Feeds

Dirty PCs: How much filth can you take?

The horror, the horror

Application security programs and practises

Ventblockers II It's been a tad over a year since our shock insight into the darkest and most fearsome interiors of computing hardware, and by our reckoning that's just about enough time to recover from the trauma.

Accordingly, we're inviting contributions for "Ventblockers II", so let's see if you lot can match this further collection of horror which has crawled into the Bootnotes inbox over the last 12 months.

First up, here's one from James Dore, who explains that it's "a machine acting as a firewall that was in the cellar of a building we were having refurbished".

The builder's foreman said: "No worries mate. We'll cover it in plastic sheeting, and it will be fine."

Rather dirty PC interior

Well, it wasn't fine as you can see.

Next up, a couple of dusty snaps from Anthony Giagiarno:

Dusty PC interior

Dusty fan vent

Not bad...

The Power of One Infographic

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.