• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • As I See It: Operating on Overload

    May 21, 2007 Victor Rozek

    If the name Conrad Gesner is unfamiliar, it’s probably because you’re either not a librarian or weren’t around in the 16th century when Gesner walked the earth. Born in Switzerland, Gesner was a naturalist and a scholar, but he is known to librarians as the creator of the bibliography. And what an ambitious accomplishment it was! Known as the Bibliotheca universalis, it was written in three languages–Greek, Latin, and Hebrew–and it listed all of the writers who had ever lived and the titles of all their works.

    No surprise then that Gesner was also among the first to have gone on record as suffering from information overload, a term coined by Alvin Toffler 425 years later in his book Future Shock. Jonathan Spira, writing for Collaboration Loop, recounts that in 1545 Gesner “warned of the ‘confusing and harmful abundance of books’ and suggested reading strategies for coping with information overload.”

    What’s remarkable is how accurately Gesner diagnosed the symptoms. “Confusion” and “harm” precisely describe the consequences of being buried in too much information for too long a time. Sufferers report symptoms which include poor decision making, brain freeze, anxiety, impaired judgment, trouble with memorization, difficulty with recall, and a shrinking attention span. A noteworthy number also complain of health effects. Cyberneticist Francis Heylighen reports that “a world-wide survey found two thirds of managers suffer from increased tension and one third from ill-health because of information overload.” And if it’s true for managers, it’s true for employees as well; the symptoms are certainly universal enough. And these effects, says Heylighen, “merely add to the stress caused by the need to constantly adapt to a changing situation,” which for IT professionals is a way of life.

    The inability to react to rapidly changing situations is precisely why the Israeli Air Force turned down the volume of electronic information bombarding its pilots. A number of years ago, 60 Minutes did a piece on how the Israelis were using the very expensive, state-of-the-art, bursting with whiz-bang technology fighter jets that we were selling them. They found some surprises. First, the Israelis made a number of low-tech modifications to the planes, like installing a rear view mirror, which allowed the pilot to locate a trailing enemy plane without the distraction of turning his head. So enamored were the Israelis of their alterations that the interviewer finally pointed to the constellation of gadgets, gizmos, dials, and screens stuffed into the cockpit and asked what use Israeli pilots made of all the new technology. “Oh,” said the Israeli somewhat sheepishly, “we turn all that stuff off, its too distracting.”

    As advanced and theoretically useful as the technology was, in aggregate it produced more information than any pilot operating under combat conditions could possibly assimilate. Nor could they easily determine what was vital in any given moment and what was extraneous. The time spent figuring it out could result in an instant of inattention that might cost the pilot his life. The Israelis preferred to put their faith in the judgment of their people rather than in the incessant chatter produced by the plane’s numerous electronic systems.

    But whether your workspace is a cockpit or a cubicle, whether you manage a book library or a data library, chances are the rising tide of information has not escaped your notice. Nor, perhaps, that employers, unlike the Israeli Air Force, are putting more of their trust in information and less of their trust in you.

    The availability of inexpensive and plentiful storage has subordinated individual judgment to the weight of information, turned data bases into data warehouses, and data retrieval into data mining–a term which quite accurately suggests that you have to dig through a lot of useless dirt before finding the nuggets. And because the cost of electronic transmission is low, information is often sent in a scatter-gun fashion to people that the sender hopes will be interested, but who do not actually require it. Messages bombard us from a dozen sources–e-mail, text messages, instant messages, personal digital assistants, cell phones, iPods and more–with no way to determine what is urgent and important and what is trivial.

    And what does all of this messaging cost employers? To find out, Stever Robbins suggests taking your annual salary and dividing it by 120,000, which will give you an approximate per minute cost. Then track the amount of time you spend managing your various messaging sources. For extra bonus points, he says, track it for the whole company.

    And none of this includes the informational assault of radio and television–the feedback-free, one-way medium–that Americans watch an average of 4 hours and 35 minutes each day, with its 150 channels, most of which are useless.

