Browse by Tags

  • Blog Post: Protecting student privacy

    “No one shall be subjected to arbitrary interference with [his or her] privacy.” - The Universal Declaration of Human Rights , United Nations, 1948 New Zealand’s schools work hard to earn the trust of their communities. As part of the important work they do, schools need to collect...
  • Blog Post: Microsoft releases NZ privacy guide for Office 365

    New Zealand organisations are quickly deploying cloud computing. Low prices and convenience are appealing, but there are also important questions to ask around privacy, security, and data integrity. Waldo Kuipers, Corporate Affairs Manager at Microsoft NZ, says “Organisations know that trust...
  • Blog Post: Cloud computing standards

    With responsible adoption of cloud computing services at front of mind for many organisations and policy makers, it is timely to consider the global context and New Zealand's work to advance trustworthy computing. This article was originally published by Standards NZ in Touchstone Issue 48 - April 2013...
  • Blog Post: Innovate with Cloud Computing

    Businesses use technology to improve productivity. They need it to speed up innovation, and help with the basic needs to save money and get more done. Internet-based subscriptions make cloud computing a cheaper way for businesses to get computer technology working for them. Capital expenditure and...
  • Blog Post: Keeping Safe Online

    New Zealand’s first Cyber-Security Awareness Week is on now. It's been organised by NetSafe and the Government, with support from businesses including Microsoft and MSN New Zealand Ltd. It’s a time for everyone to work together to help all Kiwis be safer online. Unfortunately, criminals...
  • Blog Post: Ten years of Microsoft's Trustworthy Computing initiative

    In 2002, Bill Gates wrote an email to all Microsoft employees that made trustworthy computing – including security, privacy and reliability – the top priority for the company. Ten years on, Microsoft continues its dedication to these objectives, which we refer to as the Trustworthy Computing...
  • Blog Post: The technology behind managing digital identities

    This week Microsoft was pleased to have the opportunity to participate in the Digital Identity Conference 2012 on Managing Digital Identity in a Networked World , organised by the Victoria University of Wellington. There are many facets to the dialogue on digital identity. It is woven of philosophy...
  • Blog Post: Using the Cloud for Good

    Cloud computing is not just being adopted by the business community in New Zealand but has also made a significant impact in not-for-profit organizations (NFP) across the country. Attendees of the Connecting Communities conference in Christchurch on 29 February 2012 learnt of several NFPs who have used...
  • Blog Post: The Great NZICT Cloud Debate

    Last night NZICT Group and EMA hosted a feisty debate about cloud computing . The moot was, “Is the cloud all hot air or the biggest game changer we’ve ever seen?” The speakers were: Andrew Crabb (Head of Business and Government, TelstraClear), Doug Wilson (CIO, Automobile...
  • Blog Post: Trustworthy Computing and Cloud Services

    Malicious attempts to infiltrate computer infrastructure have become more frequent and more sophisticated. When these attacks succeed, the consequences for the victims can be serious. Confidential information and personal information are at risk. In this environment, we hear that security is often...
  • Blog Post: With compliments from Microsoft

    Updated July 2012. A PDF version is provided at the bottom of this blog post for printing. Microsoft offers a number of services free of charge to help people live and work a little smarter. Here’s a quick overview of technology to make life a little simpler and more fun. More than a million...
  • Blog Post: Windows 7 achieves Common Criteria security certification

    Microsoft endeavours to help make the computing environment as secure as possible. Part of this commitment to security involves thorough testing against widely-recognized security certification requirements. We are pleased to advise that Windows 7, Windows Server 2008 R2 and SQL Server 2008 SP2 32...
  • Blog Post: The Need for Global Collective Defense on the Internet

    (Cross posted from Microsoft on the Issues ) For more than two decades, people have struggled to understand the cyber threat, evaluate the risks to individuals, organizations (including nation-states), and society at large, and craft appropriate responses. Although many organizations have invested significantly...
  • Blog Post: Microsoft's chief privacy officer on the challenge of e-identity

    New Zealander Brendon Lynch, Microsoft’s chief privacy officer was interviewed by V3.co.uk on the challenge of e-identity and online privacy issues. Lynch says privacy, as past failed startups have learned, is a tough sell to consumers, mostly because the required technology is often complicated...
Page 1 of 1 (14 items)