Qld Justice to equip workplace inspectors with Windows tablets 
 
Jeff Smith appointed IBM global CIO 
Former Suncorp CIO to lead Big Blue IT.
 
NICTA trial replaces some Canberra buses with taxis 
By Paris Cowan | Aug 15, 2014 | Comment Now 
Analytics pinpoint the cheapest way to travel.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
IBM, NEC picked for major NSW Transport deals 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Final contract negotiations begin.
 
Have you fallen for the big data trap? 
By Vito Forte | Jul 28, 2014 | Comment Now 
[Blog post] Big data IS the problem.
 
Strong iPhone sales in China boost Apple profits 
By Allie Coyne | Jul 23, 2014 | Comment Now 
Customers still buying despite new model coming.
 
Yahoo to buy analytics startup Flurry 
Jul 22, 2014 | Comment Now 
To bolster mobile ad business.
 
Stevens retires as IBM Aus/NZ boss 
By Paris Cowan | Jul 16, 2014 | Comment Now 
Successor identified.
 
IBM and Apple target enterprise with iOS tie-up 
By Juha Saarinen, Brett Winterford | Jul 16, 2014 | Comment Now 
Apple makes first major move into enterprise market.
 
IBM puts $3bn toward chip breakthrough 
Jul 10, 2014 | Comment Now 
Five-year investment.
 
Thieves steal $38m in phones, tablets from Samsung factory 
Jul 8, 2014 | Comment Now 
Workers held hostage for 40,000 devices.
 
Aussies dodge US mobile device flight bans 
By Allie Coyne | Jul 8, 2014 | Comment Now 
No battery checks required for locals bound for US.
 
Qantas checks in with cloud computing 
By Brett Winterford | Jul 8, 2014 | Comment Now 
Impressed with results of public cloud bake-off.
 
Dead mobile devices banned from planes to US 
By Allie Coyne | Jul 7, 2014 | Comment Now 
Passengers asked to prove devices have power.
 
Defence renews IBM contract for $264 million 
By Allie Coyne | Jul 3, 2014 | Comment Now 
Awards another closed extension.
 
Credentials theft hole found in Android devices 
By Juha Saarinen | Jun 30, 2014 | Comment Now 
Classic stack-based buffer overflow flaw.
 
NSW Govt sets out new technical standards for mobility 
By Allie Coyne | Jun 26, 2014 | Comment Now 
Trials as-a-service contracts.
 
US charges two more in IBM insider trading case 
Jun 26, 2014 | Comment Now 
Join Australian man as list of charged grows.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 490

Vote