- Combining Cloud-Based DDoS Protection and DNS Services to Thwart the Threat of DDoS
- DDoS and Downtime - Considerations for Risk Management
- Thwart off Application-Based Security Exploits: Protect Against Zero-Day Attacks, Malware, Advanced Persistent Threats
- Want Information Fast or Want it Right? Learn How to Have Both
For more details on perceptual computing with the SDK, see Mike Riley's Gesture-Based Computing for the Desktop.