Best of
Technology

2017

12 Ways Your Phone Is Changing You


Tony Reinke - 2017
    Never offline, always within reach, we now wield in our hands a magic wand of technological power we have only begun to grasp. But it raises new enigmas, too. Never more connected, we seem to be growing more distant. Never more efficient, we have never been more distracted. Drawing from the insights of numerous thinkers, published studies, and his own research, writer Tony Reinke identifies twelve potent ways our smartphones have changed us—for good and bad. Reinke calls us to cultivate wise thinking and healthy habits in the digital age, encouraging us to maximize the many blessings, to avoid the various pitfalls, and to wisely wield the most powerful gadget of human connection ever unleashed.

Blood, Sweat, and Pixels: The Triumphant, Turbulent Stories Behind How Video Games Are Made


Jason Schreier - 2017
    In Blood, Sweat, and Pixels, Jason Schreier takes readers on a fascinating odyssey behind the scenes of video game development, where the creator may be a team of 600 overworked underdogs or a solitary geek genius. Exploring the artistic challenges, technical impossibilities, marketplace demands, and Donkey Kong-sized monkey wrenches thrown into the works by corporate, Blood, Sweat, and Pixels reveals how bringing any game to completion is more than Sisyphean—it's nothing short of miraculous.Taking some of the most popular, bestselling recent games, Schreier immerses readers in the hellfire of the development process, whether it's RPG studio Bioware's challenge to beat an impossible schedule and overcome countless technical nightmares to build Dragon Age: Inquisition; indie developer Eric Barone's single-handed efforts to grow country-life RPG Stardew Valley from one man's vision into a multi-million-dollar franchise; or Bungie spinning out from their corporate overlords at Microsoft to create Destiny, a brand new universe that they hoped would become as iconic as Star Wars and Lord of the Rings—even as it nearly ripped their studio apart. Documenting the round-the-clock crunches, buggy-eyed burnout, and last-minute saves, Blood, Sweat, and Pixels is a journey through development hell—and ultimately a tribute to the dedicated diehards and unsung heroes who scale mountains of obstacles in their quests to create the best games imaginable.

The Tech-Wise Family: Everyday Steps for Putting Technology in Its Proper Place


Andy Crouch - 2017
    It's about developing wisdom, character, and courage in the way we use digital media rather than accepting technology's promises of ease, instant gratification, and the world's knowledge at our fingertips. And it's definitely not just about the kids.Drawing on in-depth original research from the Barna Group, Andy Crouch shows readers that the choices we make about technology have consequences we may never have considered. He takes readers beyond the typical questions of what, where, and when and instead challenges them to answer provocative questions like, Who do we want to be as a family? and How does our use of a particular technology move us closer or farther away from that goal? Anyone who has felt their family relationships suffer or their time slip away amid technology's distractions will find in this book a path forward to reclaiming their real life in a world of devices.

Python Tricks: A Buffet of Awesome Python Features


Dan Bader - 2017
    Discover the “hidden gold” in Python’s standard library and start writing clean and Pythonic code today. Who Should Read This Book: If you’re wondering which lesser known parts in Python you should know about, you’ll get a roadmap with this book. Discover cool (yet practical!) Python tricks and blow your coworkers’ minds in your next code review. If you’ve got experience with legacy versions of Python, the book will get you up to speed with modern patterns and features introduced in Python 3 and backported to Python 2. If you’ve worked with other programming languages and you want to get up to speed with Python, you’ll pick up the idioms and practical tips you need to become a confident and effective Pythonista. If you want to make Python your own and learn how to write clean and Pythonic code, you’ll discover best practices and little-known tricks to round out your knowledge. What Python Developers Say About The Book: "I kept thinking that I wished I had access to a book like this when I started learning Python many years ago." — Mariatta Wijaya, Python Core Developer"This book makes you write better Python code!" — Bob Belderbos, Software Developer at Oracle"Far from being just a shallow collection of snippets, this book will leave the attentive reader with a deeper understanding of the inner workings of Python as well as an appreciation for its beauty." — Ben Felder, Pythonista"It's like having a seasoned tutor explaining, well, tricks!" — Daniel Meyer, Sr. Desktop Administrator at Tesla Inc.

Kubernetes in Action


Marko Luksa - 2017
    Each layer in their application is decoupled from other layers so they can scale, update, and maintain them independently.Kubernetes in Action teaches developers how to use Kubernetes to deploy self-healing scalable distributed applications. By the end, readers will be able to build and deploy applications in a proper way to take full advantage of the Kubernetes platform.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

Swipe to Unlock: The Primer on Technology and Business Strategy


Parth Detroja - 2017
    But have you ever wondered how Google makes billions of dollars while providing search, email, and maps for free? How do they figure out which ads perfectly capture your interests? And how do they search the entire internet so quickly, anyway?By answering real-world questions like this, Swipe to Unlock gives you a peek under the hood of the technology you use every day, decodes technologists' weirdest buzzwords, and shows you how technology is changing the society we live in for better or for worse. Unlock the answers you need to become a better-educated consumer, digital citizen, or technology professional.

Neuralink and the Brain’s Magical Future


Tim Urban - 2017
    

A Mind at Play: How Claude Shannon Invented the Information Age


Jimmy Soni - 2017
    He constructed a fleet of customized unicycles and a flamethrowing trumpet, outfoxed Vegas casinos, and built juggling robots. He also wrote the seminal text of the digital revolution, which has been called “the Magna Carta of the Information Age.” His discoveries would lead contemporaries to compare him to Albert Einstein and Isaac Newton. His work anticipated by decades the world we’d be living in today—and gave mathematicians and engineers the tools to bring that world to pass.In this elegantly written, exhaustively researched biography, Jimmy Soni and Rob Goodman reveal Claude Shannon’s full story for the first time. It’s the story of a small-town Michigan boy whose career stretched from the era of room-sized computers powered by gears and string to the age of Apple. It’s the story of the origins of our digital world in the tunnels of MIT and the “idea factory” of Bell Labs, in the “scientists’ war” with Nazi Germany, and in the work of Shannon’s collaborators and rivals, thinkers like Alan Turing, John von Neumann, Vannevar Bush, and Norbert Wiener.And it’s the story of Shannon’s life as an often reclusive, always playful genius. With access to Shannon’s family and friends, A Mind at Play brings this singular innovator and creative genius to life.

A Seat at the Table


Mark Schwartz - 2017
    But honest and open conversations are not taking place between management and Agile delivery teams.In A Seat at the Table, CIO Mark Schwartz explores the role of IT leadership as it is now and opens the door to reveal IT leadership as it should be - an integral part of the value creation engine. With wit and easy style, Schwartz reveals that the only way to become an Agile IT leader is to be courageous - to throw off the attitude and assumptions that have kept CIOs from taking their rightful seat at the table. CIOs, step on up, your seat at the table is waiting for you.Listening Length: 9 hours and 20 minutes

The Hardware Hacker: Adventures in Making and Breaking Hardware


Andrew Huang - 2017
    In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.

Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech


Sara Wachter-Boettcher - 2017
    But few of us realize just how many oversights, biases, and downright ethical nightmares are baked inside the tech products we use every day. It’s time we change that.In Technically Wrong, Sara Wachter-Boettcher demystifies the tech industry, leaving those of us on the other side of the screen better prepared to make informed choices about the services we use—and to demand more from the companies behind them.

The Kubernetes Book: Version 2.2 - January 2018


Nigel Poulton - 2017
    Kubernetes has emerged as the hottest and most important container orchestration platform in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!

Mastering Blockchain: Distributed Ledgers, Decentralization and Smart Contracts Explained


Imran Bashir - 2017
    Get to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsExplore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide

A Common-Sense Guide to Data Structures and Algorithms: Level Up Your Core Programming Skills


Jay Wengrow - 2017
    If you have received one of these copies, please contact the Pragmatic Bookshelf at support@pragprog.com, and we will replace it for you.Algorithms and data structures are much more than abstract concepts. Mastering them enables you to write code that runs faster and more efficiently, which is particularly important for today's web and mobile apps. This book takes a practical approach to data structures and algorithms, with techniques and real-world scenarios that you can use in your daily production code. Graphics and examples make these computer science concepts understandable and relevant. You can use these techniques with any language; examples in the book are in JavaScript, Python, and Ruby.Use Big O notation, the primary tool for evaluating algorithms, to measure and articulate the efficiency of your code, and modify your algorithm to make it faster. Find out how your choice of arrays, linked lists, and hash tables can dramatically affect the code you write. Use recursion to solve tricky problems and create algorithms that run exponentially faster than the alternatives. Dig into advanced data structures such as binary trees and graphs to help scale specialized applications such as social networks and mapping software. You'll even encounter a single keyword that can give your code a turbo boost. Jay Wengrow brings to this book the key teaching practices he developed as a web development bootcamp founder and educator.Use these techniques today to make your code faster and more scalable.

Who Can You Trust?: How Technology is Rewriting the Rules of Human Relationships


Rachel Botsman - 2017
    But this isn't the age of distrust--far from it. In this revolutionary book, world-renowned trust expert Rachel Botsman reveals that we are at the tipping point of one of the biggest social transformations in human history--with fundamental consequences for everyone. A new world order is emerging: we might have lost faith in institutions and leaders, but millions of people rent their home to total strangers, exchange digital currencies, or find themselves trusting a bot. This is the age of "distributed trust", a paradigm shift driven by innovative technologies that are rewriting the rules of an all-too-human relationship. If we are to benefit from this radical shift, we must understand the mechanics of how trust is built, managed, lost and repaired in the digital age. In the first book to explain this new world, Botsman provides a detailed map of this uncharted landscape--and explores what's next for humanity.

