Tags: cscRemove, emcRemove, hpRemove, paasRemove, saasRemove, vceRemove

SAP buys cloud travel expense platform Concur 
By Penny Wolf | 18 hours ago | Comment Now 
Deal inked for $8.13 billion.
 
Extreme upgrade pain for XtremIO customers 
 
The big winners from Defence’s back-office IT refresh 
By Brett Winterford | Sep 12, 2014 | Comment Now 
Updated: The full list of subcontractors.
 
NSW FACS to move its SAP back office into the cloud 
By Penny Wolf | Sep 11, 2014 | Comment Now 
CIO Tim Hume prepares for community sector reform.
 
LogMeIn acquires Meldium for $16m  
By Penny Wolf | Sep 5, 2014 | Comment Now 
Adds cloud SSO to IT management portfolio.
 
HP recalls six million power cords over fire hazard 
Aug 27, 2014 | Comment Now 
Australian users affected.
 
Will Nutanix be outflanked before reaching IPO? 
By Justin Warren | Aug 27, 2014 | Comment Now 
VMware muscles in on storage startup in hyper-converged infrastructure.
 
HP pledges to hold former execs accountable for Autonomy "fraud" 
 
Westpac committed to core banking plan 
By Brett Winterford, Allie Coyne | Aug 1, 2014 | Comment Now 
[Blog post] Now with leadership.
 
'Internet of Things' full of vulnerabilities 
By Juha Saarinen | Jul 31, 2014 | Comment Now 
Research report reveals popular consumer devices are insecure.
 
Vatican entangled in HP, Autonomy stoush 
Jul 21, 2014 | Comment Now 
Dispute sheds light on HP case in troubled deal.
 
Shell extends hardware and services contract 
 
HP, shareholders agree to settle lawsuit 
Jun 30, 2014 | Comment Now 
Claimants will pursue ex-CEO Lynch.
 
Telstra expands cloud services to US 
By Penny Wolf | Jun 19, 2014 | Comment Now 
Considers hubs in emerging markets.
 
BOQ CIO looks to slash IT costs 
By Brett Winterford | Jun 5, 2014 | Comment Now 
Seeks more value from fewer technology partners.
 
Photos: CSC launches Sydney Security Operations Centre 
 
HP announces more job cuts 
May 23, 2014 | Comment Now 
Records 11th consecutive revenue fall.
 
Selling IT change to the user base  
By Penny Wolf | May 22, 2014 | Comment Now 
[Blog post] Are quick wins the secret to getting staff on board?
 
Mitigating cloud risks 
By Justin Warren | May 20, 2014 | Comment Now 
A checklist for the risk-conscious CIO.
 
NIST launches post-NSA review into crypto guidance 
By Juha Saarinen, Brett Winterford | May 15, 2014 | Comment Now 
Updated: Addressing concerns over compromised algorithms.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1051

Vote