More from The Register
Samsung takes Google into third dimension of flashy storage
Flash-flood: Korean 3D flash-furtler melts heart of the Chocolate Factory
Never mind Samsung, GOOGLE will EAVESDROP as you browse on Chrome
Voice Search extension project described as 'Ear of Sauron'
Dixons Carphone clings to EE, Three in Phones 4U bullet dodge
Analysis Rush of deals will insulate firm from collapse - it hopes
Intel shows Google how to stick it real good
Chipzilla sticks it to Chromebit with Atom-powered Compute Stick
Empowering E-commerce against unpredictable demand
Exploring common challenges facing E-commerce platform and B2C website managers planning for the holiday shopping rush and bolstering services to meet customer demands.
Magic Quadrant for identity governance and administration
Organizations are moving to IGA solutions such as IBM Security Identity Governance and Administration to help improve compliance and lower total cost of ownership.
2015 Cyber Risk Report
This comprehensive report culminates a year-long effort by one of the most capable and respected security research organizations in the world.
Use actionable threat intelligence to protect your digital business
Key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.