More from The Register
Never fear, Glassholes – Intel to the rescue! 'New CPU' for tech-specs
Chipzilla rumored to be lined up for Google headgear's next processor
Uh-oh Google Glassholes: Sugar daddy Intel strokes HUD goggles upstart
Strap techno-webcam-specs to nerds' faces? Two can play at that game
Facebook wants to Zuck up your cash into its mobile payment service
Seeks regulatory approval for payment processing in Europe
Network DDoS protection
Distributed denial of service (DDoS) attacks have grown dramatically in frequency, size and complexity. Learn how to combat this rising threat.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness wire data already for real-time operational intelligence