FCW Insider

Blog archive

Twitter: Is this 'river of information' too polluted to be useful?

Scott Klososky, author, entrepreneur and advisory board member for Critical Technologies, delivered a provocative speech at the opening of American Council for Technology-Industry Advisory Council's Executive Leadership Conference in Williamsburg, Va.

Provocative, yes, but also questionable in some of its particulars, and Klososky did not stick around to take questions publicly after filling his allotted hour.

Klososky alluded to the “rivers of information” that flow through Twitter and other social media platforms, saying that people not using Twitter are cutting themselves off from those alleged rich streams of information.

Well, perhaps. But Klososky ignored the quantity of false information that pollutes that river. Whether mistaken, incomplete, slanted or deliberately fabricated, there is a considerable amount of misinformation in the river.

In fact, we think Klososky is wrong to characterize what flows through Twitter as information at all. Instead, it's just data – some accurate, some not, but very little of it useful in its raw form. For data to become information, someone has to sort it out, figure out what’s correct and what’s not, and further, what’s important and useful and what’s trivial or irrelevant to a given information-seeker.

While Klososky rhapsodized on the fast-changing world of information flow, he ignored the value of gatekeepers -- people whose job it is to do just that – and presented the flood of unverified, unsorted data as a good in itself. We disagree.

Posted on Oct 24, 2011 at 12:18 PM


The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Tue, Oct 25, 2011

Twitter is the analog of a public bulletin board, with notes tacked all over it. Anybody can post anything they want. The problem with trying to winnow meaningful information from a stream of consciousness, 140 character "data blocks" is one of sorting and authentication. Can you actually trust anything posted on Twitter? For that matter, can you really trust much of the supposedly authoritative information you find anywhere on the internet? Is the "data" from a reputable source, or the ramblings or ravings of a lunatic? Twitter may be a "river of information" but it is indeed a polluted one. In most instances, the time required to extract meaningful information from this river would far exceed the value of that information.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above