Feeds

Never have to hear of the iPhone again

Reg web app will take away the pain

Security for virtualized datacentres

You've got your shiny new iPhone, so the last thing you want is to read any more about it, luckily we can now offer a Web App which will remove all references to Apple's slate and replace them with a term of your preference: at least while you're surfing El Reg.

Some people here at The Register are getting a little bored of the iPhone, so we thought we would spend the weekend creating a WebApp to remove all references to it, though replacing them seemed more fun.

You can try the application here, though only if you're using an iPhone (or an iPod Touch): it also very nearly works on a Nokia N95, though you'll have to hit the additional Back button at the bottom of the first page to kick it into action. On desktop Safari it just looks strange.

Given the lacklustre UK launch we're not sure how many will be interested, but if enough of you are then we'll run a feature next week showing how the WebApp was written so you too can create filters for your least-favourite words, or perhaps create something useful. ®

Internet Security Threat Report 2014

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.