Book picks similar to
The IT Career Builder's Toolkit by Matthew Moran
at-home
not-read
not-read-much
self-improvment
Leadership That Gets Results
Daniel Goleman - 2001
This enables you to scan, absorb, and share the management insights with others. A leader's singular job is to get results. But even with all the leadership training programs and "expert" advice available, effective leadership still eludes many people and organizations. One reason, says Daniel Goleman, is that such experts offer advice based on inference, experience, and instinct, not on quantitative data. Now, drawing on research of more than 3,000 executives, Goleman explores which precise leadership behaviors yield positive results. He outlines six distinct leadership styles, each one springing from different components of emotional intelligence. Each style has a distinct effect on the working atmosphere of a company, division, or team, and, in turn, on its financial performance. The styles, by name and brief description alone, will resonate with anyone who leads, is led, or, as is the case with most of us, does both. Coercive leaders demand immediate compliance. Authoritative leaders mobilize people toward a vision. Affiliative leaders create emotional bonds and harmony. Democratic leaders build consensus through participation. Pacesetting leaders expect excellence and self-direction. And coaching leaders develop people for the future. The research indicates that leaders who get the best results don't rely on just one leadership style; they use most of the styles in any given week. Goleman details the types of business situations each style is best suitedfor, and he explains how leaders who lack one or more of these styles can expand their repertories. He maintains that with practice leaders can switch among leadership styles to produce powerful results, thus turning the art of leadership into a science.
Grumby
Andy Kessler - 2010
In this comic novel a band of hacker-geeks load state-of-the-art artificial intelligence, including working eyes, ears, spy software, and a smart mouth, into a bunch of old Furby dolls, re-christened Grumbies, network them together, sell millions, become rich and famous and make enemies/allies of Mossad, the CIA, Google, Microsoft, IRS, Goldman Sachs, the guys from Google, and Steve Jobs.
The Decline and Fall of IBM: End of an American Icon?
Robert Cringely - 2014
Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.
Modern Operating Systems
Andrew S. Tanenbaum - 1992
What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand computer applications--primarily in the areas of multimedia, parallel and distributed computing, and security. The development of faster and more advanced hardware has driven progress in software, including enhancements to the operating system. It is one thing to run an old operating system on current hardware, and another to effectively leverage current hardware to best serve modern software applications. If you don't believe it, install Windows 3.0 on a modern PC and try surfing the Internet or burning a CD. Readers familiar with Tanenbaum's previous text, Operating Systems, know the author is a great proponent of simple design and hands-on experimentation. His earlier book came bundled with the source code for an operating system called Minux, a simple variant of Unix and the platform used by Linus Torvalds to develop Linux. Although this book does not come with any source code, he illustrates many of his points with code fragments (C, usually with Unix system calls). The first half of Modern Operating Systems focuses on traditional operating systems concepts: processes, deadlocks, memory management, I/O, and file systems. There is nothing groundbreaking in these early chapters, but all topics are well covered, each including sections on current research and a set of student problems. It is enlightening to read Tanenbaum's explanations of the design decisions made by past operating systems gurus, including his view that additional research on the problem of deadlocks is impractical except for "keeping otherwise unemployed graph theorists off the streets." It is the second half of the book that differentiates itself from older operating systems texts. Here, each chapter describes an element of what constitutes a modern operating system--awareness of multimedia applications, multiple processors, computer networks, and a high level of security. The chapter on multimedia functionality focuses on such features as handling massive files and providing video-on-demand. Included in the discussion on multiprocessor platforms are clustered computers and distributed computing. Finally, the importance of security is discussed--a lively enumeration of the scores of ways operating systems can be vulnerable to attack, from password security to computer viruses and Internet worms. Included at the end of the book are case studies of two popular operating systems: Unix/Linux and Windows 2000. There is a bias toward the Unix/Linux approach, not surprising given the author's experience and academic bent, but this bias does not detract from Tanenbaum's analysis. Both operating systems are dissected, describing how each implements processes, file systems, memory management, and other operating system fundamentals. Tanenbaum's mantra is simple, accessible operating system design. Given that modern operating systems have extensive features, he is forced to reconcile physical size with simplicity. Toward this end, he makes frequent references to the Frederick Brooks classic The Mythical Man-Month for wisdom on managing large, complex software development projects. He finds both Windows 2000 and Unix/Linux guilty of being too complicated--with a particular skewering of Windows 2000 and its "mammoth Win32 API." A primary culprit is the attempt to make operating systems more "user-friendly," which Tanenbaum views as an excuse for bloated code. The solution is to have smart people, the smallest possible team, and well-defined interactions between various operating systems components. Future operating system design will benefit if the advice in this book is taken to heart. --Pete Ostenson
Sony
John Nathan - 2001
Drawing on his unmatched expertise in Japanese culture and on unique, unlimited access to Sony's inner sanctum, John Nathan traces Sony's evolution from its inauspicious beginnings amid Tokyo's bomb-scarred ruins to its current worldwide success. "Richly detailed and revealing" (Wall Street Journal), the book examines both the outward successes and, as never before, the mysterious inner workings that have always characterized this company's top ranks. The result is "a different kind of business book, showing how personal relationships shaped one of the century's great global corporations" (Fortune).
