Feeds

And when did you you stop beating your CO2 cap?

Enviro survey redux

  • alert
  • submit to reddit

New hybrid storage solutions

Reader survey We have received some stick about our latest reader survey that's running over here. The environmental sceptics among you think some of questions are a bit assumptive, and that by simply answering them it could be construed that you take the green argument seriously - a bit like trying to answer yes or no to the question "Have you stopped beating your wife?" without incriminating yourself.

We don't think we have strayed too far towards that extreme, but to make sure we really have captured all viewpoints accurately on the fundamental question of whether the green argument is real or hype, we've put together the 90 second mini-poll below.

So, whether you're a sceptic, an activist, or just someone working their way through the arguments, it would be great if you could spare us a few mouse clicks.

QUICK OPINION POLL

Which of the following phrases best sums up your view of the 'green imperative'?
a. There is a real environmental crisis or threat and the attention given to it by the media, politicians, suppliers, etc is justified or not enough
b. Some significant environmental issues exist, but the situation is deliberately exaggerated by the media, politicians, suppliers, etc
c. The whole green thing is largely just scaremongering and/or hype created to drive political or commercial agendas
d. Haven't made up my mind yet – still trying to makes sense of it all
e. Don't have the time or inclination to think about it that much
Other (please sum it up in your own words)

Is it important for governments, businesses, etc to take action?
a. Yes, concerted efforts are required in many areas
b. Yes, in certain areas that will make a difference
c. No, because whatever is done will make little or no difference
d. No, because I don't believe there is a significant threat or crisis
Unsure

Additional comment

What is your job function?
a. IT management
b. IT practitioner
c. Business management
d. Business professional
e. Other (please specify)

How old are you?
a. Over 60
b. 50 something
c. 40 something
d. 30 something
e. 20 something
f. Under 20
g. None of your business

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.