government - News, Features, and Slideshows
government in pictures
The final update to the current New South Wales government ICT strategy, which was original launched in 2012, includes a focus on breaking down data silos between state agencies and boosting the use of data to drive evidence-based policy.
By Rohan Pearce | 26 November, 2015 13:30
More developers will be able to get their hands on real-time public transport data under an initiative announced today by the NSW government.
By Rohan Pearce | 23 October, 2015 15:52
The creation earlier this year of the Certified Cloud Services List has had an already begun having an impact on government adoption of cloud according to the Australian vendors who have been added to the CCSL.
By Rohan Pearce | 02 October, 2015 10:54
A fresh analysis of documents disclosed by former U.S. intelligence contractor Edward Snowden shows that AT&T has been a much closer and eager partner for the National Security Agency's Internet spying activities than was previously known.
By Marc Ferranti | 16 August, 2015 07:52
Smartphone users might be better off seeing a doctor than relying on a family of mobile apps to diagnose whether moles on their skin are cancerous.
By Grant Gross | 14 August, 2015 05:27
The Federal Communication Commission's 400-page official order on net neutrality, released Thursday, will undoubtedly elicit lawsuits on various fronts once it is officially published in the Federal Register.
By Matt Hamblen | 14 March, 2015 01:01
A flurry of activity will follow the plan from U.S. Federal Communications Commission Chairman Tom Wheeler to reclassify broadband as a regulated public utility as the foundation for new net neutrality rules.
By Grant Gross | 06 February, 2015 06:47
In the debate over net neutrality, AT&T and Cisco are warning that fiber optic cable rollouts could be delayed -- and revenues lost -- if President Obama's recently proposed rules move ahead.
By Matt Hamblen | 14 November, 2014 23:15
With Europe's top court ordering Google to allow people to basically edit their online personal histories, some wonder what this will mean for finding the truth online.
By Sharon Gaudin | 15 May, 2014 06:23
Whitepapers about government
More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches. •One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights. •While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch •As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCContract Junior Programmer (JAVA/Mobile App) 160115/JP/vhaAsia
- CCDBA (Oracle/SQL)NSW
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- CCSolutions ArchitectNSW
- CCMVC .Net Developer- Hurstville NSW 2220NSW
- FTTechnical Support EngineerNSW
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- CCSenior Android DeveloperNSW
- CCWeb DeveloperNSW
- FTSystems Administrator/Engineer | $60-90K package | Northern BeachesNSW
- FTApplication Support AnalystVIC
- FTIT Support AnalystNSW
- CCSolution Architect - Biomedical - South Australia locationSA
- CCInformation Security ManagerNSW
- FTNetwork EngineerSA
- CCSolution Architect - .NET TechnologiesNSW
- CCInformatica ExpertNSW
- CCDesktop Applications PackagerSA
- CC.NET DeveloperACT
- CCEnterprise Systems Infrastructure SpecialistNSW
- FTServer EngineerNSW
- FTClient Services Manager - Programmatic AdvertisingNSW
- CCHigh Level Network Engineer (Communications)WA
- CCProgrammer/Analyst Programmer (JAVA/Moblie) 160115/AP/P/vhaAsia
- FTFront End Developer Required Working World Leading Digital TeamNSW
This whitepaper looks at the security gaps and disconnects in organisations, how network virtualisation can help to reduce risk and support a higher-level security strategy and why micro-segmentation provided through network virtualisation paves the way for implementing a Zero Trust model.
- Poseidon hacker group behind long-running extortion scheme
- Is Docker ditching Ubuntu Linux? Confusion reigns
- Google will stop accepting new Flash ads on June 30
- FBI Director entreats tech firms to release encrypted data used in crimes and terror
- World's largest solar plant goes live; will provide power for 1.1M people
- Carriers celebrate as Telecommunications Act of 1996 turns 20
- Obama’s new cybersecurity agenda: What you need to know
- Navy calls on researchers to create firefighting humanoid robot
- Law firm searches for plaintiffs for class action suit against Apple over 'Error 53'
- Angular 1.5.0 paves the way for Angular 2
- Samsung hopes Raspberry Pi can spread Tizen OS adoption
- Twitter gets an assist in taking on trolls and bullies
- 5G dreams in Barcelona: Cars, robots and VR games
- VMware gives enterprises a BYOD boost with three new tools
- Gartner: Vendors hype cloud revenue to impress Wall Street