A Practical Guide to Linux Commands, Editors, and Shell Programming
Mark G. Sobell - 2005
The book is a complete revision of the commands section of Sobell's Practical Guide to Linux - a proven best-seller. The book is Linux distribution and release agnostic. It will appeal to users of ALL Linux distributions. Superior examples make this book the the best option on the market! System administrators, software developers, quality assurance engineers and others working on a Linux system need to work from the command line in order to be effective. Linux is famous for its huge number of command line utility programs, and the programs themselves are famous for their large numbers of options, switches, and configuration files. But the truth is that users will only use a limited (but still significant) number of these utilities on a recurring basis, and then only with a subset of the most important and useful options, switches and configuration files. This book cuts through all the noise and shows them which utilities are most useful, and which options most important. And it contains examples, lot's and lot's of examples. programmability. Utilities are designed, by default, to work wtih other utilities within shell programs as a way of automating system tasks. This book contains a superb introduction to Linux shell programming. And since shell programmers need to write their programs in text editors, this book covers the two most popular ones: vi and emacs.
Cybersexism: Sex, Gender and Power on the Internet
Laurie Penny - 2013
Millions found their voices in this brave new online world; it gave unheard masses the space to speak to each other without limits, across borders, both physical and social. It was supposed to liberate us from gender. But as more and more of our daily lives migrated on line, it seemed it did matter if you were a boy or a girl.’It's a tough time to be a woman on the internet. Over the past two generations, the political map of human relations has been redrawn by feminism and by changes in technology. Together they pose questions about the nature and organisation of society that are deeply challenging to those in power, and in both cases, the backlash is on. In this brave new world, old-style sexism is making itself felt in new and frightening ways. In Cybersexism, Laurie Penny goes to the dark heart of the matter and asks why threats of rape and violence are being used to try to silence female voices, analyses the structure of online misogyny, and makes a case for real freedom of speech – for everyone.
Clojure Applied: From Practice to Practitioner
Ben Vandgrift - 2015
You want to develop software in the most effective, efficient way possible. This book gives you the answers you’ve been looking for in friendly, clear language.We’ll cover, in depth, the core concepts of Clojure: immutable collections, concurrency, pure functions, and state management. You’ll finally get the complete picture you’ve been looking for, rather than dozens of puzzle pieces you must assemble yourself. First, we focus on Clojure thinking. You’ll discover the simple architecture of Clojure software, effective development processes, and how to structure applications. Next, we explore the core concepts of Clojure development. You’ll learn how to model with immutable data; write simple, pure functions for efficient transformation; build clean, concurrent designs; and structure your code for elegant composition. Finally, we move beyond pure application development and into the real world. You’ll understand your application’s configuration and dependencies, connect with other data sources, and get your libraries and applications out the door.Go beyond the toy box and into Clojure’s way of thinking. By the end of this book, you’ll have the tools and information to put Clojure’s strengths to work.https://pragprog.com/book/vmclojeco/c...
21 Lessons: What I've Learned from Falling Down the Bitcoin Rabbit Hole
Gigi - 2020
Like many others, I feel like I have learned more in the last couple of years studying Bitcoin than I have during two decades of formal education. The following lessons are a distillation of what I’ve learned. First published as an article series titled “What I’ve Learned From Bitcoin,” what follows can be seen as a third edition of the original series. Like Bitcoin, these lessons aren’t a static thing. I plan to work on them periodically, releasing updated versions and additional material in the future.Bitcoin is an inexhaustible teacher, which is why I do not claim that these lessons are all-encompassing or complete. They are a reflection of my personal journey down the rabbit hole. There are many more lessons to be learned, and every person will learn something different from entering the world of Bitcoin. I hope that you will find these lessons useful and that the process of learning them by reading won’t be as arduous and painful as learning them firsthand.
Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing
Marie Hicks - 2017
By 1974, the British computer industry was all but extinct. What happened in the intervening thirty years holds lessons for all postindustrial superpowers. As Britain struggled to use technology to retain its global power, the nation's inability to manage its technical labor force hobbled its transition into the information age.In Programmed Inequality, Marie Hicks explores the story of labor feminization and gendered technocracy that undercut British efforts to computerize. That failure sprang from the government's systematic neglect of its largest trained technical workforce simply because they were women. Women were a hidden engine of growth in high technology from World War II to the 1960s. As computing experienced a gender flip, becoming male-identified in the 1960s and 1970s, labor problems grew into structural ones and gender discrimination caused the nation's largest computer user -- the civil service and sprawling public sector -- to make decisions that were disastrous for the British computer industry and the nation as a whole.Drawing on recently opened government files, personal interviews, and the archives of major British computer companies, Programmed Inequality takes aim at the fiction of technological meritocracy. Hicks explains why, even today, possessing technical skill is not enough to ensure that women will rise to the top in science and technology fields. Programmed Inequality shows how the disappearance of women from the field had grave macroeconomic consequences for Britain, and why the United States risks repeating those errors in the twenty-first century."
Ada, the Enchantress of Numbers: A Selection from the Letters of Lord Byron's Daughter and Her Description of the First Computer
Ada Lovelace - 1992
She was Lord Byron's daughter and acted as interpretress for Charles Babbage, the computer pioneer. She was one of the first people to write programmes of instruction for Babbage's analytical engines.
