Feeds

Reg readers scuffle over the ultimate cuppa

Brews for all tastes, with a nasty dash of 'cofftea'

Business security measures using SSL

Ok, so we're agreed that we haven't got the foggiest what represents the zenith of cha, personal preference aside. We at Vulture Central are, nonetheless, determined to at least narrow the field for the benefit of those who have not yet partaken of the divine nectar and are seeking enlightenment.

We're still mulling just what kind of test might enable us to get closer to our goal, and are obliged to those readers who pointed us in the direction of the splendid ISO 3103, aka BS 6008, which quite rightly secured the 1999 Ig Nobel Prize for Literature:

  • The pot should be white porcelain or glazed earthenware and have a partly serrated edge. It should have a lid that fits loosely inside the pot.
  • If a large pot is used, it should hold a maximum of 310 ml (±8 ml) and must weigh 200 g (±10 g).
  • If a small pot is used, it should hold a maximum of 150 ml (±4 ml) and must weigh 118 g (±10 g).
  • 2 grams of tea (measured to ±2% accuracy) per 100 ml boiling water is placed into the pot.
  • Freshly boiling water is poured into the pot to within 4–6 mm of the brim. Allow 20 seconds for water to cool.
  • The water should be similar to the drinking water where the tea will be consumed.
  • Brewing time is six minutes.
  • The brewed tea is then poured into a white porcelain or glazed earthenware bowl.
  • If a large bowl is used, it must have a capacity of 380 ml and weigh 200 g (±20 g).
  • If a small bowl is used, it must have a capacity of 200 ml and weigh 105 g (±20 g).
  • If the test involves milk, then it is added before pouring the infused tea.
  • Milk added after the pouring of tea is best tasted when the liquid is between 65 - 80 °C.
  • 5 ml of milk for the large bowl, or 2.5 ml for the small bowl, is used.

Quite magnificent, although we want to jig the parameters according to our readers' opinions. Accordingly, we've prepared the following poll to better determine the lie of the land. Note that we don't offer a selection of tea types. This would be impractical, given the sheer number suggested.

When we've examined the results, we'll use them as the basis for a final showdown, using the most popular teas you've already nominated. Exact details of this epic experiment will follow in due course, so take it away...

JavaScript Disabled

Please Enable JavaScript to use this feature.

Providing a secure and efficient Helpdesk

More from The Register

next story
SCREW YOU, Russia! NASA lobs $6.8bn at Boeing AND SpaceX to run space station taxis
Musk charging nearly half as much as Boeing for crew trips
PORTAL TO ELSEWHERE scried in small galaxy far, far away
Supermassive black hole dominates titchy star formation
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Edge Research Lab to tackle chilly LOHAN's final test flight
Our US allies to probe potential Vulture 2 servo freeze
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.