More from The Register
Galaxy Note 4 latest: Samsung rushes iPhone 6 Plus rival to China as Apple flails in dark
Sadly, no suggestion Sammy's made the phablet bendable
Apple: You're a copycat! Samsung: This is really about Google, isn't it?
New Apple v Sammy trial kicks off with the same old arguments
Apple says sayonara to Samsung's ninjas: iPad, iPhone don't infringe comms patents – report
Attempt to extract damages in Tokyo court denied, we're told
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness wire data already for real-time operational intelligence
The Escalating Threat of DDoS Attacks
With increasing frequency and scale, some of the world’s largest data center and network operators are suffering from crippling Distributed Denial of Service (DDoS) attacks.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.