Following the success of The Accidental Billionaires and Moneyball comes Console Wars—a mesmerizing, behind-the-scenes business thriller that chronicles how Sega, a small, scrappy gaming company led by an unlikely visionary and a team of rebels, took on the juggernaut Nintendo and revolutionized the video game industry.
In 1990, Nintendo had a virtual monopoly on the video game industry. Sega, on the other hand, was just a faltering arcade company with big aspirations and even bigger personalities. But that would all change with the arrival of Tom Kalinske, a man who knew nothing about videogames and everything about fighting uphill battles. His unconventional tactics, combined with the blood, sweat and bold ideas of his renegade employees, transformed Sega and eventually led to a ruthless David-and-Goliath showdown with rival Nintendo.
The battle was vicious, relentless, and highly profitable, eventually sparking a global corporate war that would be fought on several fronts: from living rooms and schoolyards to boardrooms and Congress. It was a once-in-a-lifetime, no-holds-barred conflict that pitted brother against brother, kid against adult, Sonic against Mario, and the US against Japan.
Based on over two hundred interviews with former Sega and Nintendo employees, Console Wars is the underdog tale of how Kalinske miraculously turned an industry punchline into a market leader. It’s the story of how a humble family man, with an extraordinary imagination and a gift for turning problems into competitive advantages, inspired a team of underdogs to slay a giant and, as a result, birth a $60 billion dollar industry.
The Globe and Mail Top Leadership and Management BookForbes Top Creative Leadership Book
From the visionary head of Google's innovative People Operations comes a groundbreaking inquiry into the philosophy of work-and a blueprint for attracting the most spectacular talent to your business and ensuring that they succeed.
"We spend more time working than doing anything else in life. It's not right that the experience of work should be so demotivating and dehumanizing." So says Laszlo Bock, former head of People Operations at the company that transformed how the world interacts with knowledge.
This insight is the heart of WORK RULES!, a compelling and surprisingly playful manifesto that offers lessons including:
Take away managers' power over employeesLearn from your best employees-and your worstHire only people who are smarter than you are, no matter how long it takes to find themPay unfairly (it's more fair!)Don't trust your gut: Use data to predict and shape the futureDefault to open-be transparent and welcome feedbackIf you're comfortable with the amount of freedom you've given your employees, you haven't gone far enough.
Drawing on the latest research in behavioral economics and a profound grasp of human psychology, WORK RULES! also provides teaching examples from a range of industries-including lauded companies that happen to be hideous places to work and little-known companies that achieve spectacular results by valuing and listening to their employees. Bock takes us inside one of history's most explosively successful businesses to reveal why Google is consistently rated one of the best places to work in the world, distilling 15 years of intensive worker R&D into principles that are easy to put into action, whether you're a team of one or a team of thousands.
WORK RULES! shows how to strike a balance between creativity and structure, leading to success you can measure in quality of life as well as market share. Read it to build a better company from within rather than from above; read it to reawaken your joy in what you do.
In The Second Machine Age MIT’s Erik Brynjolfsson and Andrew McAfee—two thinkers at the forefront of their field—reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.
Amid this bounty will also be wrenching change. Professions of all kinds—from lawyers to truck drivers—will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.
Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.
A fundamentally optimistic book, The Second Machine Age alters how we think about issues of technological, societal, and economic progress.
“The Social Network, the much anticipated movie…adapted from Ben Mezrich’s book The Accidental Billionaires.” —The New York Times
Best friends Eduardo Saverin and Mark Zuckerberg had spent many lonely nights looking for a way to stand out among Harvard University’s elite, competitive, and accomplished student body. Then, in 2003, Zuckerberg hacked into Harvard’s computers, crashed the campus network, almost got himself expelled, and was inspired to create Facebook, the social networking site that has since revolutionized communication around the world.
With Saverin’s funding their tiny start-up went from dorm room to Silicon Valley. But conflicting ideas about Facebook’s future transformed the friends into enemies. Soon, the undergraduate exuberance that marked their collaboration turned into out-and-out warfare as it fell prey to the adult world of venture capitalists, big money, and lawyers.
From the Trade Paperback edition.
