THE WHATIS.COM WORD-OF-THE-DAY March 23, 2004
cocooning _____________ SPONSORED BY: Win a disk-on-key! Enter our daily Info Quest contest -- each response qualifies you for our daily prize draw! Each time you enter (once per day, Monday-Friday) also gives you another chance in the final draw for a nifty disk-on-key on April 1st. http://whatis.techtarget.com/content/0,290959,sid9_gci954359,00.html?track=NL-34&ad=478898 Congratulations to G. Lauffer for winning Monday's drawing! Your prize is in the mail. ______________________ TODAY'S WORD: cocooning See our complete definition with hyperlinks at http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci956291,00.html?track=NL-34&ad=478898 Cocooning is the act of insulating or hiding oneself from the normal social environment, which may be perceived as distracting, unfriendly, dangerous, or otherwise unwelcome, at least for the present. Technology has made cocooning easier than ever before. The telephone and the Internet are inventions that made possible a kind of socialized cocooning in which one can live in physical isolation while maintaining contact with others through telecommunication. The term was popularized in the 1990s by marketing consultant Faith Popcorn in her book "The Popcorn Report: The Future of Your Company, Your World, Your Life." Popcorn suggested that cocooning could be broken down into three different types: the socialized cocoon, in which one retreats to the privacy of one's home; the armored cocoon, in which one establishes a barrier to protect oneself from external threats; and the wandering cocoon, in which one travels with a technological barrier that serves to insulate one from the environment. A common example of home-based cocooning is staying in to watch videos instead of going to the movies. Wandering cocooning is evident in those who exercise or walk around the city while being plugged in with earphones to a private world of sound. Wireless technologies such as cell phones and PDAs have added a new dimension of social cocooning to wandering cocooning by allowing people to include selected others in their mobile cocoon. Examples of armored cocooning include network firewalls, virtual private networks (VPNs), surveillance cameras, and spyware-blocking software applications. ______________________ RELATED TERMS: PDA http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci214287,00.html?track=NL-34&ad=478898 firewall http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html?track=NL-34&ad=478898 VPN http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213324,00.html?track=NL-34&ad=478898 spyware http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci214518,00.html?track=NL-34&ad=478898 ______________________ SELECTED LINKS: Faith Popcorn's book is available at Amazon.com. http://www.amazon.com/exec/obidos/tg/detail/-/0887305946/qid=1080044817/sr=8-1/ref=pd_ka_1/002-9100734-1608838?v=glance&s=books&n=507846 Geert Lovink's article about media philosopher Werner Kunzel mentions cocooning. http://www.mediamatic.net/cwolk/view/3545 _____________________ TODAY'S TECH NEWS: I SPY WITH MY LITTLE EYE ...SOMETHING CONFIDENTIAL Would you have any qualms about a disgruntled employee or visitor roaming your halls and offices with a digital camera, snapping photos of whatever they pleased? Brent Sheets writes about how camera phones can pose a security threat. http://searchmobilecomputing.techtarget.com/columnItem/0,294698,sid40_gci955082,00.html?track=NL-34&ad=478898 CHAMBERS: NETWORKING SUCCESS DEMANDS MORE THAN TECHNOLOGY Cisco CEO John Chambers painted a picture of networking's future but said businesses must make some changes if they're going to effectively tap the technology. http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci956266,00.html?track=NL-34&ad=478898 NETSKY-P ON THE PROWL Antivirus vendors are warning of a Netsky variant that, among other things, exploits the Microsoft MIME header vulnerability to spread on Windows 95, 98, ME, NT, 2000 and XP systems. http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci956265,00.html?track=NL-34&ad=478898 >> Catch up on all the latest IT news at http://searchtechtarget.techtarget.com?track=NL-34&ad=478898 ______________________ SECRET WORD-OF-THE-DAY | What is IT? You can never be too thin, too rich, or have too much of this! It's a measure of how much information can be carried in a given time period over a communications link. Do you think you know the Secret Word? Click to see if you're right! http://searchmobilecomputing.techtarget.com/gDefinition/0,294236,sid40_gci211634,00.html?track=NL-34&ad=478898 ______________________ CAREER CENTER | Dice.com Looking for a new job? Visit the WhatIs.com Career Center powered by Dice and find over 37,000 tech positions to choose from. Find training and certification resources, get help with your resume and more. Visit today! http://whatis.techtarget.com/dice/0,294542,sid9,00.html?track=NL-34&ad=478898&Offer=dicewhssrp34 ______________________ GLOSSARY-TO-GO | Ethernet Bookmark or print out our handy Ethernet glossary! http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci954712,00.html?track=NL-34&ad=478898 ______________________ HOROSCOPES FOR GEEKS | March Find out what the stars have in store for you the rest of this month! http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919205,00.html?track=NL-34&ad=478898 ______________________________ RECENT ADDITIONS AND UPDATES [1] cannibalization http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci955115,00.html?track=NL-34&ad=478898 [2] ultra wideband http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci213243,00.html?track=NL-34&ad=478898 [3] zero-day exploit http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci955554,00.html?track=NL-34&ad=478898 [4] Fast Guide to Regulatory Compliance http://whatis.techtarget.com/definition/0,,sid9_gci954770,00.html?track=NL-34&ad=478898 [5] A-weighted decibels http://whatis.techtarget.com/definition/0,,sid9_gci955021,00.html?track=NL-34&ad=478898 ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: MARGARET ROUSE, Site Editor ([EMAIL PROTECTED]) IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED]) LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED]) GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED]) ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This e-newsletter is published by WhatIs.com, a targeted Web site from TechTarget, the most targeted IT media and events company. TechTarget offers magazines, Web sites, e-newsletters, Webcasts and conferences for enterprise IT professionals. Copyright 2004 TechTarget. All rights reserved. _____________________________________________________________________ To unsubscribe from "Word of the Day": Go to unsubscribe: http://WhatIs.com/u?cid=478898&lid=430801&track=NL-34&ad=478898 Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed. Contact us: WhatIs Member Services 117 Kendrick Street, Suite 800 Needham, MA 02494
