Latest News
Defence's chief IT architect moves on
Qantas obtains court order to prevent third-party access to stolen data
Cloudflare makes changes to avoid repeat of 1.1.1.1 DNS outage
TAFE NSW charts $22m ERP upgrade
Dymocks modernises system used to manage 40 million products
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
myths
myths
D8 Conference: Steve Jobs tackles his demons
Jobs on FoxConn, iPad, iPhone 4.0.
Staff Writers
Jun 2 2010 6:38PM
Hardware
Top 10 IT myths
This week, we take a look at some of the more prevalent urban legends of Silicon Valley. Some have a basis in truth, while others are just a good tale to tell..
Shaun Nichols
,
Iain Thomson
Mar 2 2009 6:38AM
Strategy
The five myths of two-factor authentication
Strong authentication has improved dramatically since its earliest days. And now more than ever, that comes as good news for consumers.
Kerry Loftus
Dec 16 2008 3:53PM
Security
The eight myths of data encryption
How misconceptions about data encryption are preventing A/NZ companies from effectively protecting data exchanged with employees, partners and suppliers.
Simon Coffey
Dec 17 2007 11:44AM
Security
Most popular tech stories
Hungry Jack's stands up Workday for its 30,000 people
Chemist Warehouse builds data maturity to underpin AI goals
TAFE NSW charts $22m ERP upgrade
Village Roadshow uses predictive rostering for its casual workforce
Viva Energy completes greenfield HR setup in time for Coles cutover
NEXTGEN "realigns" structure, announces senior promotions, plans vendor consolidation
Support Fusion launches, rolls out integration platform for MSPs and SIs
Atturra's FY25 revenue to exceed $300m
Ingram Micro "grateful" for customers' support during cybersecurity incident
Macquarie Technology Group secures option to buy Sydney land for data centre campus
Govt launches consumer tech label program for smart devices
Blackberry celebrates "giant step forward"
IoT in Action: How data-driven farming can help feed the world
Major Australian produce supplier will use AI to predict berry yield
Photos: The 4th International Driverless Vehicle Summit in Sydney
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?