Feeds

The coolest arse on the planet

Plug and play!

Choosing a cloud hosting partner with confidence

There's that word "pad" again - but for buttocks this time. Not an arse-wipe, this is a "plug and play" - yes, really, cooling device to stop your bum getting sweaty in marathon gaming sessions.

Hot pink, but not sweaty: cropped pic of man sitting at desk with pink cooling pad on his chair

Hot pink, but not sweaty

Called the USB Cooling Seat Pad, this gaming peripheral costs 25 bucks and comes in hot pink and moist orange - not the first colours that spring to mind for hardcore gamers.

The gadget contains a built-in cooling fan which sucks in air and funnels it through string-vesty holes in the seat pad.

It draws power through the USB port of any machine that has power such as a PC and a games console.

pink pad - with cartoon blue arrows at sides to indicate airflow

Arrows? You expect me to sit on that!

Which is nice. Maybe it would be even nicer to get up from time to time and stretch those legs... no? Then be sure to be packing a "pee bottle".

Go, gamer, go!

USB Cooling Seat Pad

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.