More from The Register
Nvidia ices Icera modem division, says it's leaving mobile chips biz
It's all about gaming, cars, and cloud from now on
Fujitsu SPARCs up liquid cooling for smartphones
1mm metal plate contains coolant and can be cut to fit any gadget
The TRUTH about LEAKY, STALKING, SPYING smartphone applications
How bad is it? 1 in 3 can hunt you down at HOME - research
OpenStack for enterprise: The tipping point cometh
A brief history of the OpenStack cloud operating system, its releases and projects, and significant enterprise adoptions.
Avoiding insider threats to enterprise security
Protect and monitor privileged user identities and activities across the extended enterprise.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness wire data already for real-time operational intelligence
Choosing a backup solution for SaaS-based applications
7 essential questions that you need to ask to evaluate SaaS data protection software and the steps to creating a reliable, secure data protection strategy.
Assuring application performance at scale
Empowering data center operators with an open and programmable network that easily scales to thousands of compute and storage nodes.
Strengthening networks and endpoints with behaviour-based protection
How integrated, intelligent solutions from IBM can detect and help prevent threats from the network perimeter to remote endpoints