Feeds

Jesus appears in Samsung Flash memory chip

Electron microscopy reveals 4-gig Messiah

Security for virtualized datacentres

True believers and Golden Palace Casino take note: we have just received news that Our Lord has manifested himself in a four-gig Samsung Flash memory chip - complete with beard and ethereal "flower petal halo" effect.

A simulacrum of Jesus in a Samsung flash memory chipYay verily, as the Bible sayeth (Luke 21:27): "At that time they will see the Son of Man coming in a cloud with power and great glory." Bendeth thine ears also to the words of Matthew 24:27: "For as the lightning comes from the east and flashes to the west, so will be the coming of the Son of man."

Well, four gigs is plenty of power by anyone's reckoning, and as for "the lightning comes from the east and flashes to the west", that's just too spooky to be coincidence. Time to repent, and no mistake.

For the record, and before we all nip to the pub for one last pint before the final judgement, the Flash Messiah was revealed by Chipworks using transmission electron microscopy. The company's Dick James explained to El Reg: "We often get dark fringe lines in the silicon, and in this case it looks like there was some holy influence." ®

Bootnote

Several hardened atheists here at Vulture Central have suggested this is in fact Gandalf - a heretical suggestion given that Gandalf is a fictional character without the power to manifest himself in silicon. We have, accordingly, emailed their details to the Spanish Inquisition.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.