Book picks similar to
Regulating Code: Good Governance and Better Regulation in the Information Age by Ian Brown
não-ficção
paused
politics
science
Mastering VMware vSphere 4
Scott Lowe - 2009
Coverage Includes: Shows administrators how to use VMware to realize significant savings in hardware costs while still providing adequate "servers" for their users Demonstrates how to partition a physical server into several virtual machines, reducing the overall server footprint within the operations center Explains how VMware subsumes a network to centralize and simplify its management, thus alleviating the effects of "virtual server sprawl" Now that virtualization is a key cost-saving strategy, Mastering VMware vSphere 4 is the strategic guide you need to maximize the opportunities.
Planet Earth Strangest Places: Fun Facts and Pictures for Kids
Speedy Publishing - 2015
This will let children know that there is a world out there they do not even know about. This will also make children wonder what goes on in these strange places. Some children will even develop the goal to visit some of these places when they get older. Most children do not know that there are strange places all over the earth.
The Ant and the Ferrari
Kerry Spackman - 2012
this is one of those rare books that will change your beliefs - and in doing so will change your life. tHE ANt AND tHE FERRARI offers readers a clear, navigable path through the big questions that confront us all today. What is the meaning of life? Can we be ethical beings in today's world? Can we know if there is life after death? Is there such a thing as Absolute truth? What caused the Big Bang and why should you care?
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Cathy O'Neil - 2016
Increasingly, the decisions that affect our lives--where we go to school, whether we can get a job or a loan, how much we pay for health insurance--are being made not by humans, but by machines. In theory, this should lead to greater fairness: Everyone is judged according to the same rules.But as mathematician and data scientist Cathy O'Neil reveals, the mathematical models being used today are unregulated and uncontestable, even when they're wrong. Most troubling, they reinforce discrimination--propping up the lucky, punishing the downtrodden, and undermining our democracy in the process.
In the Plex: How Google Thinks, Works, and Shapes Our Lives
Steven Levy - 2011
How has Google done it? Veteran technology reporter Steven Levy was granted unprecedented access to the company, and in this revelatory book he takes readers inside Google headquarters—the Googleplex—to show how Google works.While they were still students at Stanford, Google cofounders Larry Page and Sergey Brin revolutionized Internet search. They followed this brilliant innovation with another, as two of Google’s earliest employees found a way to do what no one else had: make billions of dollars from Internet advertising. With this cash cow, Google was able to expand dramatically and take on other transformative projects: more efficient data centers, open-source cell phones, free Internet video (YouTube), cloud computing, digitizing books, and much more.The key to Google’s success in all these businesses, Levy reveals, is its engineering mind-set and adoption of such Internet values as speed, openness, experimentation, and risk taking. After its unapologetically elitist approach to hiring, Google pampers its engineers—free food and dry cleaning, on-site doctors and masseuses—and gives them all the resources they need to succeed. Even today, with a workforce of more than 23,000, Larry Page signs off on every hire.But has Google lost its innovative edge? With its newest initiative, social networking, Google is chasing a successful competitor for the first time. Some employees are leaving the company for smaller, nimbler start-ups. Can the company that famously decided not to be evil still compete?No other book has ever turned Google inside out as Levy does with In the Plex.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play
Cliff Kuang - 2019
Spanning over a century of sweeping changes, from women's rights to the Great Depression to World War II to the rise of the digital era, this book unpacks the ways in which the world has been--and continues to be--remade according to the principles of the once-obscure discipline of user-experience design.In this essential text, Kuang and Fabricant map the hidden rules of the designed world and shed light on how those rules have caused our world to change--an underappreciated but essential history that's pieced together for the first time. Combining the expertise and insight of a leading journalist and a pioneering designer, User Friendly provides a definitive, thoughtful, and practical perspective on a topic that has rapidly gone from arcane to urgent to inescapable. In User Friendly, Kuang and Fabricant tell the whole story for the first time--and you'll never interact with technology the same way again.
Code Halos: How the Digital Lives of People, Things, and Organizations Are Changing the Rules of Business
Malcolm Frank - 2014
Today's outliers in revenue growth and value creation are winning with a new set of rules. They are dominating by managing the information that surrounds people, organizations, processes, and products--what authors Malcolm Frank, Paul Roehrig, and Ben Pring call Code Halos. This is far beyond "Big Data" and analytics. Code Halos spark new commercial models that can dramatically flip market dominance from industry stalwarts to challengers. In this new book, the authors show leaders how digital innovators and traditional companies can build Code Halo solutions to drive success. The book:Examines the explosion of digital information that now surrounds us and describes the profound impact this is having on individuals, corporations, and societies; Shows how the Crossroads Model can help anticipate and navigate this market shift; Provides examples of traditional firms already harnessing the power of Code Halos including GE's Brilliant Machines, Disney's theme park Magic Band, and Allstate's mobile devices and analytics that transform auto insurance. With reasoned insight, new data, real-world cases, and practical guidance, Code Halos shows seasoned executives, entrepreneurs, students, line-of-business owners, and technology leaders how to master the new rules of the Code Halo economy.