The Weapon Wizards: How Israel Became a High-Tech Military Superpower


Yaakov Katz - 2017
    The Weapon Wizards shows how this tiny nation of 8 million learned to adapt to the changes in warfare and in the defense industry and become the new prototype of a 21st century superpower, not in size, but rather in innovation and efficiency—and as a result of its long war experience. Sitting on the front lines of how wars are fought in the 21st century, Israel has developed in its arms trade new weapons and retrofitted old ones so they remain effective, relevant, and deadly on a constantly-changing battlefield. While other countries begin to prepare for these challenges, they are looking to Israel—and specifically its weapons—for guidance. Israel is, in effect, a laboratory for the rest of the world. How did Israel do it? And what are the military and geopolitical implications of these developments? These are some of the key questions Yaakov Katz and Amir Bohbot address. Drawing on a vast amount of research, and unparalleled access to the Israeli defense establishment, this book is a report directly from the front lines.

Fifty Inventions That Shaped the Modern Economy


Tim Harford - 2017
    Who thought up paper money? What was the secret element that made the Gutenberg printing press possible? And what is the connection between The Da Vinci Code and the collapse of Lehman Brothers? Fifty Inventions That Shaped the Modern Economy paints an epic picture of change in an intimate way by telling the stories of the tools, people, and ideas that had far-reaching consequences for all of us. From the plough to artificial intelligence, from Gillette’s disposable razor to IKEA’s Billy bookcase, bestselling author and Financial Times columnist Tim Harford recounts each invention’s own curious, surprising, and memorable story. Invention by invention, Harford reflects on how we got here and where we might go next. He lays bare often unexpected connections: how the bar code undermined family corner stores, and why the gramophone widened inequality. In the process, he introduces characters who developed some of these inventions, profited from them, and were ruined by them, as he traces the principles that helped explain their transformative effects. The result is a wise and witty book of history, economics, and biography.

WTF?: What's the Future and Why It's Up to Us


Tim O'Reilly - 2017
    In today’s economy, we have far too much dismay along with our amazement, and technology bears some of the blame. In this combination of memoir, business strategy guide, and call to action, Tim O'Reilly, Silicon Valley’s leading intellectual and the founder of O’Reilly Media, explores the upside and the potential downsides of today's WTF? technologies. What is the future when an increasing number of jobs can be performed by intelligent machines instead of people, or done only by people in partnership with those machines? What happens to our consumer based societies—to workers and to the companies that depend on their purchasing power? Is income inequality and unemployment an inevitable consequence of technological advancement, or are there paths to a better future? What will happen to business when technology-enabled networks and marketplaces are better at deploying talent than traditional companies? How should companies organize themselves to take advantage of these new tools? What’s the future of education when on-demand learning outperforms traditional institutions? How can individuals continue to adapt and retrain? Will the fundamental social safety nets of the developed world survive the transition, and if not, what will replace them? O'Reilly is "the man who can really can make a whole industry happen," according to Eric Schmidt, Executive Chairman of Alphabet (Google.) His genius over the past four decades has been to identify and to help shape our response to emerging technologies with world shaking potential—the World Wide Web, Open Source Software, Web 2.0, Open Government data, the Maker Movement, Big Data, and now AI. O’Reilly shares the techniques he's used at O’Reilly Media  to make sense of and predict past innovation waves and applies those same techniques to provide a framework for thinking about how today’s world-spanning platforms and networks, on-demand services, and artificial intelligence are changing the nature of business, education, government, financial markets, and the economy as a whole. He provides tools for understanding how all the parts of modern digital businesses work together to create marketplace advantage and customer value, and why ultimately, they cannot succeed unless their ecosystem succeeds along with them.The core of the book's call to action is an exhortation to businesses to DO MORE with technology rather than just using it to cut costs and enrich their shareholders. Robots are going to take our jobs, they say. O'Reilly replies, “Only if that’s what we ask them to do! Technology is the solution to human problems, and we won’t run out of work till we run out of problems." Entrepreneurs need to set their sights on how they can use big data, sensors, and AI to create amazing human experiences and the economy of the future, making us all richer in the same way the tools of the first industrial revolution did. Yes, technology can eliminate labor and make things cheaper, but at its best, we use it to do things that were previously unimaginable! What is our poverty of imagination? What are the entrepreneurial leaps that will allow us to use the technology of today to build a better future, not just a more efficient one? Whether technology brings the WTF? of wonder or the WTF? of dismay isn't inevitable. It's up to us!

Life 3.0: Being Human in the Age of Artificial Intelligence


Max Tegmark - 2017
    It doesn't shy away from the full range of viewpoints or from the most controversial issues--from superintelligence to meaning, consciousness and the ultimate physical limits on life in the cosmos.

Twitter and Tear Gas: The Power and Fragility of Networked Protest


Zeynep Tufekci - 2017
    An incisive observer, writer, and participant in today’s social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests—how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.   Tufekci speaks from direct experience, combining on-the-ground interviews with insightful analysis. She describes how the internet helped the Zapatista uprisings in Mexico, the necessity of remote Twitter users to organize medical supplies during Arab Spring, the refusal to use bullhorns in the Occupy Movement that started in New York, and the empowering effect of tear gas in Istanbul’s Gezi Park. These details from life inside social movements complete a moving investigation of authority, technology, and culture—and offer essential insights into the future of governance.From New York Times opinion columnist Zeynep Tufekci, an firsthand account and incisive analysis of the role of social media in modern protest“[Tufekci’s] personal experience in the squares and streets, melded with her scholarly insights on technology and communication platforms, makes [this] such an unusual and illuminating work.”—Carlos Lozada, Washington Post “Twitter and Tear Gas is packed with evidence on how social media has changed social movements, based on rigorous research and placed in historical context.”—Hannah Kuchler, Financial Times

Serious Cryptography: A Practical Introduction to Modern Encryption


Jean-Philippe Aumasson - 2017
    You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.

Drone Warrior: An Elite Soldier's Inside Account of the Hunt for America's Most Dangerous Enemies


Brett Velicovich - 2017
    Hayden, former Director of the Central Intelligence Agency and the National Security Agency A former special operations member takes us inside America’s covert drone war in this headline-making, never-before-told account for fans of Zero Dark Thirty and Lone Survivor, told by a Pulitzer Prize-winning Wall Street Journal writer and filled with eye-opening and sure to be controversial details.For nearly a decade Brett Velicovich was at the center of America’s new warfare: using unmanned aerial vehicles—drones—to take down the world’s deadliest terrorists across the globe. One of an elite handful in the entire military with the authority to select targets and issue death orders, he worked in concert with the full human and technological network of American intelligence—assets, analysts, spies, informants—and the military’s elite operatives, to stalk, capture, and eliminate high value targets in al-Qaeda and ISIS.In this remarkable book, co-written with journalist Christopher S. Stewart, Velicovich offers unprecedented perspective on the remarkably complex nature of drone operations and the rigorous and wrenching decisions behind them. In intimate gripping detail, he shares insider, action-packed stories of the most coordinated, advanced, and secret missions that neutralized terrorists, preserved the lives of US and international warriors across the globe, and saved countless innocents in the hottest conflict zones today.Drone Warrior also chronicles the US military’s evolution in the past decade and the technology driving it. Velicovich considers the future it foretells, and speaks candidly on the physical and psychological toll it exacts, including the impact on his own life. He reminds us that while these machines can kill, they can also be used productively to improve and preserve life, including protecting endangered species, work he is engaged in today.Joining warfare classics such as American Sniper, Lone Survivor, and No Easy Day, Drone Warrior is the definitive account of our nation’s capacity and capability for war in the modern age.

The Upstarts: How Uber, Airbnb, and the Killer Companies of the New Silicon Valley Are Changing the World


Brad Stone - 2017
    Uber and Airbnb are household names: redefining neighbourhoods, challenging the way governments regulate business and changing the way we travel.In the spirit of iconic Silicon Valley renegades like Steve Jobs and Bill Gates, a new generation of entrepreneurs is sparking yet another cultural upheaval through technology. They are among the Upstarts, idiosyncratic founders with limitless drive and an abundance of self-confidence. Young, hungry and brilliant, they are rewriting the traditional rules of business, changing our day-to-day lives and often sidestepping serious ethical and legal obstacles in the process.The Upstarts is the definitive account of a dawning age of tenacity, creativity, conflict and wealth. In Brad Stone’s highly anticipated and riveting account of the most radical companies of the new Silicon Valley, we find out how it all started, and how the world is wildly different than it was ten years ago.

Machine, Platform, Crowd: Harnessing Our Digital Future


Andrew McAfee - 2017
    Now they’ve written a guide to help readers make the most of our collective future. Machine | Platform | Crowd outlines the opportunities and challenges inherent in the science fiction technologies that have come to life in recent years, like self-driving cars and 3D printers, online platforms for renting outfits and scheduling workouts, or crowd-sourced medical research and financial instruments.

The Complete Software Developer's Career Guide: How to Learn Programming Languages Quickly, Ace Your Programming Interview, and Land Your Software Developer Dream Job


John Z. Sonmez - 2017
    As John invested in these skills his career took off, and he became a highly paid, highly sought-after developer and consultant. Today John helps more than 1.4 million programmers every year to increase their income by developing this unique blend of skills. "If you're a developer, green or a veteran, you owe it to yourself to read The Complete Software Developers Career Guide." - Jason Down, Platform Developer, Ontario, Canada What You Will Learn in This Book How to systematically find and fill the gaps in your technical knowledge so you can face any new challenge with confidence Should you take contract work - or hold out for a salaried position? Which will earn you more, what the tradeoffs are, and how your personality should sway your choice Should you learn JavaScript, C#, Python, C++? How to decide which programming language you should master first Ever notice how every job ever posted requires "3-5 years of experience," which you don't have? Simple solution for this frustrating chicken-and-egg problem that allows you to build legitimate job experience while you learn to code Is earning a computer science degree a necessity - or a total waste of time? How to get a college degree with maximum credibility and minimum debt Coding bootcampssome are great, some are complete scams. How to tell the difference so you don't find yourself cheated out of $10,000 Interviewer tells you, "Dress code is casual around here - the development team wears flipflops." What should you wear? How do you deal with a boss who's a micromanager. Plus how helping your manager with his goals can make you the MVP of your team The technical skills that every professional developer must have - but no one teaches you (most developers are missing some critical pieces, they don't teach this stuff in college, you're expected to just "know" this) An inside look at the recruiting industry. What that "friendly" recruiter really wants from you, how they get paid, and how to avoid getting pigeonholed into a job you'll hate Who Should Read This Book Entry-Level Developers This book will show you how to ensure you have the technical skills your future boss is looking for, create a resume that leaps off a hiring manager's desk, and escape the "no work experience" trap. Mid-Career Developers You'll see how to find and fill in gaps in your technical knowledge, position yourself as the one team member your boss can't live without, and turn those dreaded annual reviews into chance to make an iron-clad case for your salary bump. Senior Developers This book will show you how to become a specialist who can command above-market wages, how building a name for yourself can make opportunities come to you, and how to decide whether consulting or entrepreneurship are paths you should pursue.

