Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

Secure remote control for conventional and virtual desktops

Peter Witherow offered us a couple of snaps of a slightly grubby Dell...

Dusty Dell interior

Another view of dusty Dell interior

...while Kreepykrawly sent in snaps of an Oz machine covered in "at least 4mm of bulldust" (fine red outback dust). It was running a bit slow, the owner noted:

Interior of PC coated with dust

This is unpleasant - an ailing PC treated by John Tuohy for a nasty case of human skin flakes:

PC motherboard coated in dust

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.