The US National Security Agency (NSA) propagated malware around the world in a bid to infiltrate and compromise more than 50,000 networks. The claim is the latest in the Edward Snowden disclosures and published in the German newspaper ...
Tags: Computer Products, software
A landmark industrial development site in one of Australia’s premier distribution locations has come on the market, with the purchaser able to benefit from the leasing income whilst obtaining masterplan approval to develop the site. ...
Tags: Landmark, Sydney, industrial, site, market
The Australasian Production and Inventory Control Society Ltd (apicsAU) will collaborate with LEI Group (part of the Leading Edge Group of companies) to offer online and instructor-led education and training programs to organisations and ...
Tags: apicsAU, partnership, offer, Lean, certification, program
Gulf Business Machines today used its inaugural Enterprise Mobility event in Doha to highlight how companies and governments can leverage smart phones and tablets. GBM discussed the increasing need for flexible and secure mobile solutions ...
Tags: Doha Event, Highlights Mobile Solutions, Gulf Business
An Accenture survey of 252 CIOs and 405 CMOs shows that, despite IT’s years of work toward business alignment, it remains far removed from marketing. Apparently, more IT executives care about the IT-marketing relationship than ...
Tags: CIOs, CMOS, IT-marketing
Sophos has released results of a study which shows some alarming findings on senior management’s knowledge of security procedures in SMBs. Risk of an Uncertain Security Strategy, conducted by Ponemon Institute and Sophos, ...
Tags: Sophos, SMB Managers, IT Threats
Three prominent U.S. senators have in a federal court filing questioned the claim of the National Security Agency that its bulk collection of phone records is required for intelligence purposes. The brief argues that after extensive ...
Tags: US Senators, NSA, Dragnet Surveillance
IT market research and advisory firm IDC has highlighted the potential for Application-Centric Infrastructure to benefit businesses and organisations in the Middle East. The ACI approach was recently announced by Cisco, and it aims to ...
Tags: IDC, Cisco, Application-Centric Infrastructure, Middle East
Google’s privacy policy and terms of service violate German data protection law, the Regional Court of Berlin ruled Tuesday. The clauses are too vaguely formulated and can restrict the rights of consumers, said the Federation of ...
Tags: Google, Privacy Policy, terms of service
Four scientists from top pharmaceutical companies have collaborated to bring together the successful strategies for implementing an electronic patient reported outcome (ePRO) system in the form of an ebook. The handbook named "How to ...
Tags: ePRO Strategy, PHT
IDC have released the results of a study which says that EMC’s backup and recovery solutions are measurably improving businesses. The whitepaper – “Generating Proven Business Value with EMC Backup and Recovery Solutions: ...
Trend Micro’s Integrated Data Loss Prevention product has won DLP Solution of the Year at the prestigious Computing Security Awards. The internet security specialist was handed the award at a ceremony in London’s Russell Hotel ...
Tags: Trend Micro, clinch, DLP, award, London
Over a quarter of businesses are not equipped to deal with the convergence of new technologies, including mobility, social networks, big data, cloud computing and the Internet of Things, according to research from international standards ...
Tags: firm, converge, 5, technology
IT professionals have plenty of reasons to be thankful these days: rising budgets, salaries and job tenures among them. But when it comes to IT management and spending priorities, they often don’t see eye-to-eye with their ...
In light of Typhoon Haiyan, security vendor Symantec has warned the public to remain vigilant following a series of online charity scams. Over 10,000 people have died as a result of the disaster, which has decimated Leyte and Samar ...