Feeds

Reg competition: Cisco goes isup

Can you solve the mystery of the lost leer?

Eight steps to building an HP BladeSystem

It's five days since the lower case letter 't' briefly disappeared from Cisco's home page.

Since the curious case of the missing lower case letter (a browse of the html source showed that capital letter Ts were not affected) surfaced on Thursday morning, we've sought in vain for an explanation through Cisco's PR UK agency. After drawing a blank there, we've also tried an internal PR person and the networking giant's webmaster, again without success.

Perhaps they're all on an extended t-break.

Various theories have surfaced to explain the mystery disappearance, ranging from a search-and-replace screw-up to some kind of (very subtle) hacking attack.

In the absence of an explanation from the neworking firm we've decided to turn the mystery over to you, our beloved readers, through the medium of a competition.

Ge your rouers and sorage here

Entries need to be in by Friday. The best (wittiest and/or most plausible) will win a fabulous, well, T-shirt.

Comments to our earlier story already suggest a few promising ideas. Such as Infocom game fan Paul Coen's contribution:

I can only conclude that a group of salesmen showed up at the door, and in return for a flashlight, gave them a T-remover.

Ah, yes, Adventure and The Hitchhiker's Guide to the Galaxy were fine examples of text adventure games for those old enough to remember the days of gaming before the fancy dan Wii and PlayStation 3 ruled the roost.

Craig McLean was the first to suggest that a cack-handed application of a text editor on page code might be to blame.

Removal of tabs using s/t// instead of s/\t// perchance?

If you have a better (or funnier) idea, step this way. All entrants must take care to dot their Is and, of course, cross their... lower-case Js. ®

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.