With an update to its namesake configuration tool, Puppet Labs has introduced a programming language designed to give administrators more flexibility in scripting their deployment routines.
Google may be attempting to snap up social mapping and traffic service Waze, despite long-standing rumors that Facebook is already in talks to buy the company for as much as $1 billion, according to a report from Bloomberg.
The latest version of Google's sophisticated anti-spam algorithm, dubbed Penguin 2.0, was announced yesterday in an official blog post from the company's well-known webspam czar, Mike Cutts.
The ASX Group should work on its communication skills with the market during technological outages, the Australian Securities and Investments Commission (ASIC) said in a report released today.
With the full Senate starting its debate on a comprehensive immigration bill, Republican lawmakers in the House have released a plan of their own, complete with a slick website.
The Department of Homeland Security (DHS) Thursday said it has notified employees and others with DHS clearance to be on alert for potential fraud due to a vulnerability discovered in software used by a vendor to process personally identifiable information (PII) for background investigations. The software hole in had been there since July 2009.
The Tasmanian government has earmarked $28 million for the establishment of an ICT Project Fund. Funding for 2013-14, revealed in today's state budget, will total $4 million, with funding increasing annually up to $10 million in 2016-17.
Lyft, the ridesharing service known for its fleet of pink mustache-festooned cars, is eyeing international expansion supported by its biggest funding round yet.
Amid a growing appetite among public-sector agencies for mobile applications to improve services, Salesforce.com debuts new government collaboration, app-development tools.
Bob Metcalfe, who 40 years ago invented Ethernet along with David Boggs, spent two hours this week regaling Reddit users with his thoughts on everything from software-defined networking to Internet porn.
China's remarkable success in infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology, security experts say. They're just very persistent and very good at remaining undetected for long periods of time.
Sign up now »
- FTTechnical Business AnalystNSW
- FTSenior Python DeveloperNSW
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTQuality ManagerSA
- FTOS Web Applications DeveloperNSW
Traditional security controls for enterprise don’t necessarily translate into the new world of virtualisation and cloud environments. When mapping out a secure virtualisation roadmap, click to find out about pave ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia