The Future of Leadership: Rise of Automation, Robotics and Artificial Intelligence


Brigette Tasha Hyacinth - 2017
    If we don't candidly answer the pertinent questions, we will only paint a false picture.We are standing at a crucial and pivotal point in history. It's time for diversity in AI. This unprecedented technology will affect society as a whole and we need individuals from diverse disciplines and backgrounds to join the discussion. The issues surrounding AI can't be left to a small group of scientists, technologists or business executives to address. Our future and our children's future are at stake.More than ever, we need leaders who will stand on integrity and who will put people first.Do you want to take a glimpse into the future of leadership? The Future of Leadership: Rise of Automation, Robotics and Artificial Intelligence offers the most comprehensive view of what is taking place in the world of AI and emerging technologies, and gives valuable insights that will allow you to successfully navigate the tsunami of technology that is coming our way.

Obfuscation: A User's Guide for Privacy and Protest


Finn Brunton - 2015
    They are calling us not to the barricades but to our computers, offering us ways to fight today’s pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users’ search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.

8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT


Susan Cramm - 2010
    Instead, you get endless rules and regulations, not to mention processes, projects, and technologies that deliver too little, too late, for too much. It's frustrating!How to build a relationship that puts you firmly in control and produces the business results you need? In The 8 Things We Hate About IT, Susan Cramm provides the answers.Start by understanding differences between operational and IT managers - in backgrounds, personality, pressures, and incentives. Cramm explains how differences prevent operational managers and IT from communicating what, why, and how they do what they do.Citing case studies and stories, the author then presents practical strategies for overcoming the difficulty. These include seeing things from your IT partners' perspective, developing a single version of 'truth,' and assuming accountability for IT just as you've done for management of your firm's financial and human resources.Brutally honest, provocative, and filled with sound advice, this book reveals that the key to solving the IT problem is decidedly un-IT: it's a deeper understanding of human behavior, including how to apply your leadership skills to the world of IT.

The Pragmatic Programmer: From Journeyman to Master


Andy Hunt - 1999
    It covers topics ranging from personal responsibility and career development to architectural techniques for keeping your code flexible and easy to adapt and reuse. Read this book, and you'll learn how toFight software rot; Avoid the trap of duplicating knowledge; Write flexible, dynamic, and adaptable code; Avoid programming by coincidence; Bullet-proof your code with contracts, assertions, and exceptions; Capture real requirements; Test ruthlessly and effectively; Delight your users; Build teams of pragmatic programmers; and Make your developments more precise with automation. Written as a series of self-contained sections and filled with entertaining anecdotes, thoughtful examples, and interesting analogies, The Pragmatic Programmer illustrates the best practices and major pitfalls of many different aspects of software development. Whether you're a new coder, an experienced programmer, or a manager responsible for software projects, use these lessons daily, and you'll quickly see improvements in personal productivity, accuracy, and job satisfaction. You'll learn skills and develop habits and attitudes that form the foundation for long-term success in your career. You'll become a Pragmatic Programmer.

Algorithms


Robert Sedgewick - 1983
    This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing -- including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering, not to mention students who use computation in the liberal arts.The companion web site, algs4.cs.princeton.edu contains An online synopsis Full Java implementations Test data Exercises and answers Dynamic visualizations Lecture slides Programming assignments with checklists Links to related material The MOOC related to this book is accessible via the "Online Course" link at algs4.cs.princeton.edu. The course offers more than 100 video lecture segments that are integrated with the text, extensive online assessments, and the large-scale discussion forums that have proven so valuable. Offered each fall and spring, this course regularly attracts tens of thousands of registrants.Robert Sedgewick and Kevin Wayne are developing a modern approach to disseminating knowledge that fully embraces technology, enabling people all around the world to discover new ways of learning and teaching. By integrating their textbook, online content, and MOOC, all at the state of the art, they have built a unique resource that greatly expands the breadth and depth of the educational experience.

