Automation Automation | Communication | Information | Technology | June 15, 2016 MTM Robotics Announces Multiyear Agreement with Airbus S.A.S. MTM Robotics has announced that it has entered into a multiyear agreement with Airbus to supply automated manufacturing equipment and… Read More Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Automation Automation | Case Studies | Reports | Technology | March 18, 2016 Robots in travel slowly gaining Australian approval Australian travellers are divided on how much a robot could add to the holiday experience, according to a global study… Read More Automation Automation | Cloud Computing | Communication | Information | Technology | March 11, 2016 F5 releases new 100 GbE VIPRION blade for the Internet of Things and network migrations from 4G to 5G VIPRION B4450 blade supports over 1 billion concurrent connections to address need for 5G networks to handle 100x connected devices.… Read More Automation Automation | Communication | Cyber Security | Security | Technology | March 9, 2016 Telstra and Cisco redefine customer experience with software defined networking Telstra has launched its first software-defined networking products for Australian customers, developed with Cisco, that lets businesses instantly deploy and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Information | Security | Technology | April 13, 2016 Cognitec’s FaceVACS-Entry Delivers Supreme Accuracy, Security and Usability for Passport Checks in eGates Latest face recognition algorithm B10 increases performance for lower quality passport photos Cognitec released a new software version for its… Read More Automation Automation | Case Studies | Reports | Technology | March 18, 2016 Robots in travel slowly gaining Australian approval Australian travellers are divided on how much a robot could add to the holiday experience, according to a global study… Read More Automation Automation | Cloud Computing | Communication | Information | Technology | March 11, 2016 F5 releases new 100 GbE VIPRION blade for the Internet of Things and network migrations from 4G to 5G VIPRION B4450 blade supports over 1 billion concurrent connections to address need for 5G networks to handle 100x connected devices.… Read More Automation Automation | Communication | Cyber Security | Security | Technology | March 9, 2016 Telstra and Cisco redefine customer experience with software defined networking Telstra has launched its first software-defined networking products for Australian customers, developed with Cisco, that lets businesses instantly deploy and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Case Studies | Reports | Technology | March 18, 2016 Robots in travel slowly gaining Australian approval Australian travellers are divided on how much a robot could add to the holiday experience, according to a global study… Read More Automation Automation | Cloud Computing | Communication | Information | Technology | March 11, 2016 F5 releases new 100 GbE VIPRION blade for the Internet of Things and network migrations from 4G to 5G VIPRION B4450 blade supports over 1 billion concurrent connections to address need for 5G networks to handle 100x connected devices.… Read More Automation Automation | Communication | Cyber Security | Security | Technology | March 9, 2016 Telstra and Cisco redefine customer experience with software defined networking Telstra has launched its first software-defined networking products for Australian customers, developed with Cisco, that lets businesses instantly deploy and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Cloud Computing | Communication | Information | Technology | March 11, 2016 F5 releases new 100 GbE VIPRION blade for the Internet of Things and network migrations from 4G to 5G VIPRION B4450 blade supports over 1 billion concurrent connections to address need for 5G networks to handle 100x connected devices.… Read More Automation Automation | Communication | Cyber Security | Security | Technology | March 9, 2016 Telstra and Cisco redefine customer experience with software defined networking Telstra has launched its first software-defined networking products for Australian customers, developed with Cisco, that lets businesses instantly deploy and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Communication | Cyber Security | Security | Technology | March 9, 2016 Telstra and Cisco redefine customer experience with software defined networking Telstra has launched its first software-defined networking products for Australian customers, developed with Cisco, that lets businesses instantly deploy and… Read More Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Cyber Security | Information | Security | Technology | February 19, 2016 Akamai Revolutionises Bot Management Industry-first Web Security Technology – Akamai Bot Manager – Designed to Allow True Management of Bots vs. Detection and Blocking… Read More Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next × Sign In Log In Lost password? Log In Don't have an account? Register Now! × Recover Password Recover Password Recover × Register Log In A password will be e-mailed to you. Register
Automation Automation | Information | Technology | February 17, 2016 COUNT® T – Single Photon Counter for Time-correlated Applications In time-correlated single photon counting (TCSPC), single photons are not only counted, but the time of detection is also determined… Read More Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next
Automation Automation | Big Data | Case Studies | Cyber Security | Information | Reports | Security | Technology | January 20, 2016 Securing Singapore’s Smart Nation Ron Totton, MD of SEA, BT Global Services looks at how governments should anchor security as a cornerstone of their… Read More Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next
Automation Automation | Case Studies | Cyber Security | Information | Reports | Security | Technology | November 11, 2015 Software Companies Adopting “Ring of Defense” Licensing Strategy to Reduce Hacker Theft According to a study from IDC and Flexera Software, a significant proportion of software companies feel their licensing and pricing… Read More Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next
Automation Automation | Cloud Computing | Communication | Cyber Security | Data Centres | Information | Reports | Security | Technology | November 11, 2015 Protected Health Information shows up in 90 percent of sectors, not just healthcare Initial findings from Verizon’s inaugural Protected Health Information Data Breach Report suggests securing PHI Data is a much more expansive… Read More Previous 1 … 9 10 11 12 13 14 Next