Tag: make

'Old-new' Windows vulnerability discovered 
By Dan Raywood | Aug 24, 2010 | Comment Now 
200 apps possibly affected.
 
Analysis: Did Apple make the wrong bet on the Aussie dollar? 
By Anthony Caruana | May 21, 2010 | Comment Now 
The iPad might wind up cheaper in Australia.
 
Engineers Australia launches competition for inventors 
By Liz Tay | Feb 25, 2010 | Comment Now 
Innovators face new challenges.
 
Google responds to Buzz user feedback 
By David Neal | Feb 13, 2010 | Comment Now 
Several changes to user privacy options.
 
Google offers URL-shortening feature 
By David Neal | Dec 16, 2009 | Comment Now 
Address snipper added to Toolbar and FeedBurner.
 
Google names and shames sites that prey on users 
By Rosalie Marshall | Dec 9, 2009 | Comment Now 
Scams use Google brand to lure victims.
 
Alcatel-Lucent tackles mobile network overload 
By Dan Worth | Dec 5, 2009 | Comment Now 
New systems to meet future web traffic.
 
IE boss calls for more honesty about privacy 
By Phil Muncaster | Oct 21, 2009 | Comment Now 
Firms profiting from consumers' lack of awareness.
 
IT staff development "not good enough" 
By Angelica Mari | Sep 26, 2009 | Comment Now 
Failing to solve IT leadership skills gap.
 
Cloud computing too costly for enterprise 
By Iain Thomson | Apr 16, 2009 | Comment Now 
A study into cloud computing by McKinsey has found that cloud computing doesn’t make financial sense for large enterprises.
 
Opinion: Can Skype make headway in the enterprise? 
By Dave Bailey | Mar 26, 2009 | Comment Now 
Concerns over security may thwart Skype’s ambition to grab a slice of the enterprise SIP market.
 
Researchers make programming breakthrough 
By Nick Farrell | Feb 27, 2009 | Comment Now 
Researchers have developed a software tool which makes the translation of code for global markets faster.
 
QlikTech outlines BI product roadmap 
By Rosalie Marshall | Jan 30, 2009 | Comment Now 
Independent business intelligence firm QlikTech has added new support to its QlikView product for HP Neoview, and has given customers a preview of its product roadmap for 2009.
 
User feedback drives new Hotmail design 
By Rosalie Marshall | Dec 20, 2008 | Comment Now 
Microsoft appears to have learned from the recent Hotmail fiasco and is adopting user feedback in its updates.
 
No fear factor: How to make role management work for the enterprise 
By Deepak Taneja | Dec 3, 2008 | Comment Now 
There are three key objectives to keep in mind for determining the success of any roles-based access and identity management initiative, says Deepak Taneja.
 
Computer buyers becoming risk averse 
By Iain Thomson | Nov 7, 2008 | Comment Now 
The worsening economic climate is leading many computer buyers to become much more risk averse in their buying decisions according to system builders.
 
New standard will make mobiles easier to customise 
By Daniel Robinson | Oct 28, 2008 | Comment Now 
A forthcoming update to the Open Mobile Alliance Device Management (OMA DM) standard for mobile phones will make it easier for users to personalise their handset, for which ...
 
Sun and Fujitsu make huge leap in server performance 
By Sylvie Barak | Oct 14, 2008 | Comment Now 
Sun and Fujitsu will today show off a new, purportedly energy efficient, line of server systems based on a multi core Sun chip for high-performance and demanding tasks like ...
 
VMware to make bare metal hypervisor free 
By Daniel Robinson | Jul 24, 2008 | Comment Now 
VMware will next week make its ESX 3i hypervisor available for free, a move the company is presenting as a logical step in growing the virtualisation market, but which some ...
 
TV shows make down-under debut on Aussie iTunes 
Jun 25, 2008 | Comment Now 
Australians will finally be able to download television shows for their iPods after Apple made the service available on iTunes Australia some three years after it made its ...
1 2 3 4 | Next »
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1051

Vote