Iomega Corporation has released the first NAS servers designed for remote offices that can manage data from the desktop through the use of Microsoft Windows Storage Server 2003.
Following the recent disaster at Westpac, when it was brought to its knees by the Sasser worm, new research has revealed that the majority of Australian financial institutions are not prepared for these kind of crises.
Australian and New Zealand archivists have teamed up to develop, build and implement a common set of strategies for making, keeping and using digital records in governments so that they do not get lost in the future.
Australia's Open Source industry body has released a position paper to instil confidence into Australian companies interested in exploiting open source opportunities and to calm fears created by the SCO vs IBM case.
Researchers at the University of South Australia have developed intelligent watermarking techniques that give owners copyright protection on images and data used in Internet and other applications.
Australian and New Zealand archivists have teamed up to develop, build and implement a common set of strategies for making, keeping and using digital records in governments so that they do not get lost in the future.
Australia's Open Source industry body has released a position paper to instil confidence into Australian companies interested in exploiting open source opportunities and to calm fears created by the SCO vs IBM case.
Researchers at the University of South Australia have developed intelligent watermarking techniques that give owners copyright protection on images and data used in Internet and other applications.
Computer Associates International has committed itself to making major investments into future wireless technologies, web services and open source capabilities to enable companies to manage storage, security and computing issues from a single suite.
Although Macs have a reputation for having fewer security risks than PCs, Apple users have been updating their software recently to guard against security holes which could leave their computers open to infiltration.