Best of
Internet
2007
Web Analytics: An Hour a Day
Avinash Kaushik - 2007
Web analytics expert Avinash Kaushik, in his thought-provoking style, debunks leading myths and leads you on a path to gaining actionable insights from your analytics efforts. Discover how to move beyond clickstream analysis, why qualitative data should be your focus, and more insights and techniques that will help you develop a customer-centric mindset without sacrificing your company's bottom line. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Plug Your Book: Online Book Marketing for Authors, Book Publicity Through Social Networking
Steve Weber - 2007
I bought this book just to make sure I wasn't missing anything, but it blew me away."-- Scott Sigler, # 1 bestselling author"An amazingly rich collection of cutting-edge promotional tactics and strategies. Makes most other books about online publicity look sickly."-- Aaron Shepard, author: Aiming at Amazon"...The one book every author needs to read. I don't care if you're writing a computer book, a science fiction novel or the next great self-help guide, you need to get copy of Steve Weber's Plug Your Book!"- Joe Wikert, executive publisher, John Wiley & Sons "Practical, pragmatic, low-cost ideas for promoting the heck out of your own book, whether it's fiction, nonfiction, technical, business or anything else."-- Dave Taylor, author: 'Growing Your Business with Google'"I've worked with most of America's largest book publishers, helping many of them build online marketing departments. I've worked for authors too. Plug Your Book is the new training manual."-- Steve O'Keefe, author: 'Publicity on the Internet'"...Plug Your Book reveals the most effective and least expensive tools to promote your titles and to increase your exposure. It's the best book on online marketing I have ever read, and I read quite a few in the course of my consulting practice with small presses."-- Marion Gropen, president, Gropen AssociatesHere's what's inside the book:... Taking control of your book sales; Electric word of mouth; Amazon's `long tail;' Personalized bookstores; Book recommendation effectiveness... Amazon Bestseller Campaigns; How Bestseller Campaigns work; Haywired recommendations... Amateur book reviews; Credibility through peers; Amazon Top Reviewers; Negative reviews; Posting trade reviews on Amazon; Fee-based book reviews... Building your author Web site; A survey of author Web sites; Your online press kit; Multimedia for books; Podcasting for publicity; When to launch your site... Blogging for authors; Connecting with readers; Blog comments: pros and cons; Blogging categories; Over the long haul; Blog-to-e-mail service... Social networking; MySpace: Not just for kids; Facebook; Create your own group; Other places on MySpace; More social-networking sites... Tag - You're it!; Personal book tagging; Amazon tags; Amazon Media Library; LibraryThing; Tag-based marketing... Advanced Amazon tools; Buy X, Get Y; Free paired placement; Single New Product e-mails; Amazon Connect; Listmania; So You'd Like to . . .
Sex.com: One Domain, Two Men, Twelve Years and the Brutal Battle for the Jewel in the Internet's Crown
Kieren McCarthy - 2007
But the fact that it didn’t physically exist didn’t mean that it couldn’t be stolen. With an ingenious scam—the full details of which have never been revealed until now—lifelong con man Stephen Cohen was able to snatch the domain name and walk into a life of untold wealth and luxury. But Cohen underestimated the determination of Gary Kremen—sex.com’s original owner—to get his property back. The efforts took ten years and millions of dollars, but Kremen eventually saw Cohen finally pay for his crimes. This is the story of the extraordinary battle between two extraordinary men: a Stanford scholar with uncanny foresight, and an uneducated, genius con man with an unnatural gift for persuasion. The fight pushed each man to the edge, rewrote the laws, and shaped the history and development of the internet as we know it.
