how

Analysis: How four big Aussie companies went Agile

Analysis: How four big Aussie companies went Agile

NBN Co, Suncorp, Allianz, Jemena take the plunge.
Sep 17 2010 7:21AM
How to avoid flaws in identity management

How to avoid flaws in identity management

IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.
Sep 13 2010 4:57PM
Network Solutions refutes reported scale of malware issue

Network Solutions refutes reported scale of malware issue

Claims only 120,000 domains affected.
Aug 19 2010 12:59PM
How can you be confident when the endgame stakes are increasing?

How can you be confident when the endgame stakes are increasing?

IT personnel need to take more of an integrated approach.
Jun 28 2010 11:21AM
iTnews asks: Dress up or down for an IT job interview?

iTnews asks: Dress up or down for an IT job interview?

Suit and tie versus shorts and t-shirt.
Mar 26 2010 2:16PM
Analysis: How secure is an optical-fibre network?

Analysis: How secure is an optical-fibre network?

What IT leaders should consider.
Aug 7 2009 7:06AM
How to succeed as an interim IT manager

How to succeed as an interim IT manager

Working on a short-term contract can be challenging.
Jun 19 2009 7:08AM
Opinion: How SMEs can implement tailored IT systems

Opinion: How SMEs can implement tailored IT systems

Too often, small and medium-sized enterprises (SMEs) do not take responsibility for educating themselves sufficiently about technology, instead putting their trust in technology vendors or channel partners whose interests are not always aligned with the SME's.
Feb 4 2009 6:52AM
How to deploy secure unified communication

How to deploy secure unified communication

There is an uneasy tension between the concepts of unified communications (UC) and IT security.
Jan 23 2009 6:26AM
How new access control technologies can address insider threats

How new access control technologies can address insider threats

Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich Campagna.
Jan 13 2009 5:09PM
No fear factor: How to make role management work for the enterprise

No fear factor: How to make role management work for the enterprise

There are three key objectives to keep in mind for determining the success of any roles-based access and identity management initiative, says Deepak Taneja.
Dec 3 2008 2:48PM
Case study: How Smartpath got into NEC SaaS ‘supermarket’

Case study: How Smartpath got into NEC SaaS ‘supermarket’

Local asset management ISV Smartpath is using NEC’s Applications Net to deliver its Loc8 software as a hosted offering to customers.
Nov 18 2008 12:10AM
AMD vs Intel - How Shanghai shapes up

AMD vs Intel - How Shanghai shapes up

A couple of days ago we were alerted to what we were told was a Shanghai SAP score for an eight-socket machine, which looked to come in a full 30 per cent lower than the highest score, which incidentally seemed to be Intel’s Dunington.
Nov 17 2008 7:06AM
Just how harmless is Yahoo Fire Eagle?

Just how harmless is Yahoo Fire Eagle?

The launch of Fire Eagle may appear a harmless new addition to a growing group of interactive web applications but the consequence of a widespread take-up of the application may hold more sinister consequences, privacy experts have warned..
Aug 18 2008 8:02AM
CIOs confused over how to calculate carbon footprint

CIOs confused over how to calculate carbon footprint

Fujitsu Services survey finds lack of advice on what CIOs should be included in carbon footprint.
Aug 11 2008 4:02PM
Opinion: How to survive the Government ICT review

Opinion: How to survive the Government ICT review

The Whole of Government [WoG] ICT review to be conducted by Sir Peter Gershon has the potential to significantly cut costs and increase efficiency. But an Ovum analyst warns it could create both short and long-term disruption to Government agencies and suppliers.
Jul 10 2008 4:21PM
How exposed are you?

How exposed are you?

Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
May 22 2008 3:26PM
How IT security could go green?

How IT security could go green?

THE CHAIRMAN OF Wick Hill Group in the UK, which sells security infrastructure for ebusiness, has written a whitepaper outlining his views on how IT security could become more environmentally friendly.
May 16 2008 10:15AM
Hannaford tells regulators how breach happened

Hannaford tells regulators how breach happened

Hackers used sophisticated methods to evade detection and place malware on nearly 300 Hannaford Bros. store servers to intercept payment information during the credit card transaction process, the grocery chain told Massachusetts authorities.
Apr 2 2008 11:38AM
Going solo: How to be a security consultant

Going solo: How to be a security consultant

We all dream of being our own boss, but what does it take to set up a successful business in the real world? Mark Mayne has some advice.
Mar 27 2008 12:04PM

Log In

Username:
Password:
|  Forgot your password?