In this bestselling book, Wil shares his deeply personal and difficult journey to find himself. You'll understand the rigors, and joys, of Wil's rediscovering of himself, as he comes to terms with what it means to be famous, or, ironically, famous for once having been famous. Writing with honesty and disarming humanity, Wil touches on the frustrations associated with his acting career, his inability to distance himself from Ensign Crusher in the public's eyes, the launch of his incredibly successful web site, wilwheaton.net, and the joy he's found in writing. Through all of this, Wil shares the ups and downs he encountered along the journey, along with the support and love he discovered from his friends and family.
The stories in Just a Geek include:
Wil's plunge from teen star to struggling actorDiscovering the joys of HTML, blogging, Linux, and web designThe struggle between Wesley Crusher, Starfleet ensign, and Wil Wheaton, author and bloggerGut-wrenching reactions to the 9-11 disasterMoving tales of Wil's relationships with his wife, step-children, and extended familyThe transition from a B-list actor to an A-list author
Wil Wheaton--celebrity, blogger, and geek--writes for the geek in all of us. Engaging, witty, and pleasantly self-deprecating, Just a Geek will surprise you and make you laugh.
Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
Inside, you'll learn about:
Interaction design and physical computingThe Arduino hardware and software development environmentBasics of electricity and electronicsPrototyping on a solderless breadboardDrawing a schematic diagram
And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED.
Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.
—Tom Vanderbilt, New York Times bestselling author of Traffic
In Tubes, Andrew Blum, a correspondent at Wired magazine, takes us on an engaging, utterly fascinating tour behind the scenes of our everyday lives and reveals the dark beating heart of the Internet itself. A remarkable journey through the brave new technological world we live in, Tubes is to the early twenty-first century what Soul of a New Machine—Tracy Kidder’s classic story of the creation of a new computer—was to the late twentieth.
The answer is time management. And not just any time management theory--you want Time Management for System Administrators, to be exact. With keen insights into the challenges you face as a sys admin, bestselling author Thomas Limoncelli has put together a collection of tips and techniques that will help you cultivate the time management skills you need to flourish as a system administrator.
Time Management for System Administrators understands that an Sys Admin often has competing goals: the concurrent responsibilities of working on large projects and taking care of a user's needs. That's why it focuses on strategies that help you work through daily tasks, yet still allow you to handle critical situations that inevitably arise.
Among other skills, you'll learn how to:Manage interruptionsEliminate timewastersKeep an effective calendarDevelop routines for things that occur regularlyUse your brain only for what you're currently working onPrioritize based on customer expectationsDocument and automate processes for faster execution
What's more, the book doesn't confine itself to just the work environment, either. It also offers tips on how to apply these time management tools to your social life. It's the first step to a more productive, happier you.
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?
Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.
Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."
The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
A 3D printer transforms digital information into a physical object by carrying out instructions from an electronic design file, or 'blueprint.' Guided by a design file, a 3D printer lays down layer after layer of a raw material to 'print' out an object. That's not the whole story, however. The magic happens when you plug a 3D printer into today’s mind-boggling digital technologies. Add to that the Internet, tiny, low cost electronic circuitry, radical advances in materials science and biotech and voila! The result is an explosion of technological and social innovation.
Fabricated takes the reader onto a rich and fulfilling journey that explores how 3D printing is poised to impact nearly every part of our lives.
Aimed at people who enjoy books on business strategy, popular science and novel technology, Fabricated will provide readers with practical and imaginative insights to the question 'how will this technology change my life?' Based on hundreds of hours of research and dozens of interviews with experts from a broad range of industries, Fabricated offers readers an informative, engaging and fast-paced introduction to 3D printing now and in the future.
The CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106 is the officially endorsed CWNA test prep for the leading wireless certification. Expert authors and CWNEs David D. Coleman and David A. Westcott guide readers through the skills and concepts candidates need to know for the exam, using hands-on methods to convey an in-depth understanding of wireless network administration. Readers should have a basic knowledge of Radio Frequency behavior, experience with WLAN hardware peripherals and protocols, and an interest in designing, installing, and managing wireless networks.
