Book picks similar to
Makers of the Microchip: A Documentary History of Fairchild Semiconductor by Christophe La(c)Cuyer
history
technology
nonfiction
computers
Uncanny Valley: A Memoir
Anna Wiener - 2020
She moved from New York to San Francisco, where she landed at a big-data startup in the heart of the Silicon Valley bubble: a world of surreal extravagance, dubious success, and fresh-faced entrepreneurs hell-bent on domination, glory, and, of course, progress.Anna arrived amidst a massive cultural shift, as the tech industry rapidly transformed into a locus of wealth and power rivaling Wall Street. But amid the company ski vacations and in-office speakeasies, boyish camaraderie and ride-or-die corporate fealty, a new Silicon Valley began to emerge: one in far over its head, one that enriched itself at the expense of the idyllic future it claimed to be building.Part coming-age-story, part portrait of an already-bygone era, Anna Wiener’s memoir is a rare first-person glimpse into high-flying, reckless startup culture at a time of unchecked ambition, unregulated surveillance, wild fortune, and accelerating political power. With wit, candor, and heart, Anna deftly charts the tech industry’s shift from self-appointed world savior to democracy-endangering liability, alongside a personal narrative of aspiration, ambivalence, and disillusionment.Unsparing and incisive, Uncanny Valley is a cautionary tale, and a revelatory interrogation of a world reckoning with consequences its unwitting designers are only beginning to understand.
Mindf*ck: Cambridge Analytica and the Plot to Break America
Christopher Wylie - 2019
Bannon had long sensed that deep within America's soul lurked an explosive tension. Cambridge Analytica had the data to prove it, and in 2016 Bannon had a presidential campaign to use as his proving ground.Christopher Wylie might have seemed an unlikely figure to be at the center of such an operation. Canadian and liberal in his politics, he was only twenty-four when he got a job with a London firm that worked with the U.K. Ministry of Defense and was charged putatively with helping to build a team of data scientists to create new tools to identify and combat radical extremism online. In short order, those same military tools were turned to political purposes, and Cambridge Analytica was born. Wylie's decision to become a whistleblower prompted the largest data crime investigation in history. His story is both exposé and dire warning about a sudden problem born of very new and powerful capabilities. It has not only exposed the profound vulnerabilities and profound carelessness in the enormous companies that drive the attention economy, it has also exposed the profound vulnerabilities of democracy itself. What happened in 2016 was just a trial run. Ruthless actors are coming for your data, and they want to control what you think.
Access 2007: The Missing Manual
Matthew MacDonald - 2006
It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.
To Pixar and Beyond: My Unlikely Journey with Steve Jobs to Make Entertainment History
Lawrence Levy - 2016
“This is Steve Jobs. I saw your picture in a magazine a few years ago and thought we’d work together someday.” After Steve Jobs was unceremoniously dismissed from Apple, he bought a little-known graphics company called Pixar. One day, out of the blue, Jobs called Lawrence Levy, a Harvard-trained lawyer and executive to whom he had never spoken before, to persuade Levy to help him get Pixar off the ground. What Levy found was a company on the verge of failure. To Pixar and Beyond is the story of what happened next: how, working closely with Jobs, Levy produced and implemented a highly improbable plan that transformed Pixar into one of Hollywood’s greatest success stories. Set in the worlds of Silicon Valley and Hollywood, the book takes readers inside Pixar, Disney, law firms, and investment banks. It provides an up-close, firsthand account of Pixar’s ascent, how it made creative choices, Levy’s enduring collaboration and friendship with Jobs, and how Levy came to see in Pixar deeper lessons that can apply to many aspects of our lives.
The Theory That Would Not Die: How Bayes' Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy
Sharon Bertsch McGrayne - 2011
To its adherents, it is an elegant statement about learning from experience. To its opponents, it is subjectivity run amok.In the first-ever account of Bayes' rule for general readers, Sharon Bertsch McGrayne explores this controversial theorem and the human obsessions surrounding it. She traces its discovery by an amateur mathematician in the 1740s through its development into roughly its modern form by French scientist Pierre Simon Laplace. She reveals why respected statisticians rendered it professionally taboo for 150 years—at the same time that practitioners relied on it to solve crises involving great uncertainty and scanty information (Alan Turing's role in breaking Germany's Enigma code during World War II), and explains how the advent of off-the-shelf computer technology in the 1980s proved to be a game-changer. Today, Bayes' rule is used everywhere from DNA de-coding to Homeland Security.Drawing on primary source material and interviews with statisticians and other scientists, The Theory That Would Not Die is the riveting account of how a seemingly simple theorem ignited one of the greatest controversies of all time.
