Feeds

Yahoo! Finest! Invade! Ibiza!

"Gee, what's Denmark famous for?"

  • alert
  • submit to reddit

Seven Steps to Software Security

Register spies are everywhere, including Club Med in Ibiza. And they dish the dirt (disappointingly little in this case). But it just goes to show that you cannot be too careful when you are playing away, so to speak, as this report shows.

Club Med, Ibiza. Halfway through last week, among the babies and children, emerged well over 300 of Yahoo!'s finest European staff with the usual US contingent for a three day company conference to hear the Gospel according to the new CEO. Yes, several fell
fully clothed into the water during the morning ritual "Sundance" by the pool - perhaps praying for improved advertising revenues?

The ears were flapping in the breaks but believe me there was nothing to be heard but people in huddles in the corners of the restaurants bitching about their management, seemingly making up their conference speeches as they went along. In one section I think the US management would have managed to insult
virtually every European nation in turn...scratching for witticisms for countries they had hardly heard of over lunch, in preparation for the afternoon's session..."Gee, what's Denmark famous for...don't they have a
mermaid or something...I know, Hamlet...! That's a great idea..."

Summing up their interesting times and collective job prospects one commented to another, "the next two months will be real interesting". Their evening jamboree finale was a Eurovision Song Contest spoof under Club Med's own big top tent.

No great dirt - usual clubbing til dawn, too many mobile phones by the pool, some even testing their laptops in the sunshine. Ugggh. ®

Has your holiday been ruined by Conference- Caling Johnny IT sales reps? Don't call us, unless it's really interesting.

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.