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier - 1993
… The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
How To Prospect, Sell and Build Your Network Marketing Business With Stories
Tom Schreiter - 2014
a story. Facts are boring. Everyone represents a company with great facts. Our prospects have heard that all before. But with a story, everything changes. The prospect becomes involved in the story, and instantly
sees what you see
. And isn't that what you want? So forget the flip chart, the presentation book, the website, the PowerPoint, and the video. These are great tools
after
your prospect has made the mental decision to do business with you. Instead, use stories to get that "Yes" decision. Then you can do your regular boring, fact-filled presentation, but use this presentation as your new distributor's first training session. The difference is monumental. Instead of detailed explanation (facts) about what stories do inside your prospects' heads, I focused this book on the actual stories I use, word-for-word. You will love these stories, you will use them often, and you will definitely
enjoy the increased success
in your business. Join the top earners now and become a professional storyteller. Scroll up and order now and start enjoying some great MLM and network marketing stories to move your business forward.
Core Java 2, Volume I--Fundamentals (Core Series)
Cay S. Horstmann - 1999
A no-nonsense tutorial and reliable reference, this book features thoroughly tested real-world examples. The most important language and library features are demonstrated with deliberately simple sample programs, but they aren't fake and they don't cut corners. More importantly, all of the programs have been updated for J2SE 5.0 and should make good starting points for your own code. You won't find any toy examples here. This is a book for programmers who want to write real code to solve real problems. Cay S. Horstmann is a professor of computer science at San Jose State University. Previously he was vice president and chief technology officer of Preview Systems Inc. and a consultant on C++, Java, and Internet programming for major corporations, universities, and organizations. Gary Cornell has written or cowritten more than twenty popular computer books. He has a Ph.D. from Brown University and has been a visiting scientist at IBM Watson Laboratories, as well as a professor at the University of Connecticut.
Exactly What to Say: For Real Estate Agents
Phil M. Jones - 2019
The modern consumer is more educated and has more choices than ever before. Counterintuitively, this has led to more confusion, doubt and frustration in their real estate journey. Therein the opportunity lies.In 'EXACTLY WHAT TO SAY: FOR REAL ESTATE AGENTS', Phil M. Jones, Chris Smith, and Jimmy Mackin provide 30 Magic Words to help with the most common, critical, and difficult conversations real estate agents have today. If you are open-minded to a better way of selling, this book is for you. Imagine what it is going to feel like knowing exactly what to say when it matters the most. . .RUNNING TIME ⇒ 2hrs. and 14mins.©2019 Phil Jones (P)2019 Phil Jones
The B2B Social Media Book: Become a Marketing Superstar by Generating Leads with Blogging, LinkedIn, Twitter, Facebook, Email, and More
Kipp Bodnar - 2011
B2B marketers are undervalued and under appreciated in many companies. Social media and online marketing provide the right mix of rich data and reduction in marketing expenses to help transform a marketer into a superstar. The B2B Social Media Book provides B2B marketers with actionable advice on leveraging blogging, LinkedIn, Twitter, Facebook and more, combined with key strategic imperatives that serve as the backbone of effective B2B social media strategies.This book serves as the definitive reference for B2B marketers looking to master social media and take their career to the next level.Describes a methodology for generating leads using social media Details how to create content offers that increase conversion rates and drive leads from social media Offers practical advice for incorporating mobile strategies into the marketing mix Provides a step-by-step process for measuring the return on investment of B2B social media strategies The B2B Social Media Book will help readers establish a strong social media marketing strategy to generate more leads, become a marketing superstar in the eye of company leaders, and most importantly, contribute to business growth.
Automate the Boring Stuff with Python: Practical Programming for Total Beginners
Al Sweigart - 2014
But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""
The Language of SQL
Larry Rockoff - 2010
For SQL beginners, it's more important for a book to focus on general concepts and offer clear explanations and examples of what the various statements can accomplish. This is that beginner book. A number of features make The LANGUAGE OF SQL unique among introductory SQL books. First, you will not be required to download software or sit with a computer as you read the text. The intent of this book is to provide examples of SQL usage that can be understood simply by reading them. Second, topics are organized in an intuitive and logical sequence. SQL keywords are introduced one at a time, allowing you to build on your prior understanding as you encounter new words and concepts. Finally, this book covers the syntax of three widely used databases: Microsoft SQL Server, MySQL, and Oracle, with special "Database Differences" boxes that will show you any differences in the syntax among those three databases, as well as instructions on how to obtain and install free versions of the databases. This is the only book you'll need to gain a working knowledge of SQL and relational databases.
Things That Make Us Smart: Defending Human Attributes In The Age Of The Machine
Donald A. Norman - 1993
Norman explores the complex interaction between human thought and the technology it creates, arguing for the development of machines that fit our minds, rather than minds that must conform to the machine.Humans have always worked with objects to extend our cognitive powers, from counting on our fingers to designing massive supercomputers. But advanced technology does more than merely assist with thought and memory—the machines we create begin to shape how we think and, at times, even what we value. Norman, in exploring this complex relationship between humans and machines, gives us the first steps towards demanding a person-centered redesign of the machines that surround our lives.
Think Stats
Allen B. Downey - 2011
This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python.You'll work with a case study throughout the book to help you learn the entire data analysis process—from collecting data and generating statistics to identifying patterns and testing hypotheses. Along the way, you'll become familiar with distributions, the rules of probability, visualization, and many other tools and concepts.Develop your understanding of probability and statistics by writing and testing codeRun experiments to test statistical behavior, such as generating samples from several distributionsUse simulations to understand concepts that are hard to grasp mathematicallyLearn topics not usually covered in an introductory course, such as Bayesian estimationImport data from almost any source using Python, rather than be limited to data that has been cleaned and formatted for statistics toolsUse statistical inference to answer questions about real-world data
Introduction to Algorithms
Thomas H. Cormen - 1989
Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.