Based on more than forty interviews with Jobs conducted over two years—as well as interviews with more than a hundred family members, friends, adversaries, competitors, and colleagues—Walter Isaacson has written a riveting story of the roller-coaster life and searingly intense personality of a creative entrepreneur whose passion for perfection and ferocious drive revolutionized six industries: personal computers, animated movies, music, phones, tablet computing, and digital publishing.
At a time when America is seeking ways to sustain its innovative edge, and when societies around the world are trying to build digital-age economies, Jobs stands as the ultimate icon of inventiveness and applied imagination. He knew that the best way to create value in the twenty-first century was to connect creativity with technology. He built a company where leaps of the imagination were combined with remarkable feats of engineering.
Although Jobs cooperated with this book, he asked for no control over what was written nor even the right to read it before it was published. He put nothing off-limits. He encouraged the people he knew to speak honestly. And Jobs speaks candidly, sometimes brutally so, about the people he worked with and competed against. His friends, foes, and colleagues provide an unvarnished view of the passions, perfectionism, obsessions, artistry, devilry, and compulsion for control that shaped his approach to business and the innovative products that resulted.
Driven by demons, Jobs could drive those around him to fury and despair. But his personality and products were interrelated, just as Apple’s hardware and software tended to be, as if part of an integrated system. His tale is instructive and cautionary, filled with lessons about innovation, character, leadership, and values.
The official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley
It is only a slight exaggeration to say that the British mathematician Alan Turing (1912-1954) saved the Allies from the Nazis, invented the computer and artificial intelligence, and anticipated gay liberation by decades--all before his suicide at age forty-one. This New York Times–bestselling biography of the founder of computer science, with a new preface by the author that addresses Turing's royal pardon in 2013, is the definitive account of an extraordinary mind and life.
Capturing both the inner and outer drama of Turing’s life, Andrew Hodges tells how Turing’s revolutionary idea of 1936--the concept of a universal machine--laid the foundation for the modern computer and how Turing brought the idea to practical realization in 1945 with his electronic design. The book also tells how this work was directly related to Turing’s leading role in breaking the German Enigma ciphers during World War II, a scientific triumph that was critical to Allied victory in the Atlantic. At the same time, this is the tragic account of a man who, despite his wartime service, was eventually arrested, stripped of his security clearance, and forced to undergo a humiliating treatment program--all for trying to live honestly in a society that defined homosexuality as a crime.
The inspiration for a major motion picture starring Benedict Cumberbatch and Keira Knightley, Alan Turing: The Enigma is a gripping story of mathematics, computers, cryptography, and homosexual persecution.
Eric Schmidt is one of Silicon Valley’s great leaders, having taken Google from a small startup to one of the world’s most influential companies. Jared Cohen is the director of Google Ideas and a former adviser to secretaries of state Condoleezza Rice and Hillary Clinton. With their combined knowledge and experiences, the authors are uniquely positioned to take on some of the toughest questions about our future: Who will be more powerful in the future, the citizen or the state? Will technology make terrorism easier or harder to carry out? What is the relationship between privacy and security, and how much will we have to give up to be part of the new digital age?
In this groundbreaking book, Schmidt and Cohen combine observation and insight to outline the promise and peril awaiting us in the coming decades. At once pragmatic and inspirational, this is a forward-thinking account of where our world is headed and what this means for people, states and businesses.
With the confidence and clarity of visionaries, Schmidt and Cohen illustrate just how much we have to look forward to—and beware of—as the greatest information and technology revolution in human history continues to evolve. On individual, community and state levels, across every geographical and socioeconomic spectrum, they reveal the dramatic developments—good and bad—that will transform both our everyday lives and our understanding of self and society, as technology advances and our virtual identities become more and more fundamentally real.
As Schmidt and Cohen’s nuanced vision of the near future unfolds, an urban professional takes his driverless car to work, attends meetings via hologram and dispenses housekeeping robots by voice; a Congolese fisherwoman uses her smart phone to monitor market demand and coordinate sales (saving on costly refrigeration and preventing overfishing); the potential arises for “virtual statehood” and “Internet asylum” to liberate political dissidents and oppressed minorities, but also for tech-savvy autocracies (and perhaps democracies) to exploit their citizens’ mobile devices for ever more ubiquitous surveillance. Along the way, we meet a cadre of international figures—including Julian Assange—who explain their own visions of our technology-saturated future.
