More from The Register
Curb your enthusiasm, 'India's smartphones are changing the world' fans
First 30-million smartmobe quarter ever just happened, but feature phones still sell more
VMware, Citrix to have a crack at desktops on docked smartphones
Samsung Galaxy S8 can do it natively. Desktop virtualization might make it even better
Virtual reality is actually made of smartphones
From the HoloLens to the PlayStation VR, all VR kit is descended from the first iPhone
Masked men 'steal' £250k of smartphones from Exertis
170 iPhone 6s and 380 Samsung Galaxy S5 Neo mobes out the windows
Mobile App Security Program Management Handbook
Whether you are starting from square one with a mobile app security initiative, have ad-hoc tasks you want to consolidate, or just want to improve an existing program.
Preparing for Private Cloud and Hybrid IT with Red Hat Cloud Infrastructure
IT organizations continue to run many of their traditional apps on premise, moving to private cloud, while using public shared cloud for selected “other” workloads.
The Case for Modern Network Security Operations
Legacy network security operations must be modernized to improve responsiveness, streamline network security operations, and mitigate IT and business risk.
Secure Mobile Development Best Practices
Covering the vulnerabilities hackers might use to launch an attack, and remediation tips that you can use to build security into your app.