The Book of PoC||GTFO


Manul Laphroaig - 2017
    Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.

Computer Science Distilled: Learn the Art of Solving Computational Problems


Wladston Ferreira Filho - 2017
    Designed for readers who don't need the academic formality, it's a fast and easy computer science guide. It teaches essential concepts for people who want to program computers effectively. First, it introduces discrete mathematics, then it exposes the most common algorithms and data structures. It also shows the principles that make computers and programming languages work.

Kafka: The Definitive Guide: Real-Time Data and Stream Processing at Scale


Neha Narkhede - 2017
    And how to move all of this data becomes nearly as important as the data itself. If you� re an application architect, developer, or production engineer new to Apache Kafka, this practical guide shows you how to use this open source streaming platform to handle real-time data feeds.Engineers from Confluent and LinkedIn who are responsible for developing Kafka explain how to deploy production Kafka clusters, write reliable event-driven microservices, and build scalable stream-processing applications with this platform. Through detailed examples, you� ll learn Kafka� s design principles, reliability guarantees, key APIs, and architecture details, including the replication protocol, the controller, and the storage layer.Understand publish-subscribe messaging and how it fits in the big data ecosystem.Explore Kafka producers and consumers for writing and reading messagesUnderstand Kafka patterns and use-case requirements to ensure reliable data deliveryGet best practices for building data pipelines and applications with KafkaManage Kafka in production, and learn to perform monitoring, tuning, and maintenance tasksLearn the most critical metrics among Kafka� s operational measurementsExplore how Kafka� s stream delivery capabilities make it a perfect source for stream processing systems

Machine Learning: A Visual Starter Course For Beginner's


Oliver Theobald - 2017
     If you have ever found yourself lost halfway through other introductory materials on this topic, this is the book for you. If you don't understand set terminology such as vectors, hyperplanes, and centroids, then this is also the book for you. This starter course isn't a picture story book but does include many visual examples that break algorithms down into a digestible and practical format. As a starter course, this book connects the dots and offers the crash course I wish I had when I first started. The kind of guide I wish had before I started taking on introductory courses that presume you’re two days away from an advanced mathematics exam. That’s why this introductory course doesn’t go further on the subject than other introductory books, but rather, goes a step back. A half-step back in order to help everyone make his or her first strides in machine learning and is an ideal study companion for the visual learner. In this step-by-step guide you will learn: - How to download free datasets - What tools and software packages you need - Data scrubbing techniques, including one-hot encoding, binning and dealing with missing data - Preparing data for analysis, including k-fold Validation - Regression analysis to create trend lines - Clustering, including k-means and k-nearest Neighbors - Naive Bayes Classifier to predict new classes - Anomaly detection and SVM algorithms to combat anomalies and outliers - The basics of Neural Networks - Bias/Variance to improve your machine learning model - Decision Trees to decode classification Please feel welcome to join this starter course by buying a copy, or sending a free sample to your preferred device.

Troublemakers: Silicon Valley's Coming of Age


Leslie Berlin - 2017
    This is the gripping tale of seven exceptional men and women, pioneers of Silicon Valley in the 1970s and early 1980s. Together, they worked across generations, industries, and companies to bring technology from Pentagon offices and university laboratories to the rest of us. In doing so, they changed the world. In Troublemakers, historian Leslie Berlin introduces the people and stories behind the birth of the Internet and the microprocessor, as well as Apple, Atari, Genentech, Xerox PARC, ROLM, ASK, and the iconic venture capital firms Sequoia Capital and Kleiner Perkins Caufield & Byers. In the space of only seven years and thirty-five miles, five major industries—personal computing, video games, biotechnology, modern venture capital, and advanced semiconductor logic—were born.During these same years, the first ARPANET transmission came into a Stanford lab, the university began licensing faculty innovations to businesses, and the Silicon Valley tech community began mobilizing to develop the lobbying clout and influence that have become critical components of modern American politics. In other words, these were the years when one of the most powerful pillars of our modern innovation and political systems was first erected.Featured among well-known Silicon Valley innovators like Steve Jobs, Regis McKenna, Larry Ellison, and Don Valentine are Mike Markkula, the underappreciated chairman of Apple who owned one-third of the company; Bob Taylor, who kick-started the Arpanet and masterminded the personal computer; software entrepreneur Sandra Kurtzig, the first woman to take a technology company public; Bob Swanson, the cofounder of Genentech; Al Alcorn, the Atari engineer behind the first wildly successful video game; Fawn Alvarez, who rose from an assembler on a factory line to the executive suite; and Niels Reimers, the Stanford administrator who changed how university innovations reach the public. Together, these troublemakers rewrote the rules and invented the future.

Radical Technologies: The Design of Everyday Life


Adam Greenfield - 2017
    But at what cost? In this urgent and revelatory excavation of our Information Age, leading technology thinker Adam Greenfield forces us to reconsider our relationship with the networked objects, services and spaces that define us. It is time to re-evaluate the Silicon Valley consensus determining the future.We already depend on the smartphone to navigate every aspect of our existence. We're told that innovations--from augmented-reality interfaces and virtual assistants to autonomous delivery drones and self-driving cars--will make life easier, more convenient and more productive. 3D printing promises unprecedented control over the form and distribution of matter, while the blockchain stands to revolutionize everything from the recording and exchange of value to the way we organize the mundane realities of the day to day. And, all the while, fiendishly complex algorithms are operating quietly in the background, reshaping the economy, transforming the fundamental terms of our politics and even redefining what it means to be human.Having successfully colonized everyday life, these radical technologies are now conditioning the choices available to us in the years to come. How do they work? What challenges do they present to us, as individuals and societies? Who benefits from their adoption? In answering these questions, Greenfield's timely guide clarifies the scale and nature of the crisis we now confront --and offers ways to reclaim our stake in the future.

.Net Microservices: Architecture for Containerized .Net Applications


César de la Torre - 2017
    It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-based application that you can explore. The sample application is available at the eShopOnContainers GitHub repo.

Girls Who Code: Learn to Code and Change the World


Reshma Saujani - 2017
    Now its founder, Reshma Saujani, wants to inspire you to be a girl who codes!Bursting with dynamic artwork, down-to-earth explanations of coding principles, and real-life stories of girls and women working at places like Pixar and NASA, this graphically animated book shows what a huge role computer science plays in our lives and how much fun it can be. No matter your interest—sports, the arts, baking, student government, social justice—coding can help you do what you love and make your dreams come true.Whether you’re a girl who’s never coded before, a girl who codes, or a parent raising one, this entertaining book, printed in bold two-color and featuring art on every page, will have you itching to create your own apps, games, and robots to make the world a better place.

The Teen's Guide to Social Media... and Mobile Devices: 21 Tips to Wise Posting in an Insecure World


Jonathan McKee - 2017
    . .?    The Teen’s Guide to Social Media & Mobile Devices will help you navigate the digital world with 21 refreshingly honest and humorous tips that will not only inform, but that also just might change the way you think about your social media interaction.      21 real-life tips including. . .Know the app before you snap.Don’t post anything you wouldn’t want Grandma, your boss, and Jesus seeing! (Jesus is on Insta, you know!)Peek at your privacy settings. . .so you know who’s peeking at you.Take more “selflessies.”Press pause before you post.  . . .and many more will provide just the information you need to post wisely in an insecure world.

Social LEADia: Moving Students from Digital Citizenship to Digital Leadership


Jennifer Casa-Todd - 2017
    In our networked society, students need to learn how to leverage social media to connect to people, passions, and opportunities to grow and make a difference. Social LEADia offers insight and engaging stories to help you shift the focus at school and at home from digital citizenship to digital leadership.

The Non-Tinfoil Guide to EMFs: How to Fix Our Stupid Use of Technology


Nicolas Pineault - 2017
    

OAuth 2 in Action


Justin Richer - 2017
    You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.About the BookOAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.What's InsideCovers OAuth 2 protocol and designAuthorization with OAuth 2OpenID Connect and User-Managed AccessImplementation risksJOSE, introspection, revocation, and registrationProtecting and accessing REST APIsAbout the ReaderReaders need basic programming skills and knowledge of HTTP and JSON.About the AuthorJustin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.Table of ContentsPart 1 - First stepsWhat is OAuth 2.0 and why should you care?The OAuth dance Part 2 - Building an OAuth 2 environmentBuilding a simple OAuth clientBuilding a simple OAuth protected resourceBuilding a simple OAuth authorization serverOAuth 2.0 in the real world Part 3 - OAuth 2 implementation and vulnerabilitiesCommon client vulnerabilitiesCommon protected resources vulnerabilitiesCommon authorization server vulnerabilitiesCommon OAuth token vulnerabilities Part 4 - Taking OAuth furtherOAuth tokensDynamic client registrationUser authentication with OAuth 2.0Protocols and profiles using OAuth 2.0Beyond bearer tokensSummary and conclusions

Blue Team Field Manual (BTFM)


Alan J. White - 2017
    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

The Friendly Orange Glow: The Untold Story of the PLATO System and the Dawn of Cyberculture


Brian Dear - 2017
    The many thousands of people who used the system have held on to the PLATO ideas throughout their careers, influencing countless technological products and programs: from flat-panel wall TVs and touch-sensitive screens to chat rooms, instant messaging, screen savers, multiplayer games, flight simulators, crowdsourcing, interactive fiction, emoticons, and e-learning. Fascinating, first hand, and revelatory, The Friendly Orange Glow makes clear that the work of PLATO practitioners has profoundly shaped the computer industry from its inception to our very moment. This book is as much the biography of a vision as it is the story of the people behind PLATO. Every technology story--whether it's about the steam engine, airplane, telephone, Model T, or more recently, Apple, Google, and Tesla electric car--has at its core a vision. It is the immutable nature of technology, and technology visions, to run full life cycles, from cradle to grave. PLATO's story is no different. Like all technology visions, PLATO grew outdated and was disrupted by competing visions. The Friendly Orange Glow is a revelatory paradigm for our technological age.

