More from The Register
Apple's iPhone 7 to come loaded with depth-sensing camera, supply chain spies claim
Look into my eyes, look into my eyes ... It's all about focus
'Camera-shy' Raspberry Pi 2 suffers strange 'XENON DEATH FLASH' glitch
Vid Bright light, bright light ... Do you have any blu-tack?
Camera-carrying DOLPHIN SPY caught off Gaza
Claims weaponised mammal deployed to spy on Palestinian navy
Samsung S6: You might get a Sony camera in it - or you might not
Some S6s are more equal than others, even among the golden ones
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Assuring application performance at scale
Empowering data center operators with an open and programmable network that easily scales to thousands of compute and storage nodes.
Strategy considerations for building a security operations center
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Breaches happen: Be prepared
Discussing how a layered approach to security provides better protection of your organization's IT assets.