More from The Register
China's BYD ramps up 'leccycar battery production in challenge to Tesla
Buffett-ing ahead for Musk's offerings?
Mozilla: Five... Four... Three... Two... One... Thunderbirds are – gone
Time you grew up and got your own coders, foundation says
Misty-eyed Ray Ozzie celebrates 25th birthday of Lotus Notes by tweeting about it ...
'Legal tussles nearly killed us but we shipped on 7 Dec 1989'
Lotus F1: 38°C? Sand in your Vblocks? Must be building a data center in Bahrain again
How the race aces stand up and tear down IT at speed
The state of mobile security maturity
When you start the mobile security maturity discussion, you have to begin with the entry point – the device.
National Geographic - More time working, less time fighting technology
See how National Geographic created a policy around employee logins, prevented rogue IT scenarios, and provided cost savings and end-user productivity benefits.
Put The Business Back In Your Data Management Business Case
Be customer-driven: It’s time for enterprise architects to put the business back in the business case.
Most data breaches, including many of the highest-profile instances, are the direct result of hackers’ actions going undetected for several months.