Events

iTnews welcomes submissions for its event section. If your company has an event you would like considered for inclusion in this section, please click the button to the right.
 
Loading...

R Programming – an Introduction

Sep 3, 2014

UTS Short Course Venue, Sydney: City & inner suburbs (NSW)

Learn R-the popular programming language that excels in statistics, visualisation and data analysis.

The Information Professional's Guide to Search and Discovery

Oct 8 - 9, 2014

Rydges Sydney Central, Sydney: City & inner suburbs (NSW)

This interactive workshop brings together practitioners and thought leaders in one space to explore the challenges of enterprise information search and retrieval.

Ovum 2020 Telecoms Summit

Oct 30 - 31, 2014

Sydney Harbour Marriott, Sydney: City & inner suburbs (NSW)

The Ovum 2020 Telecoms Summit presents a series of keynote addresses from the leaders of the Australasian telecoms industry - followed by several presentation streams with each focused on the key growth areas as identified by specialist Ovum analysts globally.

Gartner Symposium/ITxpo 2014

Nov 17 - 20, 2014

Gold Coast Convention Centre, Gold Coast (QLD)

Gartner Symposium/ITxpo is the world's most important gathering of CIOs and senior IT executives. Our 2014 agenda offers 200+ analyst sessions, workshops, roundtables and mastermind keynotes across four full days.

Australian Data Centre Strategy Summit

Mar 10 - 12, 2015

Marriott Resort, Gold Coast, Gold Coast (QLD)

Australia's annual Data Centre Strategy Summit returns for the third time in March 2015 after two years of setting the standard for technology conferences.
nextmedia takes no responsibility for the accuracy of the content contained in these listings. Please contact the vendor with any enquiries.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote