Feeds

Geek seeks cash for Top Trumps-style CPU game

Ha! My Z80A beats your 6502

Secure remote control for conventional and virtual desktops

Nowadays, Top Trumps packs are filled with licensed brand tat, but readers keen to re-live the days when TT's decks were full of real stuff, like supercars, jet fighters, locomotives, missiles and such, will be able to do so with a new tech-inspired set, if one Harry Mylonadis gets his way.

Or, rather, if he gets $3500 (£2232) to put the first edition of his CPU Wars deck into production.

CPU Ward deck

Harry's take on the Top Trumps games of yesteryear has a distinctly geeky feel: 30 cards covering all the major processor platforms of the past 40 years, complete with clock speed, transistor count, fabrication process, die size and other stats to keep the data-obsessed happy.

There's page up on beg-for-money [surely 'connect dynamic young entrepreneurs to sources of venture funding'? - Ed] site Kickstarter, and anyone putting up at least $15 gets a copy of the game, Harry says.

CPU Ward deck

Now where did I put my Lamborghini Countach card with its beats-everything £70,000 price stat… ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.