Stories by Hamish Barwick

Google+ 13

NBN service plans won't cost consumers more: Conroy

Senator Stephen Conroy has slammed Opposition leader Tony Abbott’s comments that National Broadband Network (NBN) services could cost consumers more than current ADSL plans, saying Abbott was “plain wrong” “and that he should “check his facts.”

In pictures: Fujitsu celebrates data centre re-opening with sake

The Victorian Minister for Technology, Gordon Rich-Phillips, and Fujitsu executives took the Japanese approach and broke open a barrel of sake to toast the $60 million upgrade of Fujitsu’s Tier III data centre in Noble Park, Melbourne.

Fujitsu invests $60m in Melbourne data centre upgrade

Data centre provider, Fujitsu, has spent $60 million adding a fourth data hall to its 6,700 metre Tier III facility in Noble Park, Melbourne, with the option of adding a further two data halls in the future if customer demand warrants it.

Pacnet embarks on SYCS1 expansion

Data centre and telecommunications provider, Pacnet, has started the second phase of expansion at its Sydney CloudSpace1 (SYCS1) data centre as part of its long-term strategy to be the third largest data centre operator in Asia Pacific by 2019.

CenITex to cut 200 jobs

Victorian ICT shared services agency, CenITex, has announced plans to cut approximately 200 staff and cancel 80 vacancy advertisements as part of a strategy to balance its 2013 budget.

Budget 2012-13: E-health gets funding boost while gov staff job cuts expected

E-health and welfare were the big winners in Treasurer Wayne Swan’s Federal Budget this year with more than $627 million committed to e-health/welfare projects, but it was a different story for government staff with more than 3000 job cuts expected.

ICANN offers refund to top level domain applicants

The Internet Corporation for Assigned Names and Numbers (ICANN) has responded to delays caused by a software glitch in its TLD Application System (TAS) by offering a full refund of the US$185,000 application fee back to companies and individuals.


Cloud exit strategy 101

Cloud computing has been touted by vendors and bean counters as a cost effective way to reduce overheads and the need for physical IT infrastructure, but having a Cloud exit strategy is also essential if it all turns dark and stormy.

Companies respond to Aussie worker mobility fatigue: Survey

Some office staff members in Australia are seeking to reclaim normal working hours by turning off devices and not checking work emails at home, according to a survey conducted by NorthgateArinso.

Q&A: F-Secure chief research officer, Mikko Hypponen

The enemies of information security come in different forms so it’s important to understand the different types and what motivates them, according to F-Secure chief research officer, Mikko Hypponen. #auscert2012

Call for mandatory data breach notification grows: Survey

More Australian internet users want the government to order businesses to notify users of online data breaches, as a new survey conducted by the University of Canberra and eBay Australia found that 85 per cent of 700 Australian participants want data breach notifications to become mandatory.


Data sovereignty awareness lacking in Australia: Security experts

While the US Patriot Act may make many headlines for the legal authority it bestows on US agencies to access data held in foreign countries, Australian companies need to be aware of similar legislation in both the US and Australia, according to security industry experts.

OAIC updates data breach guidelines

The Office of the Australian Information Commission (OAIC) has updated its voluntary data breach guidelines as a means of encouraging organisations to notify the public in the advent of a data breach.

Q&A: Internet Systems Consortium founder, Paul Vixie

When news of the domain name system (DNS)Changer malware broke in 2011, Internet Systems Consortium founder, Paul Vixie, was brought into the project by US law enforcement agencies as an advisor.


Regulated environment key to successful BYOD: Security expert

Controls, such as restricted network access, should be in place before allowing staff to bring their own devices if organisations want to avoid the risk of data leakage, says ACT government IT security senior manager, Peter Major.#auscert2012