Wireless technology is taking over the tech industry, and the demand for competent, certified professionals is far outpacing the supply. A CWNA certification denotes advanced-level proficiency in the field, with a complete understanding of wireless LAN components, features, and function—but the only way to pass the exam is to truly understand the material, not just the talking points. The CWNA: Certified Wireless Network Administrator Official Study Guide thoroughly covers each exam objective, and includes review questions, assessment tests, and exercises to test your skills. Topics include:Radio Frequency technologies, regulations, and standards 802.11 protocols Network implementation and security 802.11 RF site surveying
Readers also get access to a suite of study tools including an electronic test engine with hundreds or practice test questions, electronic flashcards, exercise peripherals, and industry White Papers, which serve as valuable backup references. In preparing for the CWNA-106 exam, the ideal study guide should cover all of the exam topics in depth—CWNA: Certified Wireless Network Administrator Official Study Guide does just that, making it an excellent, comprehensive study guide.
Don’t believe it.
In Glow Kids, Dr. Nicholas Kardaras will examine how technology—more specifically, age-inappropriate screen tech, with all of its glowing ubiquity—has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis. Most shocking of all, recent brain imaging studies conclusively show that excessive screen exposure can neurologically damage a young person’s developing brain in the same way that cocaine addiction can.
Kardaras will dive into the sociological, psychological, cultural, and economic factors involved in the global tech epidemic with one major goal: to explore the effect all of our wonderful shiny new technology is having on kids. Glow Kids also includes an opt-out letter and a "quiz" for parents in the back of the book.
Conversion Optimization offers practical advice on how to persuade visitors to make a buying decision -- without driving them away through data overload or tedious navigation. You'll learn how to use marketing principles, design, usability, and analytics on your site to increase your buyer-to-visitor ratio, whether you're involved with marketing or designing a large ecommerce site, or managing a modest online operation.
Based on the authors' broad experience in helping businesses attract online customers, this book addresses every aspect of the process, from landing visitors to finalizing the sale. You'll learn several techniques for blending successful sales approaches with the particular needs of the people you want to attract. Are you ready to do what it takes to get a double-digit conversion rate?Explore case studies involving significant conversion rate improvementsWalk through different stages of a sale and understand the value of eachUnderstand your website visitors through persona creationConnect with potential customers and guide them toward a conversionLearn how to deal with FUDs -- customer fears, uncertainties, and doubtsExamine the path that visitors take from landing page to checkoutTest any change you make against your original design
"The Web is unique in its ability to deliver this almost improbable win-win: You can increase revenue AND make your customers happy. Yet most websites stink. Worry not, Khalid and Ayat to the rescue! Buy this book to follow their practical advice on how to create high converting websites that your visitors love."--Avinash Kaushik, author of Web Analytics 2.0 and Web Analytics: An Hour A Day (both Sybex)
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.
Inside, you’ll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram
Getting started with Arduino is a snap. To use the introductory examples in this guide, all you need an Arduino Uno or earlier model, along with USB A-B cable and an LED. The easy-to-use Arduino development environment is free to download.
Join hundreds of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, Getting Started with Arduino gets you in on all the fun!
From the Trade Paperback edition.
Part history, part guidebook, part prediction for the future, Targeted tells the story of the companies, individuals, and innovations driving this revolution. It takes readers behind the scenes—examining the growth of digital advertising, its enormous potential, and the technologies that are changing the game forever. Leading the way is real-time bidding, which offers advertisers unprecedented precision in targeting ads and measuring their effectiveness.
From keyword micro-markets and ad serving systems to aggregated virtual audiences and new business models, Targeted is sweeping in scope and stripped of technical complexity. It is an essential resource for anyone interested in finding and connecting with customers in the vast and shifting Internet universe.
