Feeds

Don't call me Ishmael

Choosing a name for your new PC

Secure remote control for conventional and virtual desktops

The 10 key rules for naming computers and stuff

Rule 1: (In the Python manner) Naaaaaaaaah hobbits!

Rule 2: An enlargement and clarification of rule 1. We mean not only no Frodo, no Bilbo, no Merry, no Pippin, no Marmadoc Brandybuck, nor Adalgrim Took, nor Lobelia (Bracegirdle) Sackville-Baggins; we also mean no Gandalf, no Gollum, no Preciousss, no Treebeard, no Sauron, no Glóin son of Gróin nor yet Glóin son of Thorin, even if your network does support mixed case, UTF-8 and spaces in its names. The ban also implies no Eöl, no Rohirrim, no Melkor, no Mordor, no Sindarin, no Eleventy-first birthdays and definitely, absolutely, certainly no Tom bloody Bombadil.

Curiously, however, 'Tolkein' is quite a good name for a server.

Rule 3: As with dogs and humans, so, mysteriously, with PCs and peripherals. 'Brian' is not really a PC's name, but is quite acceptable for printer or scanner, whereas 'Jonathan' is obviously a silly name for a Laserjet but is quite viable as a little LAMP intranet machine.

Rule 4: Don't be too cute. Specifically, don't borrow from fictional computers. It was done to death 20 years since. If you call the first octo-core 64-bit machine on the premises 'Hal9k' or 'DeepThort', you will a) hereafter experience a whiff of irritation every time you need to connect to it and b) advertise your lack of imagination to your colleagues.

Another example of excessive cuteness is the dodge of calling a file server 'Jeeves' or 'Bunter' (server nearly equals servant, geddit?). Sorry about that, guys.

Rule 5: In the absence of any other pointer, and frankly to my irritation, Windows PCs are boys, and possibly a bit common, whereas Macs are girls, and distinctly posh. A MacBook Air is much more likely to be a Felicity than a Wayne. Presumably this is because frilly-girly Macs are supposedly filled with sugar and spice and all things nice. Grrrr. So much for emancipation. To think Emmeline and Germaine died for this. Yes you do; they were the G4s we slung out the year before last.

Linux machines are a bit androgynous, and should be named in a non-committal manner, for example 'Hilary', 'Evelyn', 'Vivian' or 'Kim'.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.