A Summer Reading Pick for President Barack Obama, Bill Gates, and Mark Zuckerberg
From a renowned historian comes a groundbreaking narrative of humanity’s creation and evolution—a #1 international bestseller—that explores the ways in which biology and history have defined us and enhanced our understanding of what it means to be “human.”
One hundred thousand years ago, at least six different species of humans inhabited Earth. Yet today there is only one—homo sapiens. What happened to the others? And what may happen to us?
Most books about the history of humanity pursue either a historical or a biological approach, but Dr. Yuval Noah Harari breaks the mold with this highly original book that begins about 70,000 years ago with the appearance of modern cognition. From examining the role evolving humans have played in the global ecosystem to charting the rise of empires, Sapiens integrates history and science to reconsider accepted narratives, connect past developments with contemporary concerns, and examine specific events within the context of larger ideas.
Dr. Harari also compels us to look ahead, because over the last few decades humans have begun to bend laws of natural selection that have governed life for the past four billion years. We are acquiring the ability to design not only the world around us, but also ourselves. Where is this leading us, and what do we want to become?
Featuring 27 photographs, 6 maps, and 25 illustrations/diagrams, this provocative and insightful work is sure to spark debate and is essential reading for aficionados of Jared Diamond, James Gleick, Matt Ridley, Robert Wright, and Sharon Moalem.
Analyzing the strategic maneuvers of today’s great information powers–Apple, Google, and an eerily resurgent AT&T–Tim Wu uncovers a time-honored pattern in which invention begets industry and industry begets empire.
It is easy to forget that every development in the history of the American information industry–from the telephone to radio to film–once existed in an open and chaotic marketplace inhabited by entrepreneurs and utopians, just as the Internet does today. Each of these, however, grew to be dominated by a monopolist or cartel. In this pathbreaking book, Tim Wu asks: will the Internet follow the same fate? Could the Web–the entire flow of American information–come to be ruled by a corporate leviathan in possession of "the master switch"? Here, Tim Wu shows how a battle royale for Internet’s future is brewing, and this is one war we dare not tune out.
A NEW YORK TIMES NOTABLE BOOK
A VOICE LITERARY SUPPLEMENT TOP 25 FAVORITE BOOKS OF THE YEAR
AN ESQUIRE MAGAZINE BEST BOOK OF THE YEAR
Explaining why the whole is sometimes smarter than the sum of its parts, Johnson presents surprising examples of feedback, self-organization, and adaptive learning. How does a lively neighborhood evolve out of a disconnected group of shopkeepers, bartenders, and real estate developers? How does a media event take on a life of its own? How will new software programs create an intelligent World Wide Web?
In the coming years, the power of self-organization -- coupled with the connective technology of the Internet -- will usher in a revolution every bit as significant as the introduction of electricity. Provocative and engaging, Emergence puts you on the front lines of this exciting upheaval in science and thought.
**Named a best book of the year by Bloomberg and Nature**
**'Best of 2017' by The Morning Sun**
"We owe Claude Shannon a lot, and Soni & Goodman’s book takes a big first step in paying that debt." —San Francisco Review of Books
"Soni and Goodman are at their best when they invoke the wonder an idea can instill. They summon the right level of awe while stopping short of hyperbole." —Financial Times
"Jimmy Soni and Rob Goodman make a convincing case for their subtitle while reminding us that Shannon never made this claim himself." —The Wall Street Journal
"Soni and Goodman have done their research...A Mind at Play reveals the remarkable human behind some of the most important theoretical and practical contributions to the information age." —Nature
"A Mind at Play shows us that you don't need to be a genius to learn from a genius. Claude Shannon's inventive, vibrant life demonstrates how vital the act of play can be to making the most of work." —Inc.
“A charming account of one of the twentieth century’s most distinguished scientists…Readers will enjoy this portrait of a modern-day Da Vinci.” —Fortune
In their second collaboration, biographers Jimmy Soni and Rob Goodman present the story of Claude Shannon—one of the foremost intellects of the twentieth century and the architect of the Information Age, whose insights stand behind every computer built, email sent, video streamed, and webpage loaded. Claude Shannon was a groundbreaking polymath, a brilliant tinkerer, and a digital pioneer. He constructed the first wearable computer, outfoxed Vegas casinos, and built juggling robots. He also wrote the seminal text of the digital revolution, which has been called “the Magna Carta of the Information Age.” In this elegantly written, exhaustively researched biography, Soni and Goodman reveal Claude Shannon’s full story for the first time. With unique access to Shannon’s family and friends, A Mind at Play brings this singular innovator and always playful genius to life.
