Feeds

Quotes of the Year 2010

Our annual collection of the dippy, inane, and occasionally brilliant

Internet Security Threat Report 2014


“My biggest terrorist client was the IRA and I am pleased to say that I managed to write off more than £1 billion of its money”

Lord James of Blackheath, in the oddest Parliamentary contribution of this or any year. He also described an international organisation he called Foundation X "that wishes to make the United Kingdom one of the principal points that it will use to disseminate its extraordinarily great wealth into the world at this present moment, as part of an attempt to seek the recovery of the global economy." What was he on about? Unfortunately the press was distracted by the diplomatic trivia seeping from Wikileaks - and didn't want to find out. Read the whole thing here.


“Thickly populated by fraudsters, pornographers of the worst kind and cranks”

Irish High Court judge Judge Peter Charleton describes the internet.

Did we miss any? Let us know. ®

Intelligent flash storage arrays

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?