The case against web 2.0

Via Simon, Gina Trapani asks some very relevant questions in the anti web 2.0

I still prefer my text files and my own MySQL databases to anyone else’s, and I’m not sure why I’m so alone in that sentiment.

You’re certainly not alone but blogs, generally, only reinforce positive buzz, often uncritically. You’re also stepping into politics here, which doesn’t travel well on tech-blogs. Breaking my own habits for once though, I’ll put a toe in, by way of anecdote.

Back when I was at University doing a sandwich course, took a year working at IBM in London. One of my managers back then was something of an IBM high-flyer – interesting guy but I never knew quite what to say to him – generation gap, too much respect for elders and so on tied my tongue. Anyway – keeping this story short – we’d been at some IBM / customer conference all day, for the product we were involved with, and he gave me a lift home. Most of the way it was embarrassed silence, on my part, not knowing how to strike up a sustainable conversation. Then, seemingly out of the blue;

You know Harry; after three years, power corrupts. I’ve seen the same thing again and again – it doesn’t matter who’s got the power or how much they’ve got – after three years, power always corrupts.

…which left me at even more of a loss for words, but has stuck with me ever since. Whether three years is the magic number here, I can’t say but I do think the principle is correct. Which leads to the conclusion: power itself is the problem, irrespective of who owns it, and we should be extremely cautious when we dish it out, if at all.

OK – if you’re not running for the political escape hatch – so how does that relate to web 2.0? Well, simply, in doling out all our data to central repositories, not in our control and not open for us to inspect fully , we’re placing massive amounts of power in the hands of a minority. There is some discussion of the consequences happening, but nowhere near enough.

Consider for example (not that I think there’s anything wrong with In relation to individual users, has a pretty good policy, to the point of having implemented features that allow you to export your bookmarks should you wish to leave. But what they’re not giving away (partly because it would be very hard to implement in a form that scales) is the “big picture” – there’s only so much you can query as a normal user. But let’s say I’m an employer and I’m looking for a hot Javascript developer – one way I could (in theory) find one would be by tracking down users who’ve consistently been the amongst first to bookmark popular links on – that’s likely to be someone who’s at least ahead of the curve in Javascript (perhaps not an ideal employee but still). Technically you could perform this query, given it’s only a single tag, but you’d be skirting the border of API abuse – from the terms;

4. Feeds and API

[…] You may not use these or any other features or the Site itself to allow the display of a substantial portion of the database or reproduce, duplicate or copy the Site. […]

If I wanted to make this kind of search across multiple tags, or start analysing some of the social networks that have built up in, I’d certainly be abusing the API and generating some significant HTTP traffic. But have these queries at their disposal, potentially giving them opportunity to sell them as a premium service – which raises some significant questions about who’s buying…

OK – personally I’m not of the view that this type of view of data should be somehow protected and kept in the dark. Instead think it’s about being it being Open for anyone that wants it plus (ideally) I want be able to see how my data is being used. It’s a free data thing.

Anyway enough rambling. Specific to Gina’s interest and futureproofing data, Mark Pilgrim’s post on long term backups (plus all the comments) is worth a read, but not conclusive. From a wider perspective this is all about (hard to solve) implementation detail – how do we really do a decentralized web, while preserving all that’s good about web 2.0?


Category: programming Time: 2006-07-25 Views: 1

Related post

  • SitePoint Podcast #8: The Case For Web Apps 2009-02-06

    Episode 8 of The SitePoint Podcast is now available! This week your hosts are Patrick O'Keefe (@ifroggy), Stephan Segraves (@ssegraves), Brad Williams (@williamsba), and Kevin Yank (@sentience). Listen in your Browser Play this episode directly in yo

  • Darwin and the Art of Web Design 2015-07-03

    Photo: Son of Groucho Once upon a time there was a man called Darwin. This man came up with an idea that has come to be known as 'the survival of the fittest'. This is probably one of the most misused terms in history, but the concept is based on his

  • News Wire: The Business Case for Web Standards 2007-06-28

    Instant.js (now with IE 6/7 support) Exploiting the dynamic graphics features of current browsers (e.g. the canvas element), instant.js (along with corner.js, glossy.js, and loupe.js) adds special effects to images on your page that you can configure

  • Case Study: The difference a web design firm can make 2005-09-25

    We took a vacation in Wyoming/Idaho last week to look for a summer log cabin property. The local real estate market provided a telling example about the difference a web design firm can make. Before going on our trip, I contacted a few realtors via G

