Tags: 'aRemove, workloadRemove

Canberra's CIOs ponder a 'G-Cloud' 
By Brett Winterford | Jan 18, 2011 | Comment Now 
Informal discussions centre on sharing of peak workloads.
Virtualised workloads sit at 16 percent: Gartner 
Oct 22, 2009 | Comment Now 
Price reductions ready technology for take-off.
Electricity grid set to become 'a type of internet' 
By Robert Jaques | Oct 26, 2007 | Comment Now 
In the future everyone who is connected to the electricity grid will be able to upload and download packages of electricity to and from this network, a researcher predicted today..
IT pros' excessive workload 'a myth' 
May 4, 2007 | Comment Now 
IT professionals in the US work fewer hours than almost anyone else, sayssurvey.
Google Sky deal 'a wise move' 
By Will Head | Dec 11, 2006 | Comment Now 
Crafty move by the big G.
Zune branded 'a complete, humiliating failure' 
By Iain Thomson | Nov 28, 2006 | Comment Now 
Damning review predicts 'just plain dreadful' player will be dead in six months.
World Cup 'a drain on bandwidth,' study says 
By René Millman | May 25, 2006 | Comment Now 
Organizations face a potential drain on bandwidth and employee productivity when streaming online coverage of the FIFA World Cup becomes available in two week's time, according ...
Poor wireless security 'a liability' warns lawyer 
By René Millman | Feb 13, 2006 | Comment Now 
Companies leave themselves open to legal threats if they fail to secure employee's laptops against wireless hackers in public hotspots, according to a London law firm.
Ex-MI5 chief brands encryption 'a momentary problem to overcome' 
By René Millman | Oct 18, 2005 | Comment Now 
The former head of MI5 (Britain's secret intelligence agency) said that technology has made the work of spies much easier - but better encryption techniques have made it easier ...
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats