Feeds

UK.gov password protects Aryan Governance Summit site

'Promoting Prosperity' through National Socialism

7 Elements of Radically Simple OS Migration

Updated The powers that be yesterday blocked unauthorised access to the website of the Progressive Governance Summit following our discovery that it was, in lieu of "Promoting Prosperity", actually promoting National Socialism.

The Progressive Governance Summit logoThe chilling proof of UK.gov's plans for a blond-haired, blue-eyed future comes in the form of the logo, as seen here. Lurking in the shadows is the unmistakable crooked cross much beloved of Alsatian-owning vegetarians.

We were going to make our dossier available to the relevant authorities when it suddenly dawned on us that any attempt to alert them would certainly result in an early-morning knock at the door by men dressed in long black leather coats and bearing Progressive Governance armbands.

El Reg will continue to broadcast for as long as is possible, but if it suddenly falls silent, please... ®

Update

The site became reavailable to the unwashed masses at around lunchtime today - complete with denazified logo and nice YouTube greeting from Gordo. Bless.

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?