Inspiring, provocative and absorbing, The New Digital Age is a brilliant analysis of how our hyper-connected world will soon look, from two of our most prescient and informed public thinkers.
Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
Computers have changed since 1981, when The Soul of a New Machine first examined the culture of the computer revolution. What has not changed is the feverish pace of the high-tech industry, the go-for-broke approach to business that has caused so many computer companies to win big (or go belly up), and the cult of pursuing mind-bending technological innovations.
The Soul of a New Machine is an essential chapter in the history of the machine that revolutionized the world in the twentieth century.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.
With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.
With a novelist's sensitivity, David Leavitt portrays Turing in all his humanity—his eccentricities, his brilliance, his fatal candor—and elegantly explains his work and its implications.
Forget Apple and IBM. For that matter forget Silicon Valley. The first
personal computer, a self-contained unit with its own programmable processor,
display, keyboard, internal memory, telephone interface, and mass storage of
data was born in San Antonio TX. US Patent number 224,415 was filed November
27, 1970 for a machine that is the direct lineal ancestor to the PC as we know
it today. The story begins in 1968, when two Texans, Phil Ray and Gus Roche,
founded a firm called Computer Terminal Corporation. As the name implies their
first product was a Datapoint 3300 computer terminal replacement for a
mechanical Teletype. However, they knew all the while that the 3300 was only a
way to get started, and it was cover for what their real intentions were - to
create a programmable mass-produced desktop computer. They brought in Jack
Frassanito, Vic Poor, Jonathan Schmidt, Harry Pyle and a team of designers,
engineers and programmers to create the Datapoint 2200. In an attempt to reduce
the size and power requirement of the computer it became apparent that the 2200
processor could be printed on a silicon chip. Datapoint approached Intel who
rejected the concept as a "dumb idea" but were willing to try for a
development contract. Intel belatedly came back with their chip but by then the
Datapoint 2200 was already in production. Intel added the chip to its catalog
designating it the 8008. A later upgrade, the 8080 formed the heart of the
Altair and IMSI in the mid-seventies. With further development it was used in
the first IBM PC-the PC revolution's chip dynasty. If you're using a PC, you're
using a modernized Datapoint 2000.
Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:
The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their preyHow social networking, cloud computing, and other popular trends help or hurt our online securityHow metrics, requirements gathering, design, and law can take security to a higher levelThe real, little-publicized history of PGP
This book includes contributions from:
Peiter "Mudge" ZatkoJim StickleyElizabeth NicholsChenxi WangEd BellisBen EdelmanPhil Zimmermann and Jon CallasKathy WangMark CurpheyJohn McManusJames RouthRandy V. SabettAnton ChuvakinGrant Geyer and Brian DunphyPeter WaynerMichael Wood and Fernando Francisco
All royalties will be donated to the Internet Engineering Task Force (IETF).
Write ups, specs and pictures of over 85 collectible consoles and variant models from 1972 to 2000. From the Magnavox Odyssey right through to the Sega Dreamcast.
Including the history of the evolution of electronic gaming and advice on how to collect classic consoles.
A comprehensive database of collectible consoles. Written by fellow collectors and enthusiasts.
Vikram Chandra has been a computer programmer for almost as long as he has been a novelist. In this extraordinary new book, his first work of nonfiction, he searches for the connections between the worlds of art and technology. Coders are obsessed with elegance and style, just as writers are, but do the words mean the same thing to both? Can we ascribe beauty to the craft of writing code?
Exploring such varied topics as logic gates and literary modernism, the machismo of tech geeks, the omnipresence of an "Indian Mafia" in Silicon Valley, and the writings of the eleventh-century Kashmiri thinker Abhinavagupta, Geek Sublime is both an idiosyncratic history of coding and a fascinating meditation on the writer's art. Part literary essay, part technology story, and part memoir, it is an engrossing, original, and heady book of sweeping ideas.
