Greg Nojeim - News, Features, and Slideshows
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
By Grant Gross | 17 October, 2014 04:02
U.S. President Barack Obama failed to address the National Security Agency's reported efforts to weaken encryption standards and circumvent online encryption technologies in a speech Friday about surveillance reform.
By Grant Gross | 17 January, 2014 20:47
U.S. President Barack Obama's proposed changes to the National Security Agency's surveillance programs don't go far enough, some technology and digital rights groups said, while others hailed it as a good first step.
By Grant Gross | 17 January, 2014 20:00
The U.S. Department of Justice defended the National Security Agency's massive phone records collection program after a U.S. District Court judge ruled Monday that the program is likely to violate the U.S. Constitution.
By Grant Gross | 16 December, 2013 22:03
A U.S. Senate committee has voted to approve a bill that would leave in place the U.S. National Security Agency's bulk telephone-records collection program, with some limits.
By Grant Gross | 31 October, 2013 23:52
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCSenior Android DeveloperNSW
- CCTechnical Tester - AutomationVIC
- FTSenior Oracle DBANSW
- CCDesktop Support L1, 2 & 3NSW
- FTNetwork Engineer | NV1 NV2 clearance | Defence projects | Immediate interviewACT
- CCETL DeveloperNSW
- CCObjective ECMS Technical ConsultantSA
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC
- CCPython Web Developer - DevOPS EnvironmentVIC
- CCSenior Systems Analyst (Biomedical)SA
- FTSecurity ArchitectWA
- CCInformation ArchitectQLD
- FTNetwork Engineer | NV2 clearance | Defence projects | Immediate interviewACT
- CCIT Hadoop DevelopersQLD
- FTJava Web Development OpportunityVIC
- FTLevel 2 IT Support TechnicianVIC
- CCDBA (Oracle/SQL)NSW
- CC.NET DeveloperACT
- CCJava Developer - Front/ Back EndVIC
- CCAndroid and iOS DevelopersVIC
- FTServer EngineerNSW
- CCSolutions ArchitectNSW
- CCVMWare Horizon View 6.1 roll out & IT support | Short contract | Macquarie ParkNSW
- CCService EngineerVIC
- FT.NET Tech LeadVIC
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Poseidon hacker group behind long-running extortion scheme
- Is Docker ditching Ubuntu Linux? Confusion reigns
- Google will stop accepting new Flash ads on June 30
- FBI Director entreats tech firms to release encrypted data used in crimes and terror
- World's largest solar plant goes live; will provide power for 1.1M people
- Carriers celebrate as Telecommunications Act of 1996 turns 20
- Obama’s new cybersecurity agenda: What you need to know
- Navy calls on researchers to create firefighting humanoid robot
- Law firm searches for plaintiffs for class action suit against Apple over 'Error 53'
- Angular 1.5.0 paves the way for Angular 2
- Samsung hopes Raspberry Pi can spread Tizen OS adoption
- Twitter gets an assist in taking on trolls and bullies
- 5G dreams in Barcelona: Cars, robots and VR games
- VMware gives enterprises a BYOD boost with three new tools
- Gartner: Vendors hype cloud revenue to impress Wall Street