It invested heavily in technology that offers more compatibility than anyone else's among open systems, mainframes and other computer systems.
That means there's often much more to do than simply install the patch to both stop the worm and make sure other computer systems are not compromised.
They found that gate agents and other employees were often using different and uncoordinated computer systems, which provided different information.
Among the many things that surprised Michael Jordan when he arrived at troubled tech giant EDS last year was a deep and puzzling irony: EDS invented the business of outsourcing, overhauling other firms' computer systems and running them far more efficiently, yet its own internal network was a haphazard and disjointed mess.
The user-generated nature of the technology means it will have to be adopted by vast numbers of boats to fulfil its full potential -- although a chunk of data the system relies on is already publicly available and used by other on-board computer systems.
CNN: Mariner's code: Computer hackers conquering the high seas
Companies that provide computer systems, storage and other services, such as Amazon and Google, will invest more in upgrades because they are under greater pressure by their customers to provide reliable and secure services, Narayan said.
FORBES: A Software Startup Helps Utilities Decode Smart Meter Data
Earlier this month, Iain Lobban, the head of GCHQ, told a cyber security conference in London that a "significant" attempt was made to target the computer systems of the Foreign Office and other government departments over the summer.
According to reports, the plan calls for creating three types of forces under the Cyber Command: protecting computer systems that involve electrical grids and other kinds of infrastructure, offensive operations overseas as well as protection of the defence department's internal systems.
Swapping data between computer and phone systems -- for mail order, home banking and other service providers -- is an ideal growth business for a computer and telecom equipment maker like Oki, he says.
Swapping data between computer and phone systems -- for mail-order, home- banking and other service providers -- is an ideal growth business for a computer and telecom equipment maker like Oki, he says.
The software includes an auto-recognition feature that identifies any device plugged into a laptop, from an electrocardiogram machine to an electron microscope, and translates the signals into a form that can be received by hospital computer systems at the other end.
The sorts of computer systems it enters are those that control critical infrastructures like power plants, refineries and other industrial targets.
Unknown hackers, perhaps a world away, had inserted malicious software into the computer networks of private-sector companies that operate most of our transportation, water and other critical infrastructure systems.
应用推荐