Feeds

Welcome indeed to the billionaire toyshop

Expensive toys for very rich boys

High performance access to file storage

So you've finally done it. You had an idea, or successfully nicked one; you wrote some code, or had it written. The customers flocked to buy licences, or perhaps the unpaid Web-2.0 peon hordes spewed content in an endless stream while you booked ads on the eyeballs and waxed fat. Maybe that last bit never actually happened, but you managed to convince people it would and walked away after the IPO/buyout laughing and laughing and laughing.

Alternatively, you were born into the ruling family of an oil kingdom, or the property-owning oligarchy of a developing nation. Maybe you didn't inherit anything and never got involved with any kind of new idea; you just bought and sold humdrum stuff – real estate, comedic pieces of stockmarket paper, whatever – and did really well.

But all that is either unlikely or intensely dull or both, which is why almost all of us aren't billionaires. So let's skip rapidly over that and get to the good bit. You're a billionaire, however you got there. You've got all the basic trappings – cars, palatial homes worldwide, maybe a business jet or a helicopter or a few old propellor fighters. You know, the sort of things that smallfry have; Hollywood stars, mega-selling novelists, politicians and trailer trash of that type. Poor people.

But you're a billionaire, in the I-was-in-Microsoft-early league, along with the Third-World oligarchs and oil princes. You're so rich that buying consumer goods is a real problem for you – you simply can't find expensive enough stuff to really properly show off your wealth. Ordinary middle-class scum can have fun buying a mobile, a computer, a barbecue or maybe a car, better in some way than that possessed by their envious friends; but it's difficult for you.

In the old days, before proper personal technology, it was easier to display one's prosperity. Legend tells of a long-ago episode involving noted Oz tycoon Kerry Packer, in which he got into an argument over drinks at home regarding the details of a cricket match which had taken place some years previously.

Nowadays, any ordinary sports obsessive could slot in his treasured VHS tape or DVD, fire up his PVR file or call down some VoD goodness and so settle matters. But back then there was none of that. Packer, however, had the answer: he simply phoned a TV channel which he controlled and told them to interrupt what they were showing and re-run the relevant match.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.