Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Neil D Burgess
Fujitsu Australia Software Tech
Sydney, Australia

With over 30 years of experience in the IT industry, Neil holds a Graduate Diploma in Technology Management and Master of Business Administration (Technology Management) from Deakin University.

Neil is experienced in project management, business analysis, system design, configuration management, security analysis, system documentation, programming and testing.

He has taught customer education courses and provided consulting services on Fujitsu's behalf in Victoria, New South Wales, ACT, Queensland, Northern Territory, Papua New Guinea, England, Illinois, California, Florida, Indonesia, Japan and Malaysia. He is also the holder of a Certificate in Software Quality from the Software Quality Association (SQA), an independent body affiliated with the Australian Organization for Quality (AOQ).

Neil’s current role is as Principal Software Development Engineer for Fujitsu Australia Software Technology.

Neil has managed a number of software development projects, some in house using Fujitsu staff and contractors, and some conducted entirely by independent contractors.

Prior to his current role, he worked as a project manager in a large systems integration project for an Australian government client.

He also provided customizations and associated education services for automated software testing of an advanced point-of-sale software solution for a global company, working in Australia, Illinois (USA) and London (UK). Earlier, he was the leader of a team responsible for the deployment, customization and technical support of the same software for a number of markets in the Asia-Pacific region, the Middle East and Africa.


Adaptable, model-driven security engineering for SaaS cloud-based applications
Almorsy M., Grundy J., Ibrahim A.  Automated Software Engineering 21(2): 187-224, 2014. Type: Article

This paper presents a novel approach to security for applications that are run on a central server and supplied to multiple consuming organizations (tenants) as a service. The issues associated with the separation of data and security profiles of ...


Cyberpatterns: unifying design patterns with security and attack patterns
Blackwell C., Zhu H.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 264 pp. Type: Book (978-3-319044-46-0)

This is a collection of academic papers. It falls toward the theory end of the theory-practice spectrum. Blackwell and Zhu are major contributors to the work as well as being joint editors. The papers, as a collection, provide a framework for...


The Office demon: Minos
Dechaux J.  Journal of Computer Virology and Hacking Techniques 9(3): 125-135, 2013. Type: Article

An instruction manual on the use of a program for injecting malicious payloads into Office documents, this paper is interesting but not useful to defenders of computer installations....


Effective detection of sophisticated online banking fraud on extremely imbalanced data
Wei W., Li J., Cao L., Ou Y., Chen J.  World Wide Web 16(4): 449-475, 2013. Type: Article

The novel algorithm proposed in this academic paper aims to facilitate the online detection of banking fraud. While it is not a silver bullet, it does promise to be a useful tool. The paper is recommended reading for professionals involved in...


IRIS: a robust information system against insider DoS-attacks
Eikel M., Scheideler C.  SPAA 2013 (Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures, Montreal, Canada,  Jul 23-25, 2013) 119-129, 2013. Type: Proceedings

This academic paper presents the theory and use of an algorithm designed to detect denial-of-service (DoS) attacks by an adversary who has detailed knowledge of the system under attack....


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy