Feeds

Knickerless celebutards: the secure data centre connection

Discarded panties threaten national security

7 Elements of Radically Simple OS Migration

The champagne corks are popping this morning down at Vulture Central because, after years of trying, we've finally found a rock-solid link between IT and knickerless celebutards:

View of data centre showing pair of knickers on floor

For the record, the panties in question were spotted by a reader in a well-known London data centre. Our man says that the premises are protected by swipe cards, voice recognition, palm scanners, ex-special forces operatives armed with Tasers, Japanese-built killbots, three electified razor-wire fences, and a miniature helicopter gunship packing intruder-frying microwave weaponry.

Accordingly, we must ask: how did either Britney, Lindsay, or Paris gain entry to this most secure of facilities; what level of threat did the penetration pose to national security; and why has the CCTV footage not yet appeared on the YouTube celebrity upskirt channel?

We have, of course, made our dossier available to the relevant authorities and selected lingerie fetish websites. ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?