Through the ideas and software in this book, users will learn to design and employ a fully-featured rendering system for creating stunning imagery. This completely updated and revised edition includes new coverage on ray-tracing hair and curves primitives, numerical precision issues with ray tracing, LBVHs, realistic camera models, the measurement equation, and much more. It is a must-have, full color resource on physically-based rendering.Presents up-to-date revisions of the seminal reference on rendering, including new sections on bidirectional path tracing, numerical robustness issues in ray tracing, realistic camera models, and subsurface scatteringProvides the source code for a complete rendering system allowing readers to get up and running fastIncludes a unique indexing feature, literate programming, that lists the locations of each function, variable, and method on the page where they are first describedServes as an essential resource on physically-based rendering
Previously the domain of philosophers and linguists, information theory has now moved beyond the province of code breakers to become the crucial science of our time. In Decoding the Universe, Charles Seife draws on his gift for making cutting-edge science accessible to explain how this new tool is deciphering everything from the purpose of our DNA to the parallel universes of our Byzantine cosmos. The result is an exhilarating adventure that deftly combines cryptology, physics, biology, and mathematics to cast light on the new understanding of the laws that govern life and the universe.
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?
Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.
Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."
The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
Database design is not an exact science. Many are surprised to find that problems with their databases are caused by poor design rather than by difficulties in using the database management software. Beginning Database Design, Second Edition helps you ask and answer important questions about your data so you can understand the problem you are trying to solve and create a pragmatic design capturing the essentials while leaving the door open for refinements and extension at a later stage. Solid database design principles and examples help demonstrate the consequences of simplifications and pragmatic decisions. The rationale is to try to keep a design simple, but allow room for development as situations change or resources permit.Provides solid design principles by which to avoid pitfalls and support changing needs Includes numerous examples of good and bad design decisions and their consequences Shows a modern method for documenting design using the Unified Modeling Language
Beginning ASP.NET 4.5 Databases is a comprehensive introduction on how you can connect a Web site to many different data sources — not just databases — and use the data to create dynamic page content. It also shows you how to build a relational database, use SQL to communicate with it, and understand how they differ from each other.
With in-depth, on-target coverage of the new data access features of .NET Framework 4.5, this book is your guide to using ASP.NET to build responsive, easy-to-update data-driven Web sites.
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge.
Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes:Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysisAccess control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systemsProtocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSMSoftware: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security
This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development.
Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
The 9 papers presented in this volume were carefully reviewed and selected from 15 submissions. They deal with the general subject and issues of high-dimensional data clustering; present examples of techniques used to find and investigate clusters in high dimensionality; and the most common approach to tackle dimensionality problems, namely, dimensionality reduction and its application in clustering.
Modern cryptology has been described as the science of the integrity of information, covering all aspects like confidentiality, authenticity and non-repudiation and also including the protocols required for achieving these aims. In both theory and practice it requires notions and constructions from three major disciplines: computer science, electronic engineering and mathematics. Within mathematics, group theory, the theory of finite fields, and elementary number theory as well as some topics not normally covered in courses in algebra, such as the theory of Boolean functions and Shannon theory, are involved.Although essentially self-contained, a degree of mathematical maturity on the part of the reader is assumed, corresponding to his or her background in computer science or engineering. Algebra for Cryptologists is a textbook for an introductory course in cryptography or an upper undergraduate course in algebra, or for self-study in preparation for postgraduate study in cryptology.
With tables, diagrams, games, and as little math as possible, authors Colt McAnlis and Aleks Haecky neatly explain the fundamentals. Learn how compressed files are better, cheaper, and faster to distribute and consume, and how they’ll give you a competitive edge.Learn why compression has become crucial as data production continues to skyrocketKnow your data, circumstances, and algorithm options when choosing compression toolsExplore variable-length codes, statistical compression, arithmetic numerical coding, dictionary encodings, and context modelingExamine tradeoffs between file size and quality when choosing image compressorsLearn ways to compress client- and server-generated data objectsMeet the inventors and visionaries who created data compression algorithms
This book will show you how to exploit different parallel architectures to improve your code's performance, scalability, and resilience. You'll learn about seven concurrency models: threads and locks, functional programming, separating identity and state, actors, sequential processes, data parallelism, and the lambda architecture.
