Tag: building

TPG considers speed limit for fibre expansion 
By Ry Crozier | Sep 17, 2013 | Comment Now 
Cherry-picking laws face first big test.
 
Telstra office energy use becomes video art 
By Ry Crozier | Sep 13, 2013 | Comment Now 
One of five buildings to visualise electricity use.
 
ASIO asks for public trust after alleged hack 
By Ry Crozier | May 30, 2013 | Comment Now 
Expresses confidence in security of its new headquarters.
 
Riverstone deploys iPads for digital building plans 
By Nathan Cochrane | May 8, 2012 | Comment Now 
Construction firm embraces mobile age.
 
Pipe Networks seeks carrier land access review 
By Ry Crozier | Mar 30, 2011 | Comment Now 
Broken system could delay NBN rollout, add costs.
 
Australian CIOs dish dirt on vendor engagement 
By Ry Crozier | May 7, 2010 | Comment Now 
How to get Australian financial CIOs to listen to you.
 
Suncorp fast-tracks IT ‘building blocks' program 
By Ry Crozier | Feb 24, 2010 | Comment Now 
Strategic group restructure.
 
Security must be built in from the start 
By Phil Muncaster | Apr 30, 2009 | Comment Now 
The UK government-backed Cyber Security Knowledge Transfer Network (KTN) launched a roadmap today intended to kickstart an international effort to engineer security into ...
 
Tretecnic wins planning approval for new data centres 
By Ry Crozier | Dec 4, 2008 | Comment Now 
Tretecnic will inject up to another 16,000 square metres of data centre space into Melbourne and Canberra after it received planning approval to construct two new centres.
 
Data centre operators stake green incentive claims 
By Ry Crozier | Oct 20, 2008 | Comment Now 
A data centre construction firm has claimed they should be paid up to $30 million in government incentives to help them transition Aussie businesses to greener computing ...
 
Apple Brick rumours building 
By Stewart Meagher | Oct 7, 2008 | Comment Now 
The web has been buzzing with rumours that a new Apple product, code-named Brick, would be announced in an industry keynote on October 14th.
 
Building a security culture 
Lately there has been a lot of discussion about the difference between real security and compliance with data security regulations.
 
Building security into your software-development lifecycle 
By Chris Wysopal | Feb 18, 2008 | Comment Now 
You have probably heard by now that the root cause of most security vulnerabilities is in the software we run, and that these vulnerabilities are introduced into the software ...
 
Google building Pacific fibre cable 
By Iain Thomson | Sep 25, 2007 | Comment Now 
Google is reportedly in negotiations to build a fibre optic cable across the Pacific to link its US operations with Asia.
 
Boffins building computer that runs on light 
Mar 16, 2007 | Comment Now 
Researchers focus on photonics.
 
Building the 3D Internet 
By Shaun Nichols | Nov 27, 2006 | Comment Now 
The way we see and navigate the Internet is about to change.
 
Opinion: Consultant's view - IP building management systems - Easy
life or easy prey? 
Sep 4, 2006 | Comment Now 
All hell could break loose if the wrong people gain access to your BMS, warns Ken Munro. So make sure it's safe.
 
Cover Story: Custom building defenses 
Jan 13, 2006 | Comment Now 
Three IT security pros explain that a reliable network is key, no matter the size of the company.
 
Building a secure future for telecoms 
By Dr. Prem | Dec 1, 2004 | Comment Now 
Security is fast becoming one of the telecoms’ industry’s ‘hot topics’. This reached a new peak in October when the TeleManagement Forum committed to adding a new security ...
 
Newcastle Building Society scores with new IP VPN 
By Rene Millman | Jan 22, 2004 | Comment Now 
A building society based in the North Easy of England has rolled out an IP VPN to improve customer service and security.
1 2 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 743

Vote