Book picks similar to
The Long Arm of Moore's Law: Microelectronics and American Science by Cyrus C.M. Mody
cold-war
computers
history-of-science-and-technology
MacBook For Dummies
Mark L. Chambers - 2006
In addition to the freedom to work wherever you happen to be, a MacBook offers youA portable darkroom with iPhoto Mobile music, podcasts, and Internet radio GarageBand software that lets you make your own music The ability to create and share original movies and DVDs Safari, a safer and ultra-cool Web browser, and all the other OS X advantages Whether you already have your new MacBook or are still weighing the pros and cons of various models, MacBook For Dummies is a valuable resource. For newcomers to laptop land, it's packed with basic information about using and caring for Mac laptops. It also walks you through Mac OS X, the revolutionary Macintosh operating system that makes your laptop tick. Then it's on to all the fun stuff you can do with your MacBook, like making music, editing photos and turning them into a book, creating DVDs on the road, or adding a wireless keyboard. MacBook For Dummies will help youSet up your MacBook and get acquainted with all the features of the Mac OS X Tiger operating system Use the Safari Web browser and Apple's .Mac Internet subscriber service, connect your MacBook to a printer, and communicate with your cell phone or PDA Connect to a wired or wireless network Make the most of the iLife applications that come with your MacBook--iTunes, iPhoto, iMovie HD, iDVD, and GarageBand Keep your MacBook and your data safe, troubleshoot any problems, and maintain your system Popular For Dummies author Mark Chambers has loaded this fun book with tips, ideas, and his famous "Mark's Maxims"--power user advice that will guide you around the pitfalls and make you a Macxpert in no time. From latptop basics all the way to upgrading and adding memory, MacBook For Dummies will be your MacBook's best friend.
Marketing To The Social Web: How Digital Customer Communities Build Your Business
Larry Weber - 2007
CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities." -Mark Fuller, Chairman, Monitor Group "Consumers are using technology to grab power from companies, the media, and the government. Marketing to the Social Web succinctly outlines how institutions can survive and win in this chaotic new world, and lays out the revised rules of engagement-ignore them at your peril." -George F. Colony, CEO, Forrester Research, Inc. "Larry has brought pragmatic and useful recommendations to help brand builders manage the complexity of social interaction in a digital age. I was pleased to read a book that actually suggests how to do something with social networks, instead of just ponder them." -David Kenny, Chairman and Chief Executive Officer, Digitas Inc. "Where's the allure of social 2.0? Brands can talk . . . customers talk louder! Digital influence has arrived." -Jeff Taylor, CEO, Eons and Founder of Monster.com "Larry Weber provides a simple and effective roadmap of the new customer information highway. Marketing to the Social Web is a valuable tool that will give everyone the confidence and know-how to compete in this fast-growing marketplace of ideas." -Steve Harris, Vice President, Global Communications, General Motors Corporation "As all lines and boundaries are washed away by the Web, Weber describes how to become part of the sea versus the sand." -Nicholas Negroponte, Chairman, One Laptop per Child
Steve Jobs the Journey is the Reward: The Journey is the Reward
Jeffrey S. Young - 1987
An unvarnished view of an extraordinary man and the multimillion dollar business he built--and lost.
The Decline and Fall of IBM: End of an American Icon?
Robert Cringely - 2014
Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.
Reagan
Brett Harper - 2015
He was the unlikeliest of presidential candidates - dismissed by opponents as a movie actor, a right-winger trying to undo the work of liberals stretching back to Franklin Roosevelt. Yet Ronald Reagan made it to the White House, taking office in a time of economic turmoil, waning prestige abroad, and a general damping of the American spirit. Reagan's patriotism, wit, and optimism lifted the nation and brought it through a number of crises. An effective leader who understood the power of words, stagecraft, and symbolism, Reagan was a paradoxical blend of ideology and pragmatism. Even as he increased the tension underlying the Cold War with the Soviet Union, he embarked on a series of summits with Mikhail Gorbachev that helped defuse the arms race. When he left office, prosperity had returned and the Soviet state had collapsed. People around the world still revere him for the dawning of what he called "morning in America." Here is his story.
Windows Presentation Foundation Unleashed
Adam Nathan - 2006
Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan. - Covers everything you need to know about Extensible Application Markup Language (XAML) - Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more - Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D - Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more - Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more - Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes - Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows - Explains how to create first-class custom controls for WPF - Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies - Explains how to exploit new Windows Vista features in WPF applications
How to Count (Programming for Mere Mortals, #1)
Steven Frank - 2011
unsigned numbers- Floating point and fixed point arithmeticThis short, easily understood book will quickly get you thinking like a programmer.
