More from The Register
Ubuntu smartphone to go on sale: It'll be harder to get than a new iPhone
'Flash sales' – not that kind of Flash, silly
The TRUTH about LEAKY, STALKING, SPYING smartphone applications
How bad is it? 1 in 3 can hunt you down at HOME - research
Nvidia flops out TERAFLOP X1 for self-aware cars
CES 2015 New Tegra chip boasts 256 GPU cores, 8 CPU cores, and is baked into car kits
NVIDIA claims first 64-bit ARMv8 SoC for Androids
Mile-High 'Denver' Tegra K1 successor said to rival PC performance
Prevent costly outages due to expired SSL certificates
SSL/TLS requires comprehensive, automated management and security for certificates and keys. Make sure your certificates can be discovered, tracked, and continuously monitored.
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 steps for Windows Server 2003 End of Life success
On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. This eGuide will provide you with 5 tips critical to a successful and affordable transition.