From one of our leading technology thinkers and writers, a guide through the twelve technological imperatives that will shape the next thirty years and transform our lives
Much of what will happen in the next thirty years is inevitable, driven by technological trends that are already in motion. In this fascinating, provocative new book, Kevin Kelly provides an optimistic road map for the future, showing how the coming changes in our lives—from virtual reality in the home to an on-demand economy to artificial intelligence embedded in everything we manufacture—can be understood as the result of a few long-term, accelerating forces. Kelly both describes these deep trends—interacting, cognifying, flowing, screening, accessing, sharing, filtering, remixing, tracking, and questioning—and demonstrates how they overlap and are codependent on one another. These larger forces will completely revolutionize the way we buy, work, learn, and communicate with each other. By understanding and embracing them, says Kelly, it will be easier for us to remain on top of the coming wave of changes and to arrange our day-to-day relationships with technology in ways that bring forth maximum benefits. Kelly’s bright, hopeful book will be indispensable to anyone who seeks guidance on where their business, industry, or life is heading—what to invent, where to work, in what to invest, how to better reach customers, and what to begin to put into place—as this new world emerges.
From the Hardcover edition.
From the Trade Paperback edition.
This provocative book introduces a brand-new view of technology. It suggests that technology as a whole is not a jumble of wires and metal but a living, evolving organism that has its own unconscious needs and tendencies. Kevin Kelly looks out through the eyes of this global technological system to discover "what it wants." He uses vivid examples from the past to trace technology's long course and then follows a dozen trajectories of technology into the near future to project where technology is headed. This new theory of technology offers three practical lessons: By listening to what technology wants we can better prepare ourselves and our children for the inevitable technologies to come. By adopting the principles of pro-action and engagement, we can steer technologies into their best roles. And by aligning ourselves with the long-term imperatives of this near-living system, we can capture its full gifts. Written in intelligent and accessible language, this is a fascinating, innovative, and optimistic look at how humanity and technology join to produce increasing opportunities in the world and how technology can give our lives greater meaning.
From the Hardcover edition.
In Rise of the Robots, Ford details what machine intelligence and robotics can accomplish, and implores employers, scholars, and policy makers alike to face the implications. The past solutions to technological disruption, especially more training and education, aren't going to work, and we must decide, now, whether the future will see broad-based prosperity or catastrophic levels of inequality and economic insecurity. Rise of the Robots is essential reading for anyone who wants to understand what accelerating technology means for their own economic prospects—not to mention those of their children—as well as for society as a whole.
Social networks, the defining cultural movement of our time, offer many freedoms. But as we work and shop and date over the Web, we are opening ourselves up to intrusive privacy violations by employers, the police, and aggressive data collection companies that sell our information to any and all takers.
Through groundbreaking research, Andrews reveals how routinely colleges reject applicants due to personal information searches, robbers use vacation postings to target homes for break-ins, and lawyers scour our social media for information to use against us in court. And the legal system isn't protecting us—in the thousands of privacy violations brought to trial, judges often rule against the victims. Providing expert advice and leading the charge to secure our rights, Andrews proposes a Social Network Constitution to protect us all. Now is the time to join her and take action—the very future of privacy is at stake.
Log on to www.loriandrews.com to sign the Constitution for Web Privacy.
In his bestselling Here Comes Everybody, Internet guru Clay Shirky provided readers with a much-needed primer for the digital age. Now, with Cognitive Surplus, he reveals how new digital technology is unleashing a torrent of creative production that will transform our world. For the first time, people are embracing new media that allow them to pool their efforts at vanishingly low cost. The results of this aggregated effort range from mind-expanding reference tools like Wikipedia to life-saving Web sites like Ushahidi.com, which allows Kenyans to report acts of violence in real time. Cognitive Surplus explores what's possible when people unite to use their intellect, energy, and time for the greater good.
The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.Learn about information security without wading through a huge textbookCovers both theoretical and practical aspects of information securityProvides a broad view of the information security field in a concise mannerAll-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
Hughes draws on an enormous range of literature, art, and architecture to explore what technology has brought to society and culture, and to explain how we might begin to develop an "ecotechnology" that works with, not against, ecological systems. From the "Creator" model of development of the sixteenth century to the "big science" of the 1940s and 1950s to the architecture of Frank Gehry, Hughes nimbly charts the myriad ways that technology has been woven into the social and cultural fabric of different eras and the promises and problems it has offered. Thomas Jefferson, for instance, optimistically hoped that technology could be combined with nature to create an Edenic environment; Lewis Mumford, two centuries later, warned of the increasing mechanization of American life.
Such divergent views, Hughes shows, have existed side by side, demonstrating the fundamental idea that "in its variety, technology is full of contradictions, laden with human folly, saved by occasional benign deeds, and rich with unintended consequences." In Human-Built World, he offers the highly engaging history of these contradictions, follies, and consequences, a history that resurrects technology, rightfully, as more than gadgetry; it is in fact no less than an embodiment of human values.
