Blogs

Chief Information Officers face some of the greatest challenges and opportunities they have yet to experience, according to a Gartner report, which forecasts that IP telephony, convergence and instant messaging will be some of the key area...

A survey carried out with 50 Australian mid-market organisations by IDC Australia on behalf of IBM has discovered that IT outsourcing in this market can achieve cost savings up to 38 percent.

Linux distributor Red Hat has reached an agreement with storage vendor Network Appliance to develop and deploy iSCSI IP storage area networks (SANs) within Linux environments.

Businesses, schools and councils will be able to receive free broadband access and telephone calls in South Australia thanks to the investment of a local ISP which aims to provide a community based service.

Hewlett-Packard had decided to sign a deal with Veritas to OEM its virtualisation services instead of creating its own, which brings its original plans a year ahead of schedule.

While 2004 has been the year of the tech resurrection, with a return to positive IT spending growth, 2005 is expected to be the year of tech realignment, with a flurry of activity expected across most sectors in the coming 12 months.

The national telecommunications company has been accused of losing touch with its senses by charging people to use its Sensis directory service number, which has riled at least one frustrated small business owner in Sydney.

Despite having the wonderful resource that is the Internet at our fingertips, finding a certain piece of information can still be as difficult as finding the proverbial needle in a haystack. Meta tagging software makes it easier for organi...

The physical meltdown of a company's data centre is undoubtedly one of the most disastrous events that could befall any organisation. Stuart Finlayson talks to someone whose company is dedicated to ensuring that such an eventuality never occurs.

Spyware is set to increase massively over the next few years, which will increase the chances of information being stolen from PCs, the likelihood of identity theft and the selling of information back to anyone who is willing to pay.

Pages