With hilarious, exasperated acuity, social critic Hal Niedzviecki dives into peep, starting his own video blog, joining every social network that will have him, monitoring the movements of his toddler, selling his secrets on Craigslist, hiring a private detective to investigate him, spying on his neighbors, trying out for reality TV shows, and stripping for the pleasure of a web audience he isn’t even sure exists. Part travelogue, part diary, part meditation and social history, The Peep Diaries explores a rapidly emerging digital phenomenon that is radically changing not just the entertainment landscape, but also the firmaments of our culture and society.
The Peep Diaries introduces the arrival of the age of peep culture and explores its implications for entertainment, society, sex, politics, and everyday life. Mixing first-rate reporting with sociological observations culled from the latest research, this book captures the shift from pop to peep and the way technology is turning gossip into documentary and Peeping Toms into entertainment journalists. Packed with stranger-than-fiction true-life characters and scenarios, The Peep Diaries reflects the aspirations and confusions of the growing number of people willing to trade the details of their private lives for catharsis, attention, and notoriety.
"Take a peek at The Peep Diaries, an erudite (but not too erudite) look at the culture that Facebook, Twitter, et al. have spawned." —Real Simple
"It’s a great read; it mixes frank interviews with people pushing the boundaries of voyeurism and exhibitionism, alongside a bracing critique of the social context that got us into peep culture and the forces that now exploit our participation in it.” —The Globe and Mail
"A snapshot of a world in profound transformation. Compelling and creepy." —Naomi Klein, author of The Shock Doctrine and No Logo
"If you've found yourself obsessively posting to Facebook, Twitter, and YouTube – and becoming a little uneasy about how it's changing your life – you should read this book. The Peep Diaries is a superb investigation into how technology is shifting the landscape of our private lives." —Clive Thompson, Wired magazine columnist
"A cogent and penetrating analysis. I certainly hope, as The Peep Diaries suggests, that the cruel spectacle we're witnessing on the tube most evenings actually holds some hope for a more loving future." —Douglas Rushkoff, author of Media Virus and Life, Inc.
Hal Niedzviecki is the founder of Broken Pencil magazine and has published numerous works of social commentary and fiction, including Hello I’m Special: How Individuality Became the New Conformity and Look Down, This Is Where It Must Have Happened, which is also published by City Lights Publishers.
Lessig weaves the history of technology and its relevant laws to make a lucid and accessible case to protect the sanctity of intellectual freedom. He shows how the door to a future of ideas is being shut just as technology is creating extraordinary possibilities that have implications for all of us. Vital, eloquent, judicious and forthright, The Future of Ideas is a call to arms that we can ill afford to ignore.
From the Trade Paperback edition.
Dungeons & Dragons, a fantasy role-playing game. Through the next 40
years, computer game developers used these fantasy worlds as archetypes
for the budding virtual game worlds These games would become as varied
as books in a library, but the essence of each was built upon community.
People gathered and played...together. Dungeons & Dreamers: A story
of how computer games created a global community follows the designers,
developers, and players who built the virtual games and communities
that define today's digital entertainment landscape and explores the
nature of what it means to live and thrive in virtual communities.
Using five kilobytes of memory (the amount allocated to displaying the cursor on a computer desktop of today), they achieved unprecedented success in both weather prediction and nuclear weapons design, while tackling, in their spare time, problems ranging from the evolution of viruses to the evolution of stars.
Dyson’s account, both historic and prophetic, sheds important new light on how the digital universe exploded in the aftermath of World War II. The proliferation of both codes and machines was paralleled by two historic developments: the decoding of self-replicating sequences in biology and the invention of the hydrogen bomb. It’s no coincidence that the most destructive and the most constructive of human inventions appeared at exactly the same time.
How did code take over the world? In retracing how Alan Turing’s one-dimensional model became John von Neumann’s two-dimensional implementation, Turing’s Cathedral offers a series of provocative suggestions as to where the digital universe, now fully three-dimensional, may be heading next.
