Patrick's container-carrying robots damaged at sea 
Feb 7, 2014 | Comment Now 
Delays forecast for Sydney Port automation project.
 
NICTA inks third geothermal contract 
By Liz Tay | Apr 10, 2013 | Comment Now 
Adds Otway Basin data to advanced analytics project.
 
NICTA quadruples research service contracts 
By Liz Tay | Apr 3, 2013 | Comment Now 
Consulting contributes more revenue.
 
Choosing democracy over Big Brother  
By Dirk Helbing | Apr 2, 2013 | Comment Now 
Opinion: Surveillance and manipulation is not a sustainable situation.
 
Curtin sets up supercomputing helpdesk 
By Juha Saarinen | Mar 13, 2013 | Comment Now 
As part of iVEC engagement drive.
 
Wireless mesh researchers target defence applications 
By Krishan Sharma | Jan 30, 2013 | Comment Now 
Carrier-free communications get encrypted.
 
CSIRO launches $40m digital economy flagship 
By Liz Tay | Jan 29, 2013 | Comment Now 
To address national productivity decline.
 
Developer uses brainwaves to route mobile calls 
By Ry Crozier | Jan 9, 2013 | Comment Now 
Coming to an office near you?
 
Researcher finds pacemakers open to deadly hack 
By Darren Pauli | Oct 22, 2012 | Comment Now 
Vulnerability allows firmware rewrites from 30 feet away.
 
First ASKAP science results expected in a year 
By Ry Crozier | Oct 5, 2012 | Comment Now 
Radio telescope officially open.
 
Swinburne deploys 300-TFLOP machine 
By Liz Tay | Sep 28, 2012 | Comment Now 
Pushes total supercomputing capacity beyond 400 TFLOPS.
 
Monash celebrates Turing’s 100th anniversary 
By David Braue | Sep 17, 2012 | Comment Now 
Cryptographic war hero celebrated as the father of modern computing.
 
ASKAP to share fibre with Defence, towns 
By Darren Pauli | Sep 10, 2012 | Comment Now 
Farmers get free fibre.
 
Apple patents wireless, camera kill function 
By Darren Pauli | Sep 5, 2012 | Comment Now 
Blocks photos, videos and communications.
 
Scientists study Go to build computer common sense 
By Chris Jager | Aug 31, 2012 | Comment Now 
To benefit enterprise decision-making systems.
 
Researchers build software to map criminal networks 
By Juha Saarinen | Aug 27, 2012 | Comment Now 
Phone calls, social networks on the radar.
 
Researchers hide crypto keys on terabyte disc 
By Darren Pauli | Aug 20, 2012 | Comment Now 
Tiny, polarised rods to boost security.
 
CERN to double capacity with Budapest data centre 
By Brett Winterford | Aug 3, 2012 | Comment Now 
Power constrains Large Hadron Collider facility.
 
Computing for the Large Hadron Collider 
By Brett Winterford | Aug 3, 2012 | Comment Now 
Interview: CERN's deputy IT head talks Higgs, Moore and the cloud.
 
Researchers crack iris recognition 
By Marcos Colon | Jul 30, 2012 | Comment Now 
Vulnerability revealed at Black Hat conference.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 957

Vote