Tags: asteroidRemove, jamesRemove

Google execs back asteroid mining venture 
Apr 23, 2012 | Comment Now 
Combines space exploration and natural resources.
 
Java founder leaves Google for deep blue 
By Liam Tung | Sep 1, 2011 | Comment Now 
James Gosling dives into unmanned ocean vehicles.
 
Java founder Gosling joins Google 
By Liam Tung | Mar 29, 2011 | Comment Now 
Destination unknown.
 
Revealed: CISO's top security concerns  
By Negar Salek | May 31, 2010 | Comment Now 
What concerns Australia's security professionals?
 
Java founder James Gosling quits Oracle 
By Iain Thomson | Apr 13, 2010 | Comment Now 
Father of Java now looking for a job.
 
Centrelink eyes service delivery makeover 
By Ben Grubb | Sep 3, 2009 | Comment Now 
Social networking on table in $25m CSIRO alliance.
 
Telstra director leaves over James Hardie affair 
Aug 28, 2009 | Comment Now 
Banned from boardrooms for five years and fined $30,000.
 
Russians offer to track asteroid threat  
By Egan Orion | Jun 30, 2008 | Comment Now 
Russian scientists think a space probe should plant a radio beacon on the asteroid Apophis to determine whether it's going to impact Earth, a conference report said Friday.
 
Nasa shoots down schoolboy asteroid claim 
By Iain Thomson | Apr 18, 2008 | Comment Now 
Nasa has stated that the odds of the Earth being hit by an asteroid in 2036 have not been reduced, despite earlier reports..
 
Schoolboy corrects Nasa on asteroid strike 
By Iain Thomson | Apr 17, 2008 | Comment Now 
A German teenager has corrected Nasa's estimates of the likelihood that the Earth will be hit by a large asteroid in 2036..
 
Biometric security: more bottom-line benefits, less James Bond 
By Carl Gohringer | Jul 13, 2004 | Comment Now 
NEC’s Gohringer cuts through the misconceptions that surround biometrics and puts forward the business case for the integration of biometric technologies into a company’s ...
 
Biometric security: more bottom-line benefits, less James Bond 
By Carl Gohringer | Jan 9, 2004 | Comment Now 
Bond movies will always be associated with state-of-the-art technology, but few of the products he uses or encounters ever make it into the real world.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 768

Vote