Book picks similar to
Internet Wars: The Struggle for Power in the 21st Century by Fergus Hanson
non-fiction
kevin
giveaway-add
information-age
Consent of the Networked: The Worldwide Struggle for Internet Freedom
Rebecca MacKinnon - 2012
For every story about the web’s empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. Sudden changes in Facebook’s features and privacy settings have exposed identities of protestors to police in Egypt and Iran. Apple removes politically controversial apps at the behest of governments as well as for its own commercial reasons. Dozens of Western companies sell surveillance technology to dictatorships around the world. Google struggles with censorship demands from governments in a range of countries — many of them democracies — as well as mounting public concern over the vast quantities of information it collects about its users.In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace make decisions that affect our physical freedom — but without our consent. Yet the traditional solution to unaccountable corporate behavior — government regulation — cannot stop the abuse of digital power on its own, and sometimes even contributes to it.A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.
Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)
Artemis Caro - 2017
As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn:
A Brief History of Blockchain Technology
Blockchain Basics: Managing Digital Transactions
What is a Distributed Ledger?
Blockchain Beyond Bitcoin
Implications Of Blockchain: Big Data, Privacy & Personal Data
Profiting from Blockchain Technologies
Limitations & Challenges of Blockchain
The Future of Blockchain
For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets.
This is ALL About To Change...
Make sure you take action and join the Financial Revolution by reading this book!
If Then: How the Simulmatics Corporation Invented the Future
Jill Lepore - 2020
Jill Lepore, best-selling author of These Truths, came across the company’s papers in MIT’s archives and set out to tell this forgotten history, the long-lost backstory to the methods, and the arrogance, of Silicon Valley.Founded in 1959 by some of the nation’s leading social scientists—“the best and the brightest, fatally brilliant, Icaruses with wings of feathers and wax, flying to the sun”—Simulmatics proposed to predict and manipulate the future by way of the computer simulation of human behavior. In summers, with their wives and children in tow, the company’s scientists met on the beach in Long Island under a geodesic, honeycombed dome, where they built a “People Machine” that aimed to model everything from buying a dishwasher to counterinsurgency to casting a vote. Deploying their “People Machine” from New York, Washington, Cambridge, and even Saigon, Simulmatics’ clients included the John F. Kennedy presidential campaign, the New York Times, the Department of Defense, and dozens of major manufacturers: Simulmatics had a hand in everything from political races to the Vietnam War to the Johnson administration’s ill-fated attempt to predict race riots. The company’s collapse was almost as rapid as its ascent, a collapse that involved failed marriages, a suspicious death, and bankruptcy. Exposed for false claims, and even accused of war crimes, it closed its doors in 1970 and all but vanished. Until Lepore came across the records of its remains.The scientists of Simulmatics believed they had invented “the A-bomb of the social sciences.” They did not predict that it would take decades to detonate, like a long-buried grenade. But, in the early years of the twenty-first century, that bomb did detonate, creating a world in which corporations collect data and model behavior and target messages about the most ordinary of decisions, leaving people all over the world, long before the global pandemic, crushed by feelings of helplessness. This history has a past; If Then is its cautionary tale.
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
Francis Dacosta - 2013
Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry
Future Perfect: The Case for Progress in a Networked Age
Steven Johnson - 2012
Steven Johnson proposes that a new model of political change is on the rise, transforming everything from local government to classrooms to health care. It’s a compelling new political worldview that breaks with traditional categories of liberal or conservative thinking. Johnson explores this innovative vision through a series of fascinating narratives: from the “Miracle on the Hudson” to the planning of the French railway system; from the battle against malnutrition in Vietnam to a mysterious outbreak of strange smells in downtown Manhattan; from underground music video artists to the invention of the Internet itself. At a time when the conventional wisdom holds that the political system is hopelessly gridlocked with old ideas, Future Perfect makes the timely and uplifting case that progress is still possible.
Khaki Files: Inside Stories of Police Missions
Neeraj Kumar Neeraj Kumar - 2019
In Khaki Files, Neeraj Kumar, a former Delhi Police Commissioner revisits many such high profile police cases of his career -from investigation of one of the biggest lottery frauds in the country to foiled ISI attempt to kill Tarun Tejpal and Anirudh Behal of Tehalka-bringing to light numerous achievements of the country's police force, otherwise largely reviled and ridiculed.