Racing Toward Armageddon: Why Advanced Technology Signals the End Times


Britt Gillette - 2017
    Find out what the Bible says. Learn why our generation is unique in all of human history. Most of all, find out why modern technology will soon lead to the most epic battle of all time – the Battle of Armageddon.

Pro ASP.NET Core MVC 2


Adam Freeman - 2017
    It contains detailed explanations of the Core MVC functionality which enables developers to produce leaner, cloud optimized and mobile-ready applications for the .NET platform. This book puts ASP.NET Core MVC into context and dives deep into the tools and techniques required to build modern, cloud optimized extensible web applications. All the new MVC features are described in detail and the author explains how best to apply them to both new and existing projects.The ASP.NET Core MVC Framework is the latest evolution of Microsoft’s ASP.NET web platform, built on a completely new foundation. It represents a fundamental change to how Microsoft constructs and deploys web frameworks and is free of the legacy of earlier technologies such as Web Forms. ASP.NET Core MVC provides a "host agnostic" framework and a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility.Best-selling author Adam Freeman has thoroughly revised this market-leading book and explains how to get the most from ASP.NET Core MVC. He starts with the nuts-and-bolts and shows you everything through to advanced features, going in-depth to give you the knowledge you need. The book includes a fully worked case study of a functioning web application that readers can use as a template for their own projects.

DNA Is Not Destiny: The Remarkable, Completely Misunderstood Relationship between You and Your Genes


Steven J. Heine - 2017
    Yet cultural psychologist Steven J. Heine argues that, in trying to know who we are and where we come from, we’re likely to completely misinterpret what’s “in our DNA.” Heine’s fresh, surprising conclusions about the promise, and limits, of genetic engineering and DNA testing upend conventional thinking and reveal a simple, profound truth: your genes create life—but they do not control it.

Designing Connected Content: Plan and Model Digital Products for Today and Tomorrow (Voices That Matter)


Carrie Hane - 2017
    They show you how to research and model your subject area based on a shared understanding of the important concepts, and how to plan and design interfaces for mobile, desktop, voice, and beyond. You will learn to reuse and remix your valuable content assets to meet the needs of today and the opportunities of tomorrow.   Discover a design method that starts with content, not pixels. Master the interplay of content strategy, content design, and content management as you bring your product team closer together and encourage them to think content first.   Learn how to Model your content and its underlying subject domain Design digital products that scale without getting messy Bring a cross-functional team together to create content that can be efficiently managed and effectively delivered Create a framework for tackling content overload, a multitude of devices, constantly changing design trends, and siloed content creation

The Leafly Guide to Cannabis: A Handbook for the Modern Consumer


The Leafly Team - 2017
    

Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing


Marie Hicks - 2017
    By 1974, the British computer industry was all but extinct. What happened in the intervening thirty years holds lessons for all postindustrial superpowers. As Britain struggled to use technology to retain its global power, the nation's inability to manage its technical labor force hobbled its transition into the information age.In Programmed Inequality, Marie Hicks explores the story of labor feminization and gendered technocracy that undercut British efforts to computerize. That failure sprang from the government's systematic neglect of its largest trained technical workforce simply because they were women. Women were a hidden engine of growth in high technology from World War II to the 1960s. As computing experienced a gender flip, becoming male-identified in the 1960s and 1970s, labor problems grew into structural ones and gender discrimination caused the nation's largest computer user -- the civil service and sprawling public sector -- to make decisions that were disastrous for the British computer industry and the nation as a whole.Drawing on recently opened government files, personal interviews, and the archives of major British computer companies, Programmed Inequality takes aim at the fiction of technological meritocracy. Hicks explains why, even today, possessing technical skill is not enough to ensure that women will rise to the top in science and technology fields. Programmed Inequality shows how the disappearance of women from the field had grave macroeconomic consequences for Britain, and why the United States risks repeating those errors in the twenty-first century."

Chaos Engineering


Casey Rosenthal - 2017
    You’ll never be able to prevent all possible failure modes, but you can identify many of the weaknesses in your system before they’re triggered by these events. This report introduces you to Chaos Engineering, a method of experimenting on infrastructure that lets you expose weaknesses before they become a real problem.Members of the Netflix team that developed Chaos Engineering explain how to apply these principles to your own system. By introducing controlled experiments, you’ll learn how emergent behavior from component interactions can cause your system to drift into an unsafe, chaotic state.- Hypothesize about steady state by collecting data on the health of the system- Vary real-world events by turning off a server to simulate regional failures- Run your experiments as close to the production environment as possible- Ramp up your experiment by automating it to run continuously- Minimize the effects of your experiments to keep from blowing everything up- Learn the process for designing chaos engineering experiments- Use the Chaos Maturity Model to map the state of your chaos program, including realistic goals

This Book Isn't Safe


Colin Furze - 2017
    Now Colin is on a mission to inspire a new generation of budding inventors with This Book Isn't Safe!This Book Isn't Safe contains instructions on how to make ten brand new inventions with a basic at-home toolkit, alongside behind-the-scenes stories about some of Colin's greatest inventions and top secret tips and tricks straight from his invention bunker (aka a shed in his backyard in Stamford Lincolnshire).

Advanced Penetration Testing: Hacking the World's Most Secure Networks


Wil Allsopp - 2017
    Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data--even from organizations without a direct Internet connection--this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures.Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level--and this book shows you how to defend your high security network.Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

My First Coding Book


D.K. Publishing - 2017
    With interactive paper engineering, My First Coding Book is a playful, hands-on introduction to offline coding and programming that will give young children a head start. Filled with puzzles, mazes, and games to teach the basic concepts of sequences, algorithms, and debugging, this book will help children develop critical thinking, logic, and other skills to cement lifelong computer literacy, which is extremely valuable and sought-after in today's world.With its unique approach and colorful and creative imagery, My First Coding Book makes learning and fun one and the same and will have children playing their way to programming proficiency.Supporting STEM education initiatives, computer coding teaches kids how to think creatively, work collaboratively, and reason systematically, and is quickly becoming a necessary and sought-after skill. DK's computer coding books are full of fun exercises with step-by-step guidance, making them the perfect introductory tools for building vital skills in computer programming.

The Chinese Typewriter: A History


Thomas S. Mullaney - 2017
    Through the years, the Chinese written language encountered presumed alphabetic universalism in the form of Morse Code, Braille, stenography, Linotype, punch cards, word processing, and other systems developed with the Latin alphabet in mind. This book is about those encounters -- in particular thousands of Chinese characters versus the typewriter and its QWERTY keyboard. Thomas Mullaney describes a fascinating series of experiments, prototypes, failures, and successes in the century-long quest for a workable Chinese typewriter.The earliest Chinese typewriters, Mullaney tells us, were figments of popular imagination, sensational accounts of twelve-foot keyboards with 5,000 keys. One of the first Chinese typewriters actually constructed was invented by a Christian missionary, who organized characters by common usage (but promoted the less-common characters for "Jesus" to the common usage level). Later came typewriters manufactured for use in Chinese offices, and typewriting schools that turned out trained "typewriter girls" and "typewriter boys." Still later was the "Double Pigeon" typewriter produced by the Shanghai Calculator and Typewriter Factory, the typewriter of choice under Mao. Clerks and secretaries in this era experimented with alternative ways of organizing characters on their tray beds, inventing an input method that was the first instance of "predictive text."Today, after more than a century of resistance against the alphabetic, not only have Chinese characters prevailed, they form the linguistic substrate of the vibrant world of Chinese information technology. The Chinese Typewriter, not just an "object history" but grappling with broad questions of technological change and global communication, shows how this happened.

RxSwift: Reactive Programming with Swift


Florent Pillet - 2017
    Rx lets developers easily and quickly build apps with code that can be understood by other Rx developers - even over different platforms.Not only will you learn how to use the RxSwift port to create complex reactive applications on iOS, you'll also see how to easily solve common application design issues by using RxSwift. Finally, you'll discover how to exercise full control over the library and leverage the full power of reactive programming in your apps.Who This Book Is ForThis book is for iOS developers who already feel comfortable with iOS and Swift, and want to dive deep into development with RxSwift.Topics Covered in RxSwiftGetting Started Get an introduction to the reactive programming paradigm, learn the terminology involved and see how to begin using RxSwift in your projects.Event Management Learn how to handle asynchronous event sequences via two key concepts in Rx - Observables and Observers.Being Selective See how to work with various events using concepts such as filtering, transforming, combining, and time operators.UI Development RxSwift makes it easy to work with the UI of your apps using RxCocoa, which provides an integration of both UIKit and Cocoa.Intermediate Topics Level up your RxSwift knowledge with chapters on reactive networking, multi-threading, and error handling.Advanced Topics Round out your RxSwift education by learning about MVVM app architecture, scene-based navigation, and exposing data via services. And much, much more! By the end of this book, you'll have hands-on experience solving common issues in a reactive paradigm - and you'll be well on your way to coming up with your own Rx patterns and solutions!

