- AusCERT 2013: Visibility critical when selling IT security to execs, says Foxtel CSO
- AusCERT 2013: Interview with Dr Lizzie Coles-Kemp
- AusCERT 2013:Packetloop looks at the half-life of security information
- AusCERT organisation celebrates 20 years
- Could the Bitcoin network be used as an ultrasecure notary service?
The language used for Apple iOS app development drops a notch in Tiobe index
Experts say the language should crib app isolation, locality, and automated parallelism from more modern sources
Soasta, Cloudbees partner to connect mobile app dev to Jenkins continuous integration server, making it easier for developers to test and deploy apps to the cloud
The analyst firm is also optimistic about the adoption of cloud IDEs and heterogeneous parallel processing
The open source project enables development of applications scaling from handheld devices to large-format televisions
With Xamarin version 2.0, Visual Studio developers can build C# apps to run on Apple devices
RIM has unveiled its highly graphical, touch-oriented Peek and Flow user experience in a bid to regain its lost relevance
Traditional IT vendors aren't leading with software, and businesses aren't hiring mobile leaders, according Appcelerator's survey
Research firm says modern apps require elastic infrastructure and multichannel clients, while mobile apps are just one component of larger app architecture
For nearly $US1000, you get something more than an iPad but less than a laptop
InfoWorld's 2013 Technology of the Year Award winners stretch from devices and desktops to data centers and beyond
To close a federal investigation into possibly anticompetitive business practices, Google agrees to a slew of changes
The World Wide Web Consortium has a roster of proposed enhancements, including better forms, spell checking, and video captioning
Australian consumers are being advised to hang up on scammers who claim they are owed money for receiving telemarketing calls while registered on the Australian Communications and Media Authority's (ACMA) Do Not Call Register.
A 25-year-old Sydney man has been charged with allegedly causing millions of dollars in damage to Telstra's telephone cables on the Northern Beaches, NSW during September and November 2012.
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
ClamWin Free Antivirus is an open source GPL virus scanner for Microsoft Windows 7 / Vista / XP / Me / 2000 / 98 and ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTTechnical Consulting ManagerNSW
- FTTechnical Business AnalystNSW
- FTOS Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTLead Software EngineerSA
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTQuality ManagerSA
- FTWeb Analyst - WebTrendsVIC