Feeds

Welcome indeed to the billionaire toyshop

Expensive toys for very rich boys

Protecting against web application threats using SSL

So you've finally done it. You had an idea, or successfully nicked one; you wrote some code, or had it written. The customers flocked to buy licences, or perhaps the unpaid Web-2.0 peon hordes spewed content in an endless stream while you booked ads on the eyeballs and waxed fat. Maybe that last bit never actually happened, but you managed to convince people it would and walked away after the IPO/buyout laughing and laughing and laughing.

Alternatively, you were born into the ruling family of an oil kingdom, or the property-owning oligarchy of a developing nation. Maybe you didn't inherit anything and never got involved with any kind of new idea; you just bought and sold humdrum stuff – real estate, comedic pieces of stockmarket paper, whatever – and did really well.

But all that is either unlikely or intensely dull or both, which is why almost all of us aren't billionaires. So let's skip rapidly over that and get to the good bit. You're a billionaire, however you got there. You've got all the basic trappings – cars, palatial homes worldwide, maybe a business jet or a helicopter or a few old propellor fighters. You know, the sort of things that smallfry have; Hollywood stars, mega-selling novelists, politicians and trailer trash of that type. Poor people.

But you're a billionaire, in the I-was-in-Microsoft-early league, along with the Third-World oligarchs and oil princes. You're so rich that buying consumer goods is a real problem for you – you simply can't find expensive enough stuff to really properly show off your wealth. Ordinary middle-class scum can have fun buying a mobile, a computer, a barbecue or maybe a car, better in some way than that possessed by their envious friends; but it's difficult for you.

In the old days, before proper personal technology, it was easier to display one's prosperity. Legend tells of a long-ago episode involving noted Oz tycoon Kerry Packer, in which he got into an argument over drinks at home regarding the details of a cricket match which had taken place some years previously.

Nowadays, any ordinary sports obsessive could slot in his treasured VHS tape or DVD, fire up his PVR file or call down some VoD goodness and so settle matters. But back then there was none of that. Packer, however, had the answer: he simply phoned a TV channel which he controlled and told them to interrupt what they were showing and re-run the relevant match.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
Bacon-related medical breakthrough wins Ig Nobel prize
Is there ANYTHING cured pork can't do?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.