Book picks similar to
The Data Quality Blueprint: A Comprehensive Step by Step Guide to an Effective & Long Lasting Enterprise-Wide Data Quality Solution by John Parkinson
computer-science
data-governance
information-security
innovation
Universal Methods of Design: 100 Ways to Research Complex Problems, Develop Innovative Ideas, and Design Effective Solutions
Bella Martin - 2012
Universal Methods of Design serves as an invaluable compendium of methods that can be easily referenced and used by cross-disciplinary teams in nearly any design project. Methods and techniques are organized alphabetically for ongoing, quick reference. Each method is presented in a two-page format. The left-hand page contains a concise description of the method, accompanied by references for further reading. On the right-hand page, images and cases studies for each method are presented visually. The relevant phases for design application are highlighted as numbered icons along the right side of the page, from phases 1 (planning) through 5 (launch and monitor).Build more meaningful products with these methods and more: A/B Testing, Affinity Diagramming, Behavioral Mapping, Bodystorming, Contextual Design, Critical Incident Technique, Directed Storytelling, Flexible Modeling, Image Boards, Graffiti Walls, Heuristic Evaluation, Parallel Prototyping, Simulation Exercises, Touchstone Tours, and Weighted Matrix. This essential guide:Dismantles the myth that user research methods are complicated, expensive, and time-consumingCreates a shared meaning for cross-disciplinary design teamsIllustrates methods with compelling visualizations and case studiesCharacterizes each method at a glanceIndicates when methods are best employed to help prioritize appropriate design research strategiesUniversal Methods of Design is an essential resource for designers of all levels and specializations.
Outcomes Over Output: Why customer behavior is the key metric for business success
Josh Seiden - 2019
But in today’s service- and software-driven world, “done” is less obvious. When is Amazon done? When is Google done? Or Facebook? In reality, services powered by digital systems are never done. So then how do we give teams a goal that they can work on?Mostly, we simply ask teams to build features—but features are the wrong way to go. We often build features that create no value. Instead, we need to give teams an outcome to achieve. Using outcomes creates focus and alignment. It eliminates needless work. And it puts the customer at the center of everything you do.Setting goals as outcomes sounds simple, but it can be hard to do in practice. This book is a practical guide to using outcomes to guide the work of your team. "Josh’s crisp volume brims with insight about how to fly at just the right level - the level of outcomes. If you’ve ever wondered how M your MVP should be, or how to get more R in your OKRs, this book will help." --Nick Rockwell, CTO, NY Times
The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal
M. Mitchell Waldrop - 2001
C. R. Licklider, whose visionary dream of a human-computer symbiosis transformed the course of modern science and led to the development of the personal computer. Reprint.
A Fine Line: How Design Strategies Are Shaping the Future of Business
Hartmut Esslinger - 2009
Hartmut explains innovation through the lens of design, and it's about time we gained his valuable perspective." --Guy Kawasaki, former chief evangelist, Apple and co-founder of Alltop.com"At Flextronics, we fell in love with Hartmut and frog, and their passion for bringing crazy great designs and design processes into the forefront of great product companies. We used their expertise to help our customers, many of the greatest product companies in the world, including Apple, HP, Cisco, Microsoft and others. It is a credit to Hartmut that in the midst of a shocking global recession, frog still sets quarterly revenue records. Theirs is a unique and fascinating story." --Michael Marks, partner, Riverwood Capital LLC and former CEO, Flextronics"Hartmut's new approach to design is felt in every room in every house in every country and in every business around the world. He proved that thoughtful design is not only good for people but is good for business--and that both are interlinked. I have been fortunate to have observed first hand his impact at Sony, Apple, and HP?and have learned so much from him. He is an unsung hero of our times! A Fine Line is a must-read for designers and business people alike." --Satjiv Chahil, senior vice president, Hewlett-Packard"A fascinating, breathtaking, and exemplary insight into a success story that never had so much topicality, and so much informative potential as just now. Esslinger offers an honest and encouraging portrait of the incredible power of the business and design alliance. A Fine Line is a handbook of design expertise and the art of business at its best, showing a variety of radical solutions and fresh new ideas." --Professor Dr Peter Zec, president, ICSID and founder, red dot awards
Loyalty 3.0: How to Revolutionize Customer and Employee Engagement with Big Data and Gamification
Rajat Paharia - 2013
