IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Stories by Staff - Page 15

Story image
Hands-on review: Dragon Naturally Speaking NZ Legal Edition
Wed, 23rd Mar 2016
#
gaming
#
reviews
#
digital entertainment
This article has been written using Dragon Legal NZ speech recognition software. If you are not familiar with it, it is a godsend.
Story image
Shorter .nz domain names reach critical mass
Tue, 22nd Mar 2016
#
martech
#
software development
#
domain names
Those with a keen eye may have noticed a new-look type of .nz name recently - one that’s shorter and more direct.
Story image
Video Calls: An Area of Untapped Productivity
Fri, 18th Mar 2016
#
uc
#
video conferencing
#
video communication
Video calls demand a higher level of engagement in meetings, sales calls, and interviews, presenting an opportunity to improve productivity.
Story image
Five tips for choosing the right Cloud backup provider
Wed, 16th Mar 2016
#
dr
#
healthtech
#
cloud services
Secure, compliant, restorable: Key criteria for selecting your ideal cloud backup partner to safeguard vital business data.
Story image
Why digital marketing is the new traditional marketing
Tue, 15th Mar 2016
#
martech
#
open source
#
digital marketing
Digital marketing eclipses old ways, becoming the standard in a tech-led era of omnipresent consumer connection.
Story image
App review: Hands on with iOS Hedgehogers
Mon, 14th Mar 2016
#
smartphones
#
gaming
#
reviews
Hedgehogers may not look like anything special, but it has still got plenty of character. The mechanics make it genuinely addicting.
Story image
Hands-on review: Corsair H5 SF Low-Profile Liquid CPU Cooler
Fri, 11th Mar 2016
#
gaming
#
reviews
#
digital entertainment
​The H5 SF serves a very specific purpose: superior cooling for small form factor cases running Mini ITX boards.
Story image
Under attack? These four things will mitigate most cyber breaches
Thu, 10th Mar 2016
#
cybersecurity
#
cyber attacks
Cyberattacks are a fact of life for Australian business, but they don't have to be - here are four ways to help stop most cyber breaches.
Story image
Using converged data center infrastructure to compete at the speed of disruption
Thu, 10th Mar 2016
#
devops
#
converged infrastructure
#
apm
Hewlett Packard Enterprise's Raj Thakur outlines how converged data center infrastructure can help enterprises compete at the speed of disruption.
Story image
Hands-on review: Corsair 600, 400 and Spec-Alpha Cases
Thu, 10th Mar 2016
#
gaming
#
reviews
#
digital entertainment
The latest cases from Corsair are among the best choices for anyone building a middle or high-performance computer.
Story image
Kung Fu Panda 3 review: Karate chop or epic flop?
Mon, 7th Mar 2016
#
gaming
#
reviews
#
digital entertainment
Often by the time an animated movie is on to its second sequel the film is quietly relegated to a ‘straight to DVD' release.
Story image
Why should your business have a cloud PABX?
Mon, 7th Mar 2016
#
uc
#
telco
#
conversant
Uptake of cloud computing services is soaring. However, many Australian businesses are yet to discover the value of cloud communications services.
Story image
The surprisingly scary patterns revealed in hack attacks
Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.
Story image
Be sure you benefit during the year of SD-WAN
Thu, 3rd Mar 2016
#
network infrastructure
#
sd-wan
#
sdn
Is 2016 the year of software-defined wide area networks? More and more companies are leveraging SD-WAN to bring their idle Internet links to life.
Story image
Embrace VoIP and help customers escape the clutches of large telcos
Thu, 3rd Mar 2016
#
uc
#
telco
#
conversant
Rescuing customers from the high cost and inflexibility of traditional telecommunications services presents IT resellers with great new opportunities.
Story image
Getting Ready for Industrie 4.0
Thu, 3rd Mar 2016
#
it industry
#
digitisation
#
industrie 4.0
Industrie 4.0 is about driving digital value chains, thus creating more agile and market focused competencies.
Story image
Is there a way to sync, share and control data securely?
Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.
Story image
Going mobile: How to have secure file-sharing, backup recovery and access
Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation’s data in a world where your employees, contractors and partners are working on mobile devices?.
Story image
Endpoint data protection: A buyer's checklist
Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Story image
Backing up your data and devices for a swift recovery
Fri, 26th Feb 2016
#
dr
#
cloud services
#
netsafe
Learn how to create a backup policy that works for you in the real world, reflects how important your data is and the risks you're prepared to accept.