Feeds

Google News fails to Digg-ify itself

Expects business card from Tooth Fairy

5 things you didn’t know about cloud backup

Google News is allowing Digg-style reader comments. Sort of.

Today, on the official Google News blog, software engineers Dan Meredith and Andy Golding announced a "new, experimental feature" that gives readers the power to publicly comment on stories turned up by the site's news aggregator - if they're actually involved in the stories.

"We'll be trying out a mechanism for publishing comments from a special subset of readers: those people or organizations who were actual participants in the story in question," they wrote. "Our long-term vision is that any participant will be able to send in their comments, and we'll show them next to the articles about the story. Comments will be published in full, without any edits, but marked as 'comments' so readers know it's the individual's perspective, rather than part of a journalist's report."

So, although Google won't edit reader comments, it will decide which are worthy of posting. All comments must be sent to the company via email, and then an army of Google minions will do their best to prove that everyone really is who they say they are.

If you send a comment, you must also include explicit instructions for verifying your email address. Google's help site provides some, well, help:

For example, if the Tooth Fairy wanted to comment on a recent story about dental hygiene, she might sign her comment:

"Sincerely, Tooth Fairy.

Verify my identity by losing a tooth and placing it under your pillow. I will leave you a business card along with a small payment for your tooth. Alternately you can call 1-800-TEETH-4-ME and speak to my assistant, The Tooth Mouse, who can confirm my email address and comment."

The trouble is that few Internet users have the power to magically leave business cards under Google's pillows - and even the Tooth Fairy won't turn up until the sun goes down over California. We can't quite see how the company can promptly verify all those identities over the phone - or why it's even going to try.

Google seems to know a thing or two about leveraging the power of the Web. Why doesn't it use browsers to take comments from all readers, including "the actual participants in the story in question"? It takes low-quality videos from all YouTube users. Posting comments from everyone is much easier - and much more interesting. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
Kaspersky backpedals on 'done nothing wrong, nothing to fear' blather
Founder (and internet passport fan) now says privacy is precious
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.