Learn about the perils of traditional threads and locks programming and how to overcome them through careful design and by working with the standard library. See how actors enable software running on geographically distributed computers to collaborate, handle failure, and create systems that stay up 24/7/365. Understand why shared mutable state is the enemy of robust concurrent code, and see how functional programming together with technologies such as Software Transactional Memory (STM) and automatic parallelism help you tame it.
You'll learn about the untapped potential within every GPU and how GPGPU software can unleash it. You'll see how to use MapReduce to harness massive clusters to solve previously intractable problems, and how, in concert with Stream Processing, big data can be tamed.
With an understanding of the strengths and weaknesses of each of the different models and hardware architectures, you'll be empowered to tackle any problem with confidence.
What You Need:
The example code can be compiled and executed on *nix, OS X, or Windows. Instructions on how to download the supporting build systems are given in each chapter.
Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).
"[Borgmann] has offered a stunningly clear definition of information in Holding On to Reality. . . . He leaves room for little argument, unless one wants to pose the now vogue objection: I guess it depends on what you mean by nothing."—Paul Bennett, Wired
"A superb anecdotal analysis of information for a hype-addled age."—New Scientist
"This insightful and poetic reflection on the changing nature of information is a wonderful antidote to much of the current hype about the 'information revolution.' Borgmann reminds us that whatever the reality of our time, we need 'a balance of signs and things' in our lives."—Margaret Wertheim, LA Weekly
Karen Morton has updated the content for Oracle version 12c and helps you master powerful aspects of Oracle SQL from the inside-out. You’ll learn analytic functions, the MODEL clause, and advanced grouping syntax—features that will help in creating good queries for reporting and business intelligence applications. Pro Oracle SQL, Second Edition also helps you minimize parsing overhead, read execution plans, test for correct results, understand performance management, and exert control over SQL execution in your database. You’ll learn when to create indexes, how to verify that they make a difference, how to use SQL Baselines and Profiles to optimize and stabilize SQL execution plans, and much more. You’ll also understand how SQL is optimized for working in sets, and that the key to getting accurate results lies in making sure that queries ask clear and precise questions.
Pro Oracle SQL, Second Edition helps you work at a truly professional level in the Oracle dialect of SQL. You’ll master the language, the tools to work effectively with the language, and the right way to think about a problem in SQL.
Endorsed by the OakTable Network, a group of Oracle technologists well-known for their rigorous and scientific approach to Oracle Database performance Comprehensive—goes beyond the language with a focus on what you need to know to write successful queries and data manipulation statements. Performance focused—teaches you how to measure the performance of your SQL statements and not just the syntax.
Beginning T-SQL is a performance-oriented introduction to the T-SQL language underlying the Microsoft SQL Server database engine. T-SQL is essential in writing SQL statements to get data into and out of a database. T-SQL is the foundation for business logic embedded in the database in the form of stored procedures and functions. Beginning T-SQL starts you on the path to mastering T-SQL, with an emphasis on best-practices and sound coding techniques leading to excellent performance. This new edition is updated to cover the essential features of T-SQL found in SQL Server 2014, 2012, and 2008.
Beginning T-SQL begins with an introduction to databases, normalization, and to SQL Server Management Studio. Attention is given to Azure SQL Database and how to connect to remote databases in the cloud. Each subsequent chapter teaches an aspect of T-SQL, building on the skills learned in previous chapters. Exercises in most chapters provide an opportunity for the hands-on practice that leads to true learning and distinguishes the competent professional. Important techniques such as windowing functions are covered to help write fast executing queries that solve real business problems.
