A Pizza Box for Your Laptop 526
Dark Twonky writes "Human Beans is selling the perfect gift for the geek who has everything. It's the PowerPizza, a pizza box for transporting your precious laptop in. From the web site: Desirable laptops are desirable to thieves too. Disguise your laptop with a PowerPizza and reduce the risk of getting it nicked."
Back Pack (Score:5, Informative)
Translation (Score:2, Informative)
So thieves just... (Score:5, Informative)
Re:Idiot poster (Score:2, Informative)
Re:Instead of Theives (Score:3, Informative)
1. Steal underpants.
2. ??????
3. Profit!
It's obvious when you think about it.
Re:So thieves just... (Score:3, Informative)
Look for people walking around with pizza boxes tucked under their arms... That's what'll end up happening after people get tired of carrying their laptop around like it's a pizza.
Especially since your average sized laptop ways 6-8 pounds, which is quite a bit more that your average pizza. It would be like holding a gallon bucket full of water out at arms length.
Just out of curiousity, how would this thing work when travelling by air? Would airport security just let go by with it? What about when you have to open it? Then everyone knows what is in there.
Re:Worlds. Stupidest. Product. (Score:2, Informative)
"Spam: from Human Beans. An exhibition of fictional products"
So your right, it's fictional, but also funny.
It's in the "Fictional Products" section (Score:2, Informative)
Exactly (Score:4, Informative)
The thief wants pizza, is fairly confident that the Pizza company is too busy to report the theft and in all likelihood would never dream of stealing a laptop.
-S
Re:On recovery from theft... (Score:2, Informative)
Re:Domino's (Score:2, Informative)
Re:On recovery from theft... (Score:2, Informative)
There was actually an article in the Fall 2004 issue of 2600 that discussed a shell script to do something very similar. It would check in periodically to a particular web address, and execute a command contained on that web page. So if your laptop ever gets stolen, you have both a record of the thief's IP address and a means to execute commands locally. Pretty interesting.
Re:Translation (Score:3, Informative)