Author Melanie Swan, Founder of the Institute for Blockchain Studies, explains that the blockchain is essentially a public ledger with potential as a worldwide, decentralized record for the registration, inventory, and transfer of all assets—not just finances, but property and intangible assets such as votes, software, health data, and ideas.
Topics include:Concepts, features, and functionality of Bitcoin and the blockchainUsing the blockchain for automated tracking of all digital endeavorsEnabling censorship?resistant organizational modelsCreating a decentralized digital repository to verify identityPossibility of cheaper, more efficient services traditionally provided by nationsBlockchain for science: making better use of the data-mining networkPersonal health record storage, including access to one’s own genomic dataOpen access academic publishing on the blockchain
This book is part of an ongoing O’Reilly series. Mastering Bitcoin: Unlocking Digital Crypto-Currencies introduces Bitcoin and describes the technology behind Bitcoin and the blockchain. Blockchain: Blueprint for a New Economy considers theoretical, philosophical, and societal impact of cryptocurrencies and blockchain technologies.
The second edition focuses on Drupal 7, the latest version of this open source system. Each project spans an entire chapter, with step-by-step "recipes" to help you build out the precise functionality the site requires. With this book, developers new to Drupal will gain experience through a hands-on introduction, and experienced Drupal developers will learn real-world best practices.Learn Drupal’s concepts and building blocks, and how everything works togetherHit the ground running—build your first Drupal site hands-onExplore solutions that meet each project’s requirements, and discover why specific modules were selectedUnderstand the projects through case studies, including the client’s needs and desiresLearn how to configure modules with a bird’s-eye view of how they workDiscover new modules, including Drupal Commerce, Media, and Workbench
The network has become the core organizational structure for postmodern politics, culture, and life, replacing the modern era’s hierarchical systems. From peer-to-peer file sharing and massive multiplayer online games to contagion vectors of digital or biological viruses and global affiliations of terrorist organizations, the network form has become so invasive that nearly every aspect of contemporary society can be located within it.
Borrowing their title from the hacker term for a program that takes advantage of a flaw in a network system, Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive.
In this provocative book-length essay, Galloway and Thacker argue that a whole new topology must be invented to resist and reshape the network form, one that is as asymmetrical in relationship to networks as the network is in relation to hierarchy.
Alexander R. Galloway is associate professor of culture and communications at New York University and the author of Gaming: Essays on Algorithmic Culture (Minnesota, 2006) and Protocol: How Control Exists after Decentralization.
Eugene Thacker is associate professor of new media at the Georgia Institute of Technology and the author of Biomedia (Minnesota, 2004) and The Global Genome: Biotechnology, Politics, and Culture.
This book is a compilation of three short guides—Planning Drupal Projects, Design and Prototyping for Drupal, and Drupal Development Tricks for Designers—plus exclusive "director’s material." If you’re familiar with HTML and CSS, but struggling with Drupal’s learning curve, this is the book you’ve been looking for.Get extra material, including an expanded Grids chapter, more recommended modules, and a Short Form Project planLearn how to work user-centered design practices into Drupal projectsChoose the right modules for your project, and discover several go-to modulesUse strategies for sketching, wireframing, and designing effective layoutsManage Drupal’s markup, including code generated by the powerful Views moduleLearn how to work with Drupal on the command lineSet up your development environment and collaborate with other designers and developersLearn the basics of Git, the free open source version control system
Each chapter offers a self-contained lesson with illustrations and annotated examples, along with exercises and review questions to help you test your understanding and practice new skills as you go. Once you've finished this book, you'll know how to develop your own sophisticated games from start to finish.Learn game development from 2D animation to 3D cameras and effectsDelve into high-level shader language (HLSL) and introductory artificial intelligence conceptsBuild three complete, exciting games using 2D, 3D, and multiplayer techniquesDevelop for and deploy your games to the Xbox 360 and Windows Phone 7
Based on his nine years of experience as a program manager for Internet Explorer, and lead program manager for Windows and MSN, Berkun explains to technical and non-technical readers alike what it takes to get through a large software or web development project. Making Things Happen doesn't cite specific methods, but focuses on philosophy and strategy. Unlike other project management books, Berkun offers personal essays in a comfortable style and easy tone that emulate the relationship of a wise project manager who gives good, entertaining and passionate advice to those who ask.
