Feeds

The sound and the fury and the kettle

Noisy, expensive and weird

Top three mobile application threats

Hotel rooms

I’m going to add one more pseudo-moan. Lithuania, it seems, offers exactly what you ask for – but not anything beyond that. This leads to some interesting situations – two of which are apparent in my hotel room.

I have a coffee cup, and a packet of coffee and milk in my room. But no kettle. Clearly someone previously asked for coffee in their room. And they got it. Maybe it was two people – maybe the second person, seeing the coffee, then asked for a cup and some milk (well, creamer). What they forgot was to ask for something to provide hot water.

Is it now contingent on me to push the envelope further and ask for a kettle to contain and boil the bloody water? I’m not sure – this is a strange land. I fear I may push it too far and lose the cup in the bargain.

The other thing is the huge bathroom. Really big. The kind of shower you want at home – so much space that you can walk around in the shower area. Luxurious. And that’s only a third of it – big bathroom space, and space for the sink and the toilet.

This is great. Except the bathroom is actually the same size as the rest of the room. Which is a bit odd when you come out of the super-bathroom and feel cramped in the actual room. Clearly the architect insisted on a big bathroom. He just forgot to add that he wanted the room itself to work in the normal 1:3 bathroom-to-actual-room proportions.

I also have a desktop PC with screen, keyboard and mouse on the desk. I haven’t fired it up but I already know from the look of it that I had a better computer when I left university – and that was 15 years ago.

Still, it’s the thought that counts.

gTLD nonsense

Even though this is the IGF, ICANN politics are never far from the agenda. So in a session about IDNs this morning, we were treated to, frankly, a rant from Jamil Zahid – who I actually like very much – who horribly mispresented the issue of top-level domains for developing countries and promoted an IP lawyer delay-and-destroy argument as coming from a developing country concern perspective.

Fortunately ICANN chairman Peter Dengate Thrush was in the room and tore into the dodgy and fear-mongering arguments. But it was a depressing sign that the combatants in ICANN will do anything and go anywhere to get a leg up.

Gala event

So the Gala event this evening was at the Vilnius Modern Art museum. It was a pretty peculiar affair.

I can’t fault the locals on the food or booze – there was plenty of both. But how come the art museum had basically been stripped of any art? A few statues were carefully clumped together and surrounded by tape barriers and the rest were presumably put in storage before the guests turned up. Which meant that we all basically had a drink in a big white warehouse.

Inevitably it came to the speeches. Why local dignitaries insist on giving speeches at social events is completely beyond me. It never works, and it just frustrates those giving speeches. Especially in the internet world where people have a peculiar tendency to keep talking – loudly – even when asked politely many times not to.

I have always been in two minds whether I love or loathe this.

On one level, it is extremely rude to talk loudly in the same room as someone giving a speech. And to keep on talking when asked to be quiet (especially when there are plenty of other rooms to go to).

But on the other hand, this conference is about the internet, not about giving politicians yet another platform to bore everyone to tears. When it’s going on, it feels a little bit like the internet itself – lots of people trying to be serious and share information, while being drowned out by people who don’t give a shit.

In this case, however, it was actually the prime minister of the country, Andrius Kubilius, trying to speak. You’d think that a prime minister in his own country could command a bit of respect. But no. Anyway, he took it well. To become prime minister you know he’s already been in worse spots.

What was kind of sad was that someone had written a whole speech for him, including frequent references to the recent win by the Lithuanian basketball team – a BIG deal in this part of the world. The rousing speech fell on deaf ears. Most people didn’t know who the guy was on the little stage. That’s the internet crowd for you.

Now if he’d told a couple of jokes, or make a cat dance, well that would have been an entirely different matter.

This article originally appeared on kierenmccarthy.com.

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.