The Volunteer Economy
How much are Yahoo's volunteers worth? And how much less will Yahoo be worth if Microsoft scares them away? That's the question that should be at the center of talk about Yahoo's value both as an acquisition for Microsoft and as good company to work for with.
In the 20th century we were couch potatoes. In the 21st we do it for ourselves.
The first tech company that fully embraces this, not just in the form of User Generated Content (what an insult) but by giving us power (that comes from stock) will rule the world. If Y! had the guts, it won't be long before they're making tender offers to buy out Ballmer.
This is an highly provocative thought. Or set of thoughts. Why should stock go only to employees, friends, family, board members and buyers on the stock exchanges? Why not anybody who contributes? I suppose there are technical reasons why not. (I'm not expert on this stuff.) But the concept of rewarding involvement by users and customers with stock makes sense in a world that is increasingly knit together by volunteer contributions and associations.
Peter Drucker said "Accept the fact that we have to treat almost anybody as a volunteer." He was talking about business.
The term "social networks" never sat comfortably with me. When I look at Flickr, Facebook, and especially at the development communities that grow (and grow around) code, I see something more constructive than social. It's barn-raising on a massive scale, but so widely distributed and full of noise that the constructive work is easy to miss.
And terms like "user generated content" make it worse.
It says something about my comparative hope for both companies that, on the whole, I would much rather volunteer for Yahoo than Microsoft. (Even though I have much more interaction, all of it positive, with individuals at Microsoft perhaps because they're the ones reaching out to open development communities.) Yahoo was born of the Web. It's Net-native. Most of what it does adds value to the Net's platform, not just to one operating system.
The default assumption by Wall Street and the mainstream media seems to be that Yahoo is a goner if they don't take this deal. But in fact Yahoo is a goose that's still laying plenty of golden eggs. And it's laying those eggs in nests comprised of users on the Web, not on just one OS platform.
If Microsoft buys Yahoo and then insists that Yahoo develop software and services first or only for Windows, it will kill that goose. And not just because Yahoo employees will split. It will lose the users.
Doc Searls is Senior Editor of Linux Journal
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Death of RoboVM
- Server Hardening
- The Humble Hacker?
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- ACI Worldwide's UP Retail Payments
- Open-Source Project Secretly Funded by CIA
- Varnish Software's Hitch
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide