Jack rabbits on

Twitter’s move to double its 140-character limit to 280 has been marked by CEO Jack Dorsey unwittingly composing the worst tweet of all time, in a failed mission to justify the merits of waffle.

Reading his debut mammoth tweet in full, a prime example of the sheer redundant rambling a 280-character limit promotes, was one of the most gruelling internet experiences Downtime has ever withstood – and you bet we’ve seen YouTube footage of James Corden’s Carpool Karaoke with Foo Fighters.

So basic were the words used to express Dorsey’s simple idea, yet also somehow so gratuitous.

To but skim through the tweet is to achieve the effect of drowning in a vat of Alphabetti Spaghetti made from a script to a lost Michael Bay adaptation of The Bell Jar. When you finally reach the end of it, he links you to a blog explaining the concept in slightly more detail. The man has no mercy.

But Dorsey is at least a benign ruler. The inevitable backlash has seen users editing the tweet down to the beloved 140-character limit, but he seems to have taken it all in his stride.

Donald Trump could take a lesson in humility here. We don’t see him addressing criticism for his own capricious abuse of power with bland old retorts like “Fair. I’m still getting used to it.”

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

So, if one works for any company in a certain space, one is a pariah to all others in that space? So employees are stuck with that employer, or forced to change industries. Great way to keep employees motivated to accept abuse, and encourage employee abuse, further reducing one's security. That is not smart. Trust them or not. If you don't trust them, they won't trust you.
Cancel
Yes, security is often the top consideration when planning to invest in cloud-based technology. And when your applications move to the cloud, there’s a whole new world of as a Service holes to deal with, so how do you do that? We also published an article discussing about this topic, and for everyone who wants to deepen this subject, I recommend reading the following: http://blog.securityinnovation.com/blog/2011/06/application-security-in-the-cloud-dealing-with-aas-holes.html
Cancel

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close