Feeds

Lord Peter views the logfile

Top hole, Bunter

Beginner's guide to SSL certificates

Stob "What is design? Dorothy Sayers (English writer and dramatist - quoted by Brooks) suggests that design has three phases" - InfoQ reviewing Fred 'Mythical Man' Brook's latest tome.

I had never realised that the famous crime writer Dorothy L Sayers was one of us - VS.

The morning sunshine, filtered, as it were, through London's Green Park, shone in on the second floor flat at 110A Piccadilly. It bounced playfully off the open, over-polished lid of the baby grand piano, scattered the too-blue hues of a cut glass bowl of centaurea cyanus in a dancing pattern across the ceiling, and fell on the protective glass doors of the large, crammed bookcases on the far wall, providing glimpses of the treasures inside: a Second Folio, the Beardsley-illustrated edition of Malory's Arthur You Legend, and, best of all, the serried ranks of Knuth's L'art de la programmaçion informatiq in their original Norman French.

A young man, resplendent in a silk dress-gown with a peacock motif,  was perched delicately on the end of the Chesterfield, his flaxen head bent over a strange musical instrument. A tray of crumby breakfast plates lay on an occasional table at his elbow.

Suddenly, the room was filled with melody: one of the less well-known sonatas by Alexander Scriabin in the fiendish key of seven sharps. The young man sighed, and put down the vuvuzela  - an original by Robert Reid of Newcastle, with a mother-of-pearl mouthpiece and exquisite detailing on the bell.

'Damn this thing! I can't squeeze a single note out of it. I take it, Bunter, that terrible row means you have in your inimitable way successfully fixed the doings of the thingumajig? If so, I suppose you had better answer it, fun though it is to play Peter-the-Hermit.'

'Very good, my lord', replied the man called Bunter, raising his voice so as to be heard from the pantry. He switched off his soldering iron and picked up the source of the offending noise, deftly closing its case over its freshly-replaced aerial and answering it in a single movement.

'Hello. Hello caller! This is Mayfair 15. You have reached the currently stationary but theoretically mobile telephone of Lord Peter Wimsey. This is Mervyn Bunter speaking. How may I be of assistance?' He listened intently for a few moments. 'Yes, sir. I am sure his lordship would be delighted to oblige. His lordship will meet you as suggested. Goodbye.'

'What's that, Bunter? Who was it on the blower at eight ack emma of the day? What did he want?'

'It was Chief Inspector Parker, my lord, wishing to know if you could see your way to meeting him at the Yard this morning. He says he has a lost murderer that will interest you. I took the liberty of saying that your lordship will be with him in 90 minutes.'

'Did you, by Jove? Well, quite right too. Can't waste away the morning tootlin' my vuvuzela. I had better have my bath and toddle along.'

'Yes, my lord. Shall I put out the malacca cane with the heavy silver top and concealed sword?'

'Actually Bunter, I better have the gent's folding brolly with 2TB memory stick concealed in the handle. One has to move with the times, what?'

'Yes, my lord,' said Mr Bunter stolidly.

* * *

'Charles, there you are! What's going on?' Wimsey had been escorted to a development room on the third floor and abruptly abandoned by the whiteboard. 'This doesn't look like a murder.'

'Thanks awfully for coming, Peter,' said Parker. 'This is Miss Kimberly. She will explain everything.'

Miss Kimberly was a severe looking woman in her fifties, dressed sensibly and unostentatiously, topped off with grim, grey bun of hair and a pair of spectacles of the 'severe brow' type that make it appear that the wearer is always frowning.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.