References in periodicals archive ?
This discussion includes various views of myth(2) and its relationship to folkloristics in order to extract the nuance of meaning each offers for a description of the mythology of information overload.
The following discussions of the force and character of the information society, the nature of information, and the problem of overload suggest that information overload can be thought of as a myth developed in response to an overwhelming social process.
However such changes are described, it is clear that they are keenly felt in proportions that are significant for determining the mythic nature of information overload.
Like Kochen, they explicitly include continuity and change (conservatism and dynamism again) in their discussion, which reinforces the appropriateness of applying mythology of information overload as a framework of analysis to understand how people cope in an age when information is the chief economic product:
They explain the operation and impact of interconnectedness on three levels and analyze it in a way that serves to ground the mythology of information overload.
Of course, replacing a fuse or resetting a circuit breaker may restore power, but it will not correct the overload problem.
The wiring rated for 15 amps will no longer be protected from overloads.
While overloads can occur in any circuit, the ones that serve the kitchen account for most of them.
It's not surprising that the rising electrical demand often exceeded the capacity of the older wiring, and overloads were common.
Other heavy-draw appliances like portable electric heaters, clothes irons, hair dryers and air conditioners often cause overloads too.
Together these security features protect the SBC from deadly signaling attacks, prevent infrastructure DoS and overload conditions, and protect subscriber, enterprise, and service provider confidentiality and privacy.
Trusted & untrusted paths from network processor to signaling processor w/configurable bandwidth scheduling and partitioning, providing hardware-based access fairness and SBC overload protection