Feeds

The BBC struggles with concept of 'tech bubble'

Only bad people have bad thoughts, says Newsnight

The essential guide to IT transformation

In fact, the intelligent viewer will have spotted the flaw in the valuations, but Newsnight either didn't recognise it, or if it did, moved swiftly on. Julie Meyer told us the companies receiving investments were largely revenue-free, but the valuations were justified because they might become a "platform". This can only refer to Facebook and Twitter – not the start-ups – although this was never made clear to the viewer.

Many of the start-ups are simply third-party add-ons to Facebook, are not "platforms", and have no chance of ever becoming "platforms", either. Yet Facebook and Twitter themselves were struggling for revenue and were being forced to eat the third party. This effectively told us the bubble will burst. But it wasn't allowed to spoil the discussion. The Unicorn was left to gambol about unmolested in the Magic Garden for a bit longer.

You may have your own theory about why TV has a blindness when it comes to covering web business in a grown-up way. Perhaps the producers secretly wish they were in Shoreditch, hanging out at Bar Barian with Steve Bong and Ophelia Whimsy. But I suspect that the real reasons are more prosaic.

Thinking of unicorns allows TV people to avoid thinking about technology. Right now, money is currently pouring into fascinating technologies such as synthetic hydrocarbons. But when the BBC or a marketing person says "tech", they mean the wibbly, wobbly web. A focus on the web means the journalist can avoid all that complicated stuff like science – some of which, apparently, smells quite unpleasant. Far easier to mystify it.

The problem is much of this defies mystification. The social media bits and bobs are useful but quite dull bits of comms infrastructure: like a PBX switch, or a phone book. They'll never be completely useless, or ever be in a position to be vastly profitable. (Software is easily copied, and users jump very easily between web services). But as long as journalists can continue to imbue them with "childlike wonder", they can continue in their comfort zone, and avoid reality in another way: by not looking at a balance sheet. That too, they find difficult and unpleasant.

And this is what (most) journalists failed to do last time. The crash followed. ®

See The Register Guide To Shoreditch Tech Start-Ups and (from 2005!) Six Things You Need to Know about Bubble 2.0

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
TROLL SLAYER Google grabs $1.3 MEEELLION in patent counter-suit
Chocolate Factory hits back at firm for suing customers
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Ex-IBM CEO John Akers dies at 79
An era disrupted by the advent of the PC
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.