Feeds

Gongs ring in Oz tech sector

Geeks make the Order of Australia

Internet Security Threat Report 2014

The father of 802.11a wireless chipsets, Dr David Skellern, is one of a bunch of tech-sector luminaries to be gonged in the Australia Day honours list.

The researcher and later NICTA CEO (from 2005 to 2011) was awarded a Fellow Officer of the Order of Australia. He was awarded for his efforts in science, engineering and research. He has been heavily involved in ICT education and research, in 1989 taking up the Chair of Electronics at Macquarie University.

His most coveted achievement however was his role in the Radiata group of companies in Australia and the USA, which he co-founded in 1997 to commercialise the results of a WLAN research project that he led at Macquarie University, in collaboration with CSIRO. In September 2000 Radiata demonstrated the world’s first chip-set implementation of the 54 Mbit/s IEEE 802.11a High-Speed WLAN standard and in 2001 Radiata was acquired by Cisco Systems for $AU565 million.

In other honours, entrepreneur and founder of online accommodation site Wotif.com Graeme Wood received a Member of the Order (AM) of Australia. Aside from his dotcom success he was also honoured for his philanthropic work through the Graeme Wood Foundation.

The foundation supports the Centre for Youth Substance Abuse Research at The University of Queensland and programs promoting the creative potential of young people in the performing arts.

Also awarded as an Officer of the Order of Australia for services to business and IT was former IBM Australian-New Zealand managing director Glen Boreham. Boreham is currently the chairman of the government’s convergence review committee.

In 2008, Boreham was appointed as the inaugural Chair of Screen Australia and is the Chairman of the Industry Advisory Board for the University of Technology, Sydney. He also works with the Federal Sex Discrimination Commissioner as a member of the Male Champions of Change group of CEOs seeking to promote the increased participation of women in the workforce.

Young Australian of the Year for 2012, Marita Cheng, received her award for encouraging girls to study engineering and technology subjects. Her Robogals International organisation ran workshops for 3,000 high school girls in Australia, teaching science and technology to attendees. The operation also has branches in New Zealand and the UK. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.