Feeds

UFO wind turbine prang site: Exclusive photos

What really went down in Lincolnshire

7 Elements of Radically Simple OS Migration

6: Fugitive US businessman

US businessman parachutes in

This cash-strapped financial advisor has decided it's a bright idea to fake his own death in a light aircraft crash, and is parachuting to earth convinced he'll fool the authories with his brilliantly-conceived masterplan. Unfortunately, he's being monitored by an ultra-secret robotic stealth drone operated by Her Maj's Custom and Excise, and was later cuffed at a local campsite having checked in under his own name.

7: JCB pusuit

Police pursue JCB

Finally, we have the most dramatic image: An alcopop-crazed five-year-old from a local sink estate - already the subject of 17 Asbos and three restraining orders - has stolen a JCB and is about to cop a tasering for his trouble.

In conclusion, while our shock images show an abnormally high level of activity at the wind farm on the day in question, we're still none the wiser as to what exactly happened to the damaged turbine. Our skilled operatives are as we speak at a secret location somewhere in southern England attempting to construct a functioning alien warp drive based on the strange components seen above. Watch this space... ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?