Feeds

Pig plague 2.0: Can't spell 'pandemic' without 'panic'

If you can read this you're not dead, yet

New hybrid storage solutions

The internet has responded to the absolutely positively inevitable pandemic of swine flu with typical restraint and a decent sense of proportion, providing everything from context-sensitive maps to an iPhone application for those preparing to flee for the hills.

The irksome fact that the majority of people who contract the new H1N1 flu strain get a bit peaky and then recover provides no reason not to panic, and Web 2.0 is ready to provide you with up-to-the second updates in case you're starting to get relaxed about the whole issue.

iPhone owners can head over to SwineFlu for aggregated content, after a few sponsors' adverts, but the rest of us don't need to feel left out: the US Center for Disease Control has set up a Twitter feed that already has almost 30,000 followers. Across Twitter there are now more than 10,000 tweets an hour on the imminent viral apocalypse, so clearly it’s a breaking subject.

Those seeking more than 140 characters on the subject can turn to Google Maps tracking of infections, with colour-coded pins to indicate confirmed and suspected cases. A significant proportion of the latter seem to be fatal, though that shouldn't be a surprise as flu is often fatal for the elderly, and even kills the healthy when combined with other diseases. Google's Flu Trends doesn't report any significant change in US infections - but that doesn't support the need for immediate panic, so is best ignored.

Equally restrained is the World Health Organisation, which isn't recommending closing international borders or even boarding up the windows, which is all rather disappointing.

Luckily, Wikipedia provides a table of infections by country, helpfully including those from probably-unrelated "influenza-like" infections. Unfortunately, the "attributed deaths" column contains an awful lot of zeros, for the moment at least.

Here in the El Reg bunker with our satellite feed we fear the worst, and so would like to take this opportunity to thank all our remaining readers for their years of loyal support and promise to provide whatever scant comfort we can. But we won't. We've got far more important hedonistic matters to attend to - our time is precious, you know. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.