Topics in this new edition include:How to make things happenMaking good decisionsSpecifications and requirementsIdeas and what to do with themHow not to annoy peopleLeadership and trustThe truth about making datesWhat to do when things go wrongComplete with a new forward from the author and a discussion guide for forming reading groups/teams, Making Things Happen offers in-depth exercises to help you apply lessons from the book to your job. It is inspiring, funny, honest, and compelling, and definitely the one book that you and your team need to have within arm's reach throughout the life of your project.
Coming from the rare perspective of someone who fought difficult battles on Microsoft's biggest projects and taught project design and management for MSTE, Microsoft's internal best practices group, this is valuable advice indeed. It will serve you well with your current work, and on future projects to come.
If you administer a DNS system or are thinking about running one, or if you need to upgrade to support IPv6 DNS, need to secure a DNS for zone transfer, dynamic update, or other reasons, or if you need to implement DNSSEC, or simply want to understand the DNS system, then this book provides you with a single point of reference. Pro DNS and BIND starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and resource records are described and, in the majority of cases, illustrated with one or more examples.
The book contains a complete reference to zone files, Resource Records, and BINDs configuration file parameters. You can treat the book as as a simple paint-by-numbers guide to everything from a simple caching DNS, to the most complex secure DNS (DNSSEC) implementation. Background information is still included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.
• Find out what you can do on Facebook, and what it can do for you. Reconnect with old friends and make new ones, let your friends know what you’re up to, send greetings, share photos or video, or just goof around with applications like SuperPoke.
• Learn Facebook etiquette: how and why to friend someone, how to socialize politely, and whether to friend your boss.
• Publicize your projects, business, or causes: Post to your Wall, set up a Page, put up a Marketplace listing, or invite friends to Events.
Look for the official Facebook Me! Group on Facebook, to connect with the author and other readers of this book.
In this third edition of a widely acclaimed resource, three networking experts share their extensive experience, teaching you the cabling skills you need to build a reliable, efficient, and cost-effective network cabling infrastructure. As you master these techniques, you'll learn to avoid common pitfalls and troubleshoot problems as quickly as they arise. Coverage includes:Choosing the right cables and components for your network architecture and topology Avoiding unnecessary and unexpected costs Understanding the current limitations of data communications and network cabling Understanding how laws and building codes constrain cabling Understanding the function and importance of universal cabling standards Determining when you have a cabling-related network problem Assembling a complete cabling toolkit Integrating voice and data on the same cable system Setting up an infrastructure in which desktops, printers, copiers, and other nodes share cabling Understanding issues of bandwidth, impedance, resistance, attenuation, crosstalk, capacitance, propagation, delay, and delay skew Working effectively with USB and Firewire Knowing when to discard legacy cabling and begin anew Documenting your cabling Creating an RFP and selecting a vendor
Storytelling and directingShooting, editing, and renderingCreating your very own channelBroadcasting user-generated contentRe-broadcasting commercial contentCultivating a devoted audienceFitting into the YouTube communityBecoming a success story
Join Alan, who makes part of his living from YouTube, and Michael, a successful filmmaker, author, and D.I.Y. art pioneer. They'll take you from the basics of gear to making it big on YouTube, with a focus on networking and interaction. You'll also sit in on informative interviews with YouTube stars LisaNova, Hank Green (vlogbrothers), WhatTheBuckShow, nalts, and liamkylesullivan.
Alan and Michael understand viral marketing -- and they know what it takes to get your work on everyone's YouTube radar. And, once you read this book, so will you.