    During a conference on information overload hosted by Microsoft, Bill Gates predictably said that the answer lies in the proper use of software tools able to present information in useful and shareable formats, and the development of intelligent filters that work with multiple knowledge sources to identify relevant data. But that presents another challenge. Let’s call it Software Functionality Overload. The way to sell new generations of gadgets or software is to advertise expanded functionality regardless of whether anyone needs it or will ever actually use it. Cell phones now do everything from picture taking to tracking your position on the planet, but studies show that most people only use them to make phone calls. Imagine that. Likewise, my word processing program is almost a stand-alone publishing house, with functions I haven’t even discovered yet. But all I do is write articles and whenever I venture beyond the basics I find that the Help utility is nearly useless. It hardly matters that there are six ways to do every little thing if the user doesn’t know what each little thing is. And as for manuals, I took an intense dislike to them ever since the days that IBM delivered them by the pallet load–far too much information, most of which I never needed but was often forced to search through with differing degrees of frustration.

    Could our increased tolerance for useless data be having an actual physiological effect on our ability to think? An article in New Scientist claimed that “exposing individuals to an information overloaded environment resulted in lower IQ scores than exposing individuals to marijuana.” (By “exposing” I suspect they meant more than waving the baggie in front of the test subject). That might explain why, after plowing through the spam that comprises 98 percent of the e-mail I receive through my IT Jungle Webmail account, I feel like the synapses in my brain have been scraped with sandpaper.

    In writer Linda Stone’s memorable words, the result of having to deal with all this indiscriminate information is that everything gets “continuous partial attention.” We seldom pause long enough to grant our full focus to the task or person at hand. Stone believes “attention is the most powerful tool of the human spirit. We can enhance or augment our attention with practices like meditation and exercise, diffuse it with technologies like email and Blackberries, or alter it with pharmaceuticals. In the end, though, we are fully responsible for how we choose to use this extraordinary tool.”

    Of the three attention options Stone offers, the favorite form of consciousness for many Americans is “altered.” Which is how you can always tell when a problem is about to find a pharmaceutical remedy: someone tags it with the word “syndrome.” Indeed, psychologist David Lewis, who analyzed the findings of the global survey referenced by Heylighen, proposed the term “Information Fatigue Syndrome.” There you have it fellow sufferers, it’s official.

    Alas, as yet there are no meds, no swallowable solutions for information overload. There is, however, no shortage of clever names describing the condition. Data smog, infomania, and infoglut are among my favorites. I don’t know about you, but to me infoglut definitely sounds painful and like something that should be treated.

    While we’re waiting for the quick fix, however, let’s not overlook the easy one. The best medicine for combating information overload is to reclaim our time. Without adequate time, any ability we possess will be diminished. Can it be that the time required to manage information is inversely proportional to its usefulness? The Israeli Air Force thought so, and they turned the gadgets off. The next time you initiate a search on the Internet consider that Yahoo and Google alone are indexing an estimated 10 billion documents. Even after 450 years, that’s enough to give bibliographer Conrad Gesner a blinding headache.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 20 -- May 21, 2007

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Another Way to Retrieve i5 System Storage Space Rochester Alums Plan New Customer Care App for i

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 20

This Issue Sponsored By

    Table of Contents

    • IBM Expected to Launch Power6 Servers Today
    • IBM Outlines its Long-Term Financial Goals to Wall Street
    • IBM Tweaks i5 515 and 525 User-Based Prices
    • Sirius Computer Builds Out Biz With DyComp Acquisition
    • An i5 Platform: Q&A with Marlin Equity’s Top Brass
    • Acquisitions Fuel Growth for Reseller Logicalis
    • The Gulf Between Buyers and Sellers Widens in IT,
    • Big Blue’s Transport Partner Loses Employee Data
    • As I See It: Operating on Overload
    • Developer Population to Grow to Nearly 19 Million by 2010

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Why Open Source Is Critical for Digital Transformation
    • mrc Refreshes IBM i Low-Code Dev Tool
    • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
    • Four Hundred Monitor, March 3
    • IBM i PTF Guide, Volume 23, Number 9
    • Doing The Texas Two Step From Power9 To Power10
    • PHP’s Legacy Problem
    • Guru: For IBM i Newcomers, An Access Client Solutions Primer
    • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
    • Some Practical Advice On That HMC-Power9 Impedance Mismatch

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2021 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.