For centuries, we as a society have operated according to a very unflattering view of human nature: that, humans are universally and inherently selfish creatures. As a result, our most deeply entrenched social structures – our top-down business models, our punitive legal systems, our market-based approaches to everything from education reform to environmental regulation - have been built on the premise that humans are driven only by self interest, programmed to respond only to the invisible hand of the free markets or the iron fist of a controlling government.
In the last decade, however, this fallacy has finally begun to unravel, as hundreds of studies conducted across dozens of cultures have found that most people will act far more cooperatively than previously believed. Here, Harvard University Professor Yochai Benkler draws on cutting-edge findings from neuroscience, economics, sociology, evolutionary biology, political science, and a wealth of real world examples to debunk this long-held myth and reveal how we can harness the power of human cooperation to improve business processes, design smarter technology, reform our economic systems, maximize volunteer contributions to science, reduce crime, improve the efficacy of civic movements, and more.
For example, he describes how:
• By building on countless voluntary contributions, open-source software communities have developed some of the most important infrastructure on which the World Wide Web runs
• Experiments with pay-as-you-wish pricing in the music industry reveal that fans will voluntarily pay far more for their favorite music than economic models would ever predic
• Many self-regulating communities, from the lobster fishermen of Maine to farmers in Spain, live within self-regulating system for sharing and allocating communal resources
• Despite recent setbacks, Toyota’s collaborative shop-floor, supply chain, and management structure contributed to its meteoric rise above its American counterparts for over a quarter century.
• Police precincts across the nation have managed to reduce crime in tough neighborhoods through collaborative, trust-based, community partnerships.
A must-read for anyone who wants to understand the dynamics of cooperation in 21st century life, The Penguin and the Leviathan not only challenges so many of the ways in which we live and work, it forces us to rethink our entire view of human nature.
From the Hardcover edition.
In his bestselling book The World Without Us, Alan Weisman considered how the Earth could heal and even refill empty niches if relieved of humanity's constant pressures. Behind that groundbreaking thought experiment was his hope that we would be inspired to find a way to add humans back to this vision of a restored, healthy planet-only in harmony, not mortal combat, with the rest of nature.
But with a million more of us every 4 1/2 days on a planet that's not getting any bigger, and with our exhaust overheating the atmosphere and altering the chemistry of the oceans, prospects for a sustainable human future seem ever more in doubt. For this long awaited follow-up book, Weisman traveled to more than 20 countries to ask what experts agreed were probably the most important questions on Earth--and also the hardest: How many humans can the planet hold without capsizing? How robust must the Earth's ecosystem be to assure our continued existence? Can we know which other species are essential to our survival? And, how might we actually arrive at a stable, optimum population, and design an economy to allow genuine prosperity without endless growth?
Weisman visits an extraordinary range of the world's cultures, religions, nationalities, tribes, and political systems to learn what in their beliefs, histories, liturgies, or current circumstances might suggest that sometimes it's in their own best interest to limit their growth. The result is a landmark work of reporting: devastating, urgent, and, ultimately, deeply hopeful.
By vividly detailing the burgeoning effects of our cumulative presence, Countdown reveals what may be the fastest, most acceptable, practical, and affordable way of returning our planet and our presence on it to balance. Weisman again shows that he is one of the most provocative journalists at work today, with a book whose message is so compelling that it will change how we see our lives and our destiny.
The book covers recent crises in financial systems and job markets, the housing bubble, and environment, assessing their impact on systems thinking. A companion website is available at interactdesign.com.
This volume is ideal for senior executives as well as for chief information/operating officers and other executives charged with systems management and process improvement. It may also be a helpful resource for IT/MBA students and academics.Four NEW chapters on self-organizing systems, holistic thinking, operational thinking, and design thinkingCovers the recent crises in financial systems and job markets globally, the housing bubble, and the environment, assessing their impact on systems thinkingCompanion website to accompany the book is available at interactdesign.com
Mindless illustrates the shortcomings of CBS, providing an in-depth and disturbing look at how human dignity is slipping as we become cogs on a white collar assembly line.
It used to be that to diagnose an illness, interpret legal documents, analyze foreign policy, or write a newspaper article you needed a human being with specific skills—and maybe an advanced degree or two. These days, high-level tasks are increasingly being handled by algorithms that can do precise work not only with speed but also with nuance. These “bots” started with human programming and logic, but now their reach extends beyond what their creators ever expected.
In this fascinating, frightening book, Christopher Steiner tells the story of how algorithms took over—and shows why the “bot revolution” is about to spill into every aspect of our lives, often silently, without our knowledge.
