Feeds

El Reg celebrates 10th birthday

Our snapper captures London bacchanalian excess

  • alert
  • submit to reddit

Seven Steps to Software Security

We're delighted to report that El Reg earlier this week celebrated its tenth anniversary as a daily publication with a right royal piss-up in the very Central London hostelry where the world's favourite IT website was born.

We cannot, for state security reasons, name the location in question, but our official snapper was on hand to capture the kind of professional-level drinking which makes The Register the post-robust-lunch journalistic powerhouse it is.

So, without further ado, here's the chance for you, our beloved readers, to put some faces to those names who've entertained and delighted you over the years - kicking off with Chris "Tia Maria" Williams wondering whether he should stick to Diet Coke or switch to his sweet liqueur breakfast tipple of choice:

Chris Williams

John Oates, meanwhile, kicked off the evening with a happy smile...

John Oates

...while Caledonian bureau techie Murray "No, not that one..." Walker warmed up with a preliminary pint:

Murray Walker

Although the initial rate of beer-quaffing was not considered particularly excessive by Vulture Central standards, office whippersnapper Robin Lettice was by 6pm already looking rather nervous:

John Oates and Robin Lettice

Yes, that's right - Robin is the son of none other than Reg co-founder John "Fist of Fury" Lettice. Sadly, John successfully spent the evening dodging our lens, so you won't be able to confirm the family likeness.

Right, here's a shock for the hard core geeks among you - El Reg also employs women. Yes, women:

Tracey Cooper, Kelly Fiveash and Sarah Bee

From left to right, we have supersub Tracey Cooper, hackette Kelly Fiveash and, be afraid, Sarah "Moderatrix" Bee, the latter being of course the scourge of comments f**ktards and other gobby riff-raff.

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.