Digital Media: Technological and Social Challenges of the Interactive World is organized in four parts, each representing a different perspective on digital media: preservation, humanities, organizational, and historical. The section on preservation considers the problems of archiving digital media for long-term preservation; the humanities section offers a human-centered view of digital media, focusing on the interaction between technological changes and cultural practices; the section dealing with organization goes beyond the study of digital artifacts in isolation to consider the context, collection, and arrangement of objects; and the historical section examines how our perspectives on digital media have changed over time, looking at how issues such as the digital divide and digital production have changed as technology has changed.
The wealth of varied perspectives in Digital Media provides new light on this topic, beyond the media studies viewpoint that is the most common way of engaging these topics. This collection will be a valuable addition for students and faculty in information studies, communication studies, rhetoric, new media, and more.
This third edition provides updated analysis on software and computer networking, including new material on the programming profession, social networking, and mobile computing. It expands its focus on the IT industry with fresh discussion on the rise of Google and Facebook as well as how powerful applications are changing the way we work, consume, learn, and socialize. Computer is an insightful look at the pace of technological advancement and the seamless way computers are integrated into the modern world. Through comprehensive history and accessible writing, Computer is perfect for courses on computer history, technology history, and information and society, as well as a range of courses in the fields of computer science, communications, sociology, and management.
Each site in The Geek Atlas focuses on discoveries or inventions, and includes information about the people and the science behind them. Full of interesting photos and illustrations, the book is organized geographically by country (by state within the U.S.), complete with latitudes and longitudes for GPS devices.
Bletchley Park in the UK, where the Enigma code was brokenThe Alan Turing Memorial in Manchester, EnglandThe Horn Antenna in New Jersey, where the Big Bang theory was confirmedThe National Cryptologic Museum in Fort Meade, MarylandThe Trinity Test Site in New Mexico, where the first atomic bomb was explodedThe Joint Genome Institute in Walnut Creek, California
You won't find tedious, third-rate museums, or a tacky plaque stuck to a wall stating that "Professor X slept here." Every site in this book has real scientific, mathematical, or technological interest -- places guaranteed to make every geek's heart pound a little faster. Plan a trip with The Geek Atlas and make your own discoveries along the way.
See Additional Notes for instructions to download the highly interactive PC software. Used in thousands of schools and colleges worldwide the software is designed to work as an interactive textbook on your PC screen.
Comprising hundreds of menu selected colourful topics where the graphic images (from your eBook) are brought to life for every value change along with many additional learning software features.
A combined eBook and educational software package at a tiny fraction of the previously published price.
Chapters (958 topics): - Introduction, Electronics, Basic Electronics, DC Current Flow, Resistor Value Test, Simple DC Circuits, Types of Switching, Variable Voltages, Ohm's Law, DC Voltage, DC Current, Series/Parallel Resistors, AC Measurements, AC Voltage and Current, AC Theory, RCL Series Circuits, RCL Parallel Circuits, Capacitance, Capacitors, Inductance, Inductors, Impedance, Radio and Communication, Tuned Circuits, Attenuators, Passive Filters, Active Filters, Oscillators, Circuit Theorems, Complex Numbers, DC Power, AC Power, Silicon Controlled Rectifier, Power Supplies, Voltage Regulation, Magnetism, Electric Machines, Transformers, Three Phase Systems, Energy Transfer and Cost, Atomic Structures, Diode Theory, Diode Applications, Transistor Theory, Bipolar Transistor, Transistor Configurations, Active Transistor Circuits, Field Effect Transistors, Basic Operational Amplifier, Op-Amp Theory, Op-Amp Applications, Sum and Difference Amp, Analogue Multi-meter, Measurement, Component Testing, PIC Micro, PICa(R) Microcontroller, PICa(R) Architecture, PICa(R) Analogue to Digital, PICa(R) Byte Orientated Instructions, PICa(R) Bit Orientated Instructions, PICa(R) Literal and Control Instructions, Mechanics, Area, Surface Area and Symmetry, Volume, Compound Measures, Geometry, Motion, Machines, Optics, Computing, Hardware Devices, Data Structures, Data Files, Computer Systems, Data Handling, System Development, Computer Programming, Data Analysis, Binary Numbers, Binary Arithmetic, Digital, Logic Gates 1., Logic Gates 2., Logic Families, Flip Flops, Combinational Logic, Counters, Counting, Shift Registers, 555 Timer, Logic Interfacing, Boolean and DeMorgan's, Microprocessor, Micro-Computer, Data/Address Bus, Memory Addressing, Arithmetic and Logic Unit, Clock and Reset, Instructions and Control, Memory Cells, Microprocessor Memory, Addressing Modes, Instructions Set 1., Instructions Set 2., Instructions Set 3., Mathematics, Number Systems, Number Conversion, Number Types, Compound Measures, Roots, Angles and Parallels, Triangle Ratios, Triangle Angles, Percentages, Ratios, Fractions, Vectors, Circle Angles, Laws, Algebra 0., Algebra 1., Algebra 2., Mathematical Rules, Powers and Indices, Simplifying, Equations, Graphing, Slope and Translation, Curves and Angle Conversion, Personal Finance, Additional Notes.
