Last night
loosecanon returned home with toys!
No, really, toys like from a discovered toy store. One was an obvious choice, it would amuse most folks I know, and delighted me in particular; a tiny toy catapult. The arm moves freely and has an appropriately placed break bar; I suspect M&Ms will fly at work.
The other toy is absolute serendipity. It was chosen because I use a lot of mythological references at work. Databases named Muse, firewalls named Bifrost or Styx; that sort of thing. Bulfinch is one of those dry books I read over and over as a kid. Anyway, the toy is a little plastic figure of a three headed dog. A good icon of myth. However, and only a serious computer geek would know this or care, this little puppy is currently the most important dog in computer security.
A protocol, named after the three headed dog Kerberos (Cerberus in Greek), guardian of the underworld, is crucial in network authentication. Without Kerberos (or a dog by another name), modern computer security, even Microsoft's, wouldn't be possible. I'm not the only one who likes names from mythology for their geeky computer things.
My little plastic doggy has exceptional detail, some underpaid Chinese laborer even painted all the teeth white and eyes red with pupils. This guy's going on the desk right next to the geek clock.
No, really, toys like from a discovered toy store. One was an obvious choice, it would amuse most folks I know, and delighted me in particular; a tiny toy catapult. The arm moves freely and has an appropriately placed break bar; I suspect M&Ms will fly at work.
The other toy is absolute serendipity. It was chosen because I use a lot of mythological references at work. Databases named Muse, firewalls named Bifrost or Styx; that sort of thing. Bulfinch is one of those dry books I read over and over as a kid. Anyway, the toy is a little plastic figure of a three headed dog. A good icon of myth. However, and only a serious computer geek would know this or care, this little puppy is currently the most important dog in computer security.
A protocol, named after the three headed dog Kerberos (Cerberus in Greek), guardian of the underworld, is crucial in network authentication. Without Kerberos (or a dog by another name), modern computer security, even Microsoft's, wouldn't be possible. I'm not the only one who likes names from mythology for their geeky computer things.
My little plastic doggy has exceptional detail, some underpaid Chinese laborer even painted all the teeth white and eyes red with pupils. This guy's going on the desk right next to the geek clock.