Facebook has released an open-source tool for monitoring operating system state changes across very large infrastructures, which could help engineers quickly diagnose performance and security issues.
By Jeremy Kirk | 30 October, 2014 12:00
The notoriety that comes with taking credit for a data breach is alluring. Declaring a successful data breach can suddenly bring a lot of attention, which is why posting bogus data is attractive.
By Jeremy Kirk | 30 October, 2014 11:49
Australian electronic payment business, Payment Adviser, has transitioned to a hosted virtual desktop as part of its outsourced business model.
By Hamish Barwick | 30 October, 2014 11:31
The future telecom industry will compete on who can provide the best converged experience, according to Telstra CTO Vish Nandlall.
By Adam Bender | 30 October, 2014 11:29
The Australian government today introduced a bill for mandatory data retention that will require telcos and ISPs to retain records of people's telephone and internet communications for two years.
By Rebecca Merrett | 30 October, 2014 11:20
The company behind CurrentC, an in-store mobile payment system backed by some of the biggest retailers in the U.S., attempted on Wednesday to play down a growing controversy over whether its backers could accept Apple Pay.
By Martyn Williams | 30 October, 2014 09:37
The dictum, "Please turn off all cell phones" at your local movie theater may soon be expanded to include Google Glass, smartwatches, GoPros, life-logging cameras, and a cast of thousands of other wearables.
By Zach Miners | 30 October, 2014 09:32
The Internet2 this week said it can now demonstrate a nationwide virtualized multitenant network that operates as multiple discrete, private networks.
By Jim Duffy | 30 October, 2014 08:11
Microsoft has handed out pink slips in a third round of job cuts that "almost" concludes its plan to eliminate 18,000 positions.
By Juan Carlos Perez | 30 October, 2014 07:26
High-tech entrepreneur Elon Musk made headlines when he said artificial intelligence research is a danger to humanity, but researchers from some of the top U.S. universities say he's not so far off the mark.
By Sharon Gaudin | 30 October, 2014 07:21
As the U.S. has discovered, it only takes a few cases of Ebola to turn things upside down.
By Patrick Thibodeau | 30 October, 2014 07:03
Microsoft has switched on special search features in Office 365 designed to help IT administrators keep tabs on employees' spreadsheets, a task becoming more difficult and more important in enterprises.
By Juan Carlos Perez | 30 October, 2014 06:46
Apple's new iPhones are poised to have a very strong holiday sales season in the U.S., said Kantar's Carolina Milanesi today.
By Gregg Keizer | 30 October, 2014 06:06
As small businesses make their Wi-Fi more enterprise-like, Ruckus Wireless wants to meet them where they live with that hallmark of consumer tech, the mobile app.
By Stephen Lawson | 30 October, 2014 05:32
Cybercriminals have a new tool to make the most of stolen credit card details before payment processors detect the fraud, security researchers warn.
By Lucian Constantin | 30 October, 2014 04:54
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- FTAccount Manager - DataNSW
- CCWeb / Mobile Developer - Magento - HTML5, CSS - Excellent CMS SkillsNSW
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- FTDigital Performance Manager - MediaNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTDigital Marketing CoordinatorNSW
- FTChief Information Officer - CSIROACT
This whitepaper discusses the challenge of BYOD and how best-practice deployments help deliver on the business promise of mobility with integrated protection throughout the workplace. • Flexible, end-to-end security enables enterprises to speed adoption of transformative technologies for a competitive edge • If employees feel that security policies impede productivity or encroach on personal data, they look for work-arounds • Integrated solutions that avoid overlapping functionality and streamline management can help organizations maintain tight security and ensure compliance
- Zuckerberg to connect with regular folk in first 'community Q&A'
- In Pictures: 12 shocking social media horror stories
- In Pictures: 10 cool new features found in iOS 8.1
- RCA gives unexpected boost to tablet market in Q3
- Apple surrenders top tablet satisfaction spot to Amazon
- Petition targets Apple over ‘spyware' in OS X Yosemite
- IBM drills into the energy industry for cognitive computing advances
- Vulnerabilities found in more command-line tools, wget and tnftp get patches
- Republican gains in Congress would have limited impact on big tech issues
- One code to rule them all: Dronecode
- What you should know about Lenovo's Motorola acquisition
- Sencha melds desktop and smartphone management with Space
- Sorry movie goers, Google Glass, other wearables banned from cinemas
- Drupal: If you weren't quick to patch, assume your site was hacked
- After rocket explosion, no air, water pollutants detected