Feeds

Register readers mostly too ashamed to cop to hideous hoard horrors

First step is admitting you have a problem. On the Reg

Eight steps to building an HP BladeSystem

We're very, very disappointed that Reg readers did not answer our call for the hoardiest human to come forward and present photographic evidence of their obsession with hanging onto every last bit of crap.

Despite many horror stories - including tales of small children buried under defunct computer kit landslides, and fire departments battling to control massive suburban garage blazes erupting from ten years of WiReD back issues - just two brave souls offered proof of just how bad things can get if you don't resist the almost overwhelming urge to accumulate junk.

Actually, it's really just one brave soul, because Nicola Price took the opportunity to have a pop at Pop, and not without justification:

Nicola Price's garage - filled with junk

A shaken Nicola told us: "It it supposed to be a garage, but Dad turned it into a clutterage. He cannot use most of the stuff as he cannot get it out from behind the rest, so what is the point of it?"

Quite so. The only person who came forward to reveal his own assemblage of shame was Gaius Hammond, who noted: "Unfortunately my camera lens isn't wide enough to include the other half."

Mr Hammond's stack of antique computer kit

Just as well, by the look of things. We're certain there are many of you out there who are reading this while contemplating your own shameful collection of clutter, whose presence would doubtless be immediately required were anyone foolish enough to throw it in a skip.

While we respect every reader's democratic to right to live as he or she sees fit, we'd like to say that denial is a destructive force and the first step on the road to recovery is to admit, preferably publicly on The Register, that you have a problem which only several hundred trips to the local dump can ultimately resolve. ®

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.