The May 2010 “Flash Crash” exposed Wall Street’s reliance on trading bots to the tune of a 998-point market drop and $1 trillion in vanished market value. But that was just the beginning. In Automate This, we meet bots that are driving cars, penning haiku, and writing music mistaken for Bach’s. They listen in on our customer service calls and figure out what Iran would do in the event of a nuclear standoff. There are algorithms that can pick out the most cohesive crew of astronauts for a space mission or identify the next Jeremy Lin. Some can even ingest statistics from baseball games and spit out pitch-perfect sports journalism indistinguishable from that produced by humans.
The interaction of man and machine can make our lives easier. But what will the world look like when algorithms control our hospitals, our roads, our culture, and our national security? What happens to businesses when we automate judgment and eliminate human instinct? And what role will be left for doctors, lawyers, writers, truck drivers, and many others?Who knows—maybe there’s a bot learning to do your job this minute.
In The Party’s Over, Richard Heinberg places this momentous transition in historical context, showing how industrialism arose from the harnessing of fossil fuels, how competition to control access to oil shaped the geopolitics of the twentieth century and how contention for dwindling energy resources in the twenty-first century will lead to resource wars in the Middle East, Central Asia and South America. He describes the likely impacts of oil depletion and all of the energy alternatives. Predicting chaos unless the United States—the world’s foremost oil consumer—is willing to join with other countries to implement a global program of resource conservation and sharing, he also recommends a “managed collapse” that might make way for a slower-paced, low-energy, sustainable society in the future.
More readable than other accounts of this issue, with fuller discussion of the context, social implications and recommendations for personal, community, national and global action, Heinberg’s updated book is a riveting wake-up call for human-kind as the oil era winds down, and a critical tool for understanding and influencing current US foreign policy.
From the Trade Paperback edition.
Because even if content strategy isn’t your job, content’s probably your problem—and probably more than you think. You or your business has a message you want to deliver, right? You can deliver that message through various channels and content types, from Tweets to testimonials and photo galleries galore, and your audience has just as many ways of engaging with it. So many ways, so much content... so where’s the problem? That is the problem. And you can measure it in time, creativity, money, lost opportunity, and the sobs you hear equally from creative directors, project managers, and search engine marketing specialists.
The solution is content strategy, and this book offers real-world examples and approaches you can adopt, no matter your role on the team. Put content strategy to work for you by gathering this book into your little hands and gobbling up never-before seen case studies from teams at Johns Hopkins Medicine, MINI, Icebreaker, and more. Content Strategy at Work is a book for designers, information architects, copywriters, project managers, and anyone who works with visual or verbal content. It discusses how you can communicate and forge a plan that will enable you, your company, or your client get that message across and foster better user experiences.
Presents a content strategy framework and ways to implement in both in-house marketing departments and consultanciesIncludes case studies, interviews, and lessons learned from retail, apparel, network television, business-to-business, automotive, non-profit, and higher ed brandsDetails practical sales techniques to sell content strategy and use content strategy processes to sell other services and larger projects
Predictive analytics and Data Mining techniques covered: Exploratory Data Analysis, Visualization, Decision trees, Rule induction, k-Nearest Neighbors, Naïve Bayesian, Artificial Neural Networks, Support Vector machines, Ensemble models, Bagging, Boosting, Random Forests, Linear regression, Logistic regression, Association analysis using Apriori and FP Growth, K-Means clustering, Density based clustering, Self Organizing Maps, Text Mining, Time series forecasting, Anomaly detection and Feature selection. Implementation files can be downloaded from the book companion site at www.LearnPredictiveAnalytics.comDemystifies data mining concepts with easy to understand languageShows how to get up and running fast with 20 commonly used powerful techniques for predictive analysisExplains the process of using open source RapidMiner toolsDiscusses a simple 5 step process for implementing algorithms that can be used for performing predictive analyticsIncludes practical use cases and examples
ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015
One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined.
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services.
Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.
With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.
Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.
From the Hardcover edition.
The network has become the core organizational structure for postmodern politics, culture, and life, replacing the modern era’s hierarchical systems. From peer-to-peer file sharing and massive multiplayer online games to contagion vectors of digital or biological viruses and global affiliations of terrorist organizations, the network form has become so invasive that nearly every aspect of contemporary society can be located within it.
Borrowing their title from the hacker term for a program that takes advantage of a flaw in a network system, Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive.
In this provocative book-length essay, Galloway and Thacker argue that a whole new topology must be invented to resist and reshape the network form, one that is as asymmetrical in relationship to networks as the network is in relation to hierarchy.
Alexander R. Galloway is associate professor of culture and communications at New York University and the author of Gaming: Essays on Algorithmic Culture (Minnesota, 2006) and Protocol: How Control Exists after Decentralization.