Blockchain Technology Explained: The Ultimate Beginner’s Guide About Blockchain Wallet, Mining, Bitcoin, Ethereum, Litecoin, Zcash, Monero, Ripple, Dash, IOTA and Smart Contracts


Alan T. Norman - 2017
    Topics you can expect to see in this book include: ● What problem does blockchain solve? ● How can technology make our institutions faster and less expensive? ● Could technology replace our institutions (like governments, banks, etc) altogether? ● How does blockchain build trust between strangers? ● How does blockchain increase security for transactions and contracts? ● Can blockchain be used outside of finance? ● What is a block? ● What is the chain and why do we need it? ● What’s a technical explanation of what happens in the blockchain? ● What is mining and why do we need it? ● Are there alternatives to mining to create a blockchain? ● What’s the story of Bitcoin? ● Does Bitcoin have any problems? ● What is Ethereum, and what is a smart contract? ● Are there other blockchain technologies I should know about? ● How are companies adopting blockchain? ● What regulatory hurdles might slow blockchain adoption? Whew, that’s a lot of questions. If you’re ready to tackle them, I’m ready

Sellout: How Washington Gave Away America's Technological Soul, and One Man's Fight to Bring It Home


Victoria Bruce - 2017
    But because of globalization, and with the blessing of the U.S. government, once proprietary materials, components and technologies are increasingly commercialized outside the U.S. Nowhere is this more dangerous than in China's monopoly of rare earth elements-materials that are essential for nearly all modern consumer goods, gadgets and weapons systems.Jim Kennedy is a retired securities portfolio manager who bought a bankrupt mining operation. The mine was rich in rare earth elements, but he soon discovered that China owned the entire global supply and manufacturing chain. Worse, no one in the federal government cared. Dismayed by this discovery, Jim made a plan to restore America's rare earth industry. His plan also allowed technology companies to manufacture rare earth dependent technologies in the United States again and develop safe, clean nuclear energy. For years, Jim lobbied Congress, the Pentagon, the White House Office of Science and Technology, and traveled the globe to gain support. Exhausted, down hundreds of thousands of dollars, and with his wife at her wits' end, at the start of 2017, Jim sat on the edge of victory, held his breath and bet it all that his government would finally do the right thing.Like Beth Macy's Factory Man, this is the story of one man's efforts to stem the dehumanizing tide of globalization and Washington's reckless inaction. Jim's is a fight we need to join.

The BDD Books: Discovery


Gáspár Nagy - 2017
    This practical guide demonstrates good collaboration techniques, illustrated by concrete examples.This book is written for everyone involved in the specification and delivery of software (including product owners, business analysts, developers, and testers). The book starts by explaining the reasons BDD exists in the first place, and describes techniques for getting the most out of collaboration between technical and non-technical team members.

Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security


Brian W. Kernighan - 2017
    Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords.Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology.

20 Games to Create with Scratch


Max Wainewright - 2017
    

Exam Ref 70-761: Querying Data with Transact-SQL


Itzik Ben-Gan - 2017
    Designed for experienced IT professionals ready to advance their status, book focuses on the critical thinking and decision making acumen needed for success at the MCSA level.Covered topics focus on the expertise measured by the objectives to filter, sort, join, aggregate and modify data, use subqueries, table expressions, grouping sets and pivoting, query temporal and non-relational data, read and output XML or JSON, create views, user-defined functions and stored procedures, implement error handling, transactions, data types and nulls.

The Math of Neural Networks


Michael Taylor - 2017
    They make web searches better, organize photos, and are even used in speech translation. Heck, they can even generate encryption. At the same time, they are also mysterious and mind-bending: how exactly do they accomplish these things ? What goes on inside a neural network? On a high level, a network learns just like we do, through trial and error. This is true regardless if the network is supervised, unsupervised, or semi-supervised. Once we dig a bit deeper though, we discover that a handful of mathematical functions play a major role in the trial and error process. It also becomes clear that a grasp of the underlying mathematics helps clarify how a network learns. In the following chapters we will unpack the mathematics that drive a neural network. To do this, we will use a feedforward network as our model and follow input as it moves through the network.

The Day After Tomorrow: How to Survive in Times of Radical Innovation


Peter Hinssen - 2017
    This is a great read about the future of business, aimed at those who want to witness the potential of this age of disruption. Adam Pisoni, CEO at Abl Schools, Co-founder of Responsive.org and Co-founder of Yammer. "Peter Hinssen has done it again! The Day After Tomorrow is a provocative and inspiring book that will challenge you, educate you and open your eyes to possibilities that you never thought existed. A must-read for any organization that wants to prepare for disruptive changes." Costas Markides, Professor of Strategy and Entrepreneurship at London Business School. "Many futurists entice us with fanciful notions. Peter Hinssen, however, manages the impossible, combining a stunning clear vision of the future with a compelling but concrete framework to act on now." Eddie Obeng, Professor at Pentacle The Virtual Business School For today s organizations, our exponentially changing world has come with great consequences. In this book, Peter Hinssen tells the story of the pioneers who managed to adapt to those changes and who moved beyond today and even tomorrow in their approach to innovation. In doing so, they were able to change the course of entire industries. Peter's book focuses on the business models of these pioneers, on the organizational culture, the talent, the mindset and the technology we should tap into in order to maximize our chances for survival in the 'Day After Tomorrow'. It will shift your perspective on your future, on the future or your company and even that of your grandchildren.

Dynamic Programming for Coding Interviews: A Bottom-Up approach to problem solving


Meenakshi - 2017
    I wrote the rampant recursive function,int fib(int n){ return (1==n || 2==n) ? 1 : fib(n-1) + fib(n-2);}and waited for the result. I wait… and wait… and wait…With an 8GB RAM and an Intel i5 CPU, why is it taking so long? I terminated the process and tried computing the 40th term. It took about a second. I put a check and was shocked to find that the above recursive function was called 204,668,309 times while computing the 40th term. More than 200 million times? Is it reporting function calls or scam of some government?The Dynamic Programming solution computes 100th Fibonacci term in less than fraction of a second, with a single function call, taking linear time and constant extra memory.A recursive solution, usually, neither pass all test cases in a coding competition, nor does it impress the interviewer in an interview of company like Google, Microsoft, etc. The most difficult questions asked in competitions and interviews, are from dynamic programming. This book takes Dynamic Programming head-on. It first explain the concepts with simple examples and then deep dives into complex DP problems.

AdWords Workbook: 2017 Edition: Advertising on Google AdWords, YouTube, and the Display Network


Jason McDonald - 2017
     2017 UPDATED EDITION: August Update - master the AdWords Search Network, Display Network and Remarketing Read the Reviews - compare the REAL REVIEWS of this book to the FAKE (?) REVIEWS of other books Learn to Advertise Your Business on Google without losing money Watch Videos - view step-by-step companion VIDEOS that SHOW you how to use ADWORDS effectively Use the Worksheets - download WORKSHEETS that guide you step-by-step to AdWords success. Access Free Tools - access the companion ADWORDS TOOLBOOK with free tools for Google AdWords, a $29.99 value! The #1 Bestselling Workbook on Google AdWords Advertising for Your Business Jason McDonald - written by a successful practitioner of AdWords. Just Google 'AdWords Expert Bay Area.' Stanford University - used by Dr. McDonald in his courses, both online and in face-to-face workshops Got Questions? - just Google 'Jason McDonald' and send a quick email or call. Rebate Offer - each AdWords Book 2017 contains a $10 off survey offer. The author, Jason McDonald, has instructed thousands of people in his classes in the San Francisco Bay Area, including Stanford Continuing Studies, as well as online. Table of Contents AdWords Gotchas - identify and fix the four main 'AdWords Gotchas' that may be costing you a LOT OF MONEY Keywords - find and leverage transactional keywords that make you money and nix ones that lose you money. The AdWords Search Network - optimize your Google Search Network efforts in AdWords step-by-step. Google Display Network - avoid rip offs in the GDN, and optimize for placements and strategies that truly work YouTube - Google's subsidiary, YouTube, is the #2 Search Engine. Master video advertising easily. Metrics - Learn what you can and should measure in AdWords, and use this data to optimize your RETURN ON AD SPEND (ROAS) Tools - Includes a free companion AdWords Toolbook, with hundreds of FREE tools to master AdWords better, faster, cheaper. AdWords Advertising in PLAIN ENGLISH: let Jason guide you in SIMPLE language to INCREDIBLE return on investment via Google AdWords   Check out the other AdWords Books - Perry Marshall and Mike Rhodes Ult

Blackbird: A History of the Untouchable Spy Plane


James Hamilton-Paterson - 2017
    Once fully developed in 1964, the Blackbird represented the apogee of jet-powered flight. It could fly at well over three times the speed of sound above 85,000 feet and had an unrefueled range of 3,200 nautical miles. It flew with great success until 1999). Despite extensive use over Vietnam and later battlefields, not one was ever shot down (unlike the U2 in the Gary Powers incident).The Blackbird's capabilities seem unlikely ever to be exceeded. It was retired because its function can be performed by satellites—and in today's steady trend toward unmanned military aircraft, it is improbable that another jet aircraft of this speed and caliber will ever again be conceived.

Instrument of the Devil (Tawny Lindholm Thriller Book 1)


Debbie Burke - 2017
    But while romancing her, Kahlil Shahrivar is actually a terrorist using the rigged phone to monitor her every move and set her up as a scapegoat. He drags her into a plot to sabotage the power grid by cyber-attack on Montana's Hungry Horse Dam. Soon the feds are chasing her and her family is in jeopardy. Tawny must find a way to turn the instrument back on the devil himself. Otherwise, when the lights go out, she dies.

