Mischief Lurks Amidst the Data
Posted on March 25, 2015
Filed Under Business, Technology | Leave a Comment
Wow, the sheer scale and density of information on the Internet, not to mention corporate computer networks apart from the web, is becoming mind-boggling, and a growing opportunity for cyber mischief, intentional or by happenstance. Technical writers need to pay heed to what’s going on around them in this regard.
Mark Schaefer in his engrossing new book, The Content Code, discusses “content shock,” and points to “a 500 percent estimated increase in the amount of information on the web between 2015 and 2020. If you can imagine the vastness of the web today…well, pretty soon we’re going to have five times that! And some think that number is low, projecting as much as a staggering 1,000 percent increase in information density in that timeframe!”
Schaefer adds that 75 percent of this information increase will be coming not from automated sensors in homes and on highways, the long-anticipated Internet of Things, but from brands and individuals. “Nearly every person on earth is becoming his or her own personal broadcast channel,” he advises.
So what is a conscientious technical writer to do in the face of an information tsunami? Simply shrug it off and continue adding his or her own rivulets? Partly that, of course – completed pages, assignments and newly authorized documents prompt paychecks.
Yet from within the deluge promptings toward order, economy and clarity of expression would seem to be increasingly advisable. Sanity, not to mention safety, comes in providing reliable guidance and making such output as accessible as possible to its intended consumers.
But still, the mass of data available on local servers is an invitation to mischief or, to be less discreet, prying and spying. Chris LaPoint, Vice President of Product Management at SolarWinds, writes on the Technically Speaking blog that “insiders are starting to supplant external hackers and terrorists as the greatest cybersecurity threat.” In a SolarWinds survey of federal IT pros, “more than half (53%) of the respondents identified careless and untrained insiders as the greatest source of IT security threats at their agencies, up from 42 percent last year.”
So, it would seem that a responsible technical writer needs to be attuned not only to his own computer screen and keyboard, but to what is occurring around him as he pursues his work.
Mischief might not always be intentional, sometimes it’s the result of sheer sloppiness. Along with the increasing volume of network traffic, “the growing use of personal devices is another factor, as is mounting pressure for IT pros to change network configurations quickly, rather than correctly. Combine these issues with simple human error – a misplaced USB drive here, an unattended laptop there – and lack of training, and one can understand how insider threats can loom so large.”
It’s no longer that growing amounts of internally generated information are merely unwieldy, they may also be hard to safeguard, that is, to police. Let conscientious technical writers be mindful of that. – Doug Bedell
Photo – zazzle.com
Comments
Leave a Comment
If you would like to make a comment, please fill out the form below.
Recently
- Presentations With Forethought
- Technical Writing’s Lineage – Surely It’s Deeper than Digital
- At the Holidays, Twitting Amazon
- Successful Cookie Baking – From Mom, an Acknowledged Expert
- Slides for a Tech Writer’s Craft
- Digital or Not, Be Clear
- Being Watchful About Digital Designs…
- When Proposals Don’t Click, Keep Making Them Anyway
- Like a Good Gardener, Help an Enterprise Keep Itself Current
- We’re Leaders All, And Need to Think That Way
Categories
Archives
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
Blogroll