Digitizing Race: Visual Cultures of the Internet
Lisa Nakamura - 2007
At the same time many scholars lauded the widespread use of text-driven interfaces as a solution to the problem of racial intolerance. Today’s online world is witnessing text-driven interfaces such as e-mail and instant messaging giving way to far more visually intensive and commercially driven media forms that not only reveal but showcase people’s racial, ethnic, and gender identity.Lisa Nakamura, a leading scholar in the examination of race in digital media, uses case studies of popular yet rarely examined uses of the Internet such as pregnancy Web sites, instant messaging, and online petitions and quizzes to look at the emergence of race-, ethnic-, and gender-identified visual cultures.While popular media such as Hollywood cinema continue to depict nonwhite nonmales as passive audiences or consumers of digital media rather than as producers, Nakamura argues the contrary—with examples ranging from Jennifer Lopez music videos; films including the Matrix trilogy, Gattaca, and Minority Report; and online joke sites—that users of color and women use the Internet to vigorously articulate their own types of virtual community, avatar bodies, and racial politics.Lisa Nakamura is associate professor of speech communication and Asian American studies at the University of Illinois, Urbana-Champaign. She is the author of Cybertypes: Race, Ethnicity, and Identity on the Internet and coeditor, with Beth Kolko and Gilbert Rodman, of Race in Cyberspace.
iSpy: Surveillance and Power in the Interactive Era
Mark Andrejevic - 2007
From Amazon to iTunes, cell phones to GPS devices, Google to TiVo-all of these products and services give us an expansive sense of choice, access, and participation. But, in an era now marked by large-scale NSA operations that secretly monitor our email exchanges and internet surfing, Mark Andrejevic shows how these new technologies are increasingly employed as modes of surveillance and control. Many contend that our proliferating interactive media empower individuals and democratize society. But, Andrejevic asks, at what cost? In iSpy, he reveals that these and other highly touted benefits are accompanied by hidden risks and potential threats that tend to be ignored by mainstream society. His book offers the first sustained critique of a concept that has been a talking point for twenty years, an up-to-the-minute survey of interactivity across multiple media platforms. It debunks the false promises of the digital revolution still touted by the popular media while seeking to rehabilitate, rather than simply write off, the potentially democratic uses of interactive media. Andrejevic opens up the world of digital rights management and the data trail each of us leaves-data about our locations, preferences, or life events that are already put to use in various economic, political, and social contexts. He notes that, while citizens are becoming increasingly transparent to private and public monitoring agencies, they themselves are unable to access the information gathered about them-or know whether it's even correct. (The watchmen, it seems, don't want to be watched.) He also considers the appropriation of consumer marketing for political campaigns in targeting voters, and also examines the implications of the Internet for the so-called War on Terror. In iSpy, Andrejevic poses real challenges for our digital future. Amazingly detailed, compellingly readable, it warns that we need to temper our enthusiasm for these technologies with a better understanding of the threats they pose-to be able to distinguish between interactivity as centralized control and as collaborative participation.
Patterns in Network Architecture: A Return to Fundamentals (Paperback): A Return to Fundamentals
John Day - 2007
Piercing the fog of history, he bridges the gap between our experience from the original ARPANET and today's Internet to a new perspective on networking. Along the way, he shows how socioeconomic forces derailed progress and led to the current crisis. Beginning with the seven fundamental, and still unanswered, questions identified during the ARPANET's development, Patterns in Network Architecture returns to bedrock and traces our experience both good and bad. Along the way, he uncovers overlooked patterns in protocols that simplify design and implementation and resolves the classic conflict between connection and connectionless while retaining the best of both. He finds deep new insights into the core challenges of naming and addressing, along with results from upper-layer architecture. All of this in Day's deft hands comes together in a tour de force of elegance and simplicity with the annoying turn of events that the answer has been staring us in the face: Operating systems tell us even more about networking than we thought. The result is, in essence, the first "unified theory of networking," and leads to a simpler, more powerful--and above all--more scalable network infrastructure. The book then lays the groundwork for how to exploit the result in the design, development, and management as we move beyond the limitations of the Internet. Using this new model, Day shows how many complex mechanisms in the Internet today (multihoming, mobility, and multicast) are, with this collapse in complexity, now simply a consequence of the structure. The problems of router