• International

    An Australian in Albania


    Sophie Mayo |  October 23, 2019


    In July of 2019, GAP Intern Sophie Mayo was lucky enough to travel to Albania in Southern Europe for a summer holiday experience slightly off the beaten track.  Albania certainly delivered on her expectations and in this article she reflects on her experiences in the Balkan state.


  • Environment

    Managing the hidden water beneath our feet


    Rebecca Nelson |  October 23, 2019


    Decision-makers have significant discretion when it comes to regulating groundwater, but there is too little transparency about how it is used and its effect on the local environment.


  • Infrastructure

    Bigger on the inside?


    Open Forum |  October 23, 2019


    Could Australia’s housing crisis be solved, not with a bold expensive plan, but with sneaky, under-the-radar remedies? Architectural researcher Alysia Bennett has been working on some strategies she thinks might work.


Latest Story

  • Uncategorised

    Asian Studies and the Myth That One Size Fits All

    Warren Reed     |      June 16, 2008

    Let's face it, you ever only realise how fundamental your home grammar is when you study another language, especially one from a vastly different cultural or civilization bailiwick.

  • Uncategorised

    Enterprise-ing Web 2.0

    Greg Stone     |      June 15, 2008

    Interoperability is emerging as the key to making Web 2.0 transferable to the corporate environment.

    There have been countless discussions on how consumer expectations set by Web 2.0 are being transferred to the workplace. Based on working with Web 2.0, users increasingly expect to exert more control over their work experiences and to participate in them. They expect business applications to adjust to the way they work, rather than accept a suboptimal experience. This we know.

    Ultimately, Web 2.0 is not really about the technology. It's about social networks and users' control of their experience. The way to achieve this movement of power to the end user in the enterprise is through a composite solution that meshes software, services and the web and considers the business user as well as the developer.

    Composite applications are the business users' equivalent of Web 2.0 and mash-ups. They provide a mechanism for multiple technology vendors to participate in a solution that, in its simplest form, decouples information from line-of-business (LOB) applications like CRM or ERP and surfaces it in a more usable way.

  • Uncategorised

    A call for maturing our approach to IT security and risk

    Gavin Struthers     |      June 13, 2008

    Gavin Struthers

    For many businesses, justifying a budget for IT security remains a perennial challenge.

    As part of McAfee’s participation in E-security Awareness Week, I’ve spent the last three days talking directly to customers at an Executive Summit we hosted in the Hunter Valley in New South Wales, and gleaned some of the challenges organisations are currently facing.

    In the context of what challenges face CxO’s and security managers when it comes to better securing corporate networks and managing risk, there is a definite sense of this being a "work in progress". Their call was to make the proposition simpler while providing higher levels of protection and compliance.

  • Uncategorised

    Keeping our kids safer online

    editor     |      June 12, 2008

    Martyn Wild

    Our kids might understand and recite the safety messages we tell them, but this rarely has much impact on their everyday behaviours.

    The cybersafety discussion is more important today than it has ever been. Not simply because of the scare stories that are emerging with ever-increasing frequency (only last Thursday [5 June] we witnessed large numbers of Australians, including at least one teacher and a police officer, identified in the worst type of child exploitation). But more so because, (i) children are changing their use of the Internet; and (ii) their parents are evidently not taking responsibility for the implications that arise from that use.

  • Uncategorised

    Innate virus protection by applying POLA and Object Capabilities

    quagga     |      June 11, 2008

    Contrary to the assumptions of most people- it is possible to create computer operating systems and programs that are immune to arbitrary attack by viruses and unauthorised access. In fact the foundational knowledge of how to build such a system has been known and applied for over thirty years. Unfortunately this knowledge has never been […]

  • A shift in thinking

    Julie Inman - Grant     |      June 11, 2008

    While we all have our own safety guidance, coming together to consolidate these messages and working across sectors is critical to making impact with consumers.

  • Uncategorised

    Why we’re teaching kids to teach their parents

    editor     |      June 10, 2008

    Mark McPhersonBy Mark McPherson

    If little Jimmy comes home from school and asks you to scan the home computer for trojans, listen to what he's talking about – chances are he knows more than you do.