And yet, billions of dollars are still spent every year on programs that are doomed to fail. These programs, it turns out, don't inspire long-term loyalty. Once a better deal comes along, customers will gladly defect. Can you blame them?Silicon Valley start-up Bunchball, the pioneer and innovator in gamification, is light years ahead when it comes to the concept of loyalty--and using it to drive business profits and growth. Focusing not only on customer loyalty, but also the loyalty of employees and partners, Bunchball combines behavioral economics, big data, social media, and gamification to inspire loyalty that lasts--from everyone involved in the success of a business.Now, in Loyalty 3.0, Bunchball founder Rajat Paharia reveals how you can use these same techniques to seize the competitive edge for your business.Paharia shows you how to create a system powered by human motivation and digital technology that creates ongoing, persistent engagement among customers, employees, and partners. Loyalty 3.0 arms you with everything you need to know in order to build a loyalty and engagement program that drives a sustainable advantage for your business, including:The building blocks of motivation, big data, and gamification necessary for creating a powerful strategy that drives long-term loyaltyCase studies from today's most innovative companies that are already driving customer engagement, learning and skill development, and employee motivation with Loyalty 3.0 methodsStep-by-step guidance on how to plan, design, build, and optimize your programNow is the time to abandon your traditional loyalty programs and start taking all your stakeholders seriously--so they will take your company seriously.Loyalty 3.0 is the game-changing leap you've been waiting for. When you create true loyalty among customers, employees, and business partners, you will generate a sustainable competitive advantage and win in your industry.Praise for Loyalty 3.0"Relationships are the single greatest asset for all organizations. Relationships with customers, relationships with employees, relationships with partners. In Loyalty 3.0, Rajat Paharia reveals the new science of relationship building through big data and gamification." --TIM BROWN, CEO, IDEOLoyalty 3.0 is filled with major insights and does a brilliant job of grounding the reader in fundamental concepts around motivation, big data, and gamification--building on these concepts through real-world case studies that bring the combinations to life. It finishes with actionable ideas and next steps that enable you to test and operationalize these ideas in your own workplace and personal life. -- BRAD SMITH, CEO, IntuitA fascinating insight into how companies are exploiting big data. -- MARK READ, CEO, WPP DigitalRajat pioneered the business use of big data and game mechanics to transform the customer experience. A decade before anyone else, he saw that the same techniques that video game designers had used for years--fast feedback, badges, competition, goals, and leveling up--were also incredibly powerful for motivating behavior outside of games, and an industry was born. This book shares his secrets. -- CLARA SHIH, CEO of Hearsay Social, author of The Facebook Era, and board member at StarbucksRajat Paharia comprehensively explains how to create loyalty in the modern world full of data and connectivity. If you want to learn how to motivate and inspire employees, you must read this book. -- DAVE KERPEN, New York Times bestselling author of Likeable Social Media and Likeable BusinessIn this powerful and groundbreaking book, Rajat Paharia clearly demonstrates how big data, motivation, and gamification can be utilized to create true engagement and loyalty. We believe Loyalty 3.0 will be a game changer for our associates and guests. -- RAY BENNETT, Chief Lodging Services Officer, Marriott International"The journey to Loyalty 3.0 is real. Rajat's vision shows why right time relevancy and context will transform how organizations engage with customers and truly craft relationships."---R. RAY WANG, Principal Analyst and CEO at Constellation Research"Adoption is a critical component when creating an exceptional customer experience or smarter workforce, and gamification has proven to be a powerful driver for success. The insights Rajat shares in Loyalty 3.0 will help guide the next wave of deeper relationships across the enterprise."---SANDY CARTER, IBM Vice President, Social Business Evangelism and Sales
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
The Fourth Transformation: How Augmented Reality and Artificial Intelligence Change Everything
Robert Scoble - 2016
Game Theory. Analysis of conflict
Roger B. Myerson - 1991
Myerson introduces, clarifies, and synthesizes the extraordinary advances made in the subject over the past fifteen years, presents an overview of decision theory, and comprehensively reviews the development of the fundamental models: games in extensive form and strategic form, and Bayesian games with incomplete information.Game Theory will be useful for students at the graduate level in economics, political science, operations research, and applied mathematics. Everyone who uses game theory in research will find this book essential.
