recommended reading

Why the Internet makes it hard to procrastinate

Nneirda/Shutterstock.com

This morning, the save-for-later service Pocket (formerly Read It Later) posted some highlights from a year's worth of user data. Among the stats: Users -- who now number at 7.4 million -- saved 240 million pieces of digital content over the year (compared to 170 million in the span between the service's launch in 2007 and 2011). And they save that content at a rate of 10.4 items per second.

Perhaps you are one of those users, and perhaps your mouse is hovering over a save-for-later button right at this moment. Before you click it, though, let me just say one thing: Those numbers are remarkable. And not just because they suggest the growth of the save-for-later mentality, but also because that mentality also has the potential to shift, just a little bit, the way we relate to all the stuff -- the videos, the essays, the listicles, the treatises, the cats -- that crosses our paths every day online. A defining psychic feature of the Internet is its immediacy, its urgency, its implicit demands on our time. Hereisthisthingyoushouldseerightnow. Alsothatthingisacatvideo.

That one feature, Internet as scheduler, shapes the web as a social space. Because the same tendency that makes 20 minutes a long time to take to reply to an email, and two minutes a long time to reply to a tweet, also means that, generally, the content that lives on it has an extraordinarily short shelf life. And that's true not just of "content" as in news stories, the stuff that loses most of its value when the term "new" no longer applies to it. It's also true of content as a more general category: long stories, deeply reported narratives, richly researched essays -- stuff that aims to endure. The stock of the Internet. 

Read more at The Atlantic.

(Image via Nneirda/Shutterstock.com)

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.