Eugene Thacker is associate professor of new media at the Georgia Institute of Technology and the author of Biomedia (Minnesota, 2004) and The Global Genome: Biotechnology, Politics, and Culture.
The book includes chapters that cover the principles of entity resolution and the principles of Information Quality, in addition to their concepts and terminology. It also discusses the Fellegi-Sunter theory of record linkage, the Stanford Entity Resolution Framework, and the Algebraic Model for Entity Resolution, which are the major theoretical models that support Entity Resolution. In relation to this, the book briefly discusses entity-based data integration (EBDI) and its model, which serve as an extension of the Algebraic Model for Entity Resolution. There is also an explanation of how the three commercial ER systems operate and a description of the non-commercial open-source system known as OYSTER. The book concludes by discussing trends in entity resolution research and practice. Students taking IT courses and IT professionals will find this book invaluable.First authoritative reference explaining entity resolution and how to use it effectivelyProvides practical system design advice to help you get a competitive advantage Includes a companion site with synthetic customer data for applicatory exercises, and access to a Java-based Entity Resolution program.
The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour—so, too, have we become gluttons for texts, instant messages, emails, RSS feeds, downloads, videos, status updates, and tweets.
We're all battling a storm of distractions, buffeted with notifications and tempted by tasty tidbits of information. And just as too much junk food can lead to obesity, too much junk information can lead to cluelessness. The Information Diet shows you how to thrive in this information glut—what to look for, what to avoid, and how to be selective. In the process, author Clay Johnson explains the role information has played throughout history, and why following his prescribed diet is essential for everyone who strives to be smart, productive, and sane.
In The Information Diet, you will:Discover why eminent scholars are worried about our state of attention and general intelligenceExamine how today’s media—Big Info—give us exactly what we want: content that confirms our beliefsLearn to take steps to develop data literacy, attention fitness, and a healthy sense of humorBecome engaged in the economics of information by learning how to reward good information providersJust like a normal, healthy food diet, The Information Diet is not about consuming less—it’s about finding a healthy balance that works for you
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligenceFocuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many moreCovers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gatherIncludes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs
-Guy L. Tribble, Apple, Inc.
Tech luminary, Gordon Bell, and Jim Gemmell unveil a guide to the next digital revolution. Our daily life started becoming digital a decade ago. Now much of what we do is digitally recorded and accessible. This trend won't stop. And the benefits are astonishing.
Based on their own research Bell and Gemmell explain the ever- increasing access to electronic personal memories-both "cloud" services such as Facebook and huge personal hardrives. Using Bell as a test case, the two digitally uploaded everything-photos, computer activity, biometrics-and explored systems that could best store the vast amounts of data and make it accessible. The result? An amazing enhancement of human experience from health and education to productivity and just reminiscing about good times. And then, when you are gone, your memories, your life will still be accessible for your grandchildren...
Your Life, Uploaded is an invaluable guide to taking advantage of new technology that will fascinate and inspire techies, business people, and baby boomers alike.
From drones to Mars rovers—an exploration of the most innovative use of robots today and a provocative argument for the crucial role of humans in our increasingly technological future.
In Our Robots, Ourselves, David Mindell offers a fascinating behind-the-scenes look at the cutting edge of robotics today, debunking commonly held myths and exploring the rapidly changing relationships between humans and machines.
Drawing on firsthand experience, extensive interviews, and the latest research from MIT and elsewhere, Mindell takes us to extreme environments—high atmosphere, deep ocean, and outer space—to reveal where the most advanced robotics already exist. In these environments, scientists use robots to discover new information about ancient civilizations, to map some of the world’s largest geological features, and even to “commute” to Mars to conduct daily experiments. But these tools of air, sea, and space also forecast the dangers, ethical quandaries, and unintended consequences of a future in which robotics and automation suffuse our everyday lives.
Mindell argues that the stark lines we’ve drawn between human and not human, manual and automated, aren’t helpful for understanding our relationship with robotics. Brilliantly researched and accessibly written, Our Robots, Ourselves clarifies misconceptions about the autonomous robot, offering instead a hopeful message about what he calls “rich human presence” at the center of the technological landscape we are now creating.
From the Hardcover edition.
Implementing an enterprise-wide Configuration Management Database (CMDB) is one of the most influential actions an IT organization can take to improve service delivery and bridge the gap between technology and the business. With a well-designed CMDB in place, companies are better positioned to manage and optimize IT infrastructure, applications, and services; automate more IT management tasks; and restrain burgeoning costs. Now, there’s an objective, vendor-independent guide to making a CMDB work in your organization. The CMDB Imperative presents a start-to-finish implementation methodology that works and describes how the CMDB is shifting to the superior Configuration Management System (CMS).
