Tag: how

Analysis: How four big Aussie companies went Agile 
By Stephen Withers | Sep 17, 2010 | Comment Now 
NBN Co, Suncorp, Allianz, Jemena take the plunge.
 
How to avoid flaws in identity management 
By David Bell | Sep 13, 2010 | Comment Now 
IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.
 
Network Solutions refutes reported scale of malware issue 
By Angela Moscaritolo | Aug 19, 2010 | Comment Now 
Claims only 120,000 domains affected.
 
How can you be confident when the endgame stakes are increasing? 
 
iTnews asks: Dress up or down for an IT job interview? 
By Ry Crozier | Mar 26, 2010 | Comment Now 
Suit and tie versus shorts and t-shirt.
 
Analysis: How secure is an optical-fibre network? 
By Dave Bailey | Aug 7, 2009 | Comment Now 
What IT leaders should consider.
 
How to succeed as an interim IT manager  
By Simon Berry | Jun 19, 2009 | Comment Now 
Working on a short-term contract can be challenging.
 
Opinion: How SMEs can implement tailored IT systems 
By Tim Harmon, | Feb 4, 2009 | Comment Now 
Too often, small and medium-sized enterprises (SMEs) do not take responsibility for educating themselves sufficiently about technology, instead putting their trust in technology...
 
How to deploy secure unified communication  
By Computing staff | Jan 23, 2009 | Comment Now 
There is an uneasy tension between the concepts of unified communications (UC) and IT security.
 
How new access control technologies can address insider threats 
By Rich Campagna | Jan 13, 2009 | Comment Now 
Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich ...
 
No fear factor: How to make role management work for the enterprise 
By Deepak Taneja | Dec 3, 2008 | Comment Now 
There are three key objectives to keep in mind for determining the success of any roles-based access and identity management initiative, says Deepak Taneja.
 
Case study: How Smartpath got into NEC SaaS ‘supermarket’ 
By Ry Crozier | Nov 18, 2008 | Comment Now 
Local asset management ISV Smartpath is using NEC’s Applications Net to deliver its Loc8 software as a hosted offering to customers.
 
AMD vs Intel - How Shanghai shapes up 
By Sylvie Barak | Nov 17, 2008 | Comment Now 
A couple of days ago we were alerted to what we were told was a Shanghai SAP score for an eight-socket machine, which looked to come in a full 30 per cent lower than the ...
 
Just how harmless is Yahoo Fire Eagle? 
By Rosalie Marshall | Aug 18, 2008 | Comment Now 
The launch of Fire Eagle may appear a harmless new addition to a growing group of interactive web applications but the consequence of a widespread take-up of the application ...
 
CIOs confused over how to calculate carbon footprint 
By Rosalie Marshall | Aug 11, 2008 | Comment Now 
Fujitsu Services survey finds lack of advice on what CIOs should be included in carbon footprint.
 
Opinion: How to survive the Government ICT review 
By Dylan Bushell-Embling | Jul 10, 2008 | Comment Now 
The Whole of Government [WoG] ICT review to be conducted by Sir Peter Gershon has the potential to significantly cut costs and increase efficiency. But an Ovum analyst warns it ...
 
How exposed are you? 
By Ken Munro | May 22, 2008 | Comment Now 
Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
 
How IT security could go green? 
By Sylvie Barak | May 16, 2008 | Comment Now 
THE CHAIRMAN OF Wick Hill Group in the UK, which sells security infrastructure for ebusiness, has written a whitepaper outlining his views on how IT security could become more ...
 
Hannaford tells regulators how breach happened 
By Dan Kaplan | Apr 2, 2008 | Comment Now 
Hackers used sophisticated methods to evade detection and place malware on nearly 300 Hannaford Bros. store servers to intercept payment information during the credit card ...
 
Going solo: How to be a security consultant 
By Mark Mayne | Mar 27, 2008 | Comment Now 
We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
1 2 3 4 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...

