Book picks similar to
Humans and Robots: Ethics, Agency, and Anthropomorphism (Philosophy, Technology and Society) by Sven Nyholm
philosophy
non-fiction
year
science-technology-nature
The Wolf in CIO's Clothing
Tina Nunno - 2013
The massive pressure on CIOs continues to increase as the opportunities to use technology in business become more prevalent and more competitive. As CIOs often find themselves at the center of business conflict, they must not only familiarize themselves with Machiavellian tactics as a defensive weapon, but also learn to use them as an offensive weapon in extreme situations so that they can increase IT’s contribution to their enterprises.As Italian political philosopher Niccolo Machiavelli implied, you're either predator or prey, and the animal you most resemble determines your position on the food chain. In The Wolf in CIO's Clothing Gartner analyst and author Tina Nunno expands on Machiavelli's metaphor, examining seven animal types and the leadership attributes of each. Nunno posits the wolf — a social animal with strong predatory instincts — as the ideal example of how a leader can adapt and thrive.Technology may be black and white, but successful leadership demands an ability to exist in the grey. Drawing on her experience with hundreds of CIOs, Nunno charts a viable way to master the Machiavellian principles of power, manipulation, love, and war. Through compelling case studies, her approach demonstrates how CIOs and IT leaders can adjust their leadership styles in extreme situations for their own success and that of their teams.
Kindle Fire HD User Manual: The Complete User Guide With Instructions, Tutorial to Unlock The True Potential of Your Device in 30 Minutes (OCT 2015)
Jake Jacobs - 2013
You'll also learn tips and tricks to help you unlock the true potential of your device. Here are just some of the essentials you'll learn from this book: - Master the settings of your Kindle Fire HD device - Drastically reduce charge time & boost battery life - Setting up and using wireless networks - Utilizing security features to safeguard your device - Increase productivity: Skype, Email, Cloud Storage, Reading Documents, File Explorer - Sync your Kindle Fire HD to your computer, transfer your music and video seamlessly - Enhance your shopping and entertainment experience on Amazon and more... Kindle Fire HD Manual: The Complete Guide To Getting The Most Out Of Your Kindle Device is a comprehensive step-by-step, no fluff guide to help you master your device in no time. Get it while it's still available at this low price! **Scroll to the top of the page and click the buy button on the right to download this book now!**
Privacy is Power: Reclaiming Democracy in the Digital Age
Carissa Véliz - 2020
Before you’ve even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your ‘suggested friends’ on Facebook, you continually compromise your privacy.Without your permission, or even your awareness, tech companies are harvesting your information, your location, your likes, your habits, and sharing it amongst themselves. They're not just selling your data. They’re selling the power to influence you. Even when you’ve explicitly asked them not to. And it's not just you. It's all your contacts too.Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power and democracy, we must protect our privacy.What can we do? So much is at stake. Our phones, our TVs, even our washing machines are spies in our own homes. We need new regulation. We need to pressure policy-makers for red lines on the data economy. And we need to stop sharing and to adopt privacy-friendly alternatives to Google, WhatsApp and other online platforms.Short, terrifying, practical: Privacy is Power highlights the implications of our laid-back attitudes to data, and sets out how we can reclaim control.
Kindle Fire HD Manual - Learn how to use your Amazon Tablet, Find new releases, Free Books, Download Youtube Videos, the Best Apps and other Fiery Hot Tips!
David Garcia - 2012
Hackers: Heroes of the Computer Revolution
Steven Levy - 1984
That was before one pioneering work documented the underground computer revolution that was about to change our world forever. With groundbreaking profiles of Bill Gates, Steve Wozniak, MIT's Tech Model Railroad Club, and more, Steven Levy's Hackers brilliantly captured a seminal moment when the risk-takers and explorers were poised to conquer twentieth-century America's last great frontier. And in the Internet age, the hacker ethic-first espoused here-is alive and well.
Psychology and Social Sanity
Hugo Münsterberg - 1914
Why Digital Transformations Fail: The Surprising Disciplines of How to Take Off and Stay Ahead
Tony Saldanha - 2019
But fully 70 percent of digital transformations fail.Why? Tony Saldanha, a globally awarded industry thought-leader who led operations around the world and major digital changes at Procter & Gamble, discovered it's not due to innovation or technological problems. Rather, the devil is in the details: a lack of clear goals and a disciplined process for achieving them. In this book, Saldanha lays out a five-stage process for moving from digitally automating processes here and there to making digital technology the very backbone of your company. For each of these five stages, Saldanha describes two associated disciplines vital to the success of that stage and a checklist of questions to keep you on track.You want to disrupt before you are disrupted--be the next Netflix, not the next Blockbuster. Using dozens of case studies and his own considerable experience, Saldanha shows how digital transformation can be made routinely successful, and instead of representing an existential threat, it will become the opportunity of a lifetime.
