NICTA and Infosys sign ICT research collaboration deal
- 13 February, 2013 15:45
National ICT Australia (NICTA) and technology services firm Infosys will be conducting research into technology problems which affect businesses such as cloud computing resiliency.
Outcomes of the joint collaboration project may also include infrastructure optimisation which could allow companies to take advantage of big data.
In addition, NICTA and Infosys plan to work on what they refer to as `platformisation’ research. This will involve the development of techniques to harvest software architectures, functions and processes from large code bases in order to create new systems for cloud-based platforms.
The joint research project will include PhD student internships with Australian universities, professional exchange programs and the commercialisation of intellectual property over the next five years.
NICTA CEO Doctor Hugh Durrant-Whyte said in a statement that the collaboration will provide it with access to “real world” technology problems.
The partnership was announced during NICTA’s annual technology convention, TechFest, which took place at Parliament House in Canberra on 13 February.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Top 10 tips for Migration
- Integrated Computing Platforms: Infrastructure Builds for Tomorrow’s Data Centre
- Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
- Moving to a Private Cloud? Infrastructure Really Matters!
- Getting Real About Security Management and Big Data – A Roadmap for Big Data in Security Analytics
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
BYOD and Beyond - Implementing a Unified Access Solution
The rise of BYOD programs is the single most radical shift in the economics of client computing for business since PCs invaded the workplace. Whether you are contemplating the creation of a BYOD program or currently trying to establish one, this fact cannot be overstated. Find out how to overcome these challenges.
Tips Choosing a Cloud Service Provider
Because cloud is still a new and evolving business model, it can be argued that the decision to select a cloud service provider should be approached with even greater diligence than other IT decisions. Many providers use the same term to define very different services, “hybrid cloud” is one example, making it difficult to compare offers. This whitepaper will help enterprises evaluate their options in two critical areas: the cloud service portfolio and the service provider itself. Read now.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.