AFP, ASIO asked to clarify metadata mess 
By Allie Coyne | Aug 8, 2014 | Comment Now 
Law enforcement go public to confirm desire for source IP addresses.
 
Seek experiments with analytics 
By Penny Wolf | Jun 24, 2014 | Comment Now 
Looks to match jobs to candidate’s profile.
 
Panasonic, Fujitsu to form new chip design company 
 
Large Hadron Collider used vulnerable SCADA system 
 
SAP backs away from Business ByDesign 
Oct 21, 2013 | Comment Now 
Hosted product being wound down?
 
NBN Co reins in rollout transparency 
By Ry Crozier | Aug 30, 2013 | Comment Now 
[Blog post] Fresh wave of data files removed from website.
 
Photos: Telstra's new mobile exchange on wheels 
Jul 5, 2013 | Comment Now 
The MEOW gets a makeover.
 
Kordia lands NBN design subcontract 
May 8, 2013 | Comment Now 
Second parcel of works from construction partner.
 
Scientists close in on mysterious dark matter 
Apr 4, 2013 | Comment Now 
First physical trace potentially spotted.
 
Mining dark data for deep riches 
By Joshua Gliddon | Feb 27, 2013 | Comment Now 
Open source tools to tap big data.
 
Ubuntu for tablets outed 
By Juha Saarinen | Feb 20, 2013 | Comment Now 
Linux vendor goes mobile.
 
Video calling built into Mozilla, Chrome browsers 
By Joshua Gliddon | Feb 5, 2013 | Comment Now 
Chrome, Firefox in open source web comms collaboration.
 
RedHat project fights Java vulnerabilities 
By Darren Pauli | Oct 25, 2012 | Comment Now 
Aussie security boffin builds vulnerability database to track flawed JARs.
 
WorleyParsons buys new data management software 
By Ry Crozier | Sep 14, 2012 | Comment Now 
Expands scope of existing software agreement.
 
Photos: The data centre behind CERN's LHC 
 
CERN to double capacity with Budapest data centre 
By Brett Winterford | Aug 3, 2012 | Comment Now 
Power constrains Large Hadron Collider facility.
 
Computing for the Large Hadron Collider 
By Brett Winterford | Aug 3, 2012 | Comment Now 
Interview: CERN's deputy IT head talks Higgs, Moore and the cloud.
 
Santos to consolidate geoscience data stores 
By Liz Tay | May 22, 2012 | Comment Now 
To deliver computing grunt, data via private cloud.
 
IP Australia debates software patents 
By Liz Tay | May 18, 2012 | Comment Now 
Parliamentary petition yet to effect change.
 
Victoria calls for privacy in cloud design 
By Ry Crozier | Apr 3, 2012 | Comment Now 
Privacy commissioner outlines risks for agencies.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1019

Vote