- Akamai admits its OpenSSL patch was faulty, reissues keys
- Google updates terms of service to reflect its scanning of users' emails
- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
The proposed US$45.2 billion acquisition of Time Warner Cable by Comcast would give the company huge market power to determine broadband prices and Internet content, a group of U.S. senators said Wednesday.
By Grant Gross | 10 April, 2014 04:32
Cable giant Comcast has fired up its messaging machine to promote its proposed US$45.2 billion purchase of fellow cable television and broadband provider Time Warner Cable, arguing the deal will benefit Time Warner's broadband customers.
By Grant Gross | 09 April, 2014 05:55
A group of Democratic lawmakers have introduced a bill in both the U.S. Senate and the House of Representatives to restore net neutrality rules at the U.S. Federal Communications Commission.
By Grant Gross | 03 February, 2014 21:12
The U.S. Department of Justice has opposed requests by Facebook, Google, Microsoft and other companies to publish the number of surveillance requests they receive from the U.S. National Security Agency and other agencies.
By Grant Gross | 02 October, 2013 17:40
The U.S. Congress must act quickly on legislation that would make electronic data collection efforts by the U.S. National Security Agency more public, a group of tech firms, civil liberties groups and other organizations said Monday.
By Grant Gross | 30 September, 2013 19:23
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTIT Support EngineerNSW
- FTExecutive Producer/Head of Production: Advertising AgencyNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTDeliverability SpecialistNSW
Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
- Microsoft's Chinese partner confident Xbox can compete against Android consoles
- Australia needs effective government cyber policy leadership: report
- Court slaps TPG with $400k fine over 000 failure
- Lycamobile issued warning for over-charging customers
- TPG should pay rural levy for each FTTB service: NBN Co
- Ukraine tensions could hurt international security efforts, Kaspersky says
- See ya, Microsoft: Intel looks to Android for growth in tablets
- Rushed Heartbleed fixes may expose users to new attacks
- NBN Co hits 105Mbps in limited FTTN trial
- Typo halts sales of iPhone keyboard as injunction takes effect
- In Pictures: Windows 8.1 tablets with 8-inch screens: Which one is right for you?
- Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
- Big data drives 47% growth for top 50 public cloud companies
- Cellular industry makes concession on kill switch
- In Pictures: Inside evolving satellite technology