data - News, Features, and Slideshows
data in pictures
Williams Martini Racing believes an IT transformation can help get its Formula One racers back into pole position, according to the team’s IT manager.
By Adam Bender | 17 March, 2015 10:25
The New York University's GovLab and the federal Department of Communications have embarked on a study of how Australian organisations are employing government data sets.
By Rohan Pearce | 11 March, 2015 11:22
DeepMind, which became Google's subsidiary last year, has taken another step forward in artificial intelligence with an algorithm that can master several games.
By Rebecca Merrett | 26 February, 2015 13:45
Big data and data generated as an 'administrative by-product' could be used by the Australian Bureau of Statistics in an effort to understand the digital economy and Australia's ICT landscape.
By Rohan Pearce | 16 January, 2015 14:31
I came across a link to a new report from IDC called the "2010 Digital Universe Study".
By Bernard Golden | 08 May, 2010 00:37
Whitepapers about data
Organisations are seeking greater control over their outbound security. They’re looking to find solutions that offer the greatest protection and control to prevent data loss, ensure compliance and increase productivity. Where should they start? •Every year brings an even more extreme set of threats to the enterprise than the last •The push for increased confidentiality and the use of SSL everywhere has made it more difficult for enterprises to monitor Internet usage •While there are solutions that can help mitigate some of these risks, it’s critical for enterprises to adopt a comprehensive and streamlined way to maintain visibility and control
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.
- Google's Project Loon close to launching thosands of balloons
- Shape-shifting robot reveals secrets of Fukushima reactor
- FCC faces seventh net neutrality lawsuit
- Next on the Office expansion list: Windows 10 phone apps
- Why investors are so excited about Slack
- First Apple Watch health IT apps bring important messages to the wrist
- Insurance company now offers discounts -- if you let it track your Fitbit
- Apple's 12-inch MacBook can use third-party USB Type-C cables
- Gurucul identifies cloud threats based on identity, behaviors
- Microsoft shows impressively accurate hand-tracking system for VR
- Docker update speeds and organizes container deployments
- Facebook tries to keep it real by killing more 'fake' likes
- Feds lay down social media rules; enterprises should, too
- Should computers determine how our kids learn to talk? Maybe not
- Keep Windows 10 preview up to date -- or face a dead PC