Welcome!

Machine Learning Authors: Zakia Bouachraoui, Yeshim Deniz, Pat Romanski, Elizabeth White, Carmen Gonzalez

Related Topics: Agile Computing, Linux Containers

Agile Computing: Article

i-Technology Viewpoint: Attack of the Blogs

Jeremy Geelan Takes A Brief Sideways Look at Daniel Lyons' Much-Discussed Forbes Article About "Attack Blogs"

Attack of the Blogs: But “Blogs Don't Kill People, Idiots Do”

What’s the key issue underlying Daniel Lyons’s controversial “Attack of the Blogs” article in this month’s Forbes? In my view his piece, with its knowingly provocative title, has provoked much heat…but so far very little light.

So let’s try and redress that, however slightly! ;-)

Blogging is a hot topic in the professional news-gathering community right now and one of the simplest ways to understand all the fuss (on both sides) is to think for a moment of why Microsoft feels so threatened by Linux. The professional journalist community, if you accept this analogy, is like Microsoft, and the blogging community is like Linux, it holds out the promise of providing a product for free that is at least equal to and very possibly superior to the commercial version.

If you hold with this interpretation, then it becomes at once easier to understand why a professional writer (Dan Lyons) writing for a commercial publication (Forbes magazine) might have a vested interest in publishing an article turning the spotlight on what he terms “attack blogs” – that’s to say, blogs used by for example rival companies “as a weapon, unleashing swarms of critics on their rivals.”

But Lyons himself writes in Forbes that attack blogs “are but a sliver of the rapidly expanding blogosphere,” so let’s concentrate instead on the fact that 100,000 new blogs are said to be created every day – that’s more than one new blog per second. (These stats are derived from the San Francisco firm Technorati, which tracks the content of 20 million active blogs.) Does the blogosphere, viewed from this perspective, amount to a threat to paid-for journalism?

Personally, I think that’s the wrong question. To my mind, it’s a little like asking, does the availability of free drinking water threaten the existence of Perrier? The answer is no; they are two separate things. People will always want journalism as well as blogalism, for the simple reason that, while from a paid-for news product one has the right to demand standards of accuracy, decency and compliance with ethical standards; from a blog one can demand none of the above.

Which is not to claim that the vast majority of blogs aren’t both accurate and ethical; they are. Nor that there is no such thing as rogue journalism; there is. But blogalism isn’t predicated in any way on professional accreditation, so there really is no form of sanction for breaches of any sort, whether of accuracy, decency, or even privacy. The rule is simply, “If you don’t like what you’re reading here, just stop opening this site in your browser or receiving this RSS feed.” First Amendment rights are a wondrous thing; but they are no great guarantee of unblemished reporting.

As the world continues to spin ever-faster, with issues like globalization, outsourcing, and disintermediation all intertwining in a sometimes almost bewildering variety of ways, and with consequences both foreseen and unforeseen, I would go so far as to say not only that journalism will continue to be both valued and purchased by readers worldwide, but that the thirst for “mediated” reporting will increase as a function of the expansion of the blogosphere. When you can find ten thousand views on anything, it becomes more important and valuable, not less, to consult the view of a single trusted source. Or, more likely, a small group of different trusted sources, just to be on the safe side.

So it is not, in my opinion, a fear of pending redundancy that motivated Daniel Lyons and/or his publisher Steve Forbes to highlight the pernicious nature of “attack blogging,” so much as an inevitable curiosity about a phenomenon that technology has inadvertently enabled.

Call it the Law of Unintended Consequences in operation. Just as the inventor of the automobile doubtless had no intention of facilitating the one-night stand, neither did Dave Winer set out to foment Reckless, Stupid Syndication. It isn’t blogs that “attack,” it’s people. Or rather a sub-section of people: idiots.

More Stories By Jeremy Geelan

Jeremy Geelan is Chairman & CEO of the 21st Century Internet Group, Inc. and an Executive Academy Member of the International Academy of Digital Arts & Sciences. Formerly he was President & COO at Cloud Expo, Inc. and Conference Chair of the worldwide Cloud Expo series. He appears regularly at conferences and trade shows, speaking to technology audiences across six continents. You can follow him on twitter: @jg21.

Comments (3)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. DevOpsSUMMIT at CloudEXPO expands the DevOps community, enable a wide sharing of knowledge, and educate delegates and technology providers alike.
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a significant part of their IT budgets in the very near future. As IoT solutions are growing rapidly, as well as security challenges growing exponentially, without a doubt, the cloud world is about to change for the better. Again.
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introduces complexity and challenges availability at every turn. To embrace DX and to come out on top, there are four underlying principles that should guide you. Understanding these four essentials along with their relevance and impact will elevate you to DX Hero status now. Jonathan will provide a high-level overview of these principles and how some of his organization's clients have embraced them w...
The level of trust we have with individuals, businesses, and technology affects our lives daily. This is important to remember when discussing new technologies. For example, our level of trust is a critical factor when evaluating a new technology as a potential solution for providing business value. Given the importance of trust, imagine one's reaction upon hearing that blockchain is a "trustless trust" system. On the surface, that does sound like an oxymoron. This paper discusses how "trustless trust" applies to blockchain. It will discuss the various consensus algorithms used to provide that trust, including the benefits and challenges of each. Key use case patterns will be provided as examples and what the impact of the tradeoffs between consensus algorithms.
Today's workforce is trading their cubicles and corporate desktops in favor of an any-location, any-device work style. And as digital natives make up more and more of the modern workforce, the appetite for user-friendly, cloud-based services grows. The center of work is shifting to the user and to the cloud. But managing a proliferation of SaaS, web, and mobile apps running on any number of clouds and devices is unwieldy and increases security risks. PJ Hough, Citrix Executive Vice President and Chief Product Officer, discusses improving personal productivity with an evolved approach supporting modern workstyles and simplifying IT complexities to deliver the right experience to the right user at the right time, on any device.