Enterprise Applications

Research conducted in the UK has found 34 faults in different Oracle database servers, and most of these flaws have been identified as extremely critical vulnerabilities.

A growing number of IT workers could be shopping for an akubra hat and a sturdy pair of boots in the not too distant future, with a 70 percent increase in regional IT jobs forcing recruiters to source city based professionals to the bush.

Computer Associates has issued a challenge to the worldwide open source community to develop migration toolkits for Ingres r3, the open source licensed version of its Ingres database, with a prize pool of US$1 million up for grabs for the ...

Claims by the recently appointed ICT Minister Helen Coonan that the Australia-U.S. Free Trade Agreement posed no threat to Australia's ICT industry has been dismissed as woefully inaccurate by one of the country's leading advocates of open...

A new firm has been launched to bring back to life damaged and failing business units in storage networking and communications companies so that they can be used to deliver positive growth in these companies.

Veritas has become a member of the Open Source Development Labs (OSDL) to help spread awareness about the benefits of Linux and also aid in developing its capabilities for dealing with a wide range of enterprise problems.

The Australian Broadcast Exhibition is this week showcasing some of the most advanced and sophisticated technology used by high profile TV channels around the world for storing and managing digital assets.

Storage giant EMC Corporation has further signalled its intention get more deeply involved in the SME market in Asia Pacific with the launch of three new partner initiatives in the region.

Hot on the heels of the launch of Telstra subsidiary Sensis' multi million dollar launch of its search website, Yahoo Australia & New Zealand has introduced a website dedicated to local searches.

Hackers have been exploiting Google's advanced search capabilities recently to find Internet sites with weak security vulnerabilities so that they can infiltrate these sites with malicious viruses.

Pages