Functional Programming, Simplified: (Scala edition)


Alvin Alexander - 2017
    The lessons are presented in a logical sequence — the order in which the author learned them — culminating in advanced topics like functional domain modeling, and how to write and use monads. Some of the book’s lessons include: - A simple set of rules for functional programming in Scala - How and why to write pure functions and use immutable variables - Why function signatures in FP are *much* more important than method signatures in OOP - How pure functions work with I/O (file, database, and network) - How to read anonymous functions - Lessons on recursion, with many images to help explain how it works - How the concepts of JVM stacks and stack frames work - Partially-applied functions and currying - How using Option naturally leads to flatMap, and how flatMap naturally leads to for-comprehensions - How and why to use case classes and pattern matching - How to use monads like State and IO - How to use monad transformers like StateT - How (and why) to write your own monads - Domain modeling in functional programming - How to use “lenses” to update immutable data models - Concurrency lessons cover Akka actors and Scala futures - Visual lessons on collections’ methods like fold and reduce - How to use the ScalaCheck property-testing framework - How to write and use “type classes” - Algebraic Data Types (ADTs) are explained All told, the book contains 120 small chapters. Source code examples from the book are available as a series of Github repositories that you can download and work with.

My Chernobyl: The Human Story of a Scientist and the nuclear power Plant Catastrophe


Alexander Borovoi - 2017
    On April 29, Alexander A. Borovoi, an atomic physicist with the Kurchatov Institute in Moscow, was ordered to Chernobyl to help measure and control the release of lethal radioactive materials. He stayed for twenty-three years. In "My Chernobyl", first published in 1996—at which time, the Russian magazine "New World" called it the best work of journalism for that year—Borovoi writes of his first two years at Chernobyl, when the initial response to the catastrophe was, as a rule, heroic, but unfortunately not always effective. Although "My Chernobyl" touches on technical aspects of dealing with the uncontrolled release of radioactivity from the damaged nuclear reactor, Borovoi tells stories—sometimes humorous, sometimes chilling—of people charged with different aspects of the cleanup, as well as some who were directly affected by the tragedy. Told in an engaging style, "My Chernobyl" is a personal and unforgettable story of an international crisis. Borovoi’s calm, levelheaded, and human responses to both the original meltdown and the problems created by ill-founded attempts to manage the disaster contain lessons for our world today, as new crises continually loom on the horizon.

Craft GraphQL APIs in Elixir with Absinthe: Flexible, Robust Services for Queries, Mutations, and Subscriptions


Bruce Williams - 2017
    Upgrade your web API to GraphQL, leveraging its flexible queries to empower your users, and its declarative structure to simplify your code. Absinthe is the GraphQL toolkit for Elixir, a functional programming language designed to enable massive concurrency atop robust application architectures. Written by the creators of Absinthe, this book will help you take full advantage of these two groundbreaking technologies. Build your own flexible, high-performance APIs using step-by-step guidance and expert advice you won't find anywhere else.GraphQL is a new way of structuring and building web services, and the result is transformational. Find out how to offer a more tailored, cohesive experience to your users, easily aggregate data from different data sources, and improve your back end's maintainability with Absinthe's declarative approach to defining how your API works.Build a GraphQL-based API from scratch using Absinthe, starting from core principles. Learn the type system and how to expand your schema to suit your application's needs. Discover a growing ecosystem of tools and utilities to understand, debug, and document your API. Take it to production, but do it safely with solid best practices in mind. Find out how complexity analysis and persisted queries can let you support your users flexibly, but responsibly too. Along the way, discover how Elixir makes all the difference for a high performance, fault-tolerant API. Use asynchronous and batching execution, or write your own custom add-ons to extend Absinthe. Go live with subscriptions, delivering data over websockets on top of Elixir (and Erlang/OTP's) famous solid performance and real-time capabilities.Transform your applications with the powerful combination of Elixir and GraphQL, using Absinthe.What You Need: To follow along with the book, you should have Erlang/OTP 19+ and Elixir 1.4+ installed. The book will guide you through setting up a new Phoenix application using Absinthe.

Mike Meyers' CompTIA Security+ Certification Guide, Exam SY0-501


Mike Meyers - 2017
    Like the exam, the guide goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. In Mike Meyers’ CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501), the bestselling author and leading authority on CompTIA A+ certification brings his proven methodology to IT security. Mike covers all exam objectives in small, digestible modules that allow you to focus on individual skills as you move through a broad and complex set of skills and concepts. The book features hundreds of accurate practice questions as well as a toolbox of the author’s favorite network security related freeware/shareware. • Provides complete coverage of every objective on exam SY0-501• Electronic content includes 20+ lab simulations, video training, and hundreds of practice exam questions• Written by computer security and certification guru Mike Meyers

Windows Internals, Part 1: System Architecture, Processes, Threads, Memory Management, and More


Pavel Yosifovich - 2017
    

LETTING PEOPLE DOWN Memories of a Cemetery Worker: And ghost written by all those I have buried, 1989-2017


Don Alesi - 2017
    Don does not wear a top coat and tails. Nor does he work at midnight (the graveyard shift.) In his illuminating memoir, “Letting People Down”: Memories of a Cemetery Worker, Don shares stories about life with dead people. Jumpers, cave-ins, voodoo—he’s seen it all. He also shares some cemetery history and clears up many misconceptions surrounding his profession—one that many consider somewhat ghoulish. Here are just a few of the questions explored in this book: How does one get a job at a cemetery? Why are graves six feet deep? What’s the difference between a casket and a coffin? What happens when a grave caves in? Although Don’s great sense of humor shines through in these factual anecdotes, he also has a serious side. He’s learned a lot about death and grief during his long career, and his words are genuinely comforting. Through it all, Don has discovered that humor is a great coping mechanism. Whether you’re genuinely curious about cemetery work or are just looking for a fascinating read, you’ll find this book “to die for”!

Radiation Nation: Complete Guide to EMF Protection & Safety - The Proven Health Risks of EMF Radiation & What You Can Do to Protect Yourself & Family


Ryan P. DeBaun - 2017
    You only drink purified water. You take care of yourself and your family's health. But could there be a silent, invisible danger causing potential harm to you and your loved ones? There could. And it's called electromagnetic frequency (EMF) radiation and its one of fastest growing health issues facing our society. EMF radiation produced by modern technology such as cell phones, tablets, laptops, Wi-Fi, and smart meters is an emerging health threat, and we are all guinea pigs in a giant experiment with many unknown consequences.BUT AREN'T THESE TECHNOLOGIES REGULATED AND SAFE?Surely the government and other regulatory agencies make sure these technologies are completely safe before they are approved for wide-spread use, right? Think again. Ninety-five percent of American adults use cell phones regularly. Most households have Wi-Fi. And even schools are increasingly becoming dependent on wireless devices. And yet none of these technologies have been proven safe to humans for long-term exposure.In fact, science confirms that the EMF emitted from common electronic devices can cause definite biological changes in the body, and mounting research has already shown it can lead to a long list of health concerns - some of which can be pretty serious.The explosive use of mobile devices only occurred over the last twenty years, yet we have only scratched the surface of what technology is yet to come. Children born today will be exposed to much higher doses of EMF radiation than those born just ten years ago. What are the ramifications and what can we do now to minimize the fallout?IN 'RADIATION NATION' YOU WILL LEARN:⁍What EMF radiation is and how it affects the body biologically⁍The major health risks including fertility issues for both men and women, DNA damage, cell mutation, cancer and other serious health risks⁍The latest scientific studies broken down by disease or condition ⁍How EMF radiation specifically affects children and those suffering with electromagnetic hypersensitivity⁍Why the current safety standards for EMF are insufficient and need to be rewritten⁍The EMF sources of greatest concern⁍The most practical precautions to protect yourself and your loved ones from EMF radiation⁍What is 5G and what are the possible health risks?⁍Do stickers, diodes, harmonizers and other products marketing as protection have any grounding in science?IS THERE A SOLUTION? Fortunately, there are simple and effective steps you can take to minimize the risks. Education is key. Wish a foreword by Bulletproof's Dave Asprey, 'RADIATION NATION' is info-packed with all the essential education you need to make smart choices to stay safe when it comes to technology.RUNNING TIME ➪ 2hrs. and 55mins.©2017 Daniel T. DeBaun and Ryan P. DeBaun (P)2017 Daniel T. DeBaun and Ryan P. DeBaun

Jack Ma: The Art Of Dreaming And Succeeding Extraordinary


Jamie Morris - 2017
    From his humble beginnings as a teacher, he has founded the Alibaba Group, one of the world’s largest ecommerce businesses, and has established himself as one of the world’s richest men. Alibaba’s 2014 IPO has been the biggest public stock offering globally, paving the way further to Ma’s $38 billion net worth to date. Ma and not Alibaba not only have transformed China’s business and economy, they have likewise impacted China’s culture today immeasurably. People have always been fascinated with stories of rags-to-riches and David-versus-Goliath. Most however appreciate these fairytales from afar, never allowing inspiration to translate into action in their own lives. Beyond piquing your curiosity about Ma’s life, this book aims to show you how to dream bigger and how to use your passions to achieve extraordinary success. Various books, documentaries and interviews have been made about Jack Ma’s remarkable journey in building the Alibaba Group brick-by-brick. Being Jack Ma gleans learnings from these and integrates them with advice from other brilliant life coaches and successful entrepreneurs to teach how you that success does not necessarily have to be achieved by reinventing the wheel, but by following models like Jack Ma through bite-sized achievable lessons. Ever the educator, let Jack Ma teach you how to dream and win.

Pure React: A step-by-step guide to mastering React.


