Feeds

Honeywell's Kitchen Computer remembered

The $62,550 machine no one bought

Internet Security Threat Report 2014

Casserole Data

Unfortunately, its "user interface" only consisted of a strip of binary front panel lights and some switches, making entry or recovery of the family's famous casserole data a monumental task of machine mastery and encryption. In fact, Neiman Marcus advertised the system as coming with a complimentary two week programming course to learn how to use it – which is something anyone could enjoy over the holidays, we're sure.

The system is a Honeywell H316 General Purpose Digital Computer, which came in a tabletop, rack-mountable, and "futuristic styling" of Kitchen Computer's pedestal design, according to an old company brochure (PDF).

Internet Security Threat Report 2014

More from The Register

next story
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.