- Farmers shut out of online services by new identity scheme
- Facebook says you can be social and secure, acquires .onion address for Tor users
- Swedish hacker finds 'serious' vulnerability in OS X Yosemite
- Court rules cops can demand fingerprints, not passcodes, to unlock smartphones
- Twitter's MoPub ad exchange grabs Verizon tracking cookies, and more may follow
Desktop Transformation e-Book: Assess, Design, Deploy
Desktop virtualisation is a top strategic business initiative for IT. While its value is understood, many IT managers are wondering, “How do I get started?” “What stages will my company go through?” and “What are the best practices?” Access this e-Book now to guide you through the answers to these questions.
Please supply your email address to access the content.