A stand-out feature in this book is that most chapters end with a "Thinking About Performance" section. These sections cover aspects of query performance relative to the content just presented. They'll help you avoid beginner mistakes by knowing about and thinking about performance from Day 1.Imparts best practices for writing T-SQLHelps you avoid common errorsShows how to write scalable code for good performance
Businesses run on numbers, and good business intelligence systems make the critical numbers immediately and conveniently accessible. Business users want access to key performance indicators in the office, at the beach, and while riding the subway home after a day's work. Business Intelligence with SQL Server Reporting Services helps you meet these need for anywhere/anytime access by including chapters specifically showing how to deliver on modern devices such as smart phones and tablets. You'll learn to deliver the same information, with similar look-and-feel, across the entire range of devices used in business today.Key performance indicators give fast notification of business unit performancePolished dashboards deliver essential metrics and strategic comparisonsVisually arresting output on multiple devices focuses attention
New media thrives on cycles of obsolescence and renewal: from celebrations of cyber-everything to Y2K, from the dot-com bust to the next big things—mobile mobs, Web 3.0, cloud computing. In Programmed Visions, Wendy Hui Kyong Chun argues that these cycles result in part from the ways in which new media encapsulates a logic of programmability. New media proliferates “programmed visions,” which seek to shape and predict—even embody—a future based on past data. These programmed visions have also made computers, based on metaphor, metaphors for metaphor itself, for a general logic of substitutability.
Chun argues that the clarity offered by software as metaphor should make us pause, because software also engenders a profound sense of ignorance: who knows what lurks behind our smiling interfaces, behind the objects we click and manipulate? The combination of what can be seen and not seen, known (knowable) and not known—its separation of interface from algorithm and software from hardware—makes it a powerful metaphor for everything we believe is invisible yet generates visible, logical effects, from genetics to the invisible hand of the market, from ideology to culture.
The book starts with the basic concepts of tuning methodology, capacity planning, and architecture. Author Murali Vallath then dissects the various tiers of the testing implementation, including the operating system, the network, the application, the storage, the instance, the database, and the grid infrastructure. He also introduces tools for performance optimization and thoroughly covers each aspect of the tuning process, using many real-world examples, analyses, and solutions from the field that provide you with a solid, practical, and replicable approach to tuning a RAC environment. The book concludes with troubleshooting guidance and quick reference of all the scripts used in the book.
Expert Oracle RAC Performance Diagnostics and Tuning covers scenarios and details never discussed before in any other performance tuning books. If you have a RAC database, this book is a requirement. Get your copy today.Takes you through optimizing the various tiers of the RAC environment.Provides real life case studies, analysis and solutions from the field.Maps a methodical approach to testing, tuning and diagnosing the cluster
Shoshana Zuboff's interdisciplinary breadth and depth enable her to come to grips with the social, political, business, and technological meaning of the changes taking place in our time. We are at a critical juncture in the confrontation between the vast power of giant high-tech companies and government, the hidden economic logic of surveillance capitalism, and the propaganda of machine supremacy that threaten to shape and control human life. Will the brazen new methods of social engineering and behavior modification threaten individual autonomy and democratic rights and introduce extreme new forms of social inequality? Or will the promise of the digital age be one of individual empowerment and democratization?
The Age of Surveillance Capitalism is neither a hand-wringing narrative of danger and decline nor a digital fairy tale. Rather, it offers a deeply reasoned and evocative examination of the contests over the next chapter of capitalism that will decide the meaning of information civilization in the twenty-first century. The stark issue at hand is whether we will be the masters of information and machines or its slaves.
The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour—so, too, have we become gluttons for texts, instant messages, emails, RSS feeds, downloads, videos, status updates, and tweets.
We're all battling a storm of distractions, buffeted with notifications and tempted by tasty tidbits of information. And just as too much junk food can lead to obesity, too much junk information can lead to cluelessness. The Information Diet shows you how to thrive in this information glut—what to look for, what to avoid, and how to be selective. In the process, author Clay Johnson explains the role information has played throughout history, and why following his prescribed diet is essential for everyone who strives to be smart, productive, and sane.
