More from The Register
Apple finally teaches Android music app to validate certificates
Cupertino's so keen on Android it took eight months to repair interception bug
T-Mobile USA: DON'T install Apple's iOS 10, for the love of God
Updated iPhone 6, 6+ and SE fans told to stay away from software update for now
Banking group denied access to iPhones' NFC chips for alt.Apple.Pay
Apple told tribunal it wouldn't abide by a ruling against it
Samsung is on fire, overtakes Apple as world's #1 chip-shifter
PC vendors continue to slide as mobile tightens grasp on market
Secure Mobile Development Best Practices
Covering the vulnerabilities hackers might use to launch an attack, and remediation tips that you can use to build security into your app.
Blending Cloud-native and Conventional Applications
This IDC InfoBrief, sponsored by Red Hat, reviews ten lessons from early adopters for successful integration of cloud native and traditional applications.
Achieving the Dynamic Data Center
Examining the emergence of clustering in the enterprise data center, and a set of criteria to consider when evaluating options for managing advanced, clustered IT infrastructure.
The Case for Modern Network Security Operations
Legacy network security operations must be modernized to improve responsiveness, streamline network security operations, and mitigate IT and business risk.