Feeds

Republicans adopt 'Gore's internet' for grassroots salvation

Resurrect 'the great communicator'

High performance access to file storage

A savvy online campaign by Barrack Obama and the Democrats is at least partly responsible for enabling last week's landslide victory in the US presidential election.

Obama's web sites presented the candidate, garnered feedback, and tried to quash negative whispers. Sites like Facebook served as recruiting grounds to an army of volunteers, who teamed up and mobilized.

Now Obama is taking online feedback on what's next.

The Republicans, by contrast, behaved like former Democrat vice president Al Gore had never invented the internet*.

The Grand Old Party (GOP) delivered claims as if sites like YouTube and Google didn't exist to verify them or put them under the microscope. The GOP gave a platform to people that rallied the base but made the party look out of touch and offensive to the wider audience watching on YouTube - never mind TV. Claims over who supported research into grizzly bear DNA didn't stand up to scrutiny following a quick Googling.

Languishing in defeat and in the midst of recriminations, the GOP has woken up to the internet and has gone Obama by courting the thoughts of ordinary Republicans on what's next. The party has announced Republicanforareason.com where party members can post comments along with YouTube videos on what went wrong and what's next. The goal is to make the party "better prepared for the future," the GOP said in a statement.

Repubilcanforareason.com

Republicanforareason.com opens with Ronald Reagan, "the great communicator"

The party said this updates an earlier Platform web site, launched in the run-up to the 2008 Republican National Convention.

A quick trip through the messages and videos posted to the new site, though, illustrate the party's ideological schizophrenia and challenge it faces in a country that's increasingly diverse, tech savvy, and getting more of its information from a variety of sources.

It also shows how it'll take more than just a web site to fix things.

Among the messages are those who say they've given up on the Republican party because of its negative attacks, over-spending, and corruption under the current president George W. Bush. Some want the party rebuilt, with a younger, forward-looking focus.

"I am a conservative. I am no longer a republican. I believe that under the Bush presidency our constitutional rights were under attack. I believe that the republican party has become the enforcer of big government. It seems to me that the party no longer deserves to call itself republican," one person posted.

Others, meanwhile, are spitting about keeping true to the party's values and calling on those who'd wish to "reach across the aisle" to "shut up."

"Apparently those who want the Republican party to drop their Christian Values should just vote Democratic. If we decide to drop Christian Values then we should just elect a Muslim. Or a Black Panther. Women have rights without Abortion," another said.

Worryingly for the party in a country that appears to have shifted away from the brand of national and social conservatism that were the hallmark of Bush, it's the latter comments that are getting the most stars in the users search rankings on Republicanforareason.com.

Also the site is acting as a hub for the kind of old-school attack ads that helped the GOP lose 2008. One YouTube video posted to a section called "the new Democrat majority" compare the new Democrat majority to notorious and bloody dictators from history and gets three stars.

In a fitting testament to the challenge, Republicanforareason.com opens with an inspirational video of former US president Ronald Reagan. Reagan is a Republican whose personality and philosophy some on the right view as the way forward.

Reagan is known as "the great communicator" in certain, admiring circles. Reagan, though, was elected in 1980, in an analogue era before most people had even seen a PC and years before the existence of Windows, never mind the internet that the GOP seems to have overlooked.®

* Yes - we know he didn't really claim that.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
Jeff Bezos reveals Amazon's brutal scale in annual letter
Bit-flipping retail mogul seems hybrid of Ford and Rockefeller
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.