The End of the Line: The Siege of Khe Sanh
Robert Pisor - 1982
It was the most spectacular battle of the entire war. For 6,000 trapped marines, it was a nightmare; for President Lyndon Johnson, an obsession. For General Westmoreland, it was to be the final vindication of technological weaponry; and for General Giap, the architect of the French defeat at Dien Bien Phu, it was a spectacular ruse masking troops moving south for the Tet offensive. In a compelling narrative, Robert Pisor sets forth the history, the politics, the strategies, and, above all, the desperate reality of the battle that became the turning point of the United States's involvement in Vietnam.
Fire in the Streets: The Battle for Hue, Tet 1968
Eric Hammel - 1991
Marine Corps units in urban combat in Hue City during the 1968 Communist Tet Offensive. The focus of the story is on small units and individual fighting men as they grapple with advancing through the unfamiliar terrain across an urban battlefield. Fire in the Streets spent many years on official U.S. Marine Corps professional reading lists as the best example of modern military operations in urban terrain.
The Story of Che Guevara
Lucía Álvarez de Toledo - 2010
But for the rest of the world he is different: a charismatic revolutionary who redrew the political map of Latin America and gave hope to those resisting colonialism everywhere. In The Story of Che Guevara Lucia Alvarez de Toledo follows Che from his birth in Rosario and his early years in his parent's mate plantation, to his immortal motorcycle journeys across South America, his role at the heart of Castro's new Cuban government, and through to the unforgiving jungle that formed the backdrop to his doomed campaigns in the Congo and Bolivia. Based on interviews with Che's family and those who knew him intimately, this is an accessible biography that concentrates on the man rather than the icon. With the political developments in Latin America in the twenty-first century, his influence can be seen to be even greater than it was during his lifetime and The Story of Che Guevara is a perfect introduction to an extraordinary man.
Attack of the Flickering Skeletons: More Terrible Old Games You’ve Probably Never Heard Of
Stuart Ashen - 2017
You will probably wish you still didn’t.YouTube sensation Stuart Ashen is back with his second instalment of terrible old computer games you’ve probably never heard of... because what the world needs right now is to know exactly how bad Domain of the Undead for the Atari 8-bit computers was.Attack of the Flickering Skeletons is even bigger than the original Terrible Old Games You’ve Probably Never Heard Of – this second excavation of gaming’s buried past will not only unearth more appalling excuses for digital entertainment, but also feature guest contributors and several special interest chapters not based around single specific games.These are NOT the games you’ve heard of a million times in YouTube videos. This is a compilation of truly obscure and dreadful games. Dripping with wry humour and featuring the best, worst graphics from the games themselves, this book encapsulates the atrocities produced in the days of tight budgets and low quality controls.These are even more appalling games that leaked from the industry’s tear ducts, taken down from the dusty shelves of history by the man who has somehow made a living by sticking rubbish on a sofa and talking about it.
A Whirlwind Tour of Python
Jake Vanderplas - 2016
This report provides a brief yet comprehensive introduction to Python for engineers, researchers, and data scientists who are already familiar with another programming language.Author Jake VanderPlas, an interdisciplinary research director at the University of Washington, explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.You’ll explore:- Python syntax basics and running Python codeBasic semantics of Python variables, objects, and operators- Built-in simple types and data structures- Control flow statements for executing code blocks conditionally- Methods for creating and using reusable functionsIterators, list comprehensions, and generators- String manipulation and regular expressions- Python’s standard library and third-party modules- Python’s core data science tools- Recommended resources to help you learn more
Networking for Systems Administrators (IT Mastery Book 5)
Michael W. Lucas - 2015
Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you:•How modern networks really work•The essentials of TCP/IP•The next-generation protocol, IPv6•The right tools to diagnose network problems, and how to use them•Troubleshooting everything from the physical wire to DNS•How to see the traffic you send and receive•Connectivity testing•How to communicate with your network team to quickly resolve problemsA systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.
The Bedford Incident
Mark Rascovich - 1964
It consists of three parts:
The War
is the cold war of the 1960’s, but on a little-publicized and bleakly isolated front where opposing naval forces secretly maneuver against each other in the eternally empty reaches of the Arctic Ocean. Here they contest for strategic stakes as vital as those of Berlin or Viet Nam.
The Chase
is by a modern American destroyer on the track of a Soviet submarine whose mission is to probe NATO defenses based on Greenland. The code-name of this brilliantly elusive submarine is Moby Dick. As the stalking action moves through the lonely vastness of a frozen desolation, some of the fatal obsession which cursed Captain Ahab and his Pequod seems mystically to afflict Captain Erik Finlander, USN, and his USS Bedford.
The Battle
is finally joined above the algaed hulk of a melancholy victim of one of the last traditional battleship engagements in the North Atlantic. While all the computer-controlled miracle weapons of modern anti-submarine warfare play their part, it is the far more terrifying obstinacy — and weakness — of inflamed human spirit which determines the ultimate outcome of this searing tale.
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
John Sammons - 2011
This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.