Kindle Tips, Tricks, and Shortcuts
Michael Gallagher - 2010
Topics include:• Archived Items • Battery Replacement • Calculator Functionality • Checking Your Email • Collections • Contacting Amazon's Kindle Customer Service • Converting PDF Documents to Kindle Format • Discussion Boards • Displaying the Time • Download Problems - What To Do • Formatting Issues in a Kindle Book - What To Do • Games on Your Kindle • Gifting a Kindle Book / Gift Certificates • Internet Access (it’s free) on Your Kindle • Internet Bookmarks• Kindle Reading to You (Text to Speech) • Lending Books• Losing Your Place While Reading • Lost Kindle Tip • Mobile Websites - Access Them on Your Kindle • Password Protection • Permanent Deletion of a Title • Pictures on Your Kindle • Playing Music on Your Kindle • Popular Highlights Feature - Turning it Off • Reset Your Kindle • Samples of Books • Screen Freeze Fix • Screenshots - Printing Out What You See • Social Networking with Facebook and Twitter • Transferring Books to Your Kindle • Transferring Existing Collections to Your New Kindle • Checking the Weather • Wireless Coverage for Your Kindle • Random Tips • Blogs Available on Your KindleMichael Gallagher is the author of several bestselling Kindle “how-to” guides, and his title “Free Kindle Books and How to Find Them” has been the #1 Kindle reference guide for over two years, garnering #53 and #72 on the Top 100 Kindle bestseller lists for all Kindle book titles in 2010 and 2011, respectively. His “Kindle Books and Tips” blog has been the #1 bestselling subscription blog in the Amazon Kindle Store since 2010. You can visit his author page on the Amazon website at http://www.amazon.com/author/gallagher
Rise of the Robots: Technology and the Threat of a Jobless Future
Martin Ford - 2015
In Rise of the Robots, Silicon Valley entrepreneur Martin Ford argues that this is absolutely not the case. As technology continues to accelerate and machines begin taking care of themselves, fewer people will be necessary. Artificial intelligence is already well on its way to making “good jobs” obsolete: many paralegals, journalists, office workers, and even computer programmers are poised to be replaced by robots and smart software. As progress continues, blue and white collar jobs alike will evaporate, squeezing working- and middle-class families ever further. At the same time, households are under assault from exploding costs, especially from the two major industries—education and health care—that, so far, have not been transformed by information technology. The result could well be massive unemployment and inequality as well as the implosion of the consumer economy itself.In Rise of the Robots, Ford details what machine intelligence and robotics can accomplish, and implores employers, scholars, and policy makers alike to face the implications. The past solutions to technological disruption, especially more training and education, aren't going to work, and we must decide, now, whether the future will see broad-based prosperity or catastrophic levels of inequality and economic insecurity. Rise of the Robots is essential reading for anyone who wants to understand what accelerating technology means for their own economic prospects—not to mention those of their children—as well as for society as a whole.
Systems Analysis and Design
Alan Dennis - 2002
Building on their experience as professional systems analysts and award-winning teachers, authors Dennis, Wixom, and Roth capture the experience of developing and analyzing systems in a way that students can understand and apply.With
Systems Analysis and Design, 4th edition
, students will leave the course with experience that is a rich foundation for further work as a systems analyst.
The 3D Printing Handbook: Technologies, design and applications
Ben Redwood - 2017
The 3D Printing Handbook provides practical advice on selecting the right technology and how-to design for 3D printing, based upon first-hand experience from the industry’s leading experts. In this book: The mechanisms behind all major 3D printing technologies The benefits and limitations of each technology Decision making tools for technology selection Actionable design advice and guidelines Industry case studies from world-leading brands
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll - 1989
citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
Antisocial Media: How Facebook Disconnects Us and Undermines Democracy
Siva Vaidhyanathan - 2018
Of course, none of that was part of the plan. In this fully updated paperback edition of Antisocial Media, Siva Vaidhyanathan explains how Facebook devolved from an innocent social site hacked together by Harvard students into a force that, while it may make personal life just a little more pleasurable, makes democracy a lot more challenging. It's an account of the hubris of good intentions, a missionary spirit, and an ideology that sees computer code as the universal solvent for all human problems. And it's an indictment of how social media has fostered the deterioration of democratic culture around the world, from facilitating Russian meddling in support of Trump's election to the exploitation of the platform by murderous authoritarians in Burma and the Philippines. Both authoritative and trenchant, Antisocial Media shows how Facebook's mission went so wrong.