Feeds

Orlowski ‘deserves Pulitzer prize’

Reg hack elevated to pantheon of journo deities

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

CPRM on ATA - Full Coverage

It's not often that we print a letter guaranteed to puff the ego of some Vulture Central hack. The practice is normally discouraged since it inevitably provokes demands for wage rises, more holidays, their own office, a company car, etc., etc.

More often than not, these letters are written by friends or close relations. After all, who's mum wouldn't want to see their beloved offspring's name in lights? Bless 'em...

In this case, having closely examined the evidence and positively vetted the correspondent we're convinced this is pukka. What's more, it's nice to get a bit of praise in the Vulture Central Mailbag for a change. Take it away Anne Donker, Technology Consultant and Orlowski worshipper:

I would like to congratulate you on your absolutely outstanding reporting regarding CPRM. Compared to anyone else, you are by far the most well-informed and dedicated journalist looking into this huge issue. You deserve the Pulitzer Prize for outstanding investigative work.

Without your efforts, there would not have been the enormous buzz in the high-tech/'geek' communities that eventually made IBM back off (temporarily?). The only thing, perhaps, that amazes me more than your high-quality investigative work, is the fact that not that many media outlets here are picking up on the story.

I am a technology consultant at Accenture, but in a former life I worked as a journalist. I graduated from the School of Journalism at Columbia University in New York and have sent many of my class mates excerpts from various stories of yours on the topic, trying to get at least some of them to create buzz on the subject, but most of them just don't seem to 'get it.' To me, this just underlines how rare people like you are in journalism today.

Right, that's enough of that. It's back to the abuse for the rest of the year.

Reducing security risks from open source software

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.