Data Smog
   HOME
*





Data Smog
''Data Smog'' is a 1997 book by journalist David Shenk and published by HarperCollins. It addresses the author's ideas on how the information technology revolution would shape the world, and how the large amount of data available on the Internet would make it more difficult to sift through and separate fact from fiction. Argument of the book According to ''Data Smog'', with the advance of technology, we have been able to progress in terms of society, economy, and even health. Communication is instantaneous, knowledge is abundant, and as humans we try to keep up with this expansion of data that continues to accumulate from around the world. However, it is the overwhelming amount of information that is defined as data smog; "this unexpected, unwelcome part of our atmosphere, an expression for the noxious muck and druck of the Information age."Bucy, Eric P. (2005). Living in the Information Age: A New Media Reader. In Shenk, David, The First Law of Data Smog (pp. 159). Belmont, CA: W ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


David Shenk
David Shenk is an American writer, lecturer, and filmmaker. He is author of six books, including ''The Genius in All of Us'' (2010), ''Data Smog'' (1997), ''The Forgetting'' (2001), and ''The Immortal Game'' (2006), and has contributed to ''National Geographic, Slate, The New York Times, Gourmet, Harper's, Wired, The New Yorker, ''The New Republic,'' The Nation, The American Scholar,'' NPR and PBS. In mid-2009, he joined TheAtlantic.com as a correspondent. He is a 1988 graduate of Brown University. Books Shenk has published the following books: * ''Skeleton Key: A Dictionary For Deadheads'' (1994) (Co-written with Steve Silberman) * ''Data Smog: Surviving the Information Glut'' (1997) * ''The End of Patience: More Notes of Caution on the Information Revolution'' (1999) * ''The Forgetting: Alzheimer's, Portrait of An Epidemic'' (2001) * ''The Immortal Game: A History of Chess'' (2006) * ''The Genius In All Of Us: Why Everything You've Been Told About Genetics, Talent, and IQ I ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


E-mail Spam
Email spam, also referred to as junk email, spam mail, or simply spam, is unsolicited messages sent in bulk by email (spamming). The name comes from a Monty Python sketch in which the name of the canned pork product Spam is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic. Since the expense of the spam is borne mostly by the recipient, it is effectively postage due advertising. This makes it an excellent example of a negative externality. The legal definition and status of spam varies from one jurisdiction to another, but nowhere have laws and lawsuits been particularly successful in stemming spam. Most email spam messages are commercial in nature. Whether commercial or not, many are not only annoying as a form of attention theft, but also dangerous because they may contain links that lead to phishing web sites or sites that are hosting malware or include ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Inbox
Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" meant only physical mail (hence '' e- + mail''). Email later became a ubiquitous (very widely used) communication medium, to the point that in current use, an email address is often treated as a basic and necessary part of many processes in business, commerce, government, education, entertainment, and other spheres of daily life in most countries. ''Email'' is the medium, and each message sent therewith is also called an ''email.'' The term is a mass noun. Email operates across computer networks, primarily the Internet, and also local area networks. Today's email systems are based on a store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users nor their computers are required to be online simulta ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bill Gates
William Henry Gates III (born October 28, 1955) is an American business magnate and philanthropist. He is a co-founder of Microsoft, along with his late childhood friend Paul Allen. During his career at Microsoft, Gates held the positions of chairman, chief executive officer (CEO), President (corporate title), president and software architect, chief software architect, while also being the largest individual shareholder until May 2014. He was a major entrepreneur of the Home computer, microcomputer revolution of the 1970s and 1980s. Gates was born and raised in Seattle. In 1975, he and Allen founded Microsoft in Albuquerque, New Mexico. It became the world's largest personal computer software company. Gates led the company as chairman and CEO until stepping down as CEO in January 2000, succeeded by Steve Ballmer, but he remained chairman of the board of directors and became chief software architect. During the late 1990s, he was Criticism of Microsoft, criticized for his bu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Email Virus
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses. Computer viruses generally require a host program. The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A computer worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks. Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. Viruses use complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Urban Legend
An urban legend (sometimes contemporary legend, modern legend, urban myth, or urban tale) is a genre of folklore comprising stories or fallacious claims circulated as true, especially as having happened to a "friend of a friend" or a family member, often with horrifying, humorous, or cautionary elements. These legends can be entertaining but often concern mysterious peril or troubling events, such as disappearances and strange objects or entities. Urban legends may confirm moral standards, reflect prejudices, or be a way to make sense of societal anxieties. Urban legends in the past were most often circulated orally, but now can also be spread by any media. This includes newspapers, mobile news apps, e-mail, and most often, social media. Some urban legends have passed through the years/decades with only minor changes, in where the time period takes place. Generic urban legends are often altered to suit regional variations, but the lesson or moral remains majorly the same. Or ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Chain Letters
A chain letter is a message that attempts to convince the recipient to make a number of copies and pass them on to a certain number of recipients. The "chain" is an exponentially growing pyramid (a tree graph) that cannot be sustained indefinitely. Common methods used in chain letters include emotionally manipulative stories, get-rich-quick pyramid schemes, and the exploitation of superstition to threaten the recipient. Originally, chain letters were letters sent by mail; today, chain letters are often sent electronically via email, social network sites, and text messages. Types There are two main types of chain letter: # Hoaxes: Hoaxes attempt to trick or defraud users. A hoax could be malicious, instructing users to delete a file necessary to the operating system by claiming it is a virus. It could also be a scam that convinces users to spread the letter to other people for a specific reason, or send money or personal information. Phishing attacks could fall into this. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


