Feeds

Honeywell's Kitchen Computer remembered

The $62,550 machine no one bought

Choosing a cloud hosting partner with confidence

Instant Holiday Promotion

Honeywell had pitched the machines for industry, mathematics, medical, scientific research, and other advanced uses – but apparently Nieman Marcus thought they could possibly have a place in the kitchen. What was billed as a "writing table" became a kitchen cutting-board and voilà -- instant holiday promotion!

The advertisement reads:

If she can only cook as well as Honeywell can compute

"Her soufflés are supreme, her meal planning a challenge? She's what the Honeywell people had in mind when they devised our Kitchen Computer. She'll learn to program it with a cross-reference to her favorite recipes by N-M's own Helen Corbitt. Then by simply pushing a few buttons obtain a complete menu organized around the entrée. And if she pales at reckoning her lunch tabs, she can program it to balance the family checkbook.

In 1952, Nieman Marcus introduced a tradition of listing extravagant gifts on its Christmas catalog. Since then, it's advertised obnoxious luxuries like a toy tiger covered in diamonds, a golden toilet seat, and a robe worn by a Chinese emperor in 1770.

Intelligent flash storage arrays

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.