Pirtek to switch hosted ERP systems 
By Ry Crozier | Mar 5, 2013 | Comment Now 
Building model to deploy to franchisees globally.
 
Aussie web hosts converge for new community talks 
By Ry Crozier | Dec 6, 2012 | Comment Now 
WebHostingTalk AU domain downtime sparks fresh discussion.
 
Interactive scales back Melbourne data centre 
By Ry Crozier | Mar 9, 2012 | Comment Now 
Co-location space glut, IT services growth force hand.
 
Wolfram launches interactive document format 
By Barry Collins | Jul 22, 2011 | Comment Now 
Programmable documents.
 
Apple devices dominate Australia's mobile internet 
 
Huge email marketer's database hacked 
By Liam Tung | Apr 5, 2011 | Comment Now 
Customers warned.
 
Interactive to invest $50m in data centres 
By Ry Crozier | Mar 11, 2011 | Comment Now 
New Melbourne facility, $25m Sydney expansion.
 
Microsoft updates Windows 7 and Server 2008 
By Eric Doyle | Oct 28, 2010 | Comment Now 
Release candidates include new features and fixes.
 
Microsoft acquires Interactive Supercomputing 
By Ben Grubb | Sep 22, 2009 | Comment Now 
Plans to use ISC technology in future Operating Systems.
 
Civilians cyberattacked Georgia in 2008 war 
By Chuck Miller | Aug 19, 2009 | Comment Now 
Attacks on Georgian government websites during the 2008 war with Russia were carried out by civilians - with little or no direct involvement on the part of the Russian ...
 
Primus customers explore options after data centre blackout 
By Ry Crozier | Feb 13, 2009 | Comment Now 
At least two Melbourne data centre operators claim customers affected by the Primus blackout last week are re-evaluating their options as they seek assurances over redundancy ...
 
Innovators for 2008  
By Peter Stephenson,CeRNS, | Dec 15, 2008 | Comment Now 
This year, we took a look in the rearview mirror and observed a lot of convergence, but despite this trend interesting companies still flourish, says Peter Stephenson, ...
 
2008: A year of cybercriminal innovation 
By Angela Moscaritolo | Dec 5, 2008 | Comment Now 
With the emergence of new attack techniques and the reinvention of old ones, 2008 has been a year of cybercriminal innovation.
 
New data centres underpin digital policy: Conroy 
Nov 17, 2008 | Comment Now 
Communications and broadband Minister, Stephen Conroy, has weighed into the data centre space debate claiming the raft of new facilities being built are important ‘foundations’ ...
 
‘Cavalier’ Google burning enterprise Apps bridge 
By Ry Crozier | Nov 13, 2008 | Comment Now 
Google’s strategy of sneaking its hosted applications into enterprise environments without the knowledge of IT appears to be working, but its ‘cavalier’ attitude to the ...
 
Good green vendors are hard to find 
By Ry Crozier | Nov 13, 2008 | Comment Now 
HP, Fujitsu and IBM have topped one of the world’s first in-depth studies into the actual green credentials of ICT suppliers, as many of their counterparts were publicly named ...
 
Power reduction could bite you: Gartner 
By Ry Crozier | Nov 12, 2008 | Comment Now 
Data centre managers should be wary of committing to a long-term total reduction in the centre’s power as part of green initiatives, Gartner has warned.
 
Gartner warns of IT budget shortfalls in Australia 
By Ry Crozier | Nov 11, 2008 | Comment Now 
Anyone expecting a magical silver bullet from Gartner to help them ride out the current economic turmoil might have to look elsewhere for it, if the first day of the 2008 ...
 
Write hardware consolidation into purchase contracts 
By Ry Crozier | Nov 11, 2008 | Comment Now 
Losing one of the remaining four large server vendors in a HP-Compaq styled merger could adversely impact current competitive pricing, Gartner has said.
 
Telstra cans Terria debate 
By Ry Crozier | Nov 4, 2008 | Comment Now 
Telstra is at the centre of a new storm amid allegations that it pulled out of tomorrow’s NBN debate after a failed last-minute attempt to oust the Competitive Carriers ...
1 2 3 4 5 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1022

Vote