Latest VideosSee all videos »

The great data centre opportunity on Australia's doorstep
The great data centre opportunity on Australia's doorstep
Scott Noteboom, CEO of LitBit speaking at The Australian Data Centre Strategy Summit 2014 in the Gold Coast, Queensland, Australia. http://bit.ly/1qpxVfV Scott Noteboom is a data centre engineer who led builds for Apple and Yahoo in the earliest days of the cloud, and who now eyes Asia as the next big opportunity. Read more: http://www.itnews.com.au/News/372482,how-do-we-serve-three-billion-new-internet-users.aspx#ixzz2yNLmMG5C
Interview: Karl Maftoum, CIO, ACMA
Interview: Karl Maftoum, CIO, ACMA
To COTS or not to COTS? iTnews asks Karl Maftoum, CIO of the ACMA, at the CIO Strategy Summit.
Susan Sly: What is the Role of the CIO?
Susan Sly: What is the Role of the CIO?
AEMO chief information officer Susan Sly calls for more collaboration among Australia's technology leaders at the CIO Strategy Summit.
Meet the 2014 Finance CIO of the Year
Meet the 2014 Finance CIO of the Year
Credit Union Australia's David Gee awarded Finance CIO of the Year at the iTnews Benchmark Awards.
Meet the 2014 Retail CIO of the Year
Meet the 2014 Retail CIO of the Year
Damon Rees named Retail CIO of the Year at the iTnews Benchmark Awards for his work at Woolworths.
Robyn Elliott named the 2014 Utilities CIO of the Year
Robyn Elliott named the 2014 Utilities CIO of the Year
Acting Foxtel CIO David Marks accepts an iTnews Benchmark Award on behalf of Robyn Elliott.
Meet the 2014 Industrial CIO of the Year
Meet the 2014 Industrial CIO of the Year
Sanjay Mehta named Industrial CIO of the Year at the iTnews Benchmark Awards for his work at ConocoPhillips.
Meet the 2014 Healthcare CIO of the Year
Meet the 2014 Healthcare CIO of the Year
Greg Wells named Healthcare CIO of the Year at the iTnews Benchmark Awards for his work at NSW Health.
Meet the 2014 Education CIO of the Year
Meet the 2014 Education CIO of the Year
William Confalonieri named Healthcare CIO of the Year at the iTnews Benchmark Awards for his work at Deakin University.
Meet the 2014 Government CIO of the Year
Meet the 2014 Government CIO of the Year
David Johnson named Government CIO of the Year at the iTnews Benchmark Awards for his work at the Queensland Police Service.
Q and A: Coalition Broadband Policy
Q and A: Coalition Broadband Policy
Malcolm Turnbull and Tony Abbott discuss the Coalition's broadband policy with the press.
AFP scalps hacker 'leader' inside Australia's IT ranks.
AFP scalps hacker 'leader' inside Australia's IT ranks.
The Australian Federal Police have arrested a Sydney-based IT security professional for hacking a government website.
NBN Petition Delivered To Turnbull's Office
NBN Petition Delivered To Turnbull's Office
UTS CIO: IT teams of the future
UTS CIO: IT teams of the future
UTS CIO Chrissy Burns talks data.
New UTS Building: the IT within
New UTS Building: the IT within
The IT behind tomorrow's universities.
iTnews' NBN Panel
iTnews' NBN Panel
Is your enterprise NBN-ready?
Introducing iTnews Labs
Introducing iTnews Labs
See a timelapse of the iTnews labs being unboxed, set up and switched on! iTnews will produce independent testing of the latest enterprise software to hit the market after installing a purpose-built test lab in Sydney. Watch the installation of two DL380p servers, two HP StoreVirtual 4330 storage arrays and two HP ProCurve 2920 switches.
The True Cost of BYOD
The True Cost of BYOD
iTnews' Brett Winterford gives attendees of the first 'Touch Tomorrow' event in Brisbane a brief look at his research into enterprise mobility. What are the use cases and how can they be quantified? What price should you expect to pay for securing mobile access to corporate applications? What's coming around the corner?
Ghost clouds
Ghost clouds
ACMA chair Chris Chapman says there is uncertainty over whether certain classes of cloud service providers are caught by regulations.
Was the Snowden leak inevitable?
Was the Snowden leak inevitable?
Privacy experts David Vaile (UNSW Cyberspace Law and Policy Centre) and Craig Scroggie (CEO, NextDC) claim they were not surprised by the Snowden leaks about the NSA's PRISM program.
Latest Comments
Polls
Which bank is most likely to suffer an RBS-style meltdown?





   |   View results
ANZ
  21%
 
Bankwest
  9%
 
CommBank
  11%
 
National Australia Bank
  17%
 
Suncorp
  24%
 
Westpac
  19%
TOTAL VOTES: 1461

Vote