Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

The Power of One Brief: Top reasons to choose HP BladeSystem

Ventblockers II Well, you lovely people, it's time to pour yourselves a stiff brandy before entering the circus of horrors that is Ventblockers II.

Good work by all those readers who sent in evidence demonstrating that it really is a good idea to keep your computer spick and span. The consequences of poor PC hygiene can, as we shall see, be quite terrifying.

Of course, we're going to break you in gently, so let's warm up with a few dusty moments. Picoshark admits he "didn't have the nerve" to open this box in the warehouse where he works, so he just wrote a message for his boss, suggesting they should probably get some new kit:

BAD written in thick dust on PC case

Cornz, though, did have the cojones to open this machine from a builder's yard. He says it was "caked in really fine brick dust", and accordingly suffering somewhat from overheating:

Builders' PC coated in dust

Roger Greenwood reports that he was "called to our welding and grinding shop" to investigate a clapped-out machine. Magnetic metal dust and computers don't mix, although five minutes with a compressed air gun were enough to get this PC up and running:

Another dust-coated PC interior

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.