Co-written by two widely recognized Twitter experts, The Twitter Book is packed with all-new real-world examples, solid advice, and clear explanations guaranteed to turn you into a power user.Use Twitter to connect with colleagues, customers, family, and friendsStand out on TwitterAvoid common gaffes and pitfallsBuild a critical communications channel with Twitter—and use the best third-party tools to manage it.
Want to learn how to use Twitter like a pro? Get the book that readers and critics alike rave about.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You’ll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use.Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possibleBuild a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data storeLearn about OpenBazaar’s decentralized market and its structure for supporting transactionsExplore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogoTake an in-depth look at La’Zooz, a P2P ridesharing app that transmits data directly between riders and drivers
Social network analysis (SNA) is a discipline that predates Facebook and Twitter by 30 years. Through expert SNA researchers, you'll learn concepts and techniques for recognizing patterns in social media, political groups, companies, cultural trends, and interpersonal networks. You'll also learn how to use Python and other open source tools—such as NetworkX, NumPy, and Matplotlib—to gather, analyze, and visualize social data. This book is the perfect marriage between social network theory and practice, and a valuable source of insight and ideas.Discover how internal social networks affect a company’s ability to performFollow terrorists and revolutionaries through the 1998 Khobar Towers bombing, the 9/11 attacks, and the Egyptian uprisingLearn how a single special-interest group can control the outcome of a national electionExamine relationships between companies through investment networks and shared boards of directorsDelve into the anatomy of cultural fads and trends—offline phenomena often mediated by Twitter and Facebook
In this insightful book, author Steve Talbott, software programmer and technical writer turned researcher and editor for The Nature Institute, challenges us to step back and take an objective look at the technology driving our lives. At a time when 65 percent of American consumers spend more time with their PCs than they do with their significant others, according to a recent study, Talbott illustrates that we're forgetting one important thing--our Selves, the human spirit from which technology stems.
Whether we're surrendering intimate details to yet another database, eschewing our physical communities for online social networks, or calculating our net worth, we freely give our power over to technology until, he says, "we arrive at a computer's-eye view of the entire world of industry, commerce, and society at large...an ever more closely woven web of programmed logic."
Digital technology certainly makes us more efficient. But when efficiency is the only goal, we have no way to know whether we're going in the right or wrong direction. Businesses replace guiding vision with a spreadsheet's bottom line. Schoolteachers are replaced by the computer's dataflow. Indigenous peoples give up traditional skills for the dazzle and ease of new gadgets. Even the Pentagon's zeal to replace "boots on the ground" with technology has led to the mess in Iraq. And on it goes.
The ultimate danger is that, in our willingness to adapt ourselves to technology, "we will descend to the level of the computational devices we have engineered--not merely imagining ever new and more sophisticated automatons, but reducing ourselves to automatons."
To transform our situation, we need to see it in a new and unaccustomed light, and that's what Talbott provides by examining the deceiving virtues of technology--how we're killing education, socializing our machines, and mechanizing our society.Once you take this eye-opening journey, you will think more clearly about how you consume technology and how you allow it to consume you.
"Nothing is as rare or sorely needed in our tech-enchanted culture right now as intelligent criticism of technology, and Steve Talbott is exactly the critic we've been waiting for: trenchant, sophisticated, and completely original. Devices of the Soul is an urgent and important book."
--Michael Pollan, author of The Omnivore's Dilemma: A Natural History of Four Meals and The Botany of Desire: A Plant's Eye View of the World
"Steve Talbott is a rare voice of clarity, humanity, and passion in a world enthralled by machines and calculation. His new book, Devices of the Soul, lays out a frightening and at the same time inspiring analysis of what computers and computer-like thinking are doing to us, our children, and the future of our planet. Talbott is no Luddite. He fully understands and appreciates the stunning power of technology for both good and evil. His cool and precise skewering of the fuzzy thinking and mindless enthusiasm of the technology true believers is tempered by his modesty, the elegance of his writing, and his abiding love for the world of nature and our capacity for communion with it. "
--Edward Miller, Former editor, Harvard Education Letter
"Those who care about the healthy and wholesome lives of children can gain much from Steve Talbott's wisdom. He examines the need to help children spend more time touching nature and real life and less touching keyboards. He eloquently questions the assumption that speeding up learning is a good thing. Is, after all, a sped-up life a well-lived life? Most importantly, he reminds all of us that technology is just one part of life and ought not to overshadow the life of self and soul."
