I can see the point of pseudonyms in certain online situations such as medical forums and support groups. But otherwise they often promote trolling. That said, my daughter's Instagram name is fictitious and I don't link to some publications because they demand FB links. It's not necessarily that I want to be anonymous when I write a comment to a news site: It's that i don't want it linked/shown all over my FB page. (Having friends on both ends of the political spectrum I really don't want to hear about it from one set or the other.)
syedzunair - I'm with you on pseudonyms. I don't bother with them. Even in online communities where pseudonyms are the custom -- like Second Life and Reddit -- I'm pretty transparent about who the pseudonym really is.
Your friend's pseudonym might actually have been successful, depending on her goals. You'd have to know the name of her cat to know the pseud account, and that would limit readership to people who knew her socially.
This is the Internet. Arguing for the sake of argument is just being polite!
The ThinkerNet does not reflect the views of TechWeb. The ThinkerNet is an informal means of communication to members and visitors of the Internet Evolution site. Individual authors are chosen by Internet Evolution to blog. Neither Internet Evolution nor TechWeb assume responsibility for comments, claims, or opinions made by authors and ThinkerNet bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
Every year at this time, each of the nation's retailers writes Santa a lengthy note, telling him how good it has been and how it deserves a really special Christmas. Recently, Saint Nick hasn't been reading those notes closely.
Despite all its promises of increased productivity and morale, BYOD programs carry inherent risks. The challenge for IT and business leaders are to come up with a program that satisfies employee desires for flexibility with corporate needs for security. A well-crafted governance program is the answer.
Organizations are embracing the bring your own device concept. Report after report confirms anecdotal evidence that companies are loosening centralized control over mobile devices and allowing employees to choose and use the smartphone or tablet of their preference.
In the 1970 science fiction thriller Colossus: The Forbin Project, two giant supercomputers from the United States and Soviet Union secretly join forces to take control of the collective nuclear might of the two countries. In the film, the two machines discover each other's existence, communicate back-and-forth, share their collective data, and cut their human creators out of the process. It is the ultimate example of machine-to-machine communications, or M2M.
Facebook's Graph Search may face some profound challenges and risks, first, because Facebook users haven't been thinking of their posts as product reviews; and second, because Facebook will now have to contend with the social-network equivalent of SEO "gaming" of results.
A recent release of the popular TweetDeck app for Twitter power-users gives new life to software that had previously taken a wrong turn. Here's a quick walk-through of the new TweetDeck, to show you why it should be at the top of your Twitter toolkit.
What can users today do to protect their online privacy? The simplest and most obvious option is to not use the Internet – at all. However, once all digital information is consolidated over the Internet, trying to protect digital identity by simply unplugging from the Internet becomes impossible – a fact that has manifest implications for civil liberties, Saunders says.
By 2011 the number of Internet-connected sensors will exceed 1 trillion, making your chances of doing anything or going anywhere unnoticed pretty much zero. Saunders talks about how the 'sensortization' of the Internet is eliminating the traditional divide between online and offline populations.
The 20th Century Internet was characterized by the ability to interact with other people and information on the Internet largely without anyone knowing who you were. The Internet of this century, conversely, will be defined by identity. Saunders explains how Internet users are unwittingly contributing to the demise of the anonymous Internet.
You've heard the expression, "Out of the frying pan, into the fire?" Amazon lives in the fire. The e-tailer wins by keeping things hot for its competitors, employees, and itself, according to a new book.
Positec, a manufacturer of power tools for homes and commercial applications, achieves greater customer service flexibility and cuts hold times in half by using a cloud-based service to manage its call center.
Big-data and analytics tools enable marketers to understand customers as individuals, identifying unmet needs and addressing each customer as a "segment of one," says John Kennedy, VP corporate marketing, IBM.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?