Menu

Stories by Christopher Jay

Tough approach to sensitive data

Public servants about to trade in old computers now have a drastic way of ensuring that no unauthorised persons are able to access politically sensitive material from the discarded hard drives.
The technique uses a unit called a degausser to apply a strong magnetic field that destroys any conceivable chance of reconstituting the original material. One problem for those concerned about recycling used computers is that it also wipes out the hardware in the process.

Written by Christopher Jay01 June 08 22:00

Wiki helps problem solving

Public service departments that initially believed the internet was the highway to massive savings are now running head-on into the realities of two-way web interaction and greater reliance on outside parties for some of their most intractable problems.
What is commonly referred to as Web 2.0, in the form of blogs, joint information sharing tools (wikis), electronic one-on-one chat and moderated discussion forums, is starting to have a greater impact than the previous great white hope, putting routine transactions on the web to slash delivery costs.

Written by Christopher Jay31 May 08 22:00

Tackling an ongoing issue for IT bosses

Government departments concerned about IT security should be moving to a more general risk management approach, combining oversight of computer system availability, performance quality and compliance issues as well as technical security measures, according to security specialist Symantec.
A report on IT manager and executive attitudes from a range of countries, including Australia and others in Asia, shows specific security oversight being subsumed into a high-level policy remit, with executives being made responsible for the whole panoply of satisfactory computer system results.

Written by Christopher Jay30 Jan. 08 22:00

The dash to improve BI systems

One of the marks of a successful business intelligence software system is the ability to quickly produce consolidated summaries known as dashboards. The dashboards are, in turn, related to the growing trend of centralising data.
Brisbane-based Infohrm Group created a dashboard recently for the University of Southern Queensland, the Australian Catholic University and Swinburne University of Technology. It charts resource management, planning and productivity.

Written by Christopher Jay26 Nov. 07 22:00

Loss of electronic memory is no longer a reliable strategy

Software that can sort through voicemails and recorded conversations, even allowing for regional accents, has joined the growing array of IT equipment being used in legal forensic work and even in electronic document discovery.
One result of searches with this new software is the occasional shocked witness confronted with emails dispatched as much as five years previously, contradicting the bland denials they have just given.

Written by Christopher Jay12 Nov. 07 22:00

Pack up the data and save some money

The cost of IT data storage space is becoming a major problem for large government departments, chewing up ever increasing amounts of space and needing more power, cooling and scarce IT talent.
Apart from the cost, growing political pressure on environmental issues means the rising power consumption and cooling load have become key issues.

Written by Christopher Jay15 Sept. 07 22:00

Invasion of the botnets a real and urgent threat

In contrast to the spectacular computer virus outbreaks four years ago, today's attacks are subtle, discreet, carefully targeted and designed to stay below the radar of official security agencies.
One form of these silent yet all-pervasive attacks involves marshalling unprotected home computers into unwitting electronic slave networks called botnets.

Written by Christopher Jay12 Sept. 07 22:00