    This week we'll be working with kids from about half a dozen schools in Brisbane and taking them through a series of workshops at a purpose-built training facility at the University of Queensland.

    We're going to break them up into mixed groups where they'll work with their  teachers to solve real problems faced every day by home computer users.

    The challenge for us at AusCERT is that many of the attacks these days are carried out from computers in average homes, in average suburbs, often without the knowledge of the computer owners, so we're hoping to enlist average Australian kids in the struggle against cybercrime.

  • Uncategorised

    Telstra and the Tio, partners in crime

    Cyberbitz     |      June 8, 2008

    For a long time I thought I was the only one having trouble with Telstra, and that the TIO was an independant government body who would sort this out fair and quick. Not so, after many months of hearing and reading Telstra horror stories I have come to believe that Telstra is an unstoppable giant criminal rogue with the TIO […]

  • Uncategorised

    Does e-Security Matter?

    editor     |      June 6, 2008

    Rob ForsythBy Rob Forsyth

    The worldwide revenue from cybercrime is now more than $100 billion per year – this is the extent to which organised crime has embraced the internet.

    Why should you be interested in the message of e-security week?

    Let's imagine, for a moment, that you are already familiar with the many risks on the internet. Your employer is running good software at your email and web gateways. Your HR department regularly gives you sound security advice, such as not opening unexpected attachments, even from people you trust. (How do you know they really sent it?)

    You have an active firewall; you use strong passwords and protect them; you bank using two-factor authentication; and you don't surf to internet sites that aren't related to your business. You're protecting yourself, and you realise that at the same time you are protecting the next guy, too, through responsible internet citizenship.

  • Uncategorised

    CRM solutions – avoid the pitfalls; reap the rewards

    James Simpson     |      June 5, 2008

    For the midmarket, integrated CRM solution improves business productivity at a low total cost of ownership.

    Building and maintaining strong, solid relationships with customers is essential to the success of any business. According to Adam Sarner, an analyst with Gartner who focuses on the customer relationship management (CRM) industry, obtaining a new customer is 10 times more expensive than retaining an existing one.

    It's no secret that automating and integrating processes and procedures previously confined to paper and incompatible, disparate applications is proving to be a  cornerstone for effectively managing customer relationships.

    Until recently though, affordable technology designed specifically to meet the customer CRM needs of midmarket businesses, was not available to these organisations. That's all changed – and for the better.

    When it comes to customers, sales and service are fundamental to an organisation's success. If salespeople can't manage leads and opportunities, sales will doubtlessly be lost. And the service they do deliver is likely to be inconsistent.

  • Uncategorised

    You don’t know what you’ve got…. Until it’s gone

    Douglascomms     |      June 5, 2008

    Cyberspace is a little like the real world, and cocky kids who think they know what they're doing can get into just as much trouble online as they can at the local shops, park or pub for that matter.

  • Uncategorised

    The real value of technical innovation

    proberts     |      June 5, 2008

    Yes, process and entreprenurial innovation is crucial – but let's not forget the importance technical innovation.

    It is always hazardous to make a distinction between technical and non-technical innovation, lest one be accused of favouring one over the other. As has been pointed out, technical innovation is still a critical area where Australia is falling behind the rest of the world.

    Business spends only the equivalent of one per cent of GDP on R&D, half the OECD average and a third of that of the leaders – even Icelandic business does better. Our venture capital sector which might fund businesses to come from research is 0.1 per cent of GDP – again even Iceland manages more. Australia accounts for a mere one half of one per cent of global exports in technology-intensive industries.

    The fact is there are few R&D driven business on the stock exchange other than the familiar, Cochlear, Resmed and CSL. Most of our top companies are banks or miners. Multi nationals from Ericcson to JDS Uniphase have voted with their feet and ceased large scale R&D in Australia while most global giants in pharmaceuticals and IT spend a fraction on R&D locally compared to overseas rates.