Feeds

Dirty PCs: How much filth can you take?

The horror, the horror

Top three mobile application threats

..but here's what happens when you own a Dell but not a vacuum cleaner:

Dust puppy on Dell access panel

According to Pete MacDonald, that's the front access to a USB panel, not that you'd know it.

This too was once a computer, Stateside reader Ian Keyes believes:

Dust encrusted PC front panel

Fellow American J C Edmond, who owns a computer repair shop, provides evidence of why one of his customers' kit kept overheating:

PC completely clogged with dust

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.