Feeds

LogoWatch UNIX will save the planet

Ecowarriors against NT

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

Life, nature, growth....


Normally, LogoWatch is the Reg's eye on ominous corporate rebranding. We do, however, always welcome the preposterous guff which organisations use to justify their artistic creations.

And so our spotlight falls on The Unix versus NT organisation. According to their website, the organisation is dedicated to setting the facts straight about the various commercial and Open Source UNIX operating systems as they relate to Microsoft Windows NT.

Phew. Bet their social evenings are a laugh a minute. Be that as it may. What, you are wondering, has this group of free-thinkers done to warrant our attention?

Well, the organisation's logo can hardly be considered radical. Just a bit of graduated green text and drop shadow. Dull? Not according to the blurb:

The dark green color was chosen because it represents life, nature, growth, and ecology. This corresponds to the re-growth, rejuvenation, and general UNIX renaissance we now find ourselves in. NT may stand for "new technology" on paper, but FreeBSD and Linux are the choice of a new (or GNU) generation. NT is essentially an oxymoron. Just take a look at which OSes support IPV6.

The font is a sans serif, like Microsoft's, which alludes to the modern. Once again, Microsoft likes to think of itself as being hip and with the times, but its products are still not the core products being used by hackers. Microsoft works at being cool, i.e. it has to pay for television ads in order to feign being cool. FreeBSD and Linux simply are cool. They don't have to work at it.

We're sorry? Nature? Ecology? Have you gone completely bonkers? A Reg pin to anyone who can demonstrate the link between UNIX and the environment. Do us a favour.

Still, we like the idea of using an explantion of your logo as a springboard for a bit of anti-Microsoft ranting. Couldn't stop yourselves, eh lads?

You can find more about this bunch here

Bootnote

Thanks to Mike Heald for the lead

The LogoWatch archive

Sema rebranding ends in tears
Zarlink trumpets imperial pretentions
With this ring, I thee sack
Telco punts for pink pound
VIA rises from eastern mountain
Corel in transcendental makeover
Acer turns green at the gills
Sema "aflame with vital energy"
The Vulture laid bare

5 things you didn’t know about cloud backup

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.