April 2013
In this issue:

The Future of IT

Time is NOW for Virtualization

Why Security Updates are Vital

Security: Beware of the Dark Side of Computer Code

Services/Quick Links

Monthly Trivia

Quote and Cartoon

Security: Beware of the Dark Side of Computer Code
Used with the permission of http://thenetwork.cisco.com
by Jason Deign

Youthful hackers are nothing new. But as more people get connected, many kids now have the chance to tinker with code—which is why guidance counts.

Back in the early 2000s Luis Corrons received a strange series of emails. From the name, 'Jordi', Corrons guessed the sender came from Catalunya, north-east Spain.

Jordi seemed keen to help in the fight against malware, sending Corrons, who is now technical director of PandaLabs, an antivirus laboratory owned by Spanish IT security firm Panda Security, examples of viruses he said he had found on the 'net.

"What was odd was that these viruses were really shabby," Corrons says. "When we looked at them closely we found some of them even had Jordi's signature on them.

"It was clear he was just a kid who was getting a kick out of creating these things and sending them to us to be 'discovered'. Obviously, we didn't report him."

Of course, Jordi is not the only youth to have had a fascination with malware, nor the first one.

Read more

The Future of IT
Used with the permission of http://thenetwork.cisco.com
by Padmasree Warrior

What an exciting time to be in the tech industry. We are at the beginning of a major transition to the Mobile-Cloud era. Trends like bring your own device (BYOD), access anywhere, virtualization, and machine-to-machine connections have given way to a new breed of applications. We estimate that approximately 50 billion devices will be connected by 2020. In 2010 alone, more than 350, 000 applications were developed with more than three million downloads. A 44-fold increase in data creation is predicted from 2010 to 2020, with 34 percent of it in the cloud. All of this leads to a world of intuitive connections between people, processes, data and things on the network – the Internet of Everything.

What does this mean? It means the trends we've been discussing over the past several years are all having a cumulative effect putting new demands on IT.

Read more

The Time is NOW for Virtualization
By Blake Britton – VP, Axxys Technologies

As we continue to look forward at the IT landscape nothing is growing faster than virtualization. The last 4 out of 5 projects completed by us have all involved creating a virtual strategy for our clients. I know this number does not appear to be "staggering" or "earth shattering" but it is a rapidly growing trend in business. Here are a few reasons we are encouraging our clients to move to a virtual server environment for their infrastructures:

Maximize Resources
Can you imagine hiring someone with the intent of using 10% - 20% of their potential? This is what seems to happen when a client purchases a new server for their business. Server hardware is incredibly powerful with Quad Core processors and the low cost of memory these days; however, it is challenging to utilize the resources to their full potential because of operating system and software limitations.

Read more

Why Security Updates Are Vital
used with permission from Norton by Symantec
Perhaps it's become a clich�, all this talk about the pace of technology, and change as a constant, and the need to stay ahead of the curve. But, clich�s develop for a reason--usually because there's truth in them. In the case of computer software, and particularly Internet security software, all the pace-of-technology talk is warranted.

Historically, computer software was a static form of technology. You would buy a program, load it on your machine, and use the software "as is" until the next version came out. However, that model no longer fits. Today's digital world is in constant flux, and in order to make the latest advances available immediately, software has become much more dynamic. Many programs can retrieve updates over the Internet and seamlessly incorporate the new technology into the original software. Of course, not all updates are vital. If we're talking video games or word processing software, there's nothing critical about updating your program between versions. However, if we're talking security software, ignoring updates can have serious consequences.

Read more


Services/Quick Links

� Managed IT Services
� Network Design
� On-Site Support
� Remote Connectivity
� Microsoft Exchange Email
� Server Virtualization
� Hardware & Software Sales
� Internet Bandwidth Security
� Cloud Computing
� Virus Detection & Removal

For a complete list of services please click HERE


Monthly Trivia

First person to submit the correct answers by email to anorton@osgusa.com will receive a $25 Starbucks gift card!

Entries are judged by date/time received and correctness. Include your name and phone number, the question number and the answer.

1) Who was the first professional athlete to win championship rings in two major sports?

2) What sport besides football did famed fullback Jim Brown compete and excel in while he attended Syracuse University in the mid 1950s?

3) How many of the four Grand Slam trophies in tennis are gold; how many are silver?.

4) How much did a one-minute TV spot cost advertisers on the first Super Bowl broadcast in 1967?

Cartoon of the Month


Quote of the Month

"If the only tool you have is a hammer, you tend to see every problem as a nail."

 - Abraham Maslow

Outsource IT Solutions Group    www.osgusa.com