More from The Register
China's BYD ramps up 'leccycar battery production in challenge to Tesla
Buffett-ing ahead for Musk's offerings?
Misty-eyed Ray Ozzie celebrates 25th birthday of Lotus Notes by tweeting about it ...
'Legal tussles nearly killed us but we shipped on 7 Dec 1989'
So long Lotus 1-2-3: IBM ceases support after over 30 years of code
One of computing's first killer apps bites the dust
Samsung slams door on OLED TVs, makes QUANTUM dot LEAP
Analysis LG says will stick with it, but be ready to watch it cave in...
Managing security risks and vulnerabilities
Proactively identify security weaknesses, prioritize remediation tasks and take corrective action to minimize potential risks across a dynamic infrastructure.
Transform Your IT Infrastructure
Discover how Cisco UCS integrated infrastructure can transform your IT into agile, automated, and application-centric systems that let you innovate and stay competitive.
Three reasons to augment APM/NPM tools
Common performance management challenges and provides three fundamental reasons to add IPM services to your performance management arsenal.
Choosing a backup solution for SaaS-based applications
7 essential questions that you need to ask to evaluate SaaS data protection software and the steps to creating a reliable, secure data protection strategy.