Feeds

Vote NOW for the vilest Bond villain

I've been expecting you, 007

  • alert
  • submit to reddit

7 Elements of Radically Simple OS Migration

Poll In the 50 years since Her Majesty's Secret Service first let 007 loose on the silver screen, James Bond has faced some truly fearsome adversaries.

Menaced by steel-toothed giants, Koreans wielding killer bowler hats, and dagger-shoed Russian madwomen, it's fair to say that the world's favourite spy has survived some of the most entertaining, and at times improbable, movie villains and sidekicks.

But which of these wannabe world dominators can at least claim the posthumous crown for the vilest Bond villain?

Blofeld has to be in with a shot - the sinister cat-stroking nutter with a penchant for volcanic lairs - or perhaps Auric "No mister Bond, I expect you to die" Goldfinger is a front runner, for threatening 007's 'nads with laser treatment.

Well, you decide. We've put together a list of (naturally) 22 candidates for criminal glory, and we leave it to our readers to have the final say. Note that Mr Wint and Mr Kidd from Diamonds Are Forever are a single choice. It seemed unkind to separate them, since they did make such a lovely couple.

JavaScript Disabled

Please Enable JavaScript to use this feature.

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?