Computerworld
  • News
  • Technology
    • News
    • Business
    • Cloud Computing
    • Data Centre
    • Gaming Dev
    • Government
    • Infrastructure
    • Mobility
    • Networking
    • Open Source
    • Security
    • Servers
    • Social Networking
    • Software
    • Software Development
    • Storage
    • Tech Planet
    • Telecoms
    • Tutorials
    • Unified Comms
    • Virtualisation
  • Tools
    • Blogs
    • Editorial Contacts
    • Events
    • IT Media Releases
    • Join Computerworld
    • Newsletters
    • NBN
    • RSS
    • Slideshows
    • Vendor View
    • Videos
    • Zones
    • Jobs
  • Whitepapers
    • All Whitepapers
    • Business + Management
    • Cloud Computing
    • CRM
    • Data Centre
    • Data Management
    • Disaster Recovery
    • Network
    • Security
    • Storage
    • Telecommunications
    • Unified Communications
    • Virtualisation
    • Wireless
    • Other Whitepapers
  • Login

    Forgot password?

    Sign up now to get free exclusive access to reports, research and invitation only events.

  • Twitter
  • Facebook

Stories by Steve Stuckey

Letter: Digital deluge may prompt illegal acts

The National Archives of Australia is following with interest, and occasional alarm, the development of technologies that help businesses manage the deluge of digital information that they send and receive on a daily basis. I refer to Stan Miastkowski's article "Make your e-mail disappear" in Computerworld, August 28, p8.

Editor's Recommendations

  • Regional Australia’s ‘first Tier III data centre’ opens

  • Acquisition boosts Equinix’s Australian data centre portfolio to 15

  • Government blames Russia-backed hackers for 2017 attacks on networking gear

  • Telco ombudsman records 204 per cent growth in NBN-related complaints

  • Vault Systems targets government with cloud skills training

  • TV company wants ISPs to block app marketplaces linked to piracy

Featured Whitepapers

  • Australia Mandatory Data Breach Notification Report

  • It's Time to Align Your Vulnerability Management Priorities With the Biggest Threats

  • Strengthen your defenses against cybercrime

  • Using security metrics to drive action in ASIA Pacific

  • Advancing your anti-phishing program: How to be successful against email-borne attacks

Web Events

  • Computerworld Live Webinar | Getting to grips with data governance in 2018

  • Computerworld Live On-premise and public cloud:- Getting the best of both worlds.

  • Computerworld Live Webinar | Storage momentum - the ‘next chapter’

  • Editorial Contacts
  • Advertising Information
  • Privacy Policy
  • RSS
  • Newsletters
  • Events
  • Whitepapers
  • News
  • Zones
  • IT Media Releases
  • Slideshows
  • Videos

Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.

IDG Sites: PC World | GoodGearGuide | CIO | CMO | CSO | Techworld | ARN | CIO Executive Council