All our lives are constrained by limited space and time, limits that give rise to a particular set of problems. What should we do, or leave undone, in a day or a lifetime? How much messiness should we accept? What balance of new activities and familiar favorites is the most fulfilling? These may seem like uniquely human quandaries, but they are not: computers, too, face the same constraints, so computer scientists have been grappling with their version of such problems for decades. And the solutions they've found have much to teach us.
In a dazzlingly interdisciplinary work, acclaimed author Brian Christian (who holds degrees in computer science, philosophy, and poetry, and works at the intersection of all three) and Tom Griffiths (a UC Berkeley professor of cognitive science and psychology) show how the simple, precise algorithms used by computers can also untangle very human questions. They explain how to have better hunches and when to leave things to chance, how to deal with overwhelming choices and how best to connect with others. From finding a spouse to finding a parking spot, from organizing one's inbox to understanding the workings of human memory, Algorithms to Live By transforms the wisdom of computer science into strategies for human living.
Electronic Value Exchange recaptures the origins of one of these systems in particular: the electronic payment network known as VISA. The book examines in detail the transformation of the VISA system from a collection of non-integrated, localized, paper-based bank credit card programs into the cooperative, global, electronic value exchange network it is today. Following an introductory chapter that sets the context, chapters adhere roughly to chronological order, building the story in a logical fashion.
Topics and features:Provides a history of the VISA system from the mid-1960s to the early 1980s, charting the design, creation and adoption of the system during its foundation years and most prolific period of innovationPresents a historical narrative based on research gathered from personal documents and interviews with key actors who designed, built, and participated in the VISA payment systemInvestigates, for the first time, both the technological and social infrastructures necessary for the VISA system to operateSupplies a detailed case study, highlighting the mutual shaping of technology and social relations, and the influence that earlier information processing practices have on the way firms adopt computers and telecommunicationsExamines how “gateways” in transactional networks can reinforce or undermine established social boundaries, and reviews the establishment of trust in new payment devices
This insightful work will be of interest to researchers from a range of disciplines, from historians of technology, business and finance, to economists and sociologists, as well as the general reader. The use of academic jargon is kept to a minimum, and brief explanations are provided of useful concepts from science and technology studies for the benefit of those without a background in this field.
There are companies that create waves and those that ride or are drowned by them. As only he can, bestselling author Ken Auletta takes readers for a ride on the Google wave, telling the story of how it formed and crashed into traditional media businesses?from newspapers to books, to television, to movies, to telephones, to advertising, to Microsoft. With unprecedented access to Google?s founders and executives, as well as to those in media who are struggling to keep their heads above water, Auletta reveals how the industry is being disrupted and redefined.
Using Google as a stand-in for the digital revolution, Auletta takes readers inside Google?s closed-door meetings and paints portraits of Google?s notoriously private founders, Larry Page and Sergey Brin, as well as those who work with?and against?them. In his narrative, Auletta provides the fullest account ever told of Google?s rise, shares the ?secret sauce? of Google?s success, and shows why the worlds of ?new? and ?old? media often communicate as if residents of different planets.
