More from The Register
Apple chief Cook cooks up rumours after BMW car talks, factory tour
Sometimes you get so lonely, sometimes you get nowhere
Software update borked radar, delayed hundreds of flights, says US FAA
Contractor blamed for weekend chaos
At last! Something else for smartwatches to do as BMW promises park-by-wristjob demo
GPS-free parking proposed thanks to carpark plans baked into beemers
Blue Coat acquires the cloud-crypto monkeys at Perspecsys
Application of Cloud Access Security Broker features paramount, apparently
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Assuring workload performance through Pure Storage and VMTurbo
Three primary use cases for the VMTurbo Pure Storage Control Module are discussed, including assuring performance in both homogeneous and heterogeneous storage environments.
Strengthen security with intelligent identity and access management
IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats.
Use actionable threat intelligence to protect your digital business
Key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.