Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »
Highlights
Latest News
Twitter Feed
Top Story

Flying high: How Jetstar's David Hall snared the top job

Jetstar A/NZ chief, David Hall, discusses how he rose up the ranks from finance teams to technology and strategy leadership on his way to CEO.

Top News
  • CIO Plus

    The six mindsets of effective leadership

    The world of IT leadership has changed; it’s no longer about keeping IT systems humming. It is now about the ability to lead high performance organisations that partner with the business to consistently deliver services.

  • Business Continuity

    Deloitte launches crisis management service

    Professional services firm, Deloitte has launched a crisis management arm in Australia to help organisations deal with disasters from data breaches to an outbreak of Ebola.

  • Mobile/Wireless/Convergence

    NBN Co chief expects Telstra, Optus talks to end in 2014

    National Broadband Network negotiations with Telstra are on the “home stretch” and could be submitted for government approval by the end of the year, NBN Co CEO Bill Morrow has said.

  • In pictures: CIO Summit Melbourne 2014

    CIOs and IT leaders gathered at Melbourne's Grant Hyatt to hear from their industry peers about technology and business priorities, moving to a CEO role, turning data into competitive advantage, reducing the risk of project failure, and more at the CIO Summit.

  • Security and Privacy

    Privacy complaints jump by 183% in FY14

    The Office of the Australian Information Commissioner (OAIC) received 4,239 privacy complaints during FY14, a 183 per cent increase on the 1,496 received in the previous financial year, according to a report.

  • CIO Plus

    In pictures: CIO roundtable - Is hybrid cloud the future?

    IT leaders gathered at Sydney's Cafe Opera to discuss the opportunities and risks of deploying hybrid cloud computing models.

  • Google to build Play-like hardware store for Project Ara

    Drawing inspiration from its Play Store, Google will create a hardware store in which users can buy and sell Lego-like hardware modules for the customizable Project Ara smartphone.

  • Enterprise

    Google rethinks webmail with Inbox, raising questions about Gmail's future

    Google is taking another crack at email overload, but this time around it's resorting to drastic measures, developing a new product apparently built from scratch without relying on Gmail.

  • Government

    Victorian police spend $15m on IT refresh

    The Victorian police spent a total of $15 million on an IT refresh during the 2013-14 financial year, including the replacing of a distributed server network, transitioning from Windows XP to Windows 7 and designing new data centre

  • Government

    NSW govt dives deeper into data, digital

    The New South Wales government has revealed plans to digitise public records and make it easier for agencies to share data.

  • Big Data

    Distributed computing project enables UNSW's DNA research

    The University of New South Wales (UNSW) is using donated computing power to make 20 quadrillion comparisons of 200 million DNA proteins.

  • Health

    Telstra enters e-health space

    Telstra (ASX: TLS) has launched an e-health business division called Telstra Health as it looks to connect patients with doctors via video conferencing, said group executive of retail, Gordon Ballantyne.

  • Mobile/Wireless/Convergence

    Bunnings drives productivity with iPod Touch rollout

    Bunnings is aggressively developing mobile apps for its retail employees following a deployment last Christmas of 1500 iPod Touch devices to store staff, according to the company's mobility team leader.

  • Security

    Identity crime costing Australia $1.6b every year, govt says

    The economic impact of identity crime on Australia is costing the country up to $1.6 billion each year, according to a new report by the Attorney-General’s Department.

  • In Pictures: 15 of the scariest things hacked

    From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.