Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

NICTA and Infosys sign ICT research collaboration deal

Organisations to focus on cloud resiliency, infrastructure optimisation projects.

National ICT Australia (NICTA) and technology services firm Infosys will be conducting research into technology problems which affect businesses such as cloud computing resiliency.

Outcomes of the joint collaboration project may also include infrastructure optimisation which could allow companies to take advantage of big data.

Sydney Water and NICTA partner to predict water pipe breakages

NICTA to help protect the US drone fleet

NICTA to lead $5m geothermal energy project

In addition, NICTA and Infosys plan to work on what they refer to as `platformisation’ research. This will involve the development of techniques to harvest software architectures, functions and processes from large code bases in order to create new systems for cloud-based platforms.

The joint research project will include PhD student internships with Australian universities, professional exchange programs and the commercialisation of intellectual property over the next five years.

NICTA CEO Doctor Hugh Durrant-Whyte said in a statement that the collaboration will provide it with access to “real world” technology problems.

The partnership was announced during NICTA’s annual technology convention, TechFest, which took place at Parliament House in Canberra on 13 February.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Infosys, NICTA, Sydney Water
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: nicta, infosys, Hugh F Durrant-Whyte, ICT research, cloud computing
Latest Blog Posts
Whitepapers
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
  • The CIO Paradox
    As there are timeless leadership principles underlying IT value, there are unfortunately also timeless challenges that thwart the IT organisations efforts and make for a rocky path to CIO success. These are the inherent contradictions we call the CIO Paradox.
    Learn more »
  • Top 20 Critical Security Controls - Compliance Guide
    Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO