www.fgks.org   »   [go: up one dir, main page]

Please wait while the page is being loaded Skip this advertisement >
CIO

Finance

Features
  • +

    6 things that should be in the CFO's budget -- not mine! 14 September, 2009 07:16:00

    CIOs are from Venus. CFOs are from Mars. And nowhere is this more obvious than at budget time.
    CIOs are from Venus. CFOs are from Mars. And nowhere is this more obvious than at budget time.
  • +

    Australia lagging in data security compliance: PCI Security Standards Council 21 May, 2009 13:43:00

    Lack of fines and public naming and shaming to blame for Australia's lag in adopting measures to protecti customers from credit card breaches.
    A lack of financial penalties and a mandate to publicly admit data breaches may be clouding the real state of credit card payment and security in Australia, according to a senior executive from the Payment Card Industry Security Standards Council.
  • +

    CommBank Launches New-look NetBank 18 May, 2009 16:33:00

    Changes to CommBank's portal part of a larger strategy to push the bank’s internal systems and processes out to the public and into customers’ hands
    The Commonwealth Bank has announced an upgrade of its customer service portal, NetBank, aimed at creating a single site, sign on and password to access a wider range of the bank’s websites and services.
  • +

    5 Tips on Getting Your Customers to Pay Their Bills 15 May, 2009 15:50:00

    Getting customers to pay up quickly is a critical part of business. Here are 5 ways to ensure that your customers don’t turn into payment laggards
    Getting customers to pay up quickly is a critical part of business. Here are 5 ways to ensure that your customers don’t turn into payment laggards
  • +

    Westpac Outlines St George IT Integration Strategy 07 May, 2009 12:27:00

    Westpac eyes off St George's CRM, teller and HR systems
    Westpac is to derive much of its future IT innovation and costs savings from a cross pollination of best-of-breed IT systems between itself and St George, which was acquired by the bank last year.
Polls

Does a successful CIO need to master the art of confrontation?

Yes, learning to negotiate through confrontation is a key skill
No, confrontation is the last resort of any kind of communication
View Results

URL
www.kyoceramita.com.au

Call us on
Australia: 1800 339 003
New Zealand: 0508 596 2732

Email us
marketing@kyoceramita.com.au

Did you realise that the cost or running a laser printer over its lifetime is likely to exceed the original purchase price by several times? To compare your current printer's running costwith a Kyocera printer, select the TCO Calculator

Total Cost of Ownership (TCO)
Kyocera Saves... Try our Saving Estimator now
Calculate Now

Testimonials

 

Wondering how to improve your business with UC on an IP Network?

Join Computerworld's Live Webinar where we will address the move many companies are making towards IP based voice services (SIP trunking, VoIP) and look at how they are using a single connection for data and voice rather than separate lines. Learn about the latest in IP networks and how it can help your organisation.

Wednesday 25th November 2009, Time 10.30 am EST (Sydney, Australia) Screening at your desk

Register now

  • +

    US lawmakers ask for FTC investigation of Google Buzz 30 March, 2010 06:43:00

    Eleven representatives question whether the launch of Buzz breached consumer privacy
    Eleven U.S. lawmakers have asked the U.S. Federal Trade Commission to investigate Google's launch of its Buzz social-networking product for breaches of consumer privacy.
  • +

    Gonzalez sentenced for multimillion-dollar credit card scam 26 March, 2010 08:24:00

    The judge imposes two 20-year concurrent sentences
    As his parents and sister silently wept, hacker mastermind Albert Gonzalez was sentenced Thursday in U.S. District Court to two concurrent 20-year stints in prison for his role in what prosecutors called the "unparalleled" theft of millions of credit and debit card numbers from major U.S. retailers.
  • +

    What Are the Most Overrated Security Technologies? 25 March, 2010 06:53:00

    Companies implement multi-factor authentication but don't always get the implementation right
    The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?
  • +

    Google still censoring porn for redirected Chinese users 25 March, 2010 06:46:00

    Users of one version of Google's Hong Kong site cannot change the SafeSearch filter setting
    Google is still censoring pornographic search results for users in China, even though they are now being redirected to a Google search engine that does not block sensitive political content.
  • +

    Proposed US law would single out cybercrime havens 25 March, 2010 07:01:00

    Under the law, the White House would track countries that are soft on cybercrime
    A bill introduced in the U.S. Senate Tuesday would compel the White House to identify international cybercrime havens and establish plans for cleaning them up.

Zones
SAS Resource Centre

This Resource Centre hosts a wealth of thought leadership articles, whitepapers, and success videos, to help you make the most out of your corporate information in order to swiftly make sound business decisions to survive and thrive in the current economic climate.

Oracle Resource Centre

News, Features and the latest whitepapers on SOA, Application Grid, Enterprise Management and Database

Upcoming Industry Events
Whitepaper

Computerworld Strategy Guide: Business Intelligence

Although BI holds great promise, implementations can be dogged by technical and cultural challenges. Executives have to ensure that the data feeding BI applications is clean and consistent so that users trust it. Learn more; read this Strategy Guide now.

CIO Industry Insight Podcast #9 Scott Dawes, VP of Applications Business Unit, Oracle ANZ
Listen to the latest edition of CIO Live which is now available for download.
Listen to the podcast
Sign up to the CIO Live email
Whitepaper
Securing People and Information: How to Protect Against Today’s Web-based Threats

This white paper explores the benefits of an Application Delivery Network, highlighting the ability to protect your users and applications and still deliver outstanding application performance with confidence, consistency and cost-effectiveness across your distributed network.

Read Whitepaper

Brought to you by