Dave Ceddia - 2017
     The React ecosystem is huge – Redux, React Router, Webpack, Babel… Where do you even start? Most people begin by reading tutorials, but sifting through them to find the one that makes it 'click' is an exercise in frustration. On top of that, they dish out pages of code and leave it up to you to “learn by osmosis.” If you've tried to learn React on your own, you've probably had the same experience I did: after sifting through countless tutorials and video, you still can’t cobble together your own app. One second you’re nodding along, sure that you understand. The next, you’re staring at a blinking cursor wondering what to type. Thousands of people are already using React in their jobs or startups, and you can too -- once you figure it out. But what if you could skip straight to being as productive with React as you are with your current framework of choice? What if you were able to code as fast as you can think, using the JavaScript you know and love? Writing apps could be fun again! And fast. Teaching yourself React can be overwhelming… but it doesn’t have to be. You can master the fundamentals in a matter of days. Here's the thing: you need real practice. Not just nodding along to tutorials, but actually building examples and exercises. That's how you gain mastery, and this book will show you how. You’ll get hands-on practice building a series of small components and micro apps – no big monolithic app here. The bite-size apps will have you reviewing concepts until they’re second nature. With the included exercises you will be writing your own code right from the start – this isn’t a “copy, paste, watch it run” tutorial. Don't worry, we won't build any "ToDo" apps. The world already has enough of those. Learn to turn mockups directly into code, how to “think in components,” and how to handle changing state in React's world of one-way data flow. Here's what the book covers: - Easy project setup with Create React App (you’ll be running code within minutes) - Debugging strategies for when things go wrong - Mastering JSX syntax, including “if”s, loops, and dynamic child components - Using props to communicate between components, and make them as reusable as possible - How PropTypes can save you time debugging and help “future you” remember how to use the components you wrote - Using the “children” prop to render dynamic content - How to write React in the modern ES6 style, with a gentle introduction to ES6 syntax (you don't need to know ES6!) - How input controls work in React (controlled and uncontrolled) - Where and how to properly use component state in a React application - Stateful vs Stateless components - The lifecycle of a component, and how to use it to your advantage The book includes examples large and small, and 25 exercises to hone your knowledge. Buy Pure React and start learning React today!

THE QUIET COUP: A POLITICAL THRILLER


Rob Lubitz - 2017
    Its existence is a closely guarded secret. Now the agency is being attacked by a fringe congressman who is rapidly amassing power and influence. Worse yet, some of the drug is missing. Five thousand miles away in Hawaii, accident survivors Bill and Cheryl Parker are living idyllic, isolated lives on the island of Molokai. But after an earthquake shatters their bliss, and an investigative reporter makes disturbing inquiries, they begin to question who they really are. Their search for the truth propels them into the crosshairs of a contract killer and into the center of a political coup in Washington. In this heart-racing, mind-twisting political thriller, two lovers are about to discover that life hangs by the thinnest thread, reality is not always what it seems, and nothing is certain in an uncertain world.

Dual Transformation: How to Reposition Today's Business While Creating the Future


Scott D. Anthony - 2017
    Blending case studies from global organizations like Adobe,Johnson & Johnson, and Aetna, first-hand reflections from leaders like FordCEO Mark Fields, as well behind-the-scenes insights from the authors' ownexperiences, this book will guide executives through the journey of becomingthe next version of themselves, allowing them to own the future, rather than bedisrupted by it.

A Seat at the Table and The Art of Business Value


Mark Schwartz - 2017
    

Adobe Photoshop CC Classroom in a Book (2018 release)


Andrew Faulkner - 2017
    The 15 project-based lessons show key step-by-step techniques for working in Photoshop, including how to correct, enhance, and distort digital images, create image composites, and prepare images for print and the web. In addition to learning the essential elements of the Photoshop interface, this revised edition for the 2018 release covers features like search capabilities, Content-Aware Crop, Select and Mask, Face-Aware Liquify, designing with multiple artboards, creating and organizing enhanced brush presets, and much more! The online companion files include all the necessary assets for readers to complete the projects featured in each chapter as well as ebook updates when Adobe releases relevant new features for Creative Cloud customers. All buyers of the book get full access to the Web Edition: a Web-based version of the complete ebook enhanced with video and multiple-choice quizzes.

Blockchain Basics: A Non-Technical Introduction in 25 Steps


Daniel Drescher - 2017
    No mathematical formulas, program code, or computer science jargon are used.No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You Will Learn: • What the blockchain is• Why it is needed and what problem it solves• Why there is so much excitement about the blockchain and its potential• Major components and their purpose• How various components of the blockchain work and interact• Limitations, why they exist, and what has been done to overcome them• Major application scenariosWho This Book Is For: Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it.

Buying Illegal Bugs with Bitcoin


George Billions - 2017
    Books, electronics, and Chinese takeout are just a few clicks away. If you’re after something more illicit, all you need is a special browser and some bitcoin to spend. Every drug you might want is readily available on the darknet markets. You can also hire a hitman, get a fake ID made, or have an illegal bug delivered to your door. Ben Samsa is a small-time weed dealer and amateur entomologist. He can’t resist buying a mysterious bug he finds on one of the black market sites where he gets his inventory. The splurge leaves him with only enough bitcoin to purchase lower quality marijuana than he normally sells. Unfortunately, Ben doesn’t realize one of his customers has been flipping his product to a murderous, one-eyed Nazi. He’s soon sucked into a hellish nightmare of dread, drugs and death. Meanwhile, the bug is growing. Nothing will ever be the same when Ben learns the true, hideous name of the insect.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Calm, Cool, and Connected: 5 Digital Habits for a More Balanced Life


Arlene Pellicane - 2017
    We know that overuse of technology is harmful to our health and relationships, but how can we rewire our digital habits for a healthier life?In Calm, Cool, and Connected, Arlene Pellicane will walk you through an easy 5-step plan that will help you center your life on Jesus and love others by decluttering your screen time. By introducing a few easy habits into your daily routine, you can transform your relationship with technology and enjoy more time with God and others.It's easy to become consumed and preoccupied with our devices. In turn, we begin to suppress or ignore what’s most important, focusing instead on the urgent and sensational. Let this book guide you toward balanced technology use, and thus a more balanced life.

Make Your Own Neural Network: An In-depth Visual Introduction For Beginners


Michael Taylor - 2017
    A step-by-step visual journey through the mathematics of neural networks, and making your own using Python and Tensorflow.

The Kat Bronsky Thrillers: The Last Hostage and Blackout


John J. Nance - 2017
    Featuring FBI hostage negotiator Kat Bronsky, these are two stories of pilots, passengers, and planes in peril that move at supersonic speed.  The Last Hostage: When airline pilot Ken Wolfe learns that the presumptive nominee for US attorney general is on his flight, his blood runs cold. Rudolph Bostich bungled the case after Wolfe’s daughter was kidnapped and killed—and let the perpetrator walk. Now Wolfe is prepared to do anything for revenge, including hijacking his own plane. It’s up to FBI agent, psychologist, and rookie hostage negotiator Kat Bronsky to solve the mystery of an eleven-year-old girl’s murder and save the lives of 130 terrified passengers.  Blackout: A Boeing/McDonnell-Douglas MD-11 jetliner crashes into the Gulf of Mexico a mile inside Cuban waters, killing all onboard. The last three minutes on the plane’s cockpit voice and data recorders have been erased. Was it a massive mechanical failure or an act of terrorism? When another airliner goes down after its pilots are flash-blinded midflight, Kat Bronsky races from the jungles of Southeast Asia to the forests of the American Northwest to unmask the conspirators before the entire American airline industry comes crashing out of the sky.

Coding Projects in Python


D.K. Publishing - 2017
    All they need is a desktop or laptop, and an Internet connection to download Python 3.Step-by-step instructions teach essential coding basics like loops and conditionals, and outline 14 fun and exciting projects, including a script that cracks secret codes, a quiz to challenge family and friends, a matching game, and much more. When they are feeling more confident, kids can think creatively and use the tips and tricks provided to personalize and adapt each project.The simple, logical steps in Coding Projects in Python are fully illustrated with fun pixel art and build on the basics of coding, so kids can have the skills to build whatever kind of project they can dream up.Supporting STEM education initiatives, computer coding teaches kids how to think creatively, work collaboratively, and reason systematically, and is quickly becoming a necessary and sought-after skill. DK's computer coding books are full of fun exercises with step-by-step guidance, making them the perfect introductory tools for building vital skills in computer programming.

Screen Schooled: Two Veteran Teachers Expose How Technology Overuse Is Making Our Kids Dumber


Joe Clement - 2017
    Rather than becoming better problem solvers, kids look to Google to answer their questions for them. Rather than deepening students’ intellectual curiosity, educational technology is too often cumbersome and distracting, causing needless frustration and greatly extending homework time. Rather than becoming the great equalizer, electronic devices are widening the achievement gap. On a mission to educate and empower parents, Clement and Miles provide many real-world examples and cite multiple studies showing how technology use has created a wide range of cognitive and social deficits in our young people. They lift the veil on what’s really going on at school: teachers who are powerless to curb cell phone distractions; zoned-out kids who act helpless and are unfocused, unprepared, and antisocial; administrators who are too-easily swayed by the pro-tech “science” sponsored by corporate technology purveyors. They provide action steps parents can take to demand change and make a compelling case for simpler, smarter, more effective forms of teaching and learning.

SVG Animations: From Common UX Implementations to Complex Responsive Animation


Sarah Drasner - 2017
    It becomes increasingly more interesting as you explore its capabilities for responsive animation and performance boons. When you animate SVG, you must be aware of normal image traits like composition, color, implementation, and optimization. But when you animate, it increases the complexity of each of these factors exponentially.This practical book takes a deep dive into how you can to solve these problems with stability, performance, and creativity in mind.Learn how to make SVG cross-browser compatible, backwards compatible, optimized, and responsivePlan and debug animationMake a complex animation responsive, as many sites are responsiveProfile each animation technique in terms of performance so that you know what you're getting in to with each library or native technology

The Lessons School Forgot: How to Hack Your Way Through the Technology Revolution


Steve Sammartino - 2017
    It's time to reinvent yourself, transform your life and work the new economy for everything it's worth. With the industrial age quickly vanishing in the rearview mirror, The Lessons School Forgot is your instruction manual for hacking your mind and acquiring the skills to take control of your life and fortunes in the digital age. In simple, straightforward terms, futurist and born entrepreneur Steve Sammartino, shows you how to: 'unlearn' bad habits school taught you discover how to work the digital economy invest only your time and reap a substantial lifelong return transform your life and carve out a new path to independence. Inspirational, instructive, subversive, and with a wealth of insightful guidance, The Lessons School Forgot will help you to break from a lifetime of legacy programming and take full advantage of the technology revolution.

