Tags: aussieRemove, bigRemove, inRemove, theRemove, waveRemove

Why wait for next generation wi-fi? 
By Stuart Corner | 6 days ago | Comment Now 
Schools and universities split on when to upgrade.
 
Govt inquiry backs mandatory data breach notifications 
By Allie Coyne | Jul 15, 2014 | Comment Now 
Pushes for tech-neutral laws, supports updated cyber security strategy.
 
Ambulance Victoria exploits data to improve service 
By Penny Wolf | May 12, 2014 | Comment Now 
Seeks to reduce strain on 000.
 
Finance sector is too slow with big data analytics 
By Jeff Jacobs | May 2, 2014 | Comment Now 
[Blog post] Customers not seeing advantage.
 
Commission of Audit recommends IT outsourcing agenda 
Promotes digital, cloud-first approach to whole-of-government IT.
 
Vodafone CEO admits negative perceptions linger 
By Penny Wolf | Apr 30, 2014 | Comment Now 
Will rely on customised products, higher data to boost user figures.
 
Rio Tinto brings big data to copper, coal mines 
Mar 17, 2014 | Comment Now 
First major expansion of the Mine of the Future program.
 
Why NHS contractors pushed patient data to the cloud 
By Brian Corrigan | Mar 4, 2014 | Comment Now 
Fresh privacy concerns for the UK’s National Health Service.
 
Is your IP address personal information? 
By Brett Winterford | Jan 13, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 1.
 
Inside NBN Co's 108Mbps apartment block test 
By Ry Crozier | Dec 17, 2013 | Comment Now 
The technical details.
 
Rio Tinto tech and innovation head departs 
By Ry Crozier | Dec 10, 2013 | Comment Now 
Replacement found from within.
 
Telstra free to make TPG-style basement fibre play 
By Ry Crozier | Oct 23, 2013 | Comment Now 
But little appetite for 'crazy'.
 
Big data: Legal challenges 
Oct 22, 2013 | Comment Now 
How big data challenges notions of copyright, confidentiality and privacy.
 
NBN Co to start fibre-to-the-basement field trials 
By Ry Crozier | Oct 22, 2013 | Comment Now 
Fresh from the lab to an MDU near you.
 
Whitepaper: Big Security for Big Data 
Oct 16, 2013 | Comment Now 
Big security for big data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile ...
 
Big Security for Big Data 
Oct 16, 2013 | Comment Now 
Big security for big data We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile ...
 
Making a business case for Hadoop 
How will it fit in traditional enterprise IT environments?
 
Hadoop and Big Data: 101 
By Dez Blanchfield | Oct 7, 2013 | Comment Now 
What is Hadoop and how might it fit in your organisation?
 
Aussie analyst pleads guilty to IBM insider trading 
Sep 13, 2013 | Comment Now 
Faces maximum five years in jail.
 
Govt to work up big data pilot projects 
By Ry Crozier | Jun 24, 2013 | Comment Now 
Can privacy concerns be overcome?
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote