THE WHATIS.COM WORD-OF-THE-DAY   
March 23, 2004

cocooning 

_____________
SPONSORED BY: Win a disk-on-key!

Enter our daily Info Quest contest  -- each response qualifies you
for our daily prize draw! Each time you enter (once per day,
Monday-Friday) also gives you another chance in the final draw for a
nifty disk-on-key on April 1st. 
http://whatis.techtarget.com/content/0,290959,sid9_gci954359,00.html?track=NL-34&ad=478898

Congratulations to G. Lauffer for winning Monday's drawing! Your
prize is in the mail.
 
______________________   
TODAY'S WORD: cocooning 

See our complete definition with hyperlinks at
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci956291,00.html?track=NL-34&ad=478898
 

Cocooning is the act of insulating or hiding oneself from the normal
social environment, which may be perceived as distracting,
unfriendly, dangerous, or otherwise unwelcome, at least for the
present. Technology has made cocooning easier than ever before. The
telephone and the Internet are inventions that made possible a kind
of socialized cocooning in which one can live in physical isolation
while maintaining contact with others through telecommunication. 

The term was popularized in the 1990s by marketing consultant Faith
Popcorn in her book "The Popcorn Report: The Future of Your Company,
Your World, Your Life."  Popcorn suggested that cocooning could be
broken down into three different types: the socialized cocoon, in
which one retreats to the privacy of one's home; the armored cocoon,
in which one establishes a barrier to protect oneself from external
threats; and the wandering cocoon, in which one travels with a
technological barrier that serves to insulate one from the
environment. 

A common example of home-based cocooning is staying in to watch
videos instead of going to the movies. Wandering cocooning is evident
in those who exercise or walk around the city while being plugged in
with earphones to a private world of sound. Wireless technologies
such as cell phones and PDAs have added a new dimension of social
cocooning to wandering cocooning by allowing people to include
selected others in their mobile cocoon. Examples of armored cocooning
include network firewalls, virtual private networks (VPNs),
surveillance cameras, and spyware-blocking software applications. 

______________________
RELATED TERMS:

PDA
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci214287,00.html?track=NL-34&ad=478898

firewall
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci212125,00.html?track=NL-34&ad=478898

VPN
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213324,00.html?track=NL-34&ad=478898

spyware
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci214518,00.html?track=NL-34&ad=478898
 

______________________
SELECTED LINKS:

Faith Popcorn's book is available at Amazon.com. 
http://www.amazon.com/exec/obidos/tg/detail/-/0887305946/qid=1080044817/sr=8-1/ref=pd_ka_1/002-9100734-1608838?v=glance&s=books&n=507846
 

Geert Lovink's article about media philosopher Werner Kunzel mentions
cocooning. 
http://www.mediamatic.net/cwolk/view/3545 

_____________________
TODAY'S TECH NEWS:

I SPY WITH MY LITTLE EYE ...SOMETHING CONFIDENTIAL
Would you have any qualms about a disgruntled employee or visitor
roaming your halls and offices with a digital camera, snapping photos
of whatever they pleased? Brent Sheets writes about how camera phones
can pose a security threat. 
http://searchmobilecomputing.techtarget.com/columnItem/0,294698,sid40_gci955082,00.html?track=NL-34&ad=478898

CHAMBERS: NETWORKING SUCCESS DEMANDS MORE THAN TECHNOLOGY
Cisco CEO John Chambers painted a picture of networking's future but
said businesses must make some changes if they're going to
effectively tap the technology. 
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci956266,00.html?track=NL-34&ad=478898
 

NETSKY-P ON THE PROWL
Antivirus vendors are warning of a Netsky variant that, among other
things, exploits the Microsoft MIME header vulnerability to spread on
Windows 95, 98, ME, NT, 2000 and XP systems. 
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci956265,00.html?track=NL-34&ad=478898
 
  
>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com?track=NL-34&ad=478898

______________________
SECRET WORD-OF-THE-DAY | What is IT?

You can never be too thin, too rich, or have too much of this! It's a
measure of how much information can be carried in a given time period
over a communications link. 

Do you think you know the Secret Word? Click to see if you're right!
http://searchmobilecomputing.techtarget.com/gDefinition/0,294236,sid40_gci211634,00.html?track=NL-34&ad=478898
 

______________________
CAREER CENTER | Dice.com
 
Looking for a new job? Visit the WhatIs.com Career Center powered by
Dice and find over 37,000 tech positions to choose from. Find
training and certification resources, get help with your resume and
more. Visit today!
http://whatis.techtarget.com/dice/0,294542,sid9,00.html?track=NL-34&ad=478898&Offer=dicewhssrp34

______________________
GLOSSARY-TO-GO | Ethernet

Bookmark or print out our handy Ethernet glossary!
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci954712,00.html?track=NL-34&ad=478898
 

______________________
HOROSCOPES FOR GEEKS | March

Find out what the stars have in store for you the rest of this month!
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919205,00.html?track=NL-34&ad=478898

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] cannibalization 
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci955115,00.html?track=NL-34&ad=478898

[2] ultra wideband 
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci213243,00.html?track=NL-34&ad=478898

[3] zero-day exploit 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci955554,00.html?track=NL-34&ad=478898

[4] Fast Guide to Regulatory Compliance 
http://whatis.techtarget.com/definition/0,,sid9_gci954770,00.html?track=NL-34&ad=478898

[5] A-weighted decibels 
http://whatis.techtarget.com/definition/0,,sid9_gci955021,00.html?track=NL-34&ad=478898

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

MARGARET ROUSE, Site Editor ([EMAIL PROTECTED])

IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED])

LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED])

GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by WhatIs.com, a targeted Web site
from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Word of the Day":
 
Go to unsubscribe: http://WhatIs.com/u?cid=478898&lid=430801&track=NL-34&ad=478898
 
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to