IBM releases Watson Analytics beta for businesses 
By Juha Saarinen | 1 day 13 hours ago | Comment Now 
Features natural language queries.
 
Extreme upgrade pain for XtremIO customers 
 
Cash rolls in for ground-breaking optical storage study 
By Paris Cowan | Sep 5, 2014 | Comment Now 
Shrinking the data centre down to one compact disc.
 
Apple washes hands of celebrity iCloud hack 
By Juha Saarinen | Sep 3, 2014 | Comment Now 
Commercial motives behind the data theft.
 
Qld Health trials self-service kiosks for payroll 
By Allie Coyne | Aug 28, 2014 | Comment Now 
Help for 60 percent of staff without a PC.
 
Dropbox cuts cloud storage prices to match Google 
 
IBM launches SoftLayer cloud in Melbourne, Sydney 
By Penny Wolf | Aug 26, 2014 | Comment Now 
Melbourne live next month, Sydney to follow.
 
Is public cloud ready for your critical business applications? 
 
RBS reaches settlement to use finance software 
Aug 21, 2014 | Comment Now 
Settles lawsuit after judge blocked use.
 
Jeff Smith appointed IBM global CIO 
By Brett Winterford, Allie Coyne | Aug 18, 2014 | Comment Now 
Former Suncorp CIO to lead Big Blue IT.
 
Infor has Salesforce in its sights with latest acquisition 
By Penny Wolf | Aug 15, 2014 | Comment Now 
Saleslogix purchase rounds out CRM footprint.
 
Reading between the lines of security alerts 
By Juha Saarinen | Aug 12, 2014 | Comment Now 
[Blog post] What does it actually tell you?
 
IBM unveils computer chip that emulates human brain 
By Juha Saarinen | Aug 8, 2014 | Comment Now 
Low power cognitive computing.
 
Google adds zones to Compute Engine 
By Juha Saarinen | Aug 6, 2014 | Comment Now 
Aimed at high-availability applications.
 
USB devices offer hackers direct route into computers 
Aug 1, 2014 | Comment Now 
New research finds USB malware can evade PC security.
 
Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
Google's Android software targeted by EU regulators 
Jul 31, 2014 | Comment Now 
Is search giant abusing market monopoly?
 
IBM, NEC picked for major NSW Transport deals 
By Paris Cowan | Jul 28, 2014 | Comment Now 
Final contract negotiations begin.
 
Critical flaw could expose users of anonymity network 
Jul 24, 2014 | Comment Now 
Vulnerability discovered in I2P.
 
Google builds elite hacker squad to hunt for bugs 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1043

Vote