Expert CMDB industry analyst Glenn O’Donnell and leading-edge architect and practitioner Carlos Casanova first review the drivers behind a CMDB and the technical, economic, cultural, and political obstacles to success. Drawing on the experiences of hundreds of organizations, they present indispensable guidance on architecting and customizing CMDB solutions to your specific environment. They’ll guide you through planning, implementation, transitioning into production, day-to-day operation and maintenance, and much more. Coverage includes
Defining the tasks and activities associated with configuration management Understanding the CMDB’s role in ITIL and the relationship between CMDBs and ITIL v3’s CMS Building software models that accurately represent each entity in your IT environment Ensuring information accuracy via change management and automated discovery Understanding the state of the CMDB market and selling the CMDB within your organization Creating federated CMDB architectures that successfully balance autonomy with centralized control Planning a deployment strategy that sets appropriate priorities and reflects a realistic view of your organization’s maturity Integrating systems and leveraging established and emerging standards Previewing the future of the CMDB/CMS and how it will be impacted by key trends such as virtualization, SOA, mobility, convergence, and “flexi-sourcing”
This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack.
This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.Details current open source penetration testing toolsPresents core technologies for each type of testing and the best tools for the jobNew to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack
One thing these technologies can't do is answer the profound moral issues they raise. Who should be held accountable when they go wrong? What responsibility do we, as creators and users, have for the technologies we build? In A Dangerous Master, ethicist Wendell Wallach tackles such difficult questions with hard-earned authority, imploring both producers and consumers to face the moral ambiguities arising from our rapid technological growth. There is no doubt that scientific research and innovation are a source of promise and productivity, but, as Wallach, argues, technological development is at risk of becoming a juggernaut beyond human control. Examining the players, institutions, and values lobbying against meaningful regulation of everything from autonomous robots to designer drugs, A Dangerous Master proposes solutions for regaining control of our technological destiny.
Wallach's nuanced study offers both stark warnings and hope, navigating both the fears and hype surrounding technological innovations. An engaging, masterful analysis of the elements we must manage in our quest to survive as a species, A Dangerous Master forces us to confront the practical—and moral—purposes of our creations.
Storytelling and directingShooting, editing, and renderingCreating your very own channelBroadcasting user-generated contentRe-broadcasting commercial contentCultivating a devoted audienceFitting into the YouTube communityBecoming a success story
Join Alan, who makes part of his living from YouTube, and Michael, a successful filmmaker, author, and D.I.Y. art pioneer. They'll take you from the basics of gear to making it big on YouTube, with a focus on networking and interaction. You'll also sit in on informative interviews with YouTube stars LisaNova, Hank Green (vlogbrothers), WhatTheBuckShow, nalts, and liamkylesullivan.
Alan and Michael understand viral marketing -- and they know what it takes to get your work on everyone's YouTube radar. And, once you read this book, so will you.
Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.
The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.
You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.Govern for value over predictability Organize for responsiveness, not lowest cost Clarify accountability for outcomes and for decisions along the way Strengthen the alignment of autonomous teams Move beyond project teams to capability teams Break down tool-induced silos Choose financial practices that are free of harmful side effects Create and retain great teams despite today’s “talent crunch” Reform metrics to promote (not prevent) agility Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
While such "liberation technology" has been instrumental in freeing Egypt and Tunisia, other cases—such as China and Iran—demonstrate that it can be deployed just as effectively by authoritarian regimes seeking to control the Internet, stifle protest, and target dissenters. This two-sided dynamic has set off an intense technological race between "netizens" demanding freedom and authoritarians determined to retain their grip on power.
Liberation Technology brings together cutting-edge scholarship from scholars and practitioners at the forefront of this burgeoning field of study. An introductory section defines the debate with a foundational piece on liberation technology and is then followed by essays discussing the popular dichotomy of "liberation" versus "control" with regard to the Internet and the sociopolitical dimensions of such controls. Additional chapters delve into the cases of individual countries: China, Egypt, Iran, and Tunisia.
This book also includes in-depth analysis of specific technologies such as Ushahidi—a platform developed to document human-rights abuses in the wake of Kenya’s 2007 elections—and alkasir—a tool that has been used widely throughout the Middle East to circumvent cyber-censorship.
Liberation Technology will prove an essential resource for all students seeking to understand the intersection of information and communications technology and the global struggle for democracy.
