More from The Register
Samsung forks 4K with Tizen tellies
CES 2015 Some UHD sets are more equal than others, says Korean colossus
Samsung gets virtual with tiny S5 upgrade and goggle grab
VR headset rumoured to come down chimney with Santa
Frisky patent WAR: Samsung seeks to BLOCK Nvidia graphics chips from US market
South Korean tech giant files complaint with trade watchdog
Network DDoS protection
Distributed denial of service (DDoS) attacks have grown dramatically in frequency, size and complexity. Learn how to combat this rising threat.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.