21 Lessons: What I've Learned from Falling Down the Bitcoin Rabbit Hole
Gigi - 2020
Like many others, I feel like I have learned more in the last couple of years studying Bitcoin than I have during two decades of formal education. The following lessons are a distillation of what I’ve learned. First published as an article series titled “What I’ve Learned From Bitcoin,” what follows can be seen as a third edition of the original series. Like Bitcoin, these lessons aren’t a static thing. I plan to work on them periodically, releasing updated versions and additional material in the future.Bitcoin is an inexhaustible teacher, which is why I do not claim that these lessons are all-encompassing or complete. They are a reflection of my personal journey down the rabbit hole. There are many more lessons to be learned, and every person will learn something different from entering the world of Bitcoin. I hope that you will find these lessons useful and that the process of learning them by reading won’t be as arduous and painful as learning them firsthand.
Computing: A Concise History
Paul E. Ceruzzi - 2012
In this concise and accessible account of the invention and development of digital technology, computer historian Paul Ceruzzi offers a broader and more useful perspective. He identifies four major threads that run throughout all of computing's technological development: digitization--the coding of information, computation, and control in binary form, ones and zeros; the convergence of multiple streams of techniques, devices, and machines, yielding more than the sum of their parts; the steady advance of electronic technology, as characterized famously by "Moore's Law"; and the human-machine interface. Ceruzzi guides us through computing history, telling how a Bell Labs mathematician coined the word "digital" in 1942 (to describe a high-speed method of calculating used in anti-aircraft devices), and recounting the development of the punch card (for use in the 1890 U.S. Census). He describes the ENIAC, built for scientific and military applications; the UNIVAC, the first general purpose computer; and ARPANET, the Internet's precursor. Ceruzzi's account traces the world-changing evolution of the computer from a room-size ensemble of machinery to a "minicomputer" to a desktop computer to a pocket-sized smart phone. He describes the development of the silicon chip, which could store ever-increasing amounts of data and enabled ever-decreasing device size. He visits that hotbed of innovation, Silicon Valley, and brings the story up to the present with the Internet, the World Wide Web, and social networking.
The Man Who Knew Too Much: Alan Turing and the Invention of the Computer
David Leavitt - 2006
Then, attempting to break a Nazi code during World War II, he successfully designed and built one, thus ensuring the Allied victory. Turing became a champion of artificial intelligence, but his work was cut short. As an openly gay man at a time when homosexuality was illegal in England, he was convicted and forced to undergo a humiliating "treatment" that may have led to his suicide.With a novelist's sensitivity, David Leavitt portrays Turing in all his humanity—his eccentricities, his brilliance, his fatal candor—and elegantly explains his work and its implications.
There Is No Next: NBA Legends on the Legacy of Michael Jordan
Sam Smith - 2014
Armstrong • Marv Albert • Grant Hill • Jerry Colangelo • Bill Cartwright • Jerry Reinsdorf • Johnny Bach • Rod Thorn • Rick Barry • Kevin Loughery • David Axelrod • President Barack Obama • and many more!Written by Sam Smith—author of the New York Times bestseller THE JORDAN RULES and recent inductee into the NBA Hall of Fame—THERE IS NO NEXT assembles a cast of Hall-of-Famers, teammates, opponents, coaches, and others who experienced the ferocious drive and unparalleled greatness that defined Jordan’s career. Packed with previously untold stories and stunning insight into Jordan and his six championships, THERE IS NO NEXT is the last word on why there has never been, and will never be, another Michael Jordan.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Cockpit Confidential: Everything You Need to Know about Air Travel: Questions, Answers, & Reflections
Patrick Smith - 2013
Patrick Smith, airline pilot and author of the web's popular Ask the Pilot feature, separates the fact from fallacy and tells you everything you need to know...-How planes fly, and a revealing look at the men and women who fly them-Straight talk on turbulence, pilot training, and safety-The real story on congestion, delays, and the dysfunction of the modern airport-The myths and misconceptions of cabin air and cockpit automation-Terrorism in perspective, and a provocative look at security-Airfares, seating woes, and the pitfalls of airline customer service-The colors and cultures of the airlines we love to hateCockpit Confidential covers not only the nuts and bolts of flying, but also the grand theater of air travel, from airport architecture to inflight service to the excitement of travel abroad. It's a thoughtful, funny, at times deeply personal look into the strange and misunderstood world of commercial flying.It's the ideal book for frequent flyers, nervous passengers, and global travelers.Refreshed and vastly expanded from the original Ask the Pilot, with approximately 75 percent new material.