In The Information Diet, you will:Discover why eminent scholars are worried about our state of attention and general intelligenceExamine how today’s media—Big Info—give us exactly what we want: content that confirms our beliefsLearn to take steps to develop data literacy, attention fitness, and a healthy sense of humorBecome engaged in the economics of information by learning how to reward good information providersJust like a normal, healthy food diet, The Information Diet is not about consuming less—it’s about finding a healthy balance that works for you
This comprehensive introduction to modeling business-information systems focuses on business processes. It describes and demonstrates the formal modeling of processes in terms of Petri nets, using a well-established theory for capturing and analyzing models with concurrency. The precise semantics of this formal method offers a distinct advantage for modeling processes over the industrial modeling languages found in other books on the subject. Moreover, the simplicity and expressiveness of the Petri nets concept make it an ideal language for explaining foundational concepts and constructing exercises. After an overview of business information systems, the book introduces the modeling of processes in terms of classical Petri nets. This is then extended with data, time, and hierarchy to model all aspects of a process. Finally, the book explores analysis of Petri net models to detect design flaws and errors in the design process. The text, accessible to a broad audience of professionals and students, keeps technicalities to a minimum and offers numerous examples to illustrate the concepts covered. Exercises at different levels of difficulty make the book ideal for independent study or classroom use.
Cyberspace is widely acknowledged as a fundamental fact of daily life in today's world. Until recently, its political impact was thought to be a matter of low politics—background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics—national security, core institutions, and critical decision processes. In this book, Nazli Choucri investigates the implications of this new cyberpolitical reality for international relations theory, policy, and practice.
The ubiquity, fluidity, and anonymity of cyberspace have already challenged such concepts as leverage and influence, national security and diplomacy, and borders and boundaries in the traditionally state-centric arena of international relations. Choucri grapples with fundamental questions of how we can take explicit account of cyberspace in the analysis of world politics and how we can integrate the traditional international system with its cyber venues.
After establishing the theoretical and empirical terrain, Choucri examines modes of cyber conflict and cyber cooperation in international relations; the potential for the gradual convergence of cyberspace and sustainability, in both substantive and policy terms; and the emergent synergy of cyberspace and international efforts toward sustainable development. Choucri's discussion is theoretically driven and empirically grounded, drawing on recent data and analyzing the dynamics of cyberpolitics at individual, state, international, and global levels.
The story begins with Leibniz in the 17th century and then focuses on Boole, Frege, Cantor, Hilbert, and Gödel, before turning to Turing. Turing’s analysis of algorithmic processes led to a single, all-purpose machine that could be programmed to carry out such processes—the computer. Davis describes how this incredible group, with lives as extraordinary as their accomplishments, grappled with logical reasoning and its mechanization. By investigating their achievements and failures, he shows how these pioneers paved the way for modern computing.
Bringing the material up to date, in this revised edition Davis discusses the success of the IBM Watson on Jeopardy, reorganizes the information on incompleteness, and adds information on Konrad Zuse. A distinguished prize-winning logician, Martin Davis has had a career of more than six decades devoted to the important interface between logic and computer science. His expertise, combined with his genuine love of the subject and excellent storytelling, make him the perfect person to tell this story.
Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, complex form development, and user interface customizations. You'll then deploy your solution to the web and integrate it with other external data sources. This book is full of handy tricks to help you get the most out of what Access has to offer, including its comprehensive set of features and tools for collecting, using, and acting on business data, whether your data is in Access or stored on another platform. You'll also see how to smoothly integrate your applications with SQL Server databases and other Office programs, such as Outlook.
Virtual Ascendance tells the story of a formerly fringe enterprise that, when few were paying attention, exploded into a multi-billion dollar industry affecting the very way we live. Griffiths paints a thorough and vivid picture of the video game industry, illuminating the various, and often bizarre, ways it’s changing how we work, play and live. He brings readers along on his own journey of discovery, from the back room of a small Irish pub where members of the second-largest industry enclave meet each month, to a university clinic where the Wii is being used to treat Parkinson’s sufferers — and everywhere in between.
Virtual Ascendance is more than just a story about video games, though. It’s the story of an awakening, of a realization that a childhood pastime has exploded into a thriving enterprise — one rooted in entertainment but whose tendrils reach into virtually all aspects of life and society.
Whether you are populating databases, retrieving data from the Web, or performing complex calculations on large data sets, SSIS gives you the tools to get the job done. And this book gives you the knowledge to take advantage of everything SSIS offers.Helps you design and develop robust, efficient, scalable ETL solutions Walks you through using the built-in, stock components Shows how to programmatically extend the power of SSIS to cover any possible scenario