- Part 3 Whitepaper - How to Approach Implementation : A Practical Guide Big Data Security Analytics
- Approaches to DDoS Protection: An Overview on Keeping Your Networks Protected
- Thwart off Application-Based Security Exploits: Protect Against Zero-Day Attacks, Malware, Advanced Persistent Threats
- Are You Really Ready for a Software Audit?
For more details on perceptual computing with the SDK, see Mike Riley's Gesture-Based Computing for the Desktop.