More from The Register
Here we are now, entertain us: Caltech team designs micro, high-res 3D imager
Vid Researchers see bright future in camera chip
Epson joins Microsoft in underwhelming 3D glasses
IoT World 2015 Printer manufacturer looks at the industrial niche
Demand-driven application control: assuring application performance
The evolution of enterprise applications, the data centers in which they reside and the increasing expectations of businesses and end-users on the Quality of Service delivered.
Mitigating risks with security intelligence and identity assurance
Describing how intelligent IAM solutions help defend against insider threats, manage access and boost compliance
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The business value of an all-in-one comprehensive data protection solution
Examining the business benefits of using an end-to-end comprehensive data protection solution vs. the pitfalls of deploying multiple point solutions to protect data.