Feeds

Boris to give out Olympic 'BlackBerries'

Handheld devices promote a 'more intimate experience'

Mobile application security vulnerability report

Visitors to the 2012 Olympics may be entertained by “handheld electronic devices” designed to provide spectators with a “more intimate experience”.

The “handheld devices”, it transpired, will most likely be “some sort of Blackberry”, helping visitors to find their way around, and providing them with action replays of key moments in the games.

Transport problems might be soothed by increased use of bicycles. Meanwhile, large areas of central London could be turned over to partying.

For the most part, however, Boris Johnson’s first appearance yesterday as Mayor, answering questions from the the Culture, Media and Sport Select Committee, left few hostages to fortune. Which is not quite the same as none at all.

As London MP and Committee Member Alan Keen later observed: “He is all too easily able to overwhelm his interrogators with a flood of words, in which the original question gets lost.” Nonetheless, even a representative of the party that lost the London mayoralty to Boris in May was prepared to recognise that, at this stage, there are no sensational disasters on the horizon.

Whether this will still be the case in a year or two is another matter.

On security, Boris was upbeat. There was a budget of £600m in place for policing and that should be more than enough.

The committee expressed some concerns at the loss of two key figures in the security equation: Police Commissioner Ian Blair, who stood down last week, and Assistant Commissioner Tarique Ghaffur, who has been temporarily relieved of his duties. However, responsibility for putting together security for the games was now with Deputy Commissioner Sir Paul Stephenson. And with four years to go, recent events should not have too great an effect on the end result.

Where greater debate may yet be needed is in the nature of that security. The mayor felt that there needed to be a balance between over-intrusive security of the sort present in Beijing, and individual safety.

The experience of the G8 summit in 2005 suggested that if you put a lot of security in one place, the most likely result would be that terrorists would attack somewhere else. Too much security would be overkill.

Perhaps the biggest hostage to fortune was Boris Johnson’s “categoric assurance” that the budget as it stood now was more than enough – and he would not be spending more. Such assurances have been heard before on major public spending projects, and more often than not they have proven false.

The other downside, which formed a recurrent theme of questioning, was comparison with the Beijing Olympics. Several questions returned to the fact that London was planning to produce something “just as good” as Beijing, in its own way – but for half the budget.

The more that Boris and members of the Select Committee repeated that point, the more hollow it sounded. In time, London may come to regret having won the games that followed Beijing. ®

Mobile application security vulnerability report

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.