Archive for the ‘Stories From The Web’ Category

Dealing With Criticism On Your Blog or Article

Tuesday, October 6th, 2009 |

It happens to the best of us - the day when you’re faced with the issue of dealing with criticism. Maybe you’ve spent hours researching and writing up your work of word-art, yet within the first few days of it being posted and online your comment area is inundated with both constructive and hurtful criticisms. Maybe you messed up a point or two in your article, or maybe you just completely missed the plot. If this has ever happened to you, I’m going to offer a few tips for bloggers out there on dealing with both kinds of criticism on your blog in a way that displays healthy maturity, but also in a confident and non-confrontational way.

website seo consultant

Dealing With Criticism On Your Blog

Author criticism is something that many people on the Internet are not very good at. As a professional writer, you may be used to the sort of criticism you receive in college level courses where the professor or your peers lay out both the good points and the bad points of your writing, and then offer helpful tips on how to improve. While you sometimes get such mature and helpful feedback on your blog posts, just as often you’ll also receive comments along the lines of, “This post sucks, you didn’t do your research” or, “This is complete garbage.” It’s not exactly helpful, and the comments themselves are garbage - but since you’re the professional blogger here, you need to approach such comments in a way that validates the good commentators and invalidates those that are useless, irritating and immature (also known as “angry troll” comments).

Tip 1: Reward thoughtful and helpful criticism.

A perfect example of the various types of critical comments you may receive was a recent post I made on MakeUseOf, a large computer and technology blog that I write for. The post was actually a very simple topic - how to tweak Vista so that your Internet connection works better. The motivation behind the post was related to issues I had when I purchased a new Vista laptop that couldn’t communicate with my Linksys router. I decided to share some of my lessons learned with MUO readers. Let’s just say that when you’re writing for a technology crowd and you plan to do an article on tweaks, you better be ready to lay out the evidence for whether your tweaks work. Here are a few examples of the sort of comments I received. After the comment I’ll show you how I responded. This first comment was critical, but at the same time it was very positive and polite - clearly an emotionally balanced and kind individual.

comments1

Now, while the comment is pretty critical of the article, the commenter at least provides solid and valid points and does so in a non-confrontational way. Dealing with criticism of this type isn’t difficult, in fact it’s helpful. You’ll notice the last paragraph even offers some great advice as to how the article could have been better. In response to this comment I countered each of the points listed, however I absolutely took that last paragraph to heart - it was useful and true advice. It’s important as a blogger to take this kind of input and incorporate it into your future posts. Everyone makes mistakes and everyone has a bad day when it comes to articles - don’t let the mistakes get you down. Read these sort of comments carefully and use them to improve your future articles.

Tip 2: When a know-it-all commenter tries to make you look stupid, turn it around.

Especially if/when you are writing for a technology/computer audience, you’re going to be dealing with a lot of folks who think they know everything. I’ve been working in the computer industry for over 15 years now, and I’ve yet to work anywhere where at least 50% of the professional staff doesn’t consist of guys (usually) who think they know everything about everything - and they’re never wrong. Inevitably you’ll get some of the most spiteful and annoying comments from these folks. Nine times out of ten, they’ll also be wrong. Dealing with such comments is simple - turn it around on them. Go after the simplicity or error of their comment - and they’ll most likely leave you alone. From the same article above, here was such a comment.

comments2

Here, you’ve got a guy who clearly has all of the answers, and starts drawing conclusions without having all of the facts or information. In the computer field, this can be fatal because you spend 90% of your time convinced that one aspect of a program or system is what’s failing, and you fail to search through and verify all of the other points because you’re so convinced that it can’t possibly be that.  Here was my reply.

comments3

Was it too harsh? It simply pointed out the error in the logic and the points that the commentator didn’t even consider in his quick dismissal of all of the hardware/software issues that can cause communication problems between old network hardware and newer computer systems. So long as you aren’t too harsh or confrontational - this approach is fair toward these kind of commentators.

Tip 3: Don’t feed the trolls.

Finally, you’ve got the trolls. Beware of the trolls. Or, the more common saying is this - “Don’t Feed The Trolls!”

This sort of comment is best described with an example. You’ll get these sort of comments no matter how well you write. In fact, sometimes the better you write, the more likely you are to get attacked by such anonymous trolls. You have two options - just make good use of your blog’s delete key. Or - have some fun.  Here was a troll comment received in the article example provided above.

comments4

Isn’t that a riot? Is it possible that a grown man or woman would sit at their computer and, feeling protected by the anonymity of the Internet, type such silly and immature drivel? Personally, I doubt it - this was likely a teen or pre-teen just going off half-cocked and without thinking. While such a comment would usually get deleted, you could also just have a little fun, like this.

comments5

Unfortunately, this is called “feeding the trolls.” But sometimes, it’s just such a perfect setup that it’s very hard to resist. Gauge your responses to your blog comments upon what your general readership is like and what they can tolerate. While you don’t want to alienate your readers, you should also keep in mind that most of them are just as annoyed by the trolls as you are - so while you probably shouldn’t go at it with them all the time, every now and then a zinger or two can be fun.

How do you handle especially spiteful or immature comments on your blog? I’d love to hear your opinion!