  • Do we still have a case against the goto statement? 2011-12-17

    Possible Duplicate: Is it ever worthwhile using goto? In a recent article, Andrew Koenig writes: When asked why goto statements are harmful, most programmers will say something like "because they make programs hard to understand." Press harder,

  • Strange data returned from Exchange Web Services SDK. How do I update the CAS SCP data? 2012-02-16

    I'm using the Exchange Web Services SDK and am getting strange results after these lines run: ScpUrlGuidString = @"77378F46-2C66-4aa9-A6A6-3E7A48B19596"; ScpPtrGuidString = @"67661d7F-8FC4-4fa7-BFAC-E1D7794C1F68"; configSearcher.Filter

  • The Anatomy of Web Fonts Article 2005-12-09

    If one aspect of design has suffered most in its transition to the Web, it is the art of typography. For years, Web typography involved little more than choosing a typeface and font size. Unstyled Times New Roman was the norm, and the integration of

  • "Error in the Site Data Web Service." when performing crawl 2010-03-15

    Installed SharePoint Services v3 (SP2, october 2009 cumulative updates, Language Pack), attached to a content database I had previously (all works). Installed Search server 2008 Express (with language pack) on top of WSS and crawl does not work. Howe

  • What are the reasons against using a Splash Screen for a website? 2010-08-24

    I have a client who insists on having a splash screen on their website and I'm trying to persuade him against it. I'd like a listing of reasons against the use of a flash/silverlight-based splash screen as the main entry point to the website. One rea

  • Internal-use websites: Is there a compelling case against SQLite? 2013-12-02

    Many web frameworks, such as Flask or Django use SQLite as their default database. SQLite is compelling because it's included in python, and administrative overhead is pretty low. However, most high traffic public production sites wind up using a hea

  • The 10 Big Web Design Trends of 2015 2015-12-01

    Remember 2015? The Apple Watch, the new iPhone 6S, falling in love with Jurassic Park again. It seems like only yesterday. 2015 left its unique style on everything, including web design, which continues adapting this year to mobile browsing overtakin

  • What is the safest way to store passwords in a company for the case when the CISO leaves? 2016-02-02

    What is the best and safest way to store passwords in a company to ensure nothing is lost when the CISO leaves. I know this might be subjective and there isn't THE best way. But I'm curious about your approach. The scenario is: The person responsible

  • CSS Angles: Just the Edge Your Web Page Needs! 2008-12-03

    With the influx of JavaScript libraries like jQuery and Prototype, a lot of the more basic elements of front-end development have fallen through the cracks. Gone are the days when we would sit down for a couple of hours to find a creative way to solv

  • What would happen to the Internet in the case of a war between major powers? 2009-10-12

    In the case of Operation Enduring Freedom and Iraq Wars the Internet suffered minor hits from those minor powers isolation or absense. But what would happen if major powers start a war? A Netsplit? Would a major power isolate himself from the world a

  • Is there a case against ZFS? 2010-01-15

    Is there still a case against using ZFS in production? I run Solaris servers and I am planning an upgrade to Solaris 10 10/09 from an earlier release. Currently we use SVM for local disks and our vendor's technology for SAN volume management. We are

  • Is stopping IIS the same as stopping the World Wide Web Publishing service? 2010-01-28

    I'm sure of come across situations where stopping IIS using the IIS manager has not allowed me access to bin directory files that are in use but when stopping the World Wide Web Publishing service, the files are then accessible. The question

  • I don't understand the arguments against operator overloading 2010-12-10

    I just read one of Joel's articles in which he says: In general, I have to admit that I'm a little bit scared of language features that hide things. When you see the code i = j * 5; - in C you know, at least, that j is being multiplied by five and th

  • Block facebook even in the case users get their hands on tor, freegate and similar applications 2010-12-29

    I've been using, happily, opendns to block facebook on my network. Then I started thinking about tricks to circumvent this block and, of course, I've read here on serverfault how to block the facebook ip address. But if someone uses tor or freegate?

  • Why doesn't the client's web browser need to be PCI compliant? 2011-04-06

    A hypothetical online store that accepts credit card payment will have to be PCI compliant because it receives (transmit), process and possibly store credit card numbers. But the client's web browser is also transmitting a credit card number, albeit

iOS development

Android development

Python development

JAVA development

Development language

PHP development

Ruby development


Front-end development


development tools

Open Platform

Javascript development

.NET development

cloud computing


Copyright (C), All Rights Reserved.

processed in 2.208 (s). 13 q(s)