Devices and Desires: A History of Contraceptives in America
Andrea Tone - 2001
A down-and-out sausage-casing worker by day who turned surplus animal intestines into a million-dollar condom enterprise at night; inventors who fashioned cervical caps out of watch springs; and a mother of six who kissed photographs of the inventor of the Pill -- these are just a few of the individuals who make up this riveting story.
Epistemic Injustice: Power and the Ethics of Knowing
Miranda Fricker - 2007
Justice is one of the oldest and most central themes in philosophy, but in order to reveal the ethical dimension of our epistemic practices the focus must shift to injustice. Fricker adjusts the philosophical lens so that we see through to the negative space that is epistemic injustice.The book explores two different types of epistemic injustice, each driven by a form of prejudice, and from this exploration comes a positive account of two corrective ethical-intellectual virtues. The characterization of these phenomena casts light on many issues, such as social power, prejudice, virtue, and the genealogy of knowledge, and it proposes a virtue epistemological account of testimony. In this ground-breaking book, the entanglements of reason and social power are traced in a new way, to reveal the different forms of epistemic injustice and their place in the broad pattern of social injustice.
You Had Me at "Hello, World": Mentoring Sessions with Industry Leaders at Microsoft, Facebook, Google, Amazon, Zynga and more!
Dona Sarkar - 2015
Instead they shared with me their "career acumen" secrets, things they wished they had learned at school, but instead have had to learn the hard way..through years of experience. In this book, you will hear these leaders' secrets around: -Finding and using your superpowers , the qualities that make you completely unique and memorable - A script for how to negotiate your salary (in a non-aggressive way) and influence your managers and peers from day one - How to do that infamous "networking" thing everyone talks about, especially if you're not a networking event kind of person - How to have professional presence that sets you apart from everyone else - How to hit the ground running in the first 100 days and be the "rockstar" employee everyone talks about and wishes they could hire more of I've had all kinds of adventures during my 10 years of engineering at Microsoft but my absolute favorite thing has been building relationships, speaking to, and mentoring people (both in and out of the tech industry) on how to achieve their career goals while still being themselves. When I interviewed 25 tech leaders for advice on the questions I get over and over, I wanted to share it with more than just my mentees. This book is full of practical, do-today things as well as "scripts" and email templates that we have all actually used. Read the book and let's talk. I love reaching and meeting new people and you can now consider me “in your network” and I hope I can do the same for you. My best always, Dona
Beautiful Evidence
Edward R. Tufte - 2006
Beautiful Evidence is about how seeing turns into showing, how data and evidence turn into explanation. The book identifies excellent and effective methods for showing nearly every kind of information, suggests many new designs (including sparklines), and provides analytical tools for assessing the credibility of evidence presentations (which are seen from both sides: how to produce and how to consume presentations). For alert consumers of presentations, there are chapters on diagnosing evidence corruption and PowerPoint pitches. Beautiful Evidence concludes with two chapters that leave the world of pixel and paper flatland representations - and move onto seeing and thinking in space land, the real-land of three-space and time.
Get Your Hands Dirty on Clean Architecture: A hands-on guide to creating clean web applications with code examples in Java
Tom Hombergs - 2019
Grace Hopper and the Invention of the Information Age
Kurt W. Beyer - 2009
She works hard to succeed in the all-male computer industry, is almost brought down by personal problems but survives them, and ends her career as a celebrated elder stateswoman of computing, a heroine to thousands, hailed as the inventor of computer programming. Throughout Hopper's later years, the popular media told this simplified version of her life story. In Grace Hopper and the Invention of the Information Age, Kurt Beyer reveals a more authentic Hopper, a vibrant and complex woman whose career paralleled the meteoric trajectory of the postwar computer industry.Both rebellious and collaborative, Hopper was influential in male-dominated military and business organizations at a time when women were encouraged to devote themselves to housework and childbearing. Hopper's greatest technical achievement was to create the tools that would allow humans to communicate with computers in terms other than ones and zeroes. This advance influenced all future programming and software design and laid the foundation for the development of user-friendly personal computers.
What's New in Java 7?
Madhusudhan Konda - 2011
Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.
Computing: A Concise History
Paul E. Ceruzzi - 2012
In this concise and accessible account of the invention and development of digital technology, computer historian Paul Ceruzzi offers a broader and more useful perspective. He identifies four major threads that run throughout all of computing's technological development: digitization--the coding of information, computation, and control in binary form, ones and zeros; the convergence of multiple streams of techniques, devices, and machines, yielding more than the sum of their parts; the steady advance of electronic technology, as characterized famously by "Moore's Law"; and the human-machine interface. Ceruzzi guides us through computing history, telling how a Bell Labs mathematician coined the word "digital" in 1942 (to describe a high-speed method of calculating used in anti-aircraft devices), and recounting the development of the punch card (for use in the 1890 U.S. Census). He describes the ENIAC, built for scientific and military applications; the UNIVAC, the first general purpose computer; and ARPANET, the Internet's precursor. Ceruzzi's account traces the world-changing evolution of the computer from a room-size ensemble of machinery to a "minicomputer" to a desktop computer to a pocket-sized smart phone. He describes the development of the silicon chip, which could store ever-increasing amounts of data and enabled ever-decreasing device size. He visits that hotbed of innovation, Silicon Valley, and brings the story up to the present with the Internet, the World Wide Web, and social networking.
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
Arvind Narayanan - 2016
Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more.An essential introduction to the new technologies of digital currencyCovers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much moreFeatures an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slidesAlso suitable for use with the authors' Coursera online courseElectronic solutions manual (available only to professors)