Feeds

Kim Jong-Il in radish inspection shocker

Military experts analyse Nork nutter vegetable encounter

Remote control for virtualized desktops

The Telegraph has today answered those most pressing questions of the age: just what does Kim Jong-Il inspecting a radish look like, and when he inspects a radish, what conclusion can be drawn from the encounter?

Kim Jong-Il inspects radish on Telegraph front pageThat conclusion, the paper explains, is that experts have suggested that North Korea's entire military machine is fuelled by radishes. This, of course, is a rare delicacy which the impoverished nation's hungry population can only dream of, as they chew boiled army surplus boot leather.

Naturally, such significant news demands a top-quality headline, and the Telegraph has, let's face it, pulled out all the stops to tell it like it is.

What it doesn't make clear, however, is whether the radish in question gained the Nork nutter's approval.

What's more likely, judging by his expression, is that the country's radish growers can expect an extended holiday in the country's salt mines. Expect further in-depth analysis as this breaking story develops. ®

Bootnote

As we speak, North Korea's plucky footballers are heading for defeat at the hands of Portugal. We suspect it'll be radishes all round when they get home, having acquitted themselves well in the World Cup. England, on the other hand, can consider themselves lucky they don't work for Kim Jong-Il, who'd probably have them all shot.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?