Google engineers start from an assumption that the old ways of doing things can be improved and made more efficient, an approach that has yielded remarkable results? Google will generate about $20 billion in advertising revenues this year, or more than the combined prime-time ad revenues of CBS, NBC, ABC, and FOX. And with its ownership of YouTube and its mobile phone and other initiatives, Google CEO Eric Schmidt tells Auletta his company is poised to become the world?s first $100 billion media company. Yet there are many obstacles that threaten Google?s future, and opposition from media companies and government regulators may be the least of these. Google faces internal threats, from its burgeoning size to losing focus to hubris. In coming years, Google?s faith in mathematical formulas and in slide rule logic will be tested, just as it has been on Wall Street.
Distilling the knowledge accrued from a career of covering the media, Auletta will offer insights into what we know, and don?t know, about what the future holds for the imperiled industry.
Beyond Deep Blue: Chess in the Stratosphere tells the continuing story of the chess engine and its steady improvement from its victory over Garry Kasparov to ever-greater heights. The book provides analysis of the games alongside a detailed examination of the remarkable technological progress made by the engines – asking the questions which one is best, how good is it, and how much better can it get.Presents a total of 118 games, played by 17 different chess engines, collected together for the first time in a single referenceDetails the processor speeds, memory sizes, and the number of processors used by each chess engineReviews Deep Blue’s matches with Garry Kasparov in 1996 and 1997Includes games from 10 World Computer Chess Championships, and the three most recent major computer chess tournaments of the Internet Chess ClubCovers the man-machine matches between Fritz and Kramnik in 2002 and 2006, and between Kasparov and Deep Junior in 2003Describes three historical matches between leading engines: Hydra versus Shredder, Junior versus Fritz, and Zappa versus Rybka
This fascinating account of the ongoing evolution of computer chess will appeal to both the general reader and to specialists in A.I. and computing. Chess players and aficionados will also appreciate this remarkable insight into the new superstars of the classic game.
This book covers practical approach on software tools for ethical hacking. Some of the software tools covered are SQL Injection, Password Cracking, port scanning, packet sniffing and etc. Performing ethical hacking requires certain steps and procedures to be followed properly. A good ethical hacker will find information, identify weakness and finally perform some attacks on the target machine. Then the most crucial part would be to produce a good security audit report for the clients to understand their computer network conditions.
This book also explains and demonstrates step by step most of the software security tools for any beginners in the computer security field. Some of the software tools have been selected and utilized in computer security trainings and workshops.
These essays explore open source's impact on the software industry and reveal how open source concepts are infiltrating other areas of commerce and society. The essays appeal to a broad audience: the software developer will find thoughtful reflections on practices and methodology from leading open source developers like Jeremy Allison and Ben Laurie, while the business executive will find analyses of business strategies from the likes of Sleepycat co-founder and CEO Michael Olson and Open Source Business Conference founder Matt Asay.
From China, Europe, India, and Brazil we get essays that describe the developing world's efforts to join the technology forefront and use open source to take control of its high tech destiny. For anyone with a strong interest in technology trends, these essays are a must-read.
The enduring significance of open source goes well beyond high technology, however. At the heart of the new paradigm is network-enabled distributed collaboration: the growing impact of this model on all forms of online collaboration is fundamentally challenging our modern notion of community.
What does the future hold? Veteran open source commentators Tim O'Reilly and Doc Searls offer their perspectives, as do leading open source scholars Steven Weber and Sonali Shah. Andrew Hessel traces the migration of open source ideas from computer technology to biotechnology, and Wikipedia co-founder Larry Sanger and Slashdot co-founder Jeff Bates provide frontline views of functioning, flourishing online collaborative communities.
The power of collaboration, enabled by the internet and open source software, is changing the world in ways we can only begin to imagine.Open Sources 2.0 further develops the evolutionary picture that emerged in the original Open Sources and expounds on the transformative open source philosophy.
