Feeds

What tickles your thigh and has two sausage-like appendages?

A new kind of mouse mat that sits on your lap, of course

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

If the thought of delicate tickling sensations on your thigh sends you into rapturous delight then you need to try a K-mat. But before you get too excited, though, just remember this is no kinky adult toy. For the K-mat is a curved mouse mat that fits snugly around even the most generous of thighs. And the problem of the mouse slipping to the floor when not in use is overcome with the addition of two sausage-like rolls on either side of the K-mat. The whole purpose of it is to allow people to use their mouse without having to rest their arm on the desk. For as well as sensitising your upper leg into an altogether different erogenous zone, the K-mat is being heralded as a useful tool in the battle against repetitive strain injury (RSI). According to the inventor Nicholas Mark, because the mouse is used on your lap, the arm, elbow and wrist are all resting in a neutral position. It is this that Mark claims will help sufferers of RSI combat their painful affliction. ®

Internet Security Threat Report 2014

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.