More from The Register
Apple chief Cook cooks up rumours after BMW car talks, factory tour
Sometimes you get so lonely, sometimes you get nowhere
Can't afford a BMW or Roller? Just HACK its doors open!
Patch inbound for Beemers, Minis and Royces with a clear view of the sky
Blue Coat acquires the cloud-crypto monkeys at Perspecsys
Application of Cloud Access Security Broker features paramount, apparently
Empowering E-commerce against unpredictable demand
Exploring common challenges facing E-commerce platform and B2C website managers planning for the holiday shopping rush and bolstering services to meet customer demands.
Strengthening networks and endpoints with behaviour-based protection
How integrated, intelligent solutions from IBM can detect and help prevent threats from the network perimeter to remote endpoints
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The business value of an all-in-one comprehensive data protection solution
Examining the business benefits of using an end-to-end comprehensive data protection solution vs. the pitfalls of deploying multiple point solutions to protect data.