Triple Sticks: Tales of a Few Young Men in the 1960s


Bernie Fipp - 2010
    The author assures us it is not!Three years before they came together, four young American men left their fraternities and college campuses for an adventure exceeding their imaginations. Wanting something more than the draft and unknown to each other, they chose Naval Aviation as the next step in their lives. Generally, they were better than their navy peers, all qualifying for high performance aircraft to be flown from steel decks over foreign seas. They would become the pointy end of the stick in aerial battles over North Vietnam, the most heavily defended patch of real estate in the history of aerial warfare. They were to do this in 1967, the year in which Naval Aviation experienced its greatest losses.These four young men, now Lieutenants Junior Grade, United States Navy, were ordered to Attack Squadron 34 to fly A4 Skyhawks into combat. They were assigned Junior Officer's stateroom 0111 aboard USS Intrepid, a venerable aircraft carrier with a distinguished history. This "bunkroom" better known to them as Triple Sticks was the repository for a log (in navy terms) or journal written by these four young aviators. Forty years later this log was the genesis of this memoir.In the lethal environment over the northern reaches of North Vietnam or ashore in the Officer's clubs and bars of Asia, the writing brings to life wonderful humor, bizarre behavior, vivid aerial battles, uncommon loyalty, anger, frustration and respect. One survived or did not according to his skill and luck.

Code: Version 2.0


Lawrence Lessig - 1999
    Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecture—the very structure of cyberspace itself—will dictate the form our interactions can and cannot take. Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know it—intellectual property, free speech, and privacy-—are being threatened and what we can do to protect them. Lessig shows how code—the architecture and law of cyberspace—can make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.

Dead Wake: The Last Crossing of the Lusitania by Erik Larson | Chapter Compilation


Ethan Thomas - 2016
     The ship was called “magnificent”, consuming as much as one hundred forty tons of coal every day even if it just stands still on the dock, and standing seven stories tall from dock to bridge. She was considered by engineers and shipbuilders as one of the finest examples of man’s ingenuity and creativity. In addition, out of all the ships that were converted for use in the war, the Lusitania was the only one that was exempted and continued on as a cruise ship. However, its job of carrying passengers across the Atlantic Ocean was not the thing that made her famous today. Read more.... Download your copy today! for a limited time discount of only $2.99! Available on PC, Mac, smart phone, tablet or Kindle device. © 2015 All Rights Reserved by Unlimited Press Works, LLC

Accardo: The Genuine Godfather


William F. Roemer Jr. - 1995
    . . Roemer [is] America's most decorated FBI agent."--Chicago TribuneFor forty years Tony Accardo was America's most dangerous criminal. He cut his teeth on the Chicago mob wars of Capone and Elliot Ness. He got his nickname "Joe Batters" for killing two men with a baseball bat. As the bodies piled up, Capone's youngest capo murdered and schemed his way to the top.William Roemer was the first FBI agent to face Tony "The Big Tuna" Accardo. Now, Roemer tells the story that only he could tell: the deals, the hits, the double-crosses, and the power plays that reached from the Windy City to Hollywood and to New York. Drawing on secret wiretaps and inside information, ACCARDO chronicles bloodshed and mayhem for more than six decades--as Roemer duels against the most powerful don of them all. . . ."Roemer brings the reality of organized crime home to us."--Boston Herald"A big, sprawled out account that serves as anecdotal history of organized crime."--Kirkus Reviews

Future Crimes


Marc Goodman - 2015
    Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services.      Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.     With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.     Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.From the Hardcover edition.

WWI: Tales from the Trenches


Daniel Wrinn - 2020
    Uncover their mesmerizing, realistic stories of combat, courage, and distress in readable and balanced stories told from the front lines.Witness the creation of new technologies of destruction: tanks, planes, and submarines; machine guns and field artillery; poison gas and chemical warfare. It introduced U-boat packs and strategic bombing, unrestricted war on civilians and mistreatment of prisoners.World War I reduced Europe’s mightiest empires to rubble, killed twenty million people, and cracked the foundations of our modern world. In its wake, empires toppled, monarchies fell, and whole populations lost their national identities.If you like gripping, authentic accounts of life and combat during WWI, then you won't want to miss WWI: Tales from the Trenches.

Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money


Nathaniel Popper - 2015
    Believers from Beijing to Buenos Aires see the potential for a financial system free from banks and governments. More than just a tech industry fad, Bitcoin has threatened to decentralize some of society’s most basic institutions.An unusual tale of group invention, Digital Gold charts the rise of the Bitcoin technology through the eyes of the movement’s colorful central characters, including an Argentinian millionaire, a Chinese entrepreneur, Tyler and Cameron Winklevoss, and Bitcoin’s elusive creator, Satoshi Nakamoto. Already, Bitcoin has led to untold riches for some, and prison terms for others.

User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play


Cliff Kuang - 2019
    Spanning over a century of sweeping changes, from women's rights to the Great Depression to World War II to the rise of the digital era, this book unpacks the ways in which the world has been--and continues to be--remade according to the principles of the once-obscure discipline of user-experience design.In this essential text, Kuang and Fabricant map the hidden rules of the designed world and shed light on how those rules have caused our world to change--an underappreciated but essential history that's pieced together for the first time. Combining the expertise and insight of a leading journalist and a pioneering designer, User Friendly provides a definitive, thoughtful, and practical perspective on a topic that has rapidly gone from arcane to urgent to inescapable. In User Friendly, Kuang and Fabricant tell the whole story for the first time--and you'll never interact with technology the same way again.

Networking for Systems Administrators (IT Mastery Book 5)


Michael W. Lucas - 2015
    Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you:•How modern networks really work•The essentials of TCP/IP•The next-generation protocol, IPv6•The right tools to diagnose network problems, and how to use them•Troubleshooting everything from the physical wire to DNS•How to see the traffic you send and receive•Connectivity testing•How to communicate with your network team to quickly resolve problemsA systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.

Hadoop Explained


Aravind Shenoy - 2014
    Hadoop allowed small and medium sized companies to store huge amounts of data on cheap commodity servers in racks. The introduction of Big Data has allowed businesses to make decisions based on quantifiable analysis. Hadoop is now implemented in major organizations such as Amazon, IBM, Cloudera, and Dell to name a few. This book introduces you to Hadoop and to concepts such as ‘MapReduce’, ‘Rack Awareness’, ‘Yarn’ and ‘HDFS Federation’, which will help you get acquainted with the technology.

Barbarians Led by Bill Gates: Microsoft From The Inside: How The World's Richest Corporation Wields Its Power


Jennifer Edstrom - 1998
    District Judge Stanley Sporkin. Teamed with the daughter of one of Bill Gates's closest associates, thirteen-year Microsoft veteran Marlin Eller shows us what it was like at every step along Gates's route to world domination, making all that's been written before seem like a rough guess. If the Justice Department had Eller and Edstrom investigating the current-headline-making antitrust case, they would have on the record many of Microsoft's most respected developers directly contradicting the "authorized" version of events being presented in court. They would know the real scoop on how Windows was developed in the first place, shedding new light on the 1988 Apple v. Microsoft lawsuit over the alleged copying of the Mac. They would even know the real story of how Microsoft killed off Go Corporation, told for the first time by the man who did the deed, Marlin Eller himself. Revealing the smoke-and-mirror deals, the palms greased to help launch a product that didn't exist, and the boneyard of once-thriving competitors targeted by the Gates juggernaut, this book demonstrates with often hilariously damning detail the Microsoft muddle that passes for strategic direction, offset by Gates's uncanny ability to come from behind to crush whoever's on top.