Should You Learn to Bypass Firewalls and Proxy Servers?

Monday, April 27th, 2009 |

server roomI recently wrote an article for MakeUseOf titled “How to Bypass Firewalls & Get Into Blocked Firewalls in School or At Work With FreeProxy.” The article generated a significant flurry of comments that I only partially expected. What I didn’t expect was the significant emotional response from many of the IT administrators who found the article. They bring up a question that demands an answer - should you learn to bypass firewalls and proxy servers?

Some of The Background

I should provide a bit of background for writing an article on how to bypass firewalls and proxy servers. My own IT career is an interesting one. I started out as an Electrical Engineer - at least that’s my chosen, “credentialed” profession. However, through high school and college, I was always heavily into computers - to the extent that I gravitated towards, and was promoted by, each of the computer-related employers that I worked for during and after college. So, what does a guy end up doing who has both Engineering and Computer experience? That’s easy - computer automation of manufacturing machinery.

Being a person in such a position, I have a unique view of both the people who work in the offices and on the factory “floor,” as well as a good overview of the “background” IT that runs the computer systems. Also, being an applications programmer, I have the unique perspective of being an IT professional with a need to install software and modify PC settings to suit the needs of automation software packages. However, what I’ve noticed over the past few years is that IT security, not only where I work but also across the entire IT industry, appears to be taking the issue of IT security to a ridiculous extreme.

Does IT Security Require Folks to Bypass Firewalls and Proxy Servers?

suitWhenever I search for articles to write on MakeUseOf, I look for topics that are provocative, informational and current. I also search for what a majority of people are hunting for on the Internet. To my amused surprise, I discovered that every month thousands of students are searching for how to bypass firewalls and proxy servers. Does this mean that there are thousands of students who are out to hunt for porn or other sites that could be harmful to network security?

To answer that question, let’s get back to my scenerio. I work with a number of other IT applications folks who have to deal with IT security “patches” constantly breaking our applications.  We have more problems with IT security than we do with any of the viruses that occasionally come out. To put it in perspective - my computers at home are protected by the weakest security imaginable. I don’t even bother with Wi-Fi security. If some dude wants to drive out to the middle of nowhere in hicksville, Maine just to use my Wi-Fi connection, you’re welcome to it!

In the end, my home PC’s run far faster and more efficiently than any of the computers at work which are bogged down by excessive security software, patches and filtering. I use Facebook, blogs and several IM applications, but I also run a single version of Symantec that’s constantly updated with the latest virus definitions. I’ve never had an issue with viruses - and the occasional adware or malware gets swept up in the weekly scan.

The Controversy of Content vs. Security is a Reminder of IT “Elitism”

Back to the MakeUseOf article. Most of the IT admins who’ve responded are very sincere guys. Some are apologetic, and others are a little more in-your-face regarding the need for stringent IT security. However, what their responses show is that in general the IT security industry feels a calling to protect folks from themselves. Teens need to have content filtered on high school and college networks, that goes without question. But to what extent? Who says what content is appropriate - and don’t people understand the slippery slope that introduces in regards to freedom of speech and expression?

I understand this mentality from IT security folks, because it was the same situation back in the 90’s. I recall back at UMaine when “computing” was essentially a huge IBM Mainframe, and you did your work on a small “dumb” terminal in the computer clusters. There was no such thing as a networked PC computer cluster - those were machines you used to type word or excel files and print. The Internet was not yet fully matured - or even really “born.”

What I recall back then was a certain elitist mentality by the guys behind the glass windows who sat in the Mainframe room. That mainframe was god. The data and traffic that went to and from it was monitored and filtered by those guys. They took their job quite seriously, and they had many of the same sort of controls to prevent email spamming and other abuses. Of course, the “online” population mostly consisted of us computer geeks at the time - but the controls were in place, and those guys who worked with “God” (the mainframe) started to get a taste of what IT Security elitism feels like. You are in control. You say what gets through and what doesn’t. And you “know best.”

IT Security Elitism Today

frustratedWith the explosion of the Internet through the 90s, and with the advent of the terrorist threat in 2001, you can see the explosion of IT egotism following suit. Many of us who have moved on in the IT field into applications and support are finding that our own jobs are far less productive because the computers that we install our applications on are constantly changing configuration and “breaking” our apps. The answer is always that the “patches” are for the sake of security. In most cases, when we (the apps geeks) look into that security patch, we learn that the danger does not even apply in our specific case - but the patches are applied across the board. Corporate doesn’t know any better, they believe what they are told by the IT security manager - and IT security thrives on the Internet “fear factor” regarding the potential security threat of viruses, malware and spyware.

I ask you - how real is that threat? And how counterproductive is it when your own IT security group is causing more damage to your company’s productivity than any viruses ever would?

That’s my point of view - I welcome yours!

About Ryan

Ryan is a professional writer for private clients, Associated Content, LoveToKnow and MakeUseOf. Ryan started FreeWritingCenter to offer insight, news, advice and tools for any person who wants to earn money by working online. Make sure to bookmark FreeWritingCenter.com and visit often for the latest updates! More

Want to subscribe?

 Subscribe in a reader Or, subscribe via email:

Enter your email address:

Delivered by FeedBurner

Find entries :