--Joan Almon, Coordinator, Alliance for Childhood
"One of the most original and provocative writers of our time, Steve Talbott offers a rich assortment of insightful reflections on the nature of our humanity, challenging our own thinking and conventional wisdom about advances in technology."
--Dorothy E. Denning, Department of Defense Analysis, Naval Postgraduate School, Monterey, CA
"Are you experiencing growing unease as computational metaphors have seized our discourse? Steve Talbott offers immediate relief. You are not losing your mind! Chapter after chapter, he shows how to draw on the powers of technology without losing your soul or breaking your heart."
--Peter Denning, Past President of ACM, Monterey, California
"Steve Talbott is a rare writer whose words can alter one's entire perception of the world. He is our most original and perceptive defender of the wholeness of life against the onslaught of mechanism. Devices of the Soul is written with Talbott's typical grace and clarity. It displays a quality hardly found anymore in our high tech culture--wisdom. "
--Lowell Monke, Associate Professor of Education, Wittenberg University
Digital information is a powerful tool that spreads unbelievably rapidly, infects all corners of society, and is all but impossible to control—even when that information is actually a lie. In Virtual Unreality, Charles Seife uses the skepticism, wit, and sharp facility for analysis that captivated readers in Proofiness and Zero to take us deep into the Internet information jungle and cut a path through the trickery, fakery, and cyber skullduggery that the online world enables.
Taking on everything from breaking news coverage and online dating to program trading and that eccentric and unreliable source that is Wikipedia, Seife arms his readers with actual tools—or weapons—for discerning truth from fiction online.
What does this mean for us as individuals and for society as a whole? What are the social implications of this technological revolution that we have witnessed in the short span of about 20 years? Do people of different generations use these technologies in the same ways, or do they adopt them to support their communication habits formed at different times of their lives? How does the illusion of control provided by these technologies affect the way we think about what is meaningful in our lives? Hanson examines the wide-ranging impact of this change. How do individuals posting their viewpoints on the Internet affect democracy? Is it possible to ever completely prevent identity theft over the Internet? How permanent is information stored on the Internet or on a hard drive? Do cell phones change the way people think about privacy or the way they communicate with others? Does email? Do videogames teach new social principles? Do cell phones and the Internet change traditional communication behaviors and attitudes? Hanson discusses these crucial issues and explores to what extent individuals do have control, and she assesses how social and governmental services are responding to (or running from) the problems posed by these new technologies.
The Internet has been hailed as an unprecedented democratizing force, a place where everyone can be heard and all can participate equally. But how true is this claim? In a seminal dismantling of techno-utopian visions, The People's Platform argues that for all that we "tweet" and "like" and "share," the Internet in fact reflects and amplifies real-world inequities at least as much as it ameliorates them. Online, just as off-line, attention and influence largely accrue to those who already have plenty of both.
What we have seen so far, Astra Taylor says, has been not a revolution but a rearrangement. Although Silicon Valley tycoons have eclipsed Hollywood moguls, a handful of giants like Amazon, Apple, Google, and Facebook remain the gatekeepers. And the worst habits of the old media model—the pressure to seek easy celebrity, to be quick and sensational above all—have proliferated on the web, where "aggregating" the work of others is the surest way to attract eyeballs and ad revenue. When culture is "free," creative work has diminishing value and advertising fuels the system. The new order looks suspiciously like the old one.
We can do better, Taylor insists. The online world does offer a unique opportunity, but a democratic culture that supports diverse voices and work of lasting value will not spring up from technology alone. If we want the Internet to truly be a people's platform, we will have to make it so.
