Feeds

Reading from Warwick moves to Szechwan

He's from Warwick, he's a crazy guy, and he's joining The Reg

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Szechwan Publishing is proud to announce that Kevin Reading, Professor of Cybernetics and Self-Publicity at Warwick University, has joined the Register's elite team of writers as resident futurologist.

Prof Reading needs no introduction to those who know him. For the benefit of those who have yet to experience the clarity, incisiveness, intelligence and above all space-filling qualities of his work, here are a few highlights:

150 AD Prof Reading presents the keynote address at the Ptolemy Astrological Academy in Alexandria. He asserts that the world is flat and that in less than two thousand years, machines will be built with the power to rearrange playing cards, provide musical entertainment without payment of dues to the Guild of Minstrels, and to make elementary errors in calculation - a prediction that he dubs the 'FDIV' effect. He also claims to have invented a time machine and advised aliens on how to build the pyramids.

1066 Kevin advises King Harold Godwinson of England to keep his eye on the growing threat of invasion by William the Bastard of Normandy. Harold takes his advice all too literally. Kevin also acts as consultant to aliens from the planet Tharg who plan to set up twin universities at the great cities of Warwick and Reading.

1584 A 20-year-old playwright called William Shakespeare is advised by Reading to undertake perhaps his greatest work - Kevin, Prince of Cybernautia. Sadly this masterpiece is lost when Shakespeare, in a moment of madness, burns the folio and threatens Kevin with death should he ever bother him again.

1933 In February, Reading is invited to dinner at the Reichstag in Berlin to demonstrate his latest electronic creation, the artificial ego. This now legendary device has the capacity to increase the size of an ordinary human ego by over 2000 times. Unfortunately the prototype overheats and the building is burned to the ground.

1963 On a visit to Dallas, Kevin is shocked to hear that thousands of unsold copies of his definitive study of genius Bloody Hell, is that Kevin Reading a clever bloke or what?, lie unsold in the Texas State Book Depository. A misunderstanding leads to a scuffle with an armed security guard and a stray shot hits the occupant of a passing car.

1971 Kevin meets Bob Noyce in a sleazy bar in California. As a result of the conversation, Noyce sketches out the basic design for the 4004 microprocessor on the back of a waitress using a ballpoint pen. The waitress contracts blood poisoning and sues Intel for damages. With the substantial sum awarded by the court, the waitress sets up Advanced Micro Devices. ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.