Feeds

Dreamer calls for revolution of the algorithm

Fat cats and bourgeoisie called to action

SANS - Survey on application security programs

Fresh from challenging Silicon Valley to invest in ethical Web 2.0 efforts, a blogger-cum-consultant has proclaimed a "manifesto" for the next industrial revolution using Web 2.0.

Umair Haque, director of the Havas Media Lab think tank and founder of Web 2.0 consultant Bubblegeneration - seriously is this post-modern irony, or what? - has called for a revolution in 21st century capitalism.

The vanguard for that revolution are the venture capitalists and start-ups of Silicon Valley. The tools for this revolution? The ever-elusive, universal computer algorithm.

In true Google style, Haque wants to organize. Not the world's information, though, but - well - everything.

Haque lists a whole bunch of things that need "organizing" including hunger and thirst - although quite how you achieve such worthy goals with Java or C is not entirely evident.

He even had a stab at writing his own manifesto and provoked a typically, half-baked discussion among the web equivalent of bleeding heart, hippy liberals.

Back in April Haque challenged Silicon Valley to put away its Web 2.0 toys and build some serious world-saving code - generously offering free consulting support to those he judged the "best" ideas.

When it comes to revolution, Haque and his disciples are not actually saying anything that Marx and Engels didn't say 160 years ago in the original Communist Manifesto. Simply - it would be nice if people did good things to benefit others. The trouble is, they don't and ideals wane.

For example: remember green computing, last year's big cause that was championed through talk of power-efficient servers and green code? Even that appears to be falling out of vogue. A survey, published this week by UK document management software vendor Version One, found the number of IT workers concerned about the environment had fallen by 11 per cent compared to last year.

Maybe they are following in the steps of another famous Marx - Groucho - who famously said: "I don't want to belong to any club that will accept me as a member."®

Top three mobile application threats

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.