I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy
Lori Andrews - 2012
Social networks are the defining cultural movement of our time. Over a half a billion people are on Facebook alone. If Facebook were a country, it would be the third largest nation in the world. But while that nation appears to be a comforting small town in which we can share photos of friends and quaint bits of trivia about our lives, it is actually a lawless battle zone—a frontier with all the hidden and unpredictable dangers of any previously unexplored place. Social networks offer freedom. An ordinary individual can be a reporter, alerting the world to breaking news of a natural disaster or a political crisis. A layperson can be a scientist, participating in a crowd-sourced research project. Or an investigator, helping cops solve a crime. But as we work and chat and date (and sometimes even have sex) over the web, traditional rights may be slipping away. Colleges and employers routinely reject applicants because of information found on social networks. Cops use photos from people’s profiles to charge them with crimes—or argue for harsher sentences. Robbers use postings about vacations to figure out when to break into homes. At one school, officials used cameras on students’ laptops to spy on them in their bedrooms. The same power of information that can topple governments can also topple a person’s career, marriage, or future. What Andrews proposes is a Constitution for the web, to extend our rights to this wild new frontier. This vitally important book will generate a storm of attention.
The Race For A New Game Machine: Creating the Chips Inside the XBox and the Playstation 3
David Shippy - 2009
This is the inside story of the race to create a revolutionary chip to power the next generation consoles from Microsoft and Sony.
Tools and Weapons: The Promise and the Peril of the Digital Age
Brad Smith - 2019
This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world.In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvelous and urgently necessary contribution to that effort.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.
Hackers & Painters: Big Ideas from the Computer Age
Paul Graham - 2004
Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls “an intellectual Wild West.”The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
The Cluetrain Manifesto
Rick Levine - 2000
A rich tapestry of anecdotes, object lessons, parodies, insights, and predictions, The Cluetrain Manifesto illustrates how the Internet has radically reframed the seemingly immutable laws of business--and what business needs to know to weather the seismic aftershocks.
Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom)
Adam Fisher - 2018
It will take us all back to our roots in the counterculture, and will remind us of the true nature of the innovation process, before we tried to tame it with slogans and buzzwords." -- Po Bronson, #1 New York Times bestselling author of The Nudist on the Late Shift and NurtureshockA candid, colorful, and comprehensive oral history that reveals the secrets of Silicon Valley -- from the origins of Apple and Atari to the present day clashes of Google and Facebook, and all the start-ups and disruptions that happened along the way.Rarely has one economy asserted itself as swiftly--and as aggressively--as the entity we now know as Silicon Valley. Built with a seemingly permanent culture of reinvention, Silicon Valley does not fight change; it embraces it, and now powers the American economy and global innovation. So how did this omnipotent and ever-morphing place come to be? It was not by planning. It was, like many an empire before it, part luck, part timing, and part ambition. And part pure, unbridled genius...Drawing on over two hundred in-depth interviews, VALLEY OF GENIUS takes readers from the dawn of the personal computer and the internet, through the heyday of the web, up to the very moment when our current technological reality was invented. It interweaves accounts of invention and betrayal, overnight success and underground exploits, to tell the story of Silicon Valley like it has never been told before. Read it to discover the stories that Valley insiders tell each other: the tall tales that are all, improbably, true.
The Dirty Version: On Stage, In the Studio, and In the Streets with Ol' Dirty Bastard
Buddha Monk - 2014
ODB was one of the Clan’s wildest icons and most inventive performers, and when he died of an overdose in 2004 at the age of thirty-five, millions of fans mourned the loss. ODB lives on in epic proportions and his antics are legend: he once picked up his welfare check in a limousine; lifted a burning car off a four-year-old girl in Brooklyn; stole a fifty-dollar pair of sneakers on tour at the peak of his success. Many have questioned whether his stunts were carefully calculated or the result of paranoia and mental instability.Now, Dirty’s friend since childhood, Buddha Monk, a Wu-Tang collaborator on stage and in the studio, reveals the truth about the complex and talented performer. From their days together on the streets of Brooklyn to the meteoric rise of Wu-Tang’s star, from bouts in prison to court-mandated rehab, from Dirty’s favorite kind of pizza to his struggles with fame and success, Buddha tells the real story—The Dirty Version—of the legendary rapper.
PCs for Dummies
Dan Gookin - 1992
They have also sprouted new and wondrous capabilities at a dizzying pace. This 11th Edition of the all-time bestselling PC guide has been polished and honed to deliver everything you need to know about your twenty-first-century PC -- from what plugs into what to adjusting your monitor to burning DVDs, and much more.Whether you want to go online, install a firewall, live the digital life, or finally get a handle on the whole computer software concept, this fun, plain-English handbook is here to answer all your questions PC questions. You'll find out why Windows Vista is the way to go and how to use it to get everywhere else. And, you'll pick up Web and email tricks and learn about all the new levels of PC security. Discover how to: Set up your PC Use Vista menus Store your stuff on Memory Cards Record live TV Download digital photos Connect to a wireless network Explore the Internet safely Print perfect documents, photos, and more Use your PC as the new hub of your digital worldComplete with helpful hints on how to avoid beginner mistakes, a list of extras and accessories you may want for your PC, and insider tips from a PC guru. PCs for Dummies, 11th Edition is the one PC accessory you can't do without.