Although my formative years took place in the 1980s, the 90s were a force to be reckoned with, once I started to pay attention. That being said, the close of the decade brought a seal to the era in an unusual way: a commercial on television, featuring a song from the 1970s.
There’s many an explanation as to why this is a defining moment in my 90s decade, but to be sure it was the boom of the internet, and how listening to an unknown song that hocked a product that I wasn’t going to purchase led to an online search that brought an (almost) immediate response.
I hope I never tire of this tune.
I have the habit of not changing the station, or the tape, or the CD, or the playlist that I listen to and I end up listening to the same album for months on end. Whether it be auto search, or song skip or whatever, I burn a song in my head until I get sick of it. As of late, I find that if I come across any of these songs, I’ll “feel” the time it was burned in my chemistry. It’s not always good. But it’s always interesting.
1980? We got cable, and HBO. Before MTV, the Music Breaks provided my first exposure to music videos
1982-83 Tuning the radio away from my parents’ stations
There was this time we got an FM antenna and I heard this song in stereo on the old console:
1984 Summer-school biology, with the Oz
1986 Wasting time in high school
1988 Second semester at Texas Tech, and the CD is blaring at the end of the summer
1987 First days in college and realizing that even the pop charts were limited back home
1995 The blank days of my life, and the sudden reminder (thanks to the Columbia Records and Club) that Bruce Springsteen recorded several albums in the 80s
2018 I hesitated for a moment — indeed, a lifetime, to share this new rendition of a 1980s song with a friend that only had days to live
1987 Walking the cold sidewalks to chemistry class
(Somehow rearranged.) And it happened driving somewhere in somebody’s car, that the radio played the M/A/R/R/S mashup “Pump Up the Volume,” and music changed forever, all at once.
NOTE TO SELF: “… and then all things changed, somehow rearranged” are the lyrics I remember from the early 1980s HBO show “Remember When.” Dick Cavett hosted the series, which took on a topic and explored it for an hour, very much in the same way modern documentaries are done today, taking one topic, then exploring all branches that lead from it. The theme song:
No explanation, really. At the time — 1991, I think — I was stuck in a bus for two days. It moved forward, yes, but ever so slowly. All the time, all I had was my Sony Walkman and one single tape — “Goodbye Yellow Brick Road” by Elton John. Also, I only had two batteries. I also had one book, “Fear and Loathing in the Campaign Trail” by Hunter S. Thompson. The batteries ran out, I read the book twice. What a miserable time. What a wonderful moment.
OK, so there was some explanation.
Antivirus software Computer programs that can block, detect, and remove viruses and other malware.
Backups/backing up files Extra copies of computer files that can be used to restore files that are lost or damaged.
Bandwidth The amount of data that can pass through a network or part of a network per second.
Botnet Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
Computer network Two or more interconnected devices that can exchange data.
Computer virus A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
DDoS A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
Doxnet A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical infrastructure.
Encryption The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
Firewall Software designed to block malware from entering protected networks.
Hacktivist Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Internet service provider (ISP) A company or organization that gives users and devices access to the Internet.
Keylogger malware A program that records every key struck on a keyboard and sends that information to an attacker.
Malware Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
Phishing Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Ransomware A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
Server A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
Software Consists of code written in a programming language that instructs computers to perform specific tasks.
Software patch A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
Software vulnerability A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Spam Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.
USB drive A data storage device that is used to store, back up, and transfer computer files.
USB port A type of connection between devices that can exchange information and power supply.