Feeds

Web bears up under demand for Starr report

Viewers turn from TV to Net

  • alert
  • submit to reddit

Intelligent flash storage arrays

Like many lawyers, Kenneth Starr, the so-called independent counsel investigating Clinton's zippergate, used WordPerfect 6.1 for his report, which he supplied on CD-ROM to the House of Representatives. It was then converted to HTML, but some mistakes were made with the conversion and the versions first published on government sites were lacking some of the footnotes -- and, even worse for Starr, some footnotes that had been marked as not to be included, were included. Corrections were swiftly made. Reports conflict as to whether the Web held up under punishment from salacious surfers, but majority opinion is that it was not too serious -- only a few government servers crashed for short periods of time. Failure rates in accessing the key sites reached nearly 90 per cent for a time, and download speed was sometimes half what might be expected on a normal day. The large number of mirror sites were responsible for spreading the load. Even a broken Worldcom fibre optic cable, caused by a train derailment in Georgia, did not cause significant problems. Most nauseating perhaps (the use of cigars apart) was the hypocrisy surrounding the excuses used by the likes of Netscape and AT&T for posting the text of the report. They were just doing it to alleviate the stress at government sites and as a public service, they said, but few doubt that surfers were just curious about what pubic services were provided in the White House. They would say that, wouldn't they? The White House site put up two documents in defence. From a broader perspective, the saga has clarified the role of the Internet in news dissemination. Where pictures are unimportant (or disappointingly unavailable), television doesn't work well. Although Real Networks and Broadcast.com had reporters read the report, it was dull. Broadcast teletext via PBS was not needed as there was no gridlock. The downloaded report allowed readers to skip to the parts that interested them. ®

Security for virtualized datacentres

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
UK.gov pushes for SWIFT ACTION against nuisance calls, threatens £500k fines
DCMS seeks lowering of legal threshold to fight rogue firms
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
ISPs handbagged: BLOCK knock-off sites, rules beak
Historic trademark victory, but sunset clause applies to future blocks
Hungary's internet tax cannot be allowed to set a precedent, says EC
More protests planned against giga-tariff for Tuesday evening
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.