You are here: IT-Observer » Articles » Editorial RSS | White Papers |

“Blog” Earns Top Word of the Year Award

Merriam-Webster editors have announced that “blog” was the most requested word to their website this year, earning it a place as the top word of the year.

A “blog”, short for weblog, are the increasingly popular online journal-esque sites where individuals and groups share their thoughts on their lives, politics, business or whatever else interests them.

Blogs have been around for several years but were made mainstream by this election season which saw the rise and fall of Howard Dean – partly because of blogs – as well as such events as “Rathergate” where bloggers unearthed the falsehoods behind the CBS anchor’s statements.

The irony is that while blog was the most searched word of the year, it wasn’t actually included in the Merriam-Webster dictionary. Until now. The word was slated for inclusion in the online and print versions in 2005; however the demand has caused editors to take the rare move of introducing a word mid-stream.

The official definition of blog now stands as:

“Blog noun [short for Weblog] (1999): a Web site that contains an online personal journal with reflections, comments, and often hyperlinks provided by the writer”

The blogosphere – that is the little corner of the web where the more than 10,000,000 current blogs live – is already saying this definition is too narrowly focused. They point to news sites where “reflections and commentary” simply aren’t appropriate. Either way, though, bloggers – people who blog – should simply be happy to have made it into the dictionary.

Many have said blogging is simply a fad that will likely die out. A move yesterday by Microsoft, though, seems sure to extend the life of blogs. Microsoft yesterday launched the beta of MSN Spaces - a personal blog, photo album and more for the nearly 250,000,000 MSN users and 150,000,000 MSN Messenger users.

Industry insiders are expecting MSN Spaces to become the single largest blogging community in the world in short order, and the internal team is planning for as many as 25,000,000 new blogs in the first week.

Prevent data theft & viruses through network connected USB sticks, PDAs & media players. Control user access to endpoint connections with GFI EndPointSecurity - Free trial!

Visit GFI Security Software page for more information. - Weblog dedicated to everything concerning IT tools and services.

Latest News

SECUDE appoints Open-Source specialist as Linux Expert
02.11.06  SECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.

Increased Spam Fuelled Through Botnet Activities
02.11.06  MessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.

How to keep your VoIP net safe
30.10.06  One of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.

User tricks, security treats
30.10.06  Thirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.

10 Steps to More Secure Wireless
27.10.06  We have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.

BT acquires Counterpane Internet Security
25.10.06  BT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.

Perdemia updates Permission Analyzer
25.10.06  Perdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.

Mac OS Bluetooth exploit - Inqtana.d
25.10.06  Inqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.

Copyright © IT-Observer Online Publication 2000 - 2006 Top | RSS Feeds | About Us
Site Meter