More from The Register
French space agency teams with Google for broadband balloons
Antarctic balloon tech to be shared in hope of beaming bits to bods
HTC débuts Desire Eye, 'GoPro-slapper' RE digital snapper
No cash, please, we're HTC, says debt-free mobile firm
Microsoft and HTC are M8s again: New One mobe sports WinPhone
Just a couple of little catches, though
Google's ANDROID CRUSHING smartphone rivals underfoot
Windows Phone cracks, Blackberry's out of juice and even Apple's squeezed
Network DDoS protection
Distributed denial of service (DDoS) attacks have grown dramatically in frequency, size and complexity. Learn how to combat this rising threat.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.