More from The Register
Peace-sign selfie fools menaced by fingerprint-harvesting tech
Cute photo? Your biometrics just got raided, boffins warn
Curiosity photographs mysterious metal object on Martian rock
Shiny 'flower' sets Mars-watchers aflutter
We are 'heroes,' says police chief whose force frisked a photographer
Brit plod used Terrorism Act to collar snapper. Hello, 2005
Mobile App Security Program Management Handbook
Whether you are starting from square one with a mobile app security initiative, have ad-hoc tasks you want to consolidate, or just want to improve an existing program.
Advanced In-Memory Computing
With the rise of real time and on-demand applications, massive data is generated which needs better and faster processing that derives meaningful patterns from the data generated.
Achieving the Dynamic Data Center
Examining the emergence of clustering in the enterprise data center, and a set of criteria to consider when evaluating options for managing advanced, clustered IT infrastructure.
Customer Communication Management in the Cloud
What role does customer communication management play today in financial services firms’ business?