Feeds

8,000 bloggers born every day

Of which 2,880 annoy family, and 960 get sued

  • alert
  • submit to reddit

High performance access to file storage

Weblog search engine Technorati says it is now tracking over three million weblogs, with 8,000-17,000 new blogs created every single day. That means that a new weblog is created somewhere in the world every 5.8 seconds. Of these, a reported 36 per cent irritate friends or family with their twitterings, while a staggering 12 per cent attract the attention of lawyers with their biting commentary.

Among the less eye-catching stats is the revelation that about 45 per cent of the weblogs have not had a post in over three months, but a significant portion of people are still posting each day. The number of conversations are increasing to over 275,000 individual posts a day. On average, more than 3 blogs are updated every second.

According to a survey by MIT conducted earlier this year, the great majority of bloggers identify themselves on their sites: 55 per cent of respondents provide their real names, while another 20 per cent provide some variant of the real name: first name only, first name and initial of surname, or just a pseudonym friends would know.

If the figures are to be believed, then anonymity would appear to be the way to go. Keeping schtum as to your real identity would protect you from becoming one of the 360,000 people per year who allegedly receive subpoenas as a result of their blogging. It would also protect the 1,080,000 bloggers who annually piss off their loved ones and acquaintances. Of course - the stats may be misleading. It's entirely possible that a large percentage of subpoenas come from enraged relatives or chums, which brings the figures down to a more plausible level.

Litigation and rage aside, the emphasis of blogs seems to be shifting from links to personal stories and commentaries. About 83 per cent of respondents characterise their entries as personal ramblings, whereas 20 per cent still publish lists of useful or interesting links. Whether or not a large percentage of said links are to family counselling groups or firms of cut-price lawyers is not noted. ®

Related stories

Oi, Saddo, show us your home page!
Washington sex blogger signs book deal
Harvard man loses 3,000 weblogs
The future of Weblogging
Murderer blogs from behind bars

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.