How to Find Out Anything: From Extreme Google Searches to Scouring Government Documents, a Guide to Uncovering Anything about Everyone and Everything


Don MacLeod - 2012
    From top CEO's salaries to police records, you'll learn little-known tricks for discovering the exact information you're looking for. You'll learn:-How to really tap the power of Google, and why Google is the best place to start a search, but never the best place to finish it. -The scoop on vast, yet little-known online resources that search engines cannot scour, such as refdesk.com, ipl.org, the University of Michigan Documents Center, and Project Gutenberg, among many others. -How to access free government resources (and put your tax dollars to good use). -How to find experts and other people with special knowledge. -How to dig up seemingly confidential information on people and businesses, from public and private companies to non-profits and international companies.Whether researching for a term paper or digging up dirt on an ex, the advice in this book arms you with the sleuthing skills to tackle any mystery.

Analyzing the Analyzers


Harlan Harris - 2013
    

Only the Paranoid Survive. Lessons from the CEO of INTEL Corporation


Andrew S. Grove - 1988
    Under Andrew Grove's leadership, Intel has become the world's largest computer chipmaker, the 5th most admired company in America, and the 7th most profitable company among the Fortune 500. Few CEOs can claim this level of success. Grove attributes much of it to the philosophy and strategy he has learned the hard way as he steered Intel through a series of potential major disasters. There are moments in any business when massive change occurs, when all the rules of business shift fast, furiously and forever. Grove calls such moments strategic inflection points (SIPs), and he has lived through several. They can be set off by almost anything - by mega competition, an arcane change in regulations, or by a seemingly modest change in technology. They are not always easy to spot - but you can't hide from them. Intel's first SIP was when the Japanese started producing better-quality, lower-cost memory chips. It took Grove three years and huge losses to recognize that he had to rethink and reposition the company to become, once again, leader in its field.Grove extrapolates the lessons he has learned from this and other SIPs - for instance the drama of the Pentium flaw, and the SIP brought on by the Internet - to reveal a unique insight into the management of change. He recounts strategies from other companies and examines his own record of success and failure. Only the Paranoid Survive is a classic lesson in leadership skills that every manager in every industry will benefit from. Every manager must assume that something will change - very soon.

Privacy is Power: Reclaiming Democracy in the Digital Age


Carissa Véliz - 2020
    Before you’ve even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your ‘suggested friends’ on Facebook, you continually compromise your privacy.Without your permission, or even your awareness, tech companies are harvesting your information, your location, your likes, your habits, and sharing it amongst themselves. They're not just selling your data. They’re selling the power to influence you. Even when you’ve explicitly asked them not to. And it's not just you. It's all your contacts too.Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power and democracy, we must protect our privacy.What can we do? So much is at stake. Our phones, our TVs, even our washing machines are spies in our own homes. We need new regulation. We need to pressure policy-makers for red lines on the data economy. And we need to stop sharing and to adopt privacy-friendly alternatives to Google, WhatsApp and other online platforms.Short, terrifying, practical: Privacy is Power highlights the implications of our laid-back attitudes to data, and sets out how we can reclaim control.

Bit by Bit: How P2P Is Freeing the World


Jeffrey Tucker - 2015
    Jeffrey Tucker, CLO of Liberty.me and Distinguished Fellow of the Foundation for Economic Education, argues that peer-to-peer technology is forging a new and brighter social, economic, and political order. People tend to look at innovations in isolation. Here is my new e-reader. Here is an app I like. Here is my new mobile device and computer. Even bitcoin is routinely analyzed and explained in terms of its properties as an alternative to national currencies, as if there were no more than that at stake.But actually there is a historical trajectory at work here, one that we can trace through its logic, implementation, and spread. It’s the same logic that led from the dial phone at the county store, operated by people pulling and plugging in wires, to the wireless smartphone in your pocket that contains the whole store of human knowledge. It’s all about technology in the service of individuation.Once you understand the driving ethos — voluntarism, creativity, networks, individual initiative — you can see the outlines of a new social structure emerging within our time, an order that defies a century of top-down planning and nation-state restrictionism.It is coming about not because of political reform. It is not any one person’s creation. It is not happening because a group of elite intellectuals advocated it. The new world is emerging organically, and messily, from the ground up, as an extension of unrelenting creativity and experimentation. In the end, it is emerging out of an anarchist order that no one in particular controls and no one in particular can fully understand."The building of universal prosperity is a process that unfolds bit by bit through decentralized decision making and improvements at the margin through trial-and-error. To continue this process, we need understanding, patience, and dreams. Jeffrey Tucker’s book is an excellent guide to all three.” ~ Patrick Byrne, CEO of Overstock.com, from the introduction. “In Bitcoin’s brief existence Jeffrey Tucker has become one of its leading proponents. In this book we can see exactly why. Many people think of bitcoin as just money, but Mr. Tucker is able to explain, in a way that is easily understandable by all, the tsunami of innovation that bitcoin is about to release upon the world.” ~ Roger Ver, Bitcoin investor, from the Foreword