In Post-TV, Michael Strangelove explores the viewing habits and values of the post-television generation, one that finds new ways to exploit technology to find its entertainment for free, rather than for a fee. Challenging the notion that the audience is constrained by regulatory and industrial regimes, Strangelove argues that cord-cutting, digital piracy, increased competition, and new modes of production and distribution are making audiences and content more difficult to control, opening up the possibility of a freer, more democratic, media environment.
A follow-up to the award-winning Watching YouTube, Post-TV is a lively examination of the social and economic implications of a world where people can watch what they want, when they want, wherever they want.
Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists.Investigate an assortment of practical and intriguing project ideasPrep your ZigBee toolbox with an extensive shopping list of parts and programsCreate a simple, working ZigBee network with XBee radios in less than two hours -- for under $100Use the Arduino open source electronics prototyping platform to build a series of increasingly complex projectsGet familiar with XBee's API mode for creating sensor networksBuild fully scalable sensing and actuation systems with inexpensive componentsLearn about power management, source routing, and other XBee technical nuancesMake gateways that connect with neighboring networks, including the Internet
An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.
Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
But the same engineering marvels are shattering centuries-old assumptions about privacy, identity, free expression, and personal control as more and more details of our lives are captured as digital data.
Can you control who sees all that personal information about you? Can email be truly confidential, when nothing seems to be private? Shouldn’t the Internet be censored the way radio and TV are? Is it really a federal crime to download music? When you use Google or Yahoo! to search for something, how do they decide which sites to show you? Do you still have free speech in the digital world? Do you have a voice in shaping government or corporate policies about any of this?
Blown to Bits offers provocative answers to these questions and tells intriguing real-life stories. This book is a wake-up call to the human consequences of the digital explosion.
Because just about anyone can be the victim of cyber bullying, and because it often goes unreported, there are precious few resources available to victims, parents, teachers, and others interested in combatting this new form of bullying. This book provides, however, a thoroughly developed, well-researched analysis of cyber bullying - what it is, how it is carried out, who is affected, and what can and should be done to prevent and control its occurrence in society. The book captures the sensational, technological, and horrific aspects of cyber bullying while balancing these with discussion from perspectives about social computing, various academic disciplines, possibilities for public policy and legislation formulation, education, and crime prevention strategies. Using case examples throughout, readers will come away with a new sense of indignation for the victims and a better understanding of the growing problem and how to combat it.
In providing a very readable text that avoids getting immersed in low-level technical details, while still providing a useful, practical guide to network programming for both undergraduates and busy IT professionals, this third edition continues the trend of its predecessors. To retain its currency, the text has been updated to reflect changes that have taken place in Java's network technology over the past seven years (including the release of Java 7), whilst retaining its notable features of numerous code examples, screenshots and end-of-chapter exercises.
Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors.
Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises.
Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.
Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts. Part I covers LAN Networks and Cabling Systems offers comprehensive coverage on current cabling methodologies and is updated to the latest industry standards. Part II addresses Fiber-Optic Cabling and Components probes deeper into fiber optics, and can be used to prepare for the Fiber Optics Installer (FOI) and/or Fiber Optics Technician (FOT) certifications, two of the Electronic Technician's Association's leading certifications.Explains why cutting corners is a bad idea Walks you through the obstacles to high-speed data transfer Encourages you to follow the golden rules of cabling
This new edition is the only book you need for current cabling methodologies and standards.
This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors’ pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow’s smart grids.
Topics and features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs); explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource.
This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.
Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.
Table of Contents
What is Cloud Computing?
Types of Cloud Computing
Cloud Computing Examples
Cyber Security Dangers
Layers of Security
Cloud Computing and Security Threats
The Need for Policies
In this book, cloud computing and cyber security is described in a way that covers all sizes and implementations of businesses involved in using this method of computing.
Also by Marcia:
Silver & Gold Guide Top Tips: Learn How to Quickly Invest - Build your Wealth with Gold and Silver Bullion
Money Quick Makeovers Top Tips: Money Management Guide