"This is a wonderful collection of thoughts and examples bygreat minds from the free software movement, and is a must have foranyone who follows free software development and project histories."
--Robin Monks, Free Software Magazine
The list of contributors includeAlolita SharmaAndrew HesselBen LaurieBoon-Lock YeoBruno SouzaChris DiBonaDanese CooperDoc SearlsEugene KimGregorio RoblesIan MurdockJeff BatesJeremy AllisonJesus M. Gonzalez-BarahonaKim PoleseLarry SangerLouisa LiuMark StoneMark StoneMatthew N. AsayMichael OlsonMitchell BakerPamela JonesRobert AdkinsRuss NelsonSonali K. ShahStephen R. WalliSteven WeberSunil SaxenaTim O'ReillyWendy Seltzer
Ideal for enthusiasts, from students in robotics clubs to professional robotics scientists and engineers, each recipe describes a complete solution using ROS open source libraries and tools. You’ll learn how to complete tasks described in the recipes, as well as how to configure and recombine components for other tasks. If you’re familiar with Python, you’re ready to go.Learn fundamentals, including key ROS concepts, tools, and patternsProgram robots that perform an increasingly complex set of behaviors, using the powerful packages in ROSSee how to easily add perception and navigation abilities to your robotsIntegrate your own sensors, actuators, software libraries, and even a whole robot into the ROS ecosystemLearn tips and tricks for using ROS tools and community resources, debugging robot behavior, and using C++ in ROS
This major new edition features many topics not covered in the original, including graphical models, random forests, ensemble methods, least angle regression & path algorithms for the lasso, non-negative matrix factorization, and spectral clustering. There is also a chapter on methods for ``wide'' data (p bigger than n), including multiple testing and false discovery rates.
Trevor Hastie, Robert Tibshirani, and Jerome Friedman are professors of statistics at Stanford University. They are prominent researchers in this area: Hastie and Tibshirani developed generalized additive models and wrote a popular book of that title. Hastie co-developed much of the statistical modeling software and environment in R/S-PLUS and invented principal curves and surfaces. Tibshirani proposed the lasso and is co-author of the very successful An Introduction to the Bootstrap. Friedman is the co-inventor of many data-mining tools including CART, MARS, projection pursuit and gradient boosting.
Techniques for representing data are presented within the context of assessing costs and benefits, promoting an understanding of the principles of algorithm analysis and the effects of a chosen physical medium. The text also explores tradeoff issues, familiarizes readers with the most commonly used data structures and their algorithms, and discusses matching appropriate data structures to applications. The author offers explicit coverage of design patterns encountered in the course of programming the book's basic data structures and algorithms. Numerous examples appear throughout the text.
You will learn how to use React completely, and learn best practices for creating interfaces in a composable way. You will also cover additional tools and libraries in the React ecosystem (such as React Router and Flux architecture). Each topic is covered clearly and concisely and is packed with the details you need to learn to be truly effective. The most important features are given no-nonsense, in-depth treatment, and every chapter details common problems and how to avoid them.
Computers in Swedish Society reviews this shift in the historiography of computing from inventors and innovations to a user-perspective, and examines how the relevant sources can be created, collected, preserved, and disseminated. The text describes and evaluates a collaborative project in Sweden that documented the stories of around 700 people, and obtained extensive donations of archival records and artifacts. The book also provides a critical discussion on the interpretation of oral evidence, presenting three case studies on how this evidence can inform us about the interaction of computing with large-scale transformations in economies, cultures, and societies.
Topics and features: describes a historiography aimed at addressing the question of how computing shaped and transformed Swedish society between 1950 and 1980; presents a user-centered perspective on the history of computing, after explaining the benefits of such an approach; examines the documentation of users, describing novel and innovative documentation methods such as witness seminars and Internet-based collections of memories; discusses the pros and cons of collaborative projects between academia and industry; provides case studies on the interpretation of oral evidence, dealing with social networks and flows of knowledge, users and uses of technology, and the materiality and geography of computing.
The methods and documentation of users described in this unique text/reference will not only be of great interest to historians of computing, technology, science and medicine, but also to researchers in science and technology studies, in library and information studies, and in ethnography, ethnology and folkloristic studies.
