Feeds

Picketers maul IBM in Sadville

One virtually out - all virtually out!

5 things you didn’t know about cloud backup

"I can't believe that governments are going tolerate these changes in power balance that online communities create," gasped Brian Eno last week, in conversation with Clay Shirky. The two were at the ICA in London, marvelling (picture below) at the "emergent" power of networks *. But will global corporations soon be cowering before the mighty, virtual mob too?

We'll soon find out. Italian IBM staff are once again staging industrial action in Sadville, Linden Labs' pyramid scheme online virtual world today. The Rappresentanza Sindacale Unitaria (RSU), which represents 9,000 Italian IBM staff and their avatars, is taking the action in protest against an outsourcing deal with AT&T.

Last autumn, RSU members picketed virtual islands in Sadville, depriving IBM of literally tens of cents of revenue. It looked a bit like this:

IBM staffer pickets IBM's Sadville HQ

IBM staffer pickets IBM's Sadville nerve center - click to enlarge

This time, union activists have organised a striker's kit for would-be virtual pickets.

Not surprisingly, the "virtual" industrial action has already been lauded by outlets traditionally sympathetic to employers. The Economist credited last autumn's Sadville action for a swift reversal in policy.

Reuters' Sadville news section today

It's almost as if IBM prefer its staff's industrial action remains in the land of the Furry and Flying Penis. It's taking place, literally, on "Union Island".

Cross-furry interoperability

IBM's involvement in Linden Labs is the legacy of its chief space cadet Irving Wladawsky-Berger, who threw millions of dollars of resources into building up a presence. Wladawsky-Berger has now departed, but his successors at Big Blue have continued to give the virtual world, which most of the real world safely ignores, a high priority.

Clay Shirky and Brian Eno, ICA

Brian Eno and Clay Shirky at the ICA last week Credit: Morgan Tepsic

Last autumn, IBM announced a joint agreement with Linden Labs to "drive open standards and interoperability to enable avatars - the online persona of visitors to these online worlds - to move from one virtual world to another with ease, much like you can move from one website to another on the Internet today."

And that folks, is why you pay your IBM Software Maintenance fees. ®

*Bootnote:

Poor beleagured governments - they've only got the guns, tanks and tear gas. And your ID.

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Twitter: La la la, we have not heard of any NUDE JLaw, Upton SELFIES
If there are any on our site it is not our fault as we are not a PUBLISHER
Facebook, Google and Instagram 'worse than drugs' says Miley Cyrus
Italian boffins agree with popette's theory that haters are the real wrecking balls
Sit tight, fanbois. Apple's '$400' wearable release slips into early 2015
Sources: time to put in plenty of clock-watching for' iWatch
Facebook to let stalkers unearth buried posts with mobe search
Prepare to HAUNT your pal's back catalogue
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.