How Google Works


Eric Schmidt - 2014
    As they helped grow Google from a young start-up to a global icon, they relearned everything they knew about management. How Google Works is the sum of those experiences distilled into a fun, easy-to-read primer on corporate culture, strategy, talent, decision-making, communication, innovation, and dealing with disruption.The authors explain how the confluence of three seismic changes - the internet, mobile, and cloud computing - has shifted the balance of power from companies to consumers. The companies that will thrive in this ever-changing landscape will be the ones that create superior products and attract a new breed of multifaceted employees whom the authors dub 'smart creatives'. The management maxims ('Consensus requires dissension', 'Exile knaves but fight for divas', 'Think 10X, not 10%') are illustrated with previously unreported anecdotes from Google's corporate history.'Back in 2010, Eric and I created an internal class for Google managers,' says Rosenberg. 'The class slides all read 'Google confidential' until an employee suggested we uphold the spirit of openness and share them with the world. This book codifies the recipe for our secret sauce: how Google innovates and how it empowers employees to succeed.'

Medieval Europe, 395-1270


Gabriel Monod - 1903
    We have in particular given a large place to the rôle and to the history of the Church which dominates all this period, and which has been ordinarily so neglected in our schoolbooks, and have sought to make clear how France obtained in the thirteenth century a sort of political and intellectual hegemony in Europe. We hope those who read will understand what were the great ideas and directive tendencies which determined the historical evolution of the Middle Ages. We have always kept in mind in writing the conclusion to which we were advancing." - Charles Bémont & Gabriel MonodContents: The Roman Empire at the End of the Fourth Century. The Barbarians. The Germanic Invasions – The Vandals, The Visigoths, and the Huns (376-476). The Germanic Invasions – The Ostrogoths. The Germanic Invasions – The Barbarians in Gaul – Clovis. The Frankish Kingdom from 511 to 639. Institutions of Gaul after the Invasions. The Roman Empire of the East in the Sixth Century. The Last Invasions and the Papacy – The Lombards and Gregory the Great – The Anglo-Saxons and Monasticism. The Arabs – Mohammed. Arabian Empire – Conquests and Civilization. The Fainéant Kings – Foundation of the Carolingian Dynasty – Charlemagne. Empire of the Franks – Carolingian Customs and Institutions. The Carolingian Decadence, 814-888. The Last Carolingians – Invasions of the Saracens, Hungarians, and Norsemen – Origin of Feudalism. The Feudal System. Germany and Italy (888-1056). Emperor and Pope – Church Reform – Gregory VII. The Guelfs and Hohenstaufen – Alexander III. and Frederick I. Barbarossa. End of the Hohenstaufen – Victory of the Papacy over the Empire. The Christian and Mussulman Orient from the Seventh to the Eleventh Century. The Crusades. The Country Districts and Cities of France - Emancipation of Peasants and Bourgeois. French Royalty (987-1154). French Royalty (1154-1270). Institutions of Capetian Royalty. England from the Ninth to the Thirteenth Century. Continental Europe. The Roman Church in the Thirteenth Century. The Church and Heresies. Christian and Feudal Civilization – Instruction And Sciences – Literature And Arts – Worship. General Summary.

The Secret Architecture of Our Nation's Capital: The Masons and the Building of Washington, D.C.


David Ovason - 2000
    David Ovason, who has studied these astrological devices for ten years, now reveals why they have been placed in such abundance in the center of our nation's capital and explains their interconnections. His richly illustrated text tells the story of how Washington, from its foundation in 1791, was linked with the zodiac, with the meaning of certain stars, and with a hidden cosmological symbolism that he uncovers here for the first time.Fascinating and thoroughly researched, The Secret Architecture of Our Nation 's Capital is an engrossing book that raises provocative questions and otters complex insights into the meanings behind the mysterious symbols in Washington.

Who Are You: The Life of Pete Townshend


Mark Wilkerson - 2006
    Author Mark Wilkerson interviewed Townshend himself and several of Townshend's friends and associates for this biography.