BSA - News, Features, and Slideshows
Several technology and digital rights groups have praised a U.S. Senate move toward passing legislation that would rein in the National Security Agency's domestic telephone records collection program.
By Grant Gross | 14 November, 2014 05:06
The U.S government can take action to slow the calls in other countries to abandon U.S. tech vendors following revelations about widespread National Security Agency surveillance, some tech representatives said Friday.
By Grant Gross | 19 July, 2014 06:12
Victorian-based construction firm Telford Building Systems has paid an out of court settlement of $100,000 to BSA | The Software Alliance (BSA) after the firm used unlicensed Autodesk AutoCAD design software and Microsoft Office software.
By Hamish Barwick | 03 June, 2014 16:42
Denva Industries, a Melbourne-based engineering company, has been required to pay an undisclosed amount of damages for its use of unlicensed Siemens PLM NX software.
By Computerworld Australia staff | 11 March, 2014 09:48
Did the National Security Agency trick RSA, the security division of EMC, into including a crypto algorithm that was really an NSA cyber-espionage backdoor into the RSA BSAFE toolkit in order to propagate it through tech industry products?
By Ellen Messmer | 25 February, 2014 22:54
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
A growing number of organisations are using off the shelf technologies to stretch application processing and data access for continuous application and availability. This paper describes how deployment models for applications work. Enterprises are consolidating high availability and data recovery practices and technologies to achieve continuous availability that provides users with uninterrupted access to data and applications The right solution provides data coherency across distance for simultaneous access to the same data in multiple locations Organisations need to be able to trust that the data and applications it depends on will continues to be available and operate, through both planned and unplanned outages
- Startup SQLdep aims to help DBAs stay sane
- BlackBerry's deal to buy voice crypto company Secusmart blessed by German government
- Apple's Black Friday sale includes iPhone for the first time
- France, Germany want EU to take a tougher stance on tech firms
- Coming soon: Murder by Internet
- Distracted? Slap this Hitachi gizmo on your forehead to focus
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
- Sony confirms development of e-paper smartwatch
- Sydney Startup Weekend doubles attendance in one year
- ASIC unhappy with exclusion from data retention regime
- Australian Internet Security Initiative portal launched to help ISPs
- How SBS scaled up for FIFA World Cup online
- Hail pounds telecom networks in Queensland
- RMIT University builds virtual networking labs for students
- Weather.com fixes web application vulnerabilities