table growth of such concern today disappear. The inescapable conclusion is that the Internet is an unfinished demo, more in the tradition of DOS than Unix, that has been living on Moore's Law and 30 years of band-aids. It is long past time to get networking back on track. - Patterns in network protocols that synthesize "contradictory" approaches and simplify design and implementation - "Deriving" that networking is interprocess communication (IPC) yielding - A distributed IPC model that repeats with different scope and range of operation - Making network addresses topological makes routing purely a local matter - That in fact, private addresses are the norm--not the exception--with the consequence that the global public addresses required today are unnecessary - That mobility is dynamic multihoming and unicast is a subset of multicast, but multicast devolves into unicast and facilitates mobility - That the Internet today is more like DOS, but what we need should be more like Unix - For networking researchers, architects, designers, engineers Provocative, elegant, and profound, Patterns in Network Architecture transforms the way you envision, architect, and implement networks. Preface: The Seven Unanswered Questions xiii Chapter 1: Foundations for Network Architecture 1 Chapter 2: Protocol Elements 23 Chapter 3: Patterns in Protocols 57 Chapter 4: Stalking the Upper-Layer Architecture 97 Chapter 5: Naming and Addressing 141 Chapter 6: Divining Layers 185 Chapter 7: The Network IPC Model 235 Chapter 8: Making Addresses Topological 283 Chapter 9: Multihoming, Multicast, and Mobility 317 Chapter 10: Backing Out of a Blind Alley 351 Appendix A: Outline for Gedanken Experiment on Separating Mechanism and Policy 385 Bibliography 389 Index 399
Textpattern Solutions: Php-Based Content Management Made Easy
Kevin Potts - 2007
It is very popular among designers and developers alike, and has an active community of users. Sound good? Well, you're in luck--this book shows you how to use every aspect of Textpattern to a professional standard.Textpattern (and this book) appeals to two main groups of people:Firstly, the web designer who has mastered the fundamentals of XHTML and CSS and wants to create sites that have fresh and dynamically changing information, but is not familiar with server-side coding and databases. Never fear--Textpattern enables you to integrate your XHTML knowledge, inserting dynamic aspects into your already solid site design.Secondly, PHP developers who are looking for a content management system upon which to build additional functionality and want a hand with the design aspects of their site. Again, Textpattern fills in those holes.The book leaves no stone unturned. It starts by introducing you to Textpattern and guiding you through its very simple installation process. After the core features of the administrative interface are explored, the book dives into building sites with TXP, using CSS, articles, forms, pages, and more to create fully customized templates.Development follows next, looking at installing plugins and building your own custom plugins to further enhance your Textpattern-based site. The book concludes with several case studies to provide ideas and inspiration, including a weblog, an e-commerce site, and an online review directory.
Microsoft® Exchange Server 2007 Administrator's Pocket Consultant
William R. Stanek - 2007
Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the focused information you need to solve problems and get the job done—whether you’re at your desk or in the field!Get fast facts to:Configure and manage Exchange clientsSet up users, contacts, distribution lists, and address booksAdminister permissions, rules, policies, and security settings Manage databases and storage groups Optimize message processing, logging, and anti-spam filtering Administer at the command line using Exchange Management Shell Configure SMTP, connectors, links, and Edge subscriptions Manage mobile device features and client access Back up and restore systems
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
Henrik Walther - 2007
For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.- Understand Exchange 2007 PrerequisitesReview hardware and software requirements, Active Directory requirements, and more.- Manage Recipient FilteringCreate a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.- Manage Outlook AnywhereOutlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.- Manage Outlook Web Access 2007See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.- Use the Exchange 2007 Queue ViewerYou can now view information about queues and examine the messages held within them.- Master Powerful Out-of-the-Box Spam ProtectionThe Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.- Manage a Single-Copy Cluster-Based SetupSCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.- Recover Mailbox DatabasesUse the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.
Teach Yourself VISUALLY Laptops
Nancy C. Muir - 2007
Each task-based spread includes easy, visual directions for such operations as comparing different laptop models, using the keyboard and touchpad, connecting to a wireless network, adding PC cards and input devices, securing an Internet connection, setting up a low-battery alarm, and more. Helpful sidebars offer practical tips and tricks, while full-color screen shots demonstrate each task.