Industry insider news for Australia's technology resellers
These search results are from across the Techday Network of sites
Tech Data team roll up sleeves for Leukaemia Foundation
Volunteer day held at the Leukaemia Foundation’s Westmead Patient Accommodation Complex in Sydney.
Canon Oceania offering $30k for 12th environmental grants programme
Schools and not-for-profits encouraged to apply for up to $30,000 in cash and products to further their environmental causes.
SAP Launches Autism at Work programme in New Zealand
SAP is bringing their global initiative to provide those on the autism spectrum with qualified employment in the company to New Zealand.
Rescue Run 2018 - Have you got what it takes to save a life?
This year Youthline joins the line-up of life-saving organisations that you can support by joining the 2018 Rescue Run.
Kiwi business called to rally and run for our youths' lives
“How is it possible that a such a beautiful country... has the worst rate of youth suicide in the developed world?” asks Cisco’s Dave Wilson.
Microsoft preparing displaced Aussies for future in tech
Microsoft has partnered with the government to provide digital skills to workers whose roles were displaced by automotive manufacturing plant closure.
Konica Minolta's human rights efforts win Anti-Slavery Australia Freedom Award
The Freedom Awards raise awareness of all forms of slavery and human trafficking.
Vodafone accelerator supporting solutions making a difference for vulnerable youth
Five community organisations from around the country have been selected for the Vodafone Foundation’s inaugural Change Accelerator programme.
Samsung completes CSR agreement
South Korean firm completes transfer of handset connectivity and location development operations and technology from CSR.
Whitepaper: How MSPs can escape technology's all-too-familiar Catch-22
Managed service providers may be hurting themselves by relying on technology platforms that are ‘good enough'.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?