It's hard to believe that one man revolutionized computers in the 1970s and '80s (with the Apple II and the Mac), animated movies in the 1990s (with Pixar), and digital music in the 2000s (with the iPod and iTunes). No wonder some people worship Steve Jobs like a god. On the other hand, stories of his epic tantrums and general bad behavior are legendary.
Inside Steve's Brain cuts through the cult of personality that surrounds Jobs to unearth the secrets to his unbelievable results. So what's really inside Steve's brain? According to Leander Kahney, who has covered Jobs since the early 1990s, it's a fascinating bundle of contradictions.
This expanded edition includes a new chapter on Jobs's very public health crisis and the debate about Apple's future.
Based on the bestselling first and second editions, Beginning Ruby, Third Edition is a leading guide to learn Ruby from the ground up. The new edition of this book provides the same excellent introduction to Ruby as the previous editions plus updates for the newest version of Ruby 2.3. This book can also be used as a textbook or companion to a textbook on beginning Ruby programming.
The light and agile Ruby programming language remains a very popular open source scripting option for developers building today's web and even some enterprise applications. And, now, Ruby also has applications using the Raspberry Pi, popular among hobbyists and makers. Many former Java developers still use Ruby on Rails today, the most popular framework for building Ruby applications.
What You'll LearnDiscover the fundamentals of Ruby and its object-oriented building blocksUse the Ruby libraries, gems, and documentationWork with files and databasesWrite and deploy Ruby applicationsHarness the various Ruby web frameworks and how to use themDo network programming with Ruby Who This Book Is For
Beginning programmers, programmers new to Ruby, and web developers interested in learning and knowing the foundations of the Ruby programming language.
Chances are you already use Excel to perform some fairly routine calculations. Now the Excel Scientific and Engineering Cookbook shows you how to leverage Excel to perform more complex calculations, too, calculations that once fell in the domain of specialized tools. It does so by putting a smorgasbord of data analysis techniques right at your fingertips. The book shows how to perform these useful tasks and others:Use Excel and VBA in generalImport data from a variety of sourcesAnalyze dataPerform calculationsVisualize the results for interpretation and presentationUse Excel to solve specific science and engineering problems
Wherever possible, the Excel Scientific and Engineering Cookbook draws on real-world examples from a range of scientific disciplines such as biology, chemistry, and physics. This way, you'll be better prepared to solve the problems you face in your everyday scientific or engineering tasks.
High on practicality and low on theory, this quick, look-up reference provides instant solutions, or "recipes," to problems both basic and advanced. And like other books in O'Reilly's popular Cookbook format, each recipe also includes a discussion on how and why it works. As a result, you can take comfort in knowing that complete, practical answers are a mere page-flip away.
Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Ruby Under a Microscope gives you a hands-on look at Ruby's core, using extensive diagrams and thorough explanations to show you how Ruby is implemented (no C skills required). Author Pat Shaughnessy takes a scientific approach, laying out a series of experiments with Ruby code to take you behind the scenes of how programming languages work. You'll even find information on JRuby and Rubinius (two alternative implementations of Ruby), as well as in-depth explorations of Ruby's garbage collection algorithm.
Ruby Under a Microscope will teach you:
* How a few computer science concepts underpin Ruby's complex implementation
* How Ruby executes your code using a virtual machine
* How classes and modules are the same inside Ruby
* How Ruby employs algorithms originally developed for Lisp
* How Ruby uses grammar rules to parse and understand your code
* How your Ruby code is translated into a different language by a compiler
No programming language needs to be a black box. Whether you're already intrigued by language implementation or just want to dig deeper into Ruby, you'll find Ruby Under a Microscope a fascinating way to become a better programmer.
Covers Ruby 2.x, 1.9 and 1.8
The Silicon Jungle is a cautionary fictional tale of data mining’s promise and peril. Baluja raises ethical questions about contemporary technological innovations, and how minute details can be routinely pieced together into rich profiles that reveal our habits, goals, and secret desires—all ready to be exploited.