Book picks similar to
Internetworking Technologies Handbook by Kevin Downs
computers
sysadmin
and
it-computer-science
New Dark Age: Technology and the End of the Future
James Bridle - 2018
Underlying this trend is a single idea: the belief that our existence is understandable through computation, and more data is enough to help us build a better world. In actual fact, we are lost in a sea of information, increasingly divided by fundamentalism, simplistic narratives, conspiracy theories, and post-factual politics. Meanwhile, those in power use our lack of understanding to further their own interests. Despite the accessibility of information, we’re living in a new Dark Age. From rogue financial systems to shopping algorithms, from artificial intelligence to state secrecy, we no longer understand how our world is governed or presented to us. The media is filled with unverifiable speculation, much of it generated by anonymous software, while companies dominate their employees through surveillance and the threat of automation. In his brilliant new work, leading artist and writer James Bridle excavates the limits of technology and how it aids our understanding of the world. Surveying the history of art, technology, and information systems, he explores the dark clouds that gather over our dreams of the digital sublime.
Power Electronics for Technology
Ashfaq Ahmed - 1998
Reflecting the increasing demand for efficient conversion and control of electrical power, it considers the latest power devices, circuits, and control schemes that continue to extend power electronics technology to new applications areas. Presents material methodically - first establishing the background theory before going on to specific applications. Familiarizes readers with the analysis and operation of various power conversions circuits that have applications at high power levels, and formulates equations that govern the behavior of these circuits. Discusses the application of power electronic devices in uncontrolled and controlled single phase rectifiers, inverters, ac voltage controllers, cycloconverters, and dc choppers, and demonstrates voltage and current waveform analysis for the output, starting with a simple resistive load to more practical inductive loads. Includes many worked examples, basic formulas, and an abundance of illustrations and diagrams.
Googled: The End of the World as We Know It
Ken Auletta - 2009
This is a ride on the Google wave, and the fullest account of how it formed and crashed into traditional media businesses. With unprecedented access to Google's founders and executives, as well as to those in media who are struggling to keep their heads above water, Ken Auletta reveals how the industry is being disrupted and redefined.Auletta goes inside Google's closed-door meetings, introducing Google's notoriously private founders, Larry Page and Sergey Brin, as well as those who work with - and against - them. In Googled, the reader discovers the 'secret sauce' of the company's success and why the worlds of 'new' and 'old' media often communicate as if residents of different planets. It may send chills down traditionalists' spines, but it's a crucial roadmap to the future of media business: the Google story may well be the canary in the coal mine.Googled is candid, objective and authoritative. Crucially, it's not just a history or reportage: it's ahead of the curve and unlike any other Google books, which tend to have been near-histories, somewhat starstruck, now out of date or which fail to look at the full synthesis of business and technology.
Changing the Game: How Video Games Are Transforming the Future of Business
David Edery - 2008
Microsoft has used games to painlessly and cost-effectively quadruple voluntary employee participation in important tasks. Medical schools have used game-like simulators to train surgeons, reducing their error rate in practice by a factor of six. A recruiting game developed by the U.S. Army, for just 0.25% of the Army’s total advertising budget, has had more impact on new recruits than all other forms of Army advertising combined. And Google is using video games to turn its visitors into a giant, voluntary labor forceencouraging them to manually label the millions of images found on the Web that Google’s computers cannot identify on their own.Changing the Game reveals how leading-edge organizations are using video games to reach new customers more cost-effectively; to build brands; to recruit, develop, and retain great employees; to drive more effective experimentation and innovation; to supercharge productivity…in short, to make it fun to do business. This book is packed with case studies, best practices, and pitfalls to avoid. It is essential reading for any forward-thinking executive, marketer, strategist, and entrepreneur, as well as anyone interested in video games in general. In-game advertising, advergames, adverworlds, and beyondChoose your best marketing opportunitiesand avoid the pitfalls Use gaming to recruit and develop better employeesLearn practical lessons from America’s Army and other innovative case studies Channel the passion of your user communitiesHelp your customers improve your products and servicesand have fun doing it What gamers do better than computers, scientists, or governmentsUse games to solve problems that can’t be solved any other way
Dark Territory: The Secret History of Cyber War
Fred Kaplan - 2016
The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.
Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy
Jonathan Taplin - 2017
Since 2001, newspaper and music revenues have fallen by 70%, book publishing, film and television profits have also fallen dramatically. Revenues at Google in this same period grew from $400 million to $74.5 billion. Google's YouTube today controls 60% of the streaming audio business and pays only 11% of the streaming audio revenues. More creative content is being consumed than ever before, but less revenue is flowing to creators and owners of the content.With the reallocation of money to monopoly platforms comes a shift in power. Google, Facebook, and Amazon now enjoy political power on par with Big Oil and Big Pharma, which in part explains how such a tremendous shift in revenues from artists to platforms could have been achieved and why it has gone unchallenged for so long.The stakes in this story go far beyond the livelihood of any one musician or journalist. As Taplin observes, the fact that more and more Americans receive their news, music and other forms of entertainment from a small group of companies poses a real threat to democracy. Move Fast and Break Things offers a vital, forward-thinking prescription for how artists can reclaim their audiences using knowledge of the past and a determination to work together. Using his own half-century career as a music and film producer and early pioneer of streaming video online, Taplin offers new ways to think about the design of the World Wide Web and specifically the way we live with the firms that dominate it.Table of contentsIntroduction1. The Great Disruption2. Levon's Story3. Tech's Counterculture Roots4. The Libertarian Counterinsurgency5. Digital Destruction6. Monopoly in the Digital Age7. Google's Regulatory Capture8. The Social Media Revolution9. Pirates of the Internet10. Libertarian and the 1 Percent11. What It Means to Be Human12. The Digital RenaissanceAfterword
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Brian Krebs - 2014
Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting."
Bloomberg Businessweek
Futureproof: 9 Rules for Humans in the Age of Automation
Kevin Roose - 2021
After decades of sci-fi fantasies and hype, artificial intelligence has leapt out of research labs and Silicon Valley engineering departments and into the center of our lives. Algorithms shape everything around us, from the news we see to the products we buy and the relationships we form. And while the debate over whether or not automation will destroy jobs rages on, a much more important question is being ignored:What does it mean to be a human in a world that is increasingly built by and for machines?In Futureproof: 9 Rules for Humans in the Age of Automation, New York Times technology columnist Kevin Roose lays out a hopeful, pragmatic vision of how people can succeed in the machine age by making themselves irreplaceably human. He shares the secrets of people and organizations that have survived technological change, and explains how we can protect our own futures, with lessons like- Do work that is surprising, social, and scarce (the types of work machines can't do). - Demote your phone. - Work near other people. - Treat A.I. like an army of chimpanzees. - Add more friction to your life.Roose rejects the conventional wisdom that in order to compete with machines, we have to become more like them--hyper-efficient, data-driven, code-writing workhorses. Instead, he says, we should let machines be machines, and focus on doing the kinds of creative, inspiring, and meaningful things only humans can do.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
A People's History of Computing in the United States
Joy Lisi Rankin - 2018
But throughout the 1960s and 1970s a diverse group of teachers and students working together on academic computing systems conducted many of the activities we now recognize as personal and social computing. Their networks were centered in New Hampshire, Minnesota, and Illinois, but they connected far-flung users. Joy Rankin draws on detailed records to explore how users exchanged messages, programmed music and poems, fostered communities, and developed computer games like The Oregon Trail. These unsung pioneers helped shape our digital world, just as much as the inventors, garage hobbyists, and eccentric billionaires of Palo Alto.By imagining computing as an interactive commons, the early denizens of the digital realm seeded today's debate about whether the internet should be a public utility and laid the groundwork for the concept of net neutrality. Rankin offers a radical precedent for a more democratic digital culture, and new models for the next generation of activists, educators, coders, and makers.
Print Is Dead: Books in Our Digital Age
Jeff Gomez - 2007
Through wars, radio, TV, computer games and fluctuating literacy rates, the book has, somewhat bizarrely, remained the more robust and culturally relevant way to communicate ideas. Now, for the first time since the Middle Ages, all that is about to change.
The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Shoshana Zuboff - 2018
The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification."The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future.With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it.Table of contentsINTRODUCTION1. Home or exile in the digital futureI. THE FOUNDATIONS OF SURVEILLANCE CAPITALISM2. August 9, 2011: Setting the stage for Surveillance Capitalism3. The discovery of behavioral surplus4. The moat around the castle5. The elaboration of Surveillance Capitalism: Kidnap, corner, compete6. Hijacked: The division of learning in societyII. THE ADVANCE OF SURVEILLANCE CAPITALISM7. The reality business8. Rendition: From experience to data9. Rendition from the depths10. Make them dance11. The right to the future tenseIII. INSTRUMENTARIAN POWER FOR A THIRD MODERNITY12. Two species of power13. Big Other and the rise of instrumentarian power14. A utopia of certainty15, The instrumentarian collective16. Of life in the hive17. The right to sanctuaryCONCLUSION18. A coup from aboveAcknowledgementsAbout the authorDetailed table of contentsNotesIndex