Tags: dellRemove, hpRemove, linuxRemove

Linux distros quickly patch critical 'Ghost' vulnerability 
By Allie Coyne | 2 days ago | Comment Now 
Big bad buffer overflow discovered.
 
UK fraud office ends investigation into HP-Autonomy deal 
Jan 20, 2015 | Comment Now 
Not enough evidence to convict.
 
Trojan targeting Linux systems could be amassing DDoS 'army' 
By Ashley Carman | Jan 8, 2015 | Comment Now 
'XOR.DDoS' discovered by researchers.
 
Banca Carige 
Nov 26, 2014 | Comment Now 
Providing superior customer service by launching innovative mobile services on a secure platform
 
Adobe urges users to patch critical Flash Player flaw 
By Juha Saarinen | Nov 26, 2014 | Comment Now 
Attackers quick to exploit earlier, inadequate patch.
 
 America First Credit Union 
Nov 21, 2014 | Comment Now 
Building a thriving member base on next-generation infrastructure
 
Microsoft makes full .NET server-side core stack open source 
By Juha Saarinen | Nov 13, 2014 | Comment Now 
Enables .NET to run on Apple OS X and Linux.
 
The Buyer's Guide to Primary Storage 
Oct 26, 2014 | Comment Now 
The definitive guide to your company's storage options.
 
Microsoft unveils Azure 'cloud in a box' 
By Allie Coyne | Oct 21, 2014 | Comment Now 
Teams with Dell for hybrid solution.
 
HP, VMware combine to push AirWatch enterprise mobility 
By Juha Saarinen | Oct 15, 2014 | Comment Now 
Toe to toe with Microsoft, IBM and Apple.
 
HP to revoke certificate that mistakenly signed malware 
By Allie Coyne | Oct 13, 2014 | Comment Now 
Will re-issue new digital signature.
 
Symantec confirms split into IT, security companies 
By Allie Coyne | Oct 10, 2014 | Comment Now 
Plans separation by end of 2015.
 
BOQ signs with HP for five more years 
By Allie Coyne | Oct 9, 2014 | Comment Now 
Long-running partner wins back IT services business.
 
HP to split into two public companies 
Oct 7, 2014 | Comment Now 
Separates PCs and printers from corporate services, will restructure 5000 jobs.
 
Privacy Commissioner warns business to fix Shellshock 
By Allie Coyne | Sep 30, 2014 | Comment Now 
Ignoring the threat risks breaching the Privacy Act.
 
First Shellshock botnet attacks Akamai, US DoD networks 
 
UQ bio and nanotech dept builds a supercomputer 
By Juha Saarinen | Sep 23, 2014 | Comment Now 
Chooses Dell kit, focus on computational speed.
 
The big winners from Defence’s back-office IT refresh 
By Brett Winterford | Sep 12, 2014 | Comment Now 
Updated: The full list of subcontractors.
 
How DB Schenker restored the reputation of its IT team 
By Allie Coyne | Sep 9, 2014 | Comment Now 
Logistics company looks for deeper partnerships with IT clients.
 
Infected Linux servers give DDoS attacks some oomph  
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  36%
 
Your insurance company
  5%
 
A technology company (Google, Facebook et al)
  9%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  4%
 
A Federal Government agency (ATO, Centrelink etc)
  18%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  7%
TOTAL VOTES: 3075

Vote
Do you support the abolition of the Office of the Information Commissioner?

   |   View results
I support shutting down the OAIC.
  27%
 
I DON'T support shutting the OAIC.
  73%
TOTAL VOTES: 977

Vote