Social and Economic Networks
Matthew O. Jackson - 2008
The many aspects of our lives that are governed by social networks make it critical to understand how they impact behavior, which network structures are likely to emerge in a society, and why we organize ourselves as we do. In Social and Economic Networks, Matthew Jackson offers a comprehensive introduction to social and economic networks, drawing on the latest findings in economics, sociology, computer science, physics, and mathematics. He provides empirical background on networks and the regularities that they exhibit, and discusses random graph-based models and strategic models of network formation. He helps readers to understand behavior in networked societies, with a detailed analysis of learning and diffusion in networks, decision making by individuals who are influenced by their social neighbors, game theory and markets on networks, and a host of related subjects. Jackson also describes the varied statistical and modeling techniques used to analyze social networks. Each chapter includes exercises to aid students in their analysis of how networks function.This book is an indispensable resource for students and researchers in economics, mathematics, physics, sociology, and business.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon - 2009
From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.
Generative Design: Visualize, Program, and Create with Processing
Hartmut Bohnacker - 2009
By using accessible programming languages such as Processing, artists and designers are producing extravagant, crystalline structures that can form the basis of anything from patterned textiles and typography to lighting, scientific diagrams, sculptures, films, and even fantastical buildings. Opening with a gallery of thirty-five illustrated case studies, Generative Design takes users through specific, practical instructions on how to create their own visual experiments by combining simple-to-use programming codes with basic design principles. A detailed handbook of advanced strategies provides visual artists with all the tools to achieve proficiency. Both a how-to manual and a showcase for recent work in this exciting new field, Generative Design is the definitive study and reference book that designers have been waiting for.
Managing The Design Factory: A Product Developer's Toolkit
Donald G. Reinertsen - 1997
In Managing the Design Factory Donald G. Reinertsen presents concepts and practical tools that will be invaluable for anyone trying to get products out of the pipeline and into the market.The first book to put the principles of World Class Manufacturing to work in the development process, Managing the Design Factory combines the powerful analytical tools of queuing, information, and system theories with the proven ideas of organization design and risk management. The result: a methodical approach to consistently hit the "sweet spot" of quality, cost, and time in developing any product. Reinertsen illustrates these concepts with concrete examples drawn from his work with many leading companies across different industries.Fresh and thought-provoking, the book challenges many of the conventional approaches to product development. "There are no best practices," Reinertsen writes, "the idea of best practices is a seductive but dangerous trap." Unlike other books that promote rules and rituals based on benchmarking "best practices," this book focuses on practical tools that account for varied situations. He breaks new ground with a disciplined, quantitative approach for making decisions on critical issues: When should we use a sequential or concurrent process? Centralized or decentralized control? Functional or team organizations?Full of practical techniques, concrete examples, and solid general principles, this is a real toolkit for product developers. Moreover, it is written with the clarity, precision, and humor that are Reinertsen's trademarks. He promises to challenge the thinking of anyone involved in product development.
User Story Mapping: Discover the Whole Story, Build the Right Product
Jeff Patton - 2012
With this practical book, you'll explore the often-misunderstood practice of user story mapping, and learn how it can help keep your team stay focused on users and their experience throughout the development process.You and your team will learn that user stories aren't a way to write better specifications, but a way to organize and have better conversations. This book will help you understand what kinds of conversations you should be having, when to have them, and what to keep track of when you do. Learn the key concepts used to create a great story map. Understand how user stories really work, and how to make good use of them in agile and lean projects. Examine the nuts and bolts of managing stories through the development cycle. Use strategies that help you continue to learn before and after the product's release to customers and usersUser Story Mapping is ideal for agile and lean software development team members, product managers and UX practitioners in commercial product companies, and business analysts and project managers in IT organizations—whether you're new to this approach or want to understand more about it.
@War: The Rise of the Military-Internet Complex
Shane Harris - 2014
In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Jack Koziol - 2004
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files