Feeds

TV stars move in to Pig Brother sty

Fantasy castle promised for cyber-hogs

  • alert
  • submit to reddit

Security for virtualized datacentres

Top TV celebs today moved in to give the Pig Brother house a Posh and Becks-style make-over.

The sty, where surfers will be able to observe the movements of five swine in a pen 24-7, is being given star treatment by presenters of the BBC programme Changing Rooms.

They have moved in to construct "the world's most elaborate sty".

According to a press release, the Pig Brother house will be "based around a fantasy castle complete with moat and drawbridge".

Of course.

The escapade, which organisers say has been featured in the press in at least 20 countries, aims to raise money for farmers hit by the Foot and Mouth crisis.

Lycos has promised to pump money into the scheme - which will track the daily goings on of Blair, Portillo, Brown, Beckett and Widdecombe - in return for online advertising.

The site kicks off on September 1, and, like TV reality show Big Brother, surfers will be able to vote their least favourite hog out for eviction each week.

A trailer for Pig Brother can be found here. ®

Related Stories

Pig Brother sticks its snout into the Net

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.