E-mail Filtering
Email filtering is the processing of email to organize it according to specified criteria. The term can apply to the intervention of human intelligence, but most often refers to the automatic processing of messages at an SMTP server, possibly applying anti-spam techniques. Filtering can be applied to incoming emails as well as to outgoing ones. Depending on the calling environment, email filtering software can reject an item at the initial SMTP connection stage or pass it through unchanged for delivery to the user's mailbox. It is also possible to redirect the message for delivery elsewhere, quarantine it for further checking, modify it or 'tag' it in any other way. Motivation Common uses for mail filters include organizing incoming email and removal of spam and computer viruses. Mailbox providers filter outgoing email to promptly react to spam surges that may result from compromised accounts. A less common use is to inspect outgoing email at some companies to ensure that emplo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Verbose
Verbosity or verboseness is speech or writing that uses more words than necessary. The opposite of verbosity is plain language. Some teachers, including the author of ''The Elements of Style'', warn against verbosity; similarly Mark Twain and Ernest Hemingway, among others, famously avoid it. Synonyms include wordiness, verbiage, prolixity, grandiloquence, garrulousness, expatiation, logorrhea, sesquipedalianism, and overwriting. Etymology and synonyms The word ''verbosity'' comes from Latin ''verbosus'', "wordy". There are many other English words that also refer to the use of excessive words. ''Prolixity'' comes from Latin ''prolixus'', "extended". ''Prolixity'' can also be used to refer to the length of a monologue or speech, especially a formal address such as a lawyer's oral argument. ''Grandiloquence'' is complex speech or writing judged to be pompous or bombastic diction. It is a combination of the Latin words ''grandis'' ("great") and ''loqui'' ("to speak"). ''Logorr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Clinical Psychology
Clinical psychology is an integration of social science, theory, and clinical knowledge for the purpose of understanding, preventing, and relieving psychologically based distress or dysfunction and to promote subjective well-being and personal development. Plante, Thomas. (2005). ''Contemporary Clinical Psychology.'' New York: Wiley. Central to its practice are psychological assessment, clinical formulation, and psychotherapy, although clinical psychologists also engage in research, teaching, consultation, forensic testimony, and program development and administration.Brain, Christine. (2002). ''Advanced psychology: applications, issues and perspectives.'' Cheltenham: Nelson Thornes. In many countries, clinical psychology is a regulated mental health profession. The field is generally considered to have begun in 1896 with the opening of the first psychological clinic at the University of Pennsylvania by Lightner Witmer. In the first half of the 20th century, clinical psych ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

HarperCollins
HarperCollins Publishers LLC is one of the Big Five English-language publishing companies, alongside Penguin Random House, Simon & Schuster, Hachette, and Macmillan. The company is headquartered in New York City and is a subsidiary of News Corp. The name is a combination of several publishing firm names: Harper & Row, an American publishing company acquired in 1987—whose own name was the result of an earlier merger of Harper & Brothers (founded in 1817) and Row, Peterson & Company—together with Scottish publishing company William Collins, Sons (founded in 1819), acquired in 1989. The worldwide CEO of HarperCollins is Brian Murray. HarperCollins has publishing groups in the United States, Canada, the United Kingdom, Australia, New Zealand, Brazil, India, and China. The company publishes many different imprints, both former independent publishing houses and new imprints. History Collins Harper Mergers and acquisitions Collins was bought by Rupert Murdoch's News Corpora ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Immune System
The immune system is a network of biological processes that protects an organism from diseases. It detects and responds to a wide variety of pathogens, from viruses to parasitic worms, as well as cancer cells and objects such as wood splinters, distinguishing them from the organism's own healthy tissue. Many species have two major subsystems of the immune system. The innate immune system provides a preconfigured response to broad groups of situations and stimuli. The adaptive immune system provides a tailored response to each stimulus by learning to recognize molecules it has previously encountered. Both use molecules and cells to perform their functions. Nearly all organisms have some kind of immune system. Bacteria have a rudimentary immune system in the form of enzymes that protect against virus infections. Other basic immune mechanisms evolved in ancient plants and animals and remain in their modern descendants. These mechanisms include phagocytosis, antimicrobial pe ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]