Hockey: Then to WOW!


Sports Illustrated Kids - 2017
    Using NHL action photographs, illustrations, stories, and trivia, the book is a journey through time both for hockey fans and those new to the game. Kids will learn how basic equipment has changed from a ball to a puck and how the evolution of game strategy has transformed the sport, players, and equipment. Players throughout history are stacked up against each other in every position so fans can dream up the perfect fantasy team with Wayne Gretzky playing alongside Patrick Roy and Stan Mikita. A fun-filled section of the book explores everything fan culture-from the best ice rinks, to the iconic hockey sweater and the hockey haircut along with key aspects of the toughest sport around.

A Reader's Guide to A Seat at the Table: IT Leadership in the Age of Agility


Mark Schwartz - 2017
    This reader's guide walks through A Seat at the Table chapter by chapter.Each chapter includes additional material on:• The author’s take on the chapter.• The author’s motivation in writing the chapter, including the personal experiences.• What has changed between the Waterfall/contractor-control world and the Agile world.• The key points of the chapter.• The concrete actions that IT leaders should take away from the chapter.• Questions to help stimulate further debate.• Further reading to explore the topic.• And more.

Callous Objects: Designs against the Homeless


Robert Rosenberger - 2017
    Robert Rosenberger examines such commonplace devices as garbage cans, fences, signage, and benches—all of which reveal political agendas beneath the surface. Such objects have evolved, through a confluence of design and law, to be open to some uses and closed to others, but always capable of participating in collective ends on a large scale. Rosenberger brings together ideas from the philosophy of technology, social theory, and feminist epistemology to spotlight the widespread anti-homeless ideology built into our communities and enacted in law.Forerunners: Ideas First is a thought-in-process series of breakthrough digital publications. Written between fresh ideas and finished books, Forerunners draws on scholarly work initiated in notable blogs, social media, conference plenaries, journal articles, and the synergy of academic exchange. This is gray literature publishing: where intense thinking, change, and speculation take place in scholarship.

Unlikely Designs


Katie Willingham - 2017
    It is here we discover the allure of the index, what pleasure there is in bending it to our own devices. At the same time, these poems also remind us that logic is often reckless, held together by nothing more than syntactical short circuits—well, I mean, sorry, yes—prone to cracking under closer scrutiny. Returning us again and again to these gaps, Katie Willingham reveals how any act of preservation is inevitably an act of curation, an outcry against the arbitrary, by attempting to make what is precious also what survives.

The Nexus Framework for Scaling Scrum: Continuously Delivering an Integrated Product with Multiple Scrum Teams


Kurt Bittner - 2017
    

Disruptive Classroom Technologies: A Framework for Innovation in Education


Sonny Magana - 2017
    The T3 Framework helps teachers categorize students' learning as translational, transformational, or transcendent, sorting through the low-impact applications to reach high-impact usage of technologies. Teachers and leaders will find:Examples of technology use at the translational, transformational, and transcendent levels Activities, guides, and prompts for deeper learning that move technology use to higher levels of the T3 Framework Evaluative rubrics to self-assess current technology use, establish meaningful goals, and track progress towards those goals

The Carbon Code: How You Can Become a Climate Change Hero


Brett Favaro - 2017
    Our addiction to fossil fuels is destroying not only our ancient planet, but our modern civilization. How can we protect our fragile ecosystems while preserving our way of life? How can we respond to climate change deniers who mock the fact that environmental activists use fossil fuels? In short, how can your average concerned citizen live a normal life in a carbon-based economy without being justifiably called a hypocrite? In The Carbon Code, conservation biologist Brett Favaro answers these thorny questions, offering simple strategies to help you reduce your carbon footprint--without abandoning common sense.Favaro's Carbon Code of Conduct is based on the four R's: Reduce, Replace, Refine, and Rehabilitate. After outlining the scientific basics of climate change and explaining the logic of the code he prescribes, the author describes carbon-friendly technologies and behaviors we can adopt in our daily lives. However, he acknowledges that individual action, while vital, is insufficient. To achieve global sustainability, he insists that we must make the fight against climate change "go viral" through conspicuous conservation.The Carbon Code is a tool of empowerment. People don't need to be climate change experts to be part of the solution! In this book, Brett Favaro shows you how to take ownership of your carbon footprint and adopt a lifestyle of conspicuous conservation that will spur governments and corporations to do the same. Climate-friendly action is the best decision on every dimension--economics, health and well-being, and social justice. Saving the planet is, after all, about saving ourselves. The Carbon Code provides a framework to do this, and helps you to become a hero in the fight against climate change.

The Retro Future: Looking to the Past to Reinvent the Future


John Michael Greer - 2017
    When every upgrade has more bugs and fewer benefits than the last, and “new” no longer means “improved,” it’s time to challenge the mythology of progress and go back to what works.

Power Tools for Health: How pulsed magnetic fields (PEMFs) help you


William Pawluk - 2017
    Now they will revolutionize your health. Power Tools for Health will teach you to how to apply PEMFs to your life. Including: - How to treat new or chronic health conditions like pain, anxiety, insomnia, and diabetes - How you can avoid annoying or potentially harmful side effects from pharmaceuticals or other treatments - What PEMFs do to enhance and accelerate recovery from surgery. Research shows PEMFs accelerate the healing of almost any cell, tissue, organ, or condition. Unlike much of modern medicine, which mostly focuses on symptom management, PEMF therapy improves your body’s basic functions, allowing it to both prevent and treat a wide range of health problems. With dozens of easily accessible and effective PEMF systems on the market, this is the next major leap forward in improving health to help you live long and live well. Power Tools for Health is the most comprehensive, objective, and authoritative book on PEMF therapy. Here you will learn: - how the technology works, including an overview of common terminology - what it does in the body, from circulation to stem cell stimulation and everything in between - what it can do to treat more than 50 specific health problems, each with clinical study results FDA-approved to treat conditions from bone healing to depression, PEMF therapy has been available to the medical community for years, though few doctors are familiar with the technology outside of MRI. Power Tools for Health fills this gap in knowledge by dissecting hundreds of double-blind studies and real-life case studies. Power Tools for Health has no focus or emphasis on any specific commercial device. Instead, Dr. Pawluk brings his extensive experience to report on many of the leading PEMF systems available today, including how to use them effectively, what to look for when you consider getting a system for yourself, and how to combine PEMF therapy with other health care tools.

The Waste-Wise Gardener: Tips and Techniques to Save Time, Money, and Natural Resources While Creating the Garden of Your Dreams


Jean B. MacLeod - 2017
    Practical ideas for creating a low-cost, low-maintenance, eco-friendly garden

Begin to Code with Python


Rob Miles - 2017
    It's not just friendly and easy: it's the first Python beginner's guide that puts you in control of your own learning, and empowers you to build unique programs to solve problems you care about. Microsoft has completely reinvented the beginning programmer's tutorial, reflecting deep research into how today's beginners learn, and why other books fall short. Begin to Code with Python is packed with innovations, including its "Snaps" library of pre-built operations that are easy to combine your own unique programs, Cookie Cutter templates that give you a flying start, and "Make Something Happen" projects that help you build skills by creating your own programs, not programs someone else has handed you. Throughout, Begin to Code with Python balances playful exposition and illustration of programming fundamentals with your own creative input - and you'll never be more than a page or two away from making something unique and personal to you. It will help you... Understand the basics of coding, from simple data storage to more complex and useful programs Discover how Python works using the Visual Studio environment Master advanced techniques, including classes and object-based solutions design Extend your code with Python's powerful libraries Build web and cloud-based applications, as well as graphical user interfaces and games Test and debug your code with What can go wrong sections Understand the social aspects of professional development, and build career-ready skills from the start Whether you're a total beginner or you've tried before, Begin to Code with Python will put the power, excitement, and creativity of programming where it belongs: in your hands!

The Cybersecurity Dilemma: Network Intrusions, Trust, and Fear in the International System


Ben Buchanan - 2017
    Cybersecurity Dilemma

3D Printing Projects


D.K. Publishing - 2017
    Learn how a 3D printer works and the different types of 3D printers on the market. Understand the basic 3D printing and designing terms, how to create and prepare files for printing, and also how to scan things to create a 3D model! You will also find out the common troubles faced while 3D printing and simple tricks to fix them.All the projects included in the book can be made using freely available online 3D modeling/CAD programs. Each project has a print time, details of filament or material needed, and a difficulty rating - from easy for beginners to difficult for those looking for a new challenge. Step-by-step instructions walk you through the 3D design process, from digital modeling and sculpting to slicing, printing, and painting so that children can make their own shark-shaped phone stand, customized lamps, and much more. The book also gives inspiration to further enhance your projects once you've mastered the basics.Join the 3D printing revolution today with DK's 3D Printing Projects book.

Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi


Simon Monk - 2017
    Through a series of practical recipes, you'll learn how to solve specific problems while diving into as much or as little theory as you're comfortable with.Author Simon Monk (Raspberry Pi Cookbook) breaks down this complex subject into several topics, from using the right transistor to building and testing projects and prototypes. With this book, you can quickly search electronics topics and go straight to the recipe you need. It also serves as an ideal reference for experienced electronics makers.This cookbook includes:Theoretical concepts such as Ohm's law and the relationship between power, voltage, and currentThe fundamental use of resistors, capacitors and inductors, diodes, transistors and integrated circuits, and switches and relaysRecipes on power, sensors and motors, integrated circuits, and radio frequency for designing electronic circuits and devicesAdvice on using Arduino and Raspberry Pi in electronics projectsHow to build and use tools, including multimeters, oscilloscopes, simulations software, and unsoldered prototypes