4,000 lives have potentially been saved through the efforts at Methodist North Hospital (MNH) in Memphis. The hospital's EMR system alerts doctors and nurses to patients suffering from the sepsis an often deadly systemic infection that can be very difficult to diagnose in its early stages. Methodist Healthcare system, includes three adult-care facilities that also use the sepsis alert system.
This post is excerpted from the NetworkWorld article, Report: Lack of eHealth standards privacy concerns costing lives, by Lucas Mearian, October 2nd, 2009. To read the article in its entirety, visit NetworkWorld.