The Cult of Mac


Leander Kahney - 2004
    Apple's machines have legions of loyal, sometimes demented fans. The Cult of Mac surveys the devoted following that has grown up around Macintosh computers. Like fans of a football team or a rock group, Macintosh fanatics have their own subculture, with clearly defined obsessions, rites, and passages. Famously dedicated to their computers, many Mac fans eat, sleep, and breathe the Macintosh. Fans who get Mac tattoos and haircuts, people who attend Apple Store openings like they are Grateful Dead shows, counterculture icons who love the Mac, people who turn old Macs into aquariums (or bongs), Ellen Fein lookalike contests, erotic fiction featuring Steve Jobs; it's all here. Technology reporter Leander Kahney exposes all sides of Mac fanaticism, from the innocuous to the insane.

Sinatra: Up and Running


Alan Harris - 2011
    With this concise book, you will quickly gain working knowledge of Sinatra and its minimalist approach to building both standalone and modular web applications. Sinatra serves as a lightweight wrapper around Rack middleware, with syntax that maps closely to functions exposed by HTTP verbs, which makes it ideal for web services and APIs. If you have experience building applications with Ruby, you’ll quickly learn language fundamentals and see under-the-hood techniques, with the help of several practical examples. Then you’ll get hands-on experience with Sinatra by building your own blog engine. Learn Sinatra’s core concepts, and get started by building a simple application Create views, manage sessions, and work with Sinatra route definitions Become familiar with the language’s internals, and take a closer look at Rack Use different subclass methods for building flexible and robust architectures Put Sinatra to work: build a blog that takes advantage of service hooks provided by the GitHub API

Flash Crash: A Trading Savant, a Global Manhunt, and the Most Mysterious Market Crash in History


Liam Vaughan - 2020
    In the span of five minutes, a trillion dollars of valuation was lost. The Flash Crash, as it became known, represented the fastest drop in market history. When share values rebounded less than half an hour later, experts around the globe were left perplexed. What had they just witnessed?Navinder Singh Sarao hardly seemed like a man who would shake the world's financial markets to their core. Raised in a working-class neighborhood in West London, Nav was a preternaturally gifted trader who played the markets like a computer game. By the age of thirty, he had left behind London's "trading arcades," working instead out of his childhood home. For years the money poured in. But when lightning-fast electronic traders infiltrated markets and started eating into his profits, Nav built a system of his own to fight back. It worked--until 2015, when the FBI arrived at his door. Depending on whom you ask, Sarao was a scourge, a symbol of a financial system run horribly amok, or a folk hero who took on the tyranny of Wall Street and the high-frequency traders.A real-life financial thriller, Flash Crash uncovers the remarkable, behind-the-scenes narrative of a mystifying market crash, a globe-spanning investigation into international fraud, and the man at the center of them both.

Average Is Over: Powering America Beyond the Age of the Great Stagnation


Tyler Cowen - 2013
    About three quarters of the jobs created in the United States since the great recession pay only a bit more than minimum wage. Still, the United States has more millionaires and billionaires than any country ever, and we continue to mint them.In this eye-opening book, renowned economist and bestselling author Tyler Cowen explains that phenomenon: High earners are taking ever more advantage of machine intelligence in data analysis and achieving ever-better results. Meanwhile, low earners who haven’t committed to learning, to making the most of new technologies, have poor prospects. Nearly every business sector relies less and less on manual labor, and this fact is forever changing the world of work and wages. A steady, secure life somewhere in the middle—average—is over.With The Great Stagnation, Cowen explained why median wages stagnated over the last four decades; in Average Is Over he reveals the essential nature of the new economy, identifies the best path forward for workers and entrepreneurs, and provides readers with actionable advice to make the most of the new economic landscape. It is a challenging and sober must-read but ultimately exciting, good news. In debates about our nation’s economic future, it will be impossible to ignore.

The Decadent Society: How We Became the Victims of Our Own Success


Ross Douthat - 2020
    But beneath our social media frenzy and reality-television politics, the deeper reality is one of drift, repetition, and dead ends. The Decadent Society explains what happens when a rich and powerful society ceases advancing—how the combination of wealth and technological proficiency with economic stagnation, political stalemates, cultural exhaustion, and demographic decline creates a strange kind of “sustainable decadence,” a civilizational malaise that could endure for longer than we think..

Bit Tyrants: The Political Economy of Silicon Valley


Rob Larson - 2020
    For fans of corporate fairy-tales there are no shortage of official histories that celebrate the innovative genius of Steve Jobs, liberal commentators who fall over themselves to laude Bill Gates's selfless philanthropy, or politicians who will tell us to listen to Mark Zuckerberg for advice on how to protect our democracy from foreign influence.In this highly unauthorized account of the Big Five's origins, Rob Larson sets the record straight, and in the process shreds every focus-grouped bromide about corporate benevolence he could get his hands on. Those readers unwilling to smile and nod as every day we become more dependent on our phones and apps to do our chores, our jobs, and our socializing can take heart as Larson provides us with maps to all the shallow graves, skeleton filled closets, and invective laced emails Big Tech left behind on its ascent to power. His withering analysis will help readers crack the code of the economic dynamics that allowed these companies to become near-monopolies very early on, and, with a little bit of luck, his calls for digital socialism might just inspire a viral movement for online revolution.

Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy


Jonathan Taplin - 2017
    Since 2001, newspaper and music revenues have fallen by 70%, book publishing, film and television profits have also fallen dramatically. Revenues at Google in this same period grew from $400 million to $74.5 billion. Google's YouTube today controls 60% of the streaming audio business and pays only 11% of the streaming audio revenues. More creative content is being consumed than ever before, but less revenue is flowing to creators and owners of the content.With the reallocation of money to monopoly platforms comes a shift in power. Google, Facebook, and Amazon now enjoy political power on par with Big Oil and Big Pharma, which in part explains how such a tremendous shift in revenues from artists to platforms could have been achieved and why it has gone unchallenged for so long.The stakes in this story go far beyond the livelihood of any one musician or journalist. As Taplin observes, the fact that more and more Americans receive their news, music and other forms of entertainment from a small group of companies poses a real threat to democracy. Move Fast and Break Things offers a vital, forward-thinking prescription for how artists can reclaim their audiences using knowledge of the past and a determination to work together. Using his own half-century career as a music and film producer and early pioneer of streaming video online, Taplin offers new ways to think about the design of the World Wide Web and specifically the way we live with the firms that dominate it.Table of contentsIntroduction1. The Great Disruption2. Levon's Story3. Tech's Counterculture Roots4. The Libertarian Counterinsurgency5. Digital Destruction6. Monopoly in the Digital Age7. Google's Regulatory Capture8. The Social Media Revolution9. Pirates of the Internet10. Libertarian and the 1 Percent11. What It Means to Be Human12. The Digital RenaissanceAfterword

Windows 8.1 For Dummies


Andy Rathbone - 2013
    Parts cover: Windows 8.1 Stuff Everybody Thinks You Already Know - an introduction to the dual interfaces, basic mechanics, file storage, and instruction on how to get the free upgrade to Windows 8.1.Working with Programs, Apps and Files - the basics of finding and launching apps, getting help, and printingGetting Things Done on the Internet - instructions for connecting a Windows 8.1 device, using web and social apps, and maintaining privacyCustomizing and Upgrading Windows 8.1 - Windows 8.1 offers big changes to what a user can customize on the OS. This section shows how to manipulate app tiles, give Windows the look you in, set up boot-to-desktop capabilities, connect to a network, and create user accounts.Music, Photos and Movies - Windows 8.1 offers new apps and capabilities for working with onboard and online media, all covered in this chapterHelp! - includes guidance on how to fix common problems, interpret strange messages, move files to a new PC, and use the built-in help systemThe Part of Tens - quick tips for avoiding common annoyances and working with Windows 8.1 on a touch device

The Past Present and Future of JavaScript


Axel Rauschmayer - 2012
    Now, hopes and expectations for JavaScript’s future are considerable.In this insightful report, Dr. Axel Rauschmayer explains how the combination of several technologies and opportunities in the past 15 years turned JavaScript’s fortunes. With that as a backdrop, he provides a detailed look at proposed new features and fixes in the next version, ECMAScript.next, and then presents his own JavaScript wish list—such as an integrated IDE.

The Great Firewall of China: How to Build and Control an Alternative Version of the Internet


James Griffiths - 2019
    Even as the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and any attempts to organise outside the official Communist Party are quickly stamped out. But the effects of the Great Firewall are not confined to China itself. More and more, China is threatening global internet freedoms as it seeks to shore up its censorship regime, with methods that are providing inspiration for aspiring autocrats the world over.As censorship, distortion and fake news gain traction around the world, and internet giants such as Facebook show ever greater willingness to compromise internet freedoms in pursuit of the Chinese market, James Griffiths takes a look inside the Great Firewall and explores just how far it has spread, arguing that its influence can only be countered by initiating a radical new vision of online liberty.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News


Clint Watts - 2018
    In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.

The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power


Shoshana Zuboff - 2018
    The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification."The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit--at the expense of democracy, freedom, and our human future.With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future--if we let it.Table of contentsINTRODUCTION1. Home or exile in the digital futureI. THE FOUNDATIONS OF SURVEILLANCE CAPITALISM2. August 9, 2011: Setting the stage for Surveillance Capitalism3. The discovery of behavioral surplus4. The moat around the castle5. The elaboration of Surveillance Capitalism: Kidnap, corner, compete6. Hijacked: The division of learning in societyII. THE ADVANCE OF SURVEILLANCE CAPITALISM7. The reality business8. Rendition: From experience to data9. Rendition from the depths10. Make them dance11. The right to the future tenseIII. INSTRUMENTARIAN POWER FOR A THIRD MODERNITY12. Two species of power13. Big Other and the rise of instrumentarian power14. A utopia of certainty15, The instrumentarian collective16. Of life in the hive17. The right to sanctuaryCONCLUSION18. A coup from aboveAcknowledgementsAbout the authorDetailed table of contentsNotesIndex

Four Arguments for the Elimination of Television


Jerry Mander - 1977
    Its problems are inherent in the technology itself and are so dangerous -- to personal health and sanity, to the environment, and to democratic processes -- that TV ought to be eliminated forever.Weaving personal experiences through meticulous research, the author ranges widely over aspects of television that have rarely been examined and never before joined together, allowing an entirely new, frightening image to emerge. The idea that all technologies are "neutral," benign instruments that can be used well or badly, is thrown open to profound doubt. Speaking of TV reform is, in the words of the author, "as absurd as speaking of the reform of a technology such as guns."

The Utopia of Rules: On Technology, Stupidity, and the Secret Joys of Bureaucracy


David Graeber - 2013
    He then jets forward to the nineteenth century, where systems we can easily recognize as modern bureaucracies come into being. In some areas of life—like with the modern postal systems of Germany and France—these bureaucracies have brought tremendous efficiencies to modern life. But Graeber argues that there is a much darker side to modern bureaucracy that is rarely ever discussed. Indeed, in our own “utopia of rules,” freedom and technological innovation are often the casualties of systems that we only faintly understand.Provocative and timely, the book is a powerful look and history of bureaucracy over the ages and its power in shaping the world of ideas.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.