FCW Insider

Blog archive

Twitter: Is this 'river of information' too polluted to be useful?

Scott Klososky, author, entrepreneur and advisory board member for Critical Technologies, delivered a provocative speech at the opening of American Council for Technology-Industry Advisory Council's Executive Leadership Conference in Williamsburg, Va.

Provocative, yes, but also questionable in some of its particulars, and Klososky did not stick around to take questions publicly after filling his allotted hour.

Klososky alluded to the “rivers of information” that flow through Twitter and other social media platforms, saying that people not using Twitter are cutting themselves off from those alleged rich streams of information.

Well, perhaps. But Klososky ignored the quantity of false information that pollutes that river. Whether mistaken, incomplete, slanted or deliberately fabricated, there is a considerable amount of misinformation in the river.

In fact, we think Klososky is wrong to characterize what flows through Twitter as information at all. Instead, it's just data – some accurate, some not, but very little of it useful in its raw form. For data to become information, someone has to sort it out, figure out what’s correct and what’s not, and further, what’s important and useful and what’s trivial or irrelevant to a given information-seeker.

While Klososky rhapsodized on the fast-changing world of information flow, he ignored the value of gatekeepers -- people whose job it is to do just that – and presented the flood of unverified, unsorted data as a good in itself. We disagree.

Posted on Oct 24, 2011 at 12:18 PM


Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.