Contributors: Walid Al-Saqaf, Daniel Calingaert, Ronald Deibert, Larry Diamond, Elham Gheytanchi, Philip N. Howard, Muzammil M. Hussain, Rebecca MacKinnon, Patrick Meier, Evgeny Morozov, Xiao Qiang, Rafal Rohozinski, Mehdi Yahyanejad
While Alec Ross was working as Senior Advisor for Innovation to the Secretary of State, he traveled to forty-one countries, exploring the latest advances coming out of every continent. From startup hubs in Kenya to R&D labs in South Korea, Ross has seen what the future holds.
In The Industries of the Future, Ross provides a “lucid and informed guide” (Financial Times) to the changes coming in the next ten years. He examines the fields that will most shape our economic future, including robotics and artificial intelligence, cybercrime and cybersecurity, the commercialization of genomics, the next step for big data, and the impact of digital technology on money and markets. In each of these realms, Ross addresses the toughest questions: How will we have to adapt to the changing nature of work? Is the prospect of cyberwar sparking the next arms race? How can the world’s rising nations hope to match Silicon Valley with their own innovation hotspots? And what can today’s parents do to prepare their children for tomorrow?
Ross blends storytelling and economic analysis to show how sweeping global trends are affecting the ways we live. Sharing insights from global leaders—from the founders of Google and Twitter to defense experts like David Petraeus—Ross reveals the technologies and industries that will drive the next stage of globalization. The Industries of the Future is “a riveting and mind-bending book” (New York Journal of Books), a “must read” (Wendy Kopp, Founder of Teach for America) regardless of “whether you follow these fields closely or you still think of Honda as a car rather than a robotics company” (Forbes).
Mary Aiken is the world’s leading expert in forensic cyberpsychology—a discipline that combines psychology, criminology, and technology to investigate the intersection where technology and human behavior meet. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, security, and our perception of the world. Cyberspace is an environment full of surveillance, but who is looking out for us? The Cyber Effect offers a fascinating and chilling look at a future we can still do something about.
Drawing on her own research and extensive experience with law enforcement, Mary Aiken covers a wide range of subjects from the impact of screens on the developing child to the explosion of teen sexting, and the acceleration of compulsive and addictive behaviors online (gaming, shopping, pornography). She examines the escalation of cyberchondria (anxiety produced by self-diagnosing online), cyberstalking, and organized cybercrime in the Deep Web. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.
The Cyber Effect will upend your assumptions about your online life and forever change the way you think about the technology you, your friends, and family use. Readers will gain a new understanding of the rapid change taking shape around us and come away with critical tools to become part of this very necessary conversation.
Advance praise for The Cyber Effect
“Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time.”—Bob Woodward
“Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace.”—John R. Suler, PhD, author of The Psychology of Cyberspace
“Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense. A must-read for this moment in time.”—Steven D. Levitt, co-author of the New York Times bestseller Freakonomics
“Figuring out how to guide kids in a hyperconnected world is one of the biggest challenges for today’s parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives.”—Peggy Orenstein, author of the New York Times bestseller Girls & Sex
“Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today’s digital tools can be exploited by criminals lurking in the Internet’s Dark Net.”—Newsweek
From the Hardcover edition.
See Additional Notes for instructions to download the highly interactive PC software for your school. Used in thousands of schools and colleges worldwide the software is designed to work as a traditional textbook on your PC screen.
Comprising hundreds of menu selected colourful topics where the graphic images (from your eBook) are brought to life for every value change along with many additional learning software features.
Full colour printed is available for student handouts (using your values and selections) or images and text pasted to make student assignments.
Various additional software editors are included to enable your own calculations to be explored and evaluated from simple algebraic equations to complex formulae.
A combined eBook and educational software package at a tiny fraction of the previously published price.
Table of Contents (350 software topics) Introduction, Hardware Devices, Data Structures, Data Files, Computer Systems, Data Handling, System Development, Computer Programming, Binary Numbers, Binary Arithmetic, Logic Gates 1., Logic Gates 2., Logic Families, Flip Flops, Combinational Logic, Counters, Counting, Shift Registers, Logic Interfacing, Boolean and DeMorgan's, Micro-Computer, Data/Address Bus, Memory Addressing, Arithmetic and Logic Unit, Clock and Reset, Instructions and Control, Memory Cells, Microprocessor Memory, Addressing Modes, Instructions Set 1., Instructions Set 2., Instructions Set 3., Additional Notes.
But what about the average person? How will the Singularity affect our daily lives—our jobs, our families, and our wealth?