HTML and CSS: Design and Build Websites


Jon Duckett - 2011
    Joining the professional web designers and programmers are new audiences who need to know a little bit of code at work (update a content management system or e-commerce store) and those who want to make their personal blogs more attractive. Many books teaching HTML and CSS are dry and only written for those who want to become programmers, which is why this book takes an entirely new approach. • Introduces HTML and CSS in a way that makes them accessible to everyone—hobbyists, students, and professionals—and it’s full-color throughout • Utilizes information graphics and lifestyle photography to explain the topics in a simple way that is engaging • Boasts a unique structure that allows you to progress through the chapters from beginning to end or just dip into topics of particular interest at your leisureThis educational book is one that you will enjoy picking up, reading, then referring back to. It will make you wish other technical topics were presented in such a simple, attractive and engaging way!

Introducing Windows 10 for IT Professionals


Ed Bott - 2015
    This guide introduces new features and capabilities, providing a practical, high-level overview for IT professionals ready to begin deployment planning now. This book is a preview, a work in progress about a work in progress. It offers a snapshot of the Windows 10 Technical Preview as of April 2015, on the eve of the BUILD Developers’ Conference in San Francisco.

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Zucked: Waking Up to the Facebook Catastrophe


Roger McNamee - 2019
    He had mentored many tech leaders in his illustrious career as an investor, but few things had made him prouder, or been better for his fund's bottom line, than his early service to Mark Zuckerberg. Still a large shareholder in Facebook, he had every good reason to stay on the bright side. Until he simply couldn't. ZUCKED is McNamee's intimate reckoning with the catastrophic failure of the head of one of the world's most powerful companies to face up to the damage he is doing. It's a story that begins with a series of rude awakenings. First there is the author's dawning realization that the platform is being manipulated by some very bad actors. Then there is the even more unsettling realization that Zuckerberg and Sheryl Sandberg are unable or unwilling to share his concerns, polite as they may be to his face."

Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy


George Gilder - 2018
    Gilder says or writes is ever delivered at anything less than the fullest philosophical decibel... Mr. Gilder sounds less like a tech guru than a poet, and his words tumble out in a romantic cascade." “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.” — Peter Thiel, founder of PayPal and Palantir Technologies and author of Zero to One: Notes on Startups, or How to Build the Future The Age of Google, built on big data and machine intelligence, has been an awesome era. But it’s coming to an end. In Life after Google, George Gilder—the peerless visionary of technology and culture—explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns. Google’s astonishing ability to “search and sort” attracts the entire world to its search engine and countless other goodies—videos, maps, email, calendars….And everything it offers is free, or so it seems. Instead of paying directly, users submit to advertising. The system of “aggregate and advertise” works—for a while—if you control an empire of data centers, but a market without prices strangles entrepreneurship and turns the Internet into a wasteland of ads. The crisis is not just economic. Even as advances in artificial intelligence induce delusions of omnipotence and transcendence, Silicon Valley has pretty much given up on security. The Internet firewalls supposedly protecting all those passwords and personal information have proved hopelessly permeable. The crisis cannot be solved within the current computer and network architecture. The future lies with the “cryptocosm”—the new architecture of the blockchain and its derivatives. Enabling cryptocurrencies such as bitcoin and ether, NEO and Hashgraph, it will provide the Internet a secure global payments system, ending the aggregate-and-advertise Age of Google. Silicon Valley, long dominated by a few giants, faces a “great unbundling,” which will disperse computer power and commerce and transform the economy and the Internet. Life after Google is almost here.   For fans of "Wealth and Poverty," "Knowledge and Power," and "The Scandal of Money."