More Programming Pearls: Confessions of a Coder
Jon L. Bentley - 1988
These techniques deal with real programs and they are realistically illustrated, using the C and Awk languages. Bentley also provides the reader with some tricks of the programmer's trade, like a collection of rules of thumb and hints for finding simple solutions to hard problems.These essays also originally appeared in the author's column in Communication of the ACM, and have been substantially revised, incorporating new sections, problems, and reader comments.
CCNP ROUTE 642-902 Official Certification Guide (Official Cert Guide)
Wendell Odom - 2009
Book annotation not available for this title.Title: CCNP ROUTE 642-902Author: Odom, WendellPublisher: Pearson P T RPublication Date: 2010/02/09Number of Pages: 730Binding Type: HARDCOVERLibrary of Congress: 2009049908
Hood Love and Loyalty
E.L. Griffin - 2017
Meet Larissa Bradshaw, a strong-willed hardworking girl. After her parents turn their backs on her she closes her heart to love and becomes determined to make something of herself despite her situation. She meets Messiah “Money” Lawson and everything changes. Messiah is an up and coming boss in the streets. He’s a nigga that’s respected and feared by all. From the moment he first sees Larissa he has to have her. The two share an instant connection and can’t seem to get enough of each other. Messiah’s lifestyle and desire for money brings jealousy, temptation, and violence threatening to ruin what he and Larissa are trying to build. Follow Larissa and Messiah on their journey of ups and downs as they fight for the love, loyalty and life they always wanted.
Awaken Your Power Within: Let Go of Fear. Discover Your Infinite Potential. Become Your True Self.
Gerry Hussey - 2021
Now You See It: How the Brain Science of Attention Will Transform the Way We Live, Work, and Learn
Cathy N. Davidson - 2011
When Cathy Davidson and Duke University gave free iPods to the freshman class in 2003, critics said they were wasting their money. Yet when students in practically every discipline invented academic uses for their music players, suddenly the idea could be seen in a new light-as an innovative way to turn learning on its head. This radical experiment is at the heart of Davidson's inspiring new book. Using cutting-edge research on the brain, she shows how "attention blindness" has produced one of our society's greatest challenges: while we've all acknowledged the great changes of the digital age, most of us still toil in schools and workplaces designed for the last century. Davidson introduces us to visionaries whose groundbreaking ideas-from schools with curriculums built around video games to companies that train workers using virtual environments-will open the doors to new ways of working and learning. A lively hybrid of Thomas Friedman and Norman Doidge, Now You See It is a refreshingly optimistic argument for a bold embrace of our connected, collaborative future.
Thinking in JavaScript
Aravind Shenoy - 2014
Before we delve into the intricacies of JavaScript, we need to know why it is used. While HTML tells your browser how your webpage will look, JavaScript is used for dynamic content and to add functionality. Using this book, you will understand the concept of JavaScript and its use in web designing. You will also have a look at jQuery in general. You will learn about Functions, Operators, the concept of Variables, Conditions and Loops, Arrays, and the basics of jQuery in this book. Instead of wandering through loads of theory, we have used practical examples in this book. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output thereby understanding the subtle nuances of JavaScript. By the end of the book, with practice, you can achieve better things and get more acquainted with JavaScript.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
Becoming Facebook: The 10 Challenges That Defined the Company That's Disrupting the World
Michael Hoefflinger - 2017
But for the people who actually molded this great idea into a game-changing $300 billion company, the experience was far more tumultuous and uncertain than we might expect.Mike Hoefflinger was one of those Facebook insiders. As a computer engineer turned marketing innovator who worked with COO Sheryl Sandberg, Hoefflinger had a front-row seat to the company's growing pains, stumbles, and reinventions.Becoming Facebook tells the coming-of-age story of the now venerable giant. Filled with insights and anecdotes from crises averted and challenges solved, the book tracks the company's development, uncovering lessons learned on its way to greatness: How Facebook recovered from its "disastrous" IPO ● How the growth team achieved the impossible ● Why Facebook's News Feed ads were the company's most important business decision ever ● How Google+ attacked and lost ● Why—and how—Instagram and WhatsApp were added to the mix ● What the company does to win the talent wars ● What makes Zuckerberg, Sandberg, Cox, and other A-teamers tick ● Which products and technical advancements are on the horizon and why ● And much moreIntimate, fast-paced, and deeply informative, Becoming Facebook shares the true story of how Zuckerberg joined the ranks of iconic CEOs like Steve Jobs, Larry Page, and Jeff Bezos—as Facebook grows up, overcomes setbacks, and works to connect the world.