Singularity Rising: Surviving and Thriving in a Smarter, Richer, and More Dangerous World focuses on the implications of a future society faced with an abundance of human and artificial intelligence. James D. Miller, an economics professor and popular speaker on the Singularity, reveals how natural selection has been increasing human intelligence over the past few thousand years and speculates on how intelligence enhancements will shape civilization over the next forty years.
Miller considers several possible scenarios in this coming singularity:
• A merger of man and machine making society fantastically wealthy and nearly immortal
• Competition with billions of cheap AIs drive human wages to almost nothing while making investors rich
• Businesses rethink investment decisions to take into account an expected future period of intense creative destruction
• Inequality drops worldwide as technologies mitigate the cognitive cost of living in impoverished environments
• Drugs designed to fight Alzheimer's disease and keep soldiers alert on battlefields have the fortunate side effect of increasing all of their users’ IQs, which, in turn, adds a percentage points to worldwide economic growth
Singularity Rising offers predictions about the economic implications for a future of widely expanding intelligence and practical career and investment advice on flourishing on the way to the Singularity.
Can we scientifically predict our future? Scientists and pseudo scientists have been pursuing this mystery for hundreds and perhaps thousands of years. But now, astonishing new research is revealing patterns in human behavior previously thought to be purely random. Precise, orderly, predictable patterns...
Albert Laszlo Barabasi, already the world's preeminent researcher on the science of networks, describes his work on this profound mystery in Bursts, a stunningly original investigation into human nature. His approach relies on the digital reality of our world, from mobile phones to the Internet and email, because it has turned society into a huge research laboratory. All those electronic trails of time stamped texts, voicemails, and internet searches add up to a previously unavailable massive data set of statistics that track our movements, our decisions, our lives. Analysis of these trails is offering deep insights into the rhythm of how we do everything. His finding? We work and fight and play in short flourishes of activity followed by next to nothing. The pattern isn't random, it's "bursty." Randomness does not rule our lives in the way scientists have assumed up until now.
Illustrating this revolutionary science, Barabasi artfully weaves together the story of a 16th century burst of human activity-a bloody medieval crusade launched in his homeland, Transylvania-with the modern tale of a contemporary artist hunted by the FBI through our post 9/11 surveillance society. These narratives illustrate how predicting human behavior has long been the obsession, sometimes the duty, of those in power. Barabási's astonishingly wide range of examples from seemingly unrelated areas include how dollar bills move around the U.S., the pattern everyone follows in writing email, the spread of epidemics, and even the flight patterns of albatross. In all these phenomena a virtually identical, mathematically described bursty pattern emerges.
Bursts reveals what this amazing new research is showing us about where individual spontaneity ends and predictability in human behavior begins. The way you think about your own potential to do something truly extraordinary will never be the same.
Each of us exists in three-dimensional, physical space. But, as a constellation of everyday digital phenomena rewires our lives, we are increasingly coaxed from the containment of our predigital selves into a wonderful and eerie fourth dimension, a world of ceaseless communication, instant information, and global connection.
Our portals to this new world have been wedged open, and the silhouette of a figure is slowly taking shape. But what does it feel like to be four-dimensional? How do digital technologies influence the rhythms of our thoughts, the style and tilt of our consciousness? What new sensitivities and sensibilities are emerging with our exposure to the delights, sorrows, and anxieties of a networked world? And how do we live in public with these recoded private lives?
Laurence Scott—hailed as a “New Generation Thinker” by the Arts and Humanities Research Council and the BBC—shows how this four-dimensional life is dramatically changing us by redefining our social lives and extending the limits of our presence in the world. Blending tech-philosophy with insights on everything from Seinfeld to the fall of Gaddafi, Scott stands with a rising generation of social critics hoping to understand our new reality. His virtuosic debut is a revelatory and original exploration of life in the digital age.
What does this mean for us as individuals and for society as a whole? What are the social implications of this technological revolution that we have witnessed in the short span of about 20 years? Do people of different generations use these technologies in the same ways, or do they adopt them to support their communication habits formed at different times of their lives? How does the illusion of control provided by these technologies affect the way we think about what is meaningful in our lives? Hanson examines the wide-ranging impact of this change. How do individuals posting their viewpoints on the Internet affect democracy? Is it possible to ever completely prevent identity theft over the Internet? How permanent is information stored on the Internet or on a hard drive? Do cell phones change the way people think about privacy or the way they communicate with others? Does email? Do videogames teach new social principles? Do cell phones and the Internet change traditional communication behaviors and attitudes? Hanson discusses these crucial issues and explores to what extent individuals do have control, and she assesses how social and governmental services are responding to (or running from) the problems posed by these new technologies.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.