Greg Nojeim - News, Features, and Slideshows
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
By Grant Gross | 17 October, 2014 04:02
U.S. President Barack Obama failed to address the National Security Agency's reported efforts to weaken encryption standards and circumvent online encryption technologies in a speech Friday about surveillance reform.
By Grant Gross | 17 January, 2014 20:47
U.S. President Barack Obama's proposed changes to the National Security Agency's surveillance programs don't go far enough, some technology and digital rights groups said, while others hailed it as a good first step.
By Grant Gross | 17 January, 2014 20:00
The U.S. Department of Justice defended the National Security Agency's massive phone records collection program after a U.S. District Court judge ruled Monday that the program is likely to violate the U.S. Constitution.
By Grant Gross | 16 December, 2013 22:03
A U.S. Senate committee has voted to approve a bill that would leave in place the U.S. National Security Agency's bulk telephone-records collection program, with some limits.
By Grant Gross | 31 October, 2013 23:52
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTAcquisition Marketing ExceutiveNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
This white paper outlines the driving forces behind businesses establishing corporate application stores, the benefits of such an approach, and what to seek in a solution that supports this strategy. • The next wave of mobility is coming at us in the form of mobile applications. • Savvy companies are deploying commercial and custom mobile applications for their lines of business • Organisations must devise a viable strategy for managing the applications that employees will use on mobile devices
- Apple's Black Friday sale includes iPhone for the first time
- France, Germany want EU to take a tougher stance on tech firms
- Coming soon: Murder by Internet
- Distracted? Slap this Hitachi gizmo on your forehead to focus
- Uber suspends Nevada operations, affecting nearly 1,000 jobs
- Sony confirms development of e-paper smartwatch
- Sydney Startup Weekend doubles attendance in one year
- ASIC unhappy with exclusion from data retention regime
- Australian Internet Security Initiative portal launched to help ISPs
- How SBS scaled up for FIFA World Cup online
- Hail pounds telecom networks in Queensland
- RMIT University builds virtual networking labs for students
- Weather.com fixes web application vulnerabilities
- Early version of new POS malware family spotted
- Syrian Electronic Army posts hacking message on several news sites