Searching for Australia's all-flash early adopters 
By Ry Crozier | Jul 15, 2015 | Comment Now 
Part 2: Separating the fact from fiction on customer take-up.
 
Xen patches admin privilege escalation vulnerability 
By Juha Saarinen | Jul 10, 2015 | Comment Now 
Allows admins with limited privileges to take full control.
 
Govt funds robots, cyberbullying projects with new grants 
By Allie Coyne | Jul 8, 2015 | Comment Now 
$86.9m given to 252 joint industry-uni research initiatives.
 
Microsoft Azure Australia East hit by outage 
By Juha Saarinen | Jul 3, 2015 | Comment Now 
[Updated] Unknown network fault leaves customers cloudless.
 
Cisco to buy OpenDNS for $823m 
Jul 1, 2015 | Comment Now 
To bolster security business.
 
Cisco plugs default SSH key security hole 
By Adam Greenberg | Jun 29, 2015 | Comment Now 
Remote attackers could connect with superuser privileges.
 
Tech giants back Open Container Project 
By Juha Saarinen | Jun 23, 2015 | Comment Now 
CoreOS, Docker unite to standardise containers.
 
Defanging Venom hypervisor attacks 'easy': researcher 
By Juha Saarinen | May 18, 2015 | Comment Now 
Single configuration change required.
 
EMC releases first open source offering 
By Penny Wolf | May 7, 2015 | Comment Now 
Hopes to extend reach of ViPR Controller.
 
Don’t let big data get you into big trouble 
By Juha Saarinen | May 5, 2015 | Comment Now 
[Blog post] Think before you download unsigned, unauthenticated code.
 
Google backs Docker container rival CoreOS 
By Allie Coyne | May 5, 2015 | Comment Now 
Appc gains ground with inclusion in Kubernetes.
 
Cisco CEO steps down after 20 years  
May 5, 2015 | Comment Now 
Chambers to be replaced by sales VP Chuck Robbins.
 
Know what will leak before the breach 
By Juha Saarinen | Apr 22, 2015 | Comment Now 
[Blog post] Your archival policy could be a line of defence.
 
Google raises cloud storage transfer fees 
By Juha Saarinen | Apr 20, 2015 | Comment Now 
Australian regions subject to higher data egress charges.
 
Inside Telstra's multi-faceted cloud strategy 
By Steven Kiernan | Apr 14, 2015 | Comment Now 
An overview of its own cloud and deals with Cisco, VMware, IBM and NextDC.
 
CSIRO beats Cisco in fight over logo 
By Allie Coyne | Apr 10, 2015 | Comment Now 
Not that similar, trademark office finds.
 
Aussie enterprises, switch vendors in brite box catch-22 
By Ry Crozier | Mar 31, 2015 | Comment Now 
Is there a future smaller than Facebook-sized facilities?
 
Cisco confirms IP phone eavesdropping flaw 
By Juha Saarinen | Mar 22, 2015 | Comment Now 
Update: But successful exploit 'not likely'.
 
Cisco signals end to workforce volatility 
By Andrew Colley | Mar 18, 2015 | Comment Now 
Says transformation is "largely done".
 
Alibaba muscles in on Amazon's turf with new US data centre 
By John Ruwitch, Paul Carsten | Mar 4, 2015 | Comment Now 
Chinese cloud business starts building in Silicon Valley.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 676

Vote