The Old New Thing: Practical Development Throughout the Evolution of Windows
Raymond Chen - 2006
With this book, Raymond shares his knowledge, experience, and anecdotal stories, allowing all of us to get a better understanding of the operating system that affects millions of people every day. This book has something for everyone, is a casual read, and I highly recommend it!--Jeffrey Richter, Author/Consultant, Cofounder of WintellectVery interesting read. Raymond tells the inside story of why Windows is the way it is.--Eric Gunnerson, Program Manager, Microsoft CorporationAbsolutely essential reading for understanding the history of Windows, its intricacies and quirks, and why they came about.--Matt Pietrek, MSDN Magazine's Under the Hood ColumnistRaymond Chen has become something of a legend in the software industry, and in this book you'll discover why. From his high-level reminiscences on the design of the Windows Start button to his low-level discussions of GlobalAlloc that only your inner-geek could love, The Old New Thing is a captivating collection of anecdotes that will help you to truly appreciate the difficulty inherent in designing and writing quality software.--Stephen Toub, Technical Editor, MSDN MagazineWhy does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called hives?Many of Windows' quirks have perfectly logical explanations, rooted in history. Understand them, and you'll be more productive and a lot less frustrated. Raymond Chen--who's spent more than a decade on Microsoft's Windows development team--reveals the hidden Windows you need to know.Chen's engaging style, deep insight, and thoughtful humor have made him one of the world's premier technology bloggers. Here he brings together behind-the-scenes explanations, invaluable technical advice, and illuminating anecdotes that bring Windows to life--and help you make the most of it.A few of the things you'll find inside:What vending machines can teach you about effective user interfaces A deeper understanding of window and dialog management Why performance optimization can be so counterintuitive A peek at the underbelly of COM objects and the Visual C++ compiler Key details about backwards compatibility--what Windows does and why Windows program security holes most developers don't know about How to make your program a better Windows citizen
Essential PHP Security
Chris Shiflett - 2005
It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.
Madoff Talks: Uncovering the Untold Story Behind the Most Notorious Ponzi Scheme in History
Jim Campbell - 2021
Arrested for fraud in 2008--during the depths of the global financial crisis--the 70-year-old market maker, investment advisor, and former chairman of the NASDAQ had orchestrated the largest Ponzi scheme in world history, fleecing thousands of investors across the globe to the tune of $65 billion. To this day, questions remain: Why did he do it? How did he get away with it for so long? What did his family know? Who is the elusive Bernie Madoff?In Madoff Talks, author Jim Campbell presents the most comprehensive, insider account of the Madoff saga to date. Based on exclusive interviews with all the players--the Madoff family and their associates, the Wall Street wheelers and dealers, the army of lawyers, analysts, and investigators, the victims of the scheme, and Bernie Madoff himself--the book reveals: what motivated a respected financier to commit such a massive fraud--and why he thought he could get away with ithow Madoff managed to keep the scheme hidden in plain sight--despite numerous SEC investigationsthe shocking failures of Wall Street oversight--and how it could happen againthe true scale of the investment losses―and the victims' ongoing fight for justicewhat Ruth Madoff and the rest of the family knew--and how it shattered their livesMadoff Talks features the first, and likely only, interviews with Ruth Madoff and defense attorney Ira Sorkin, for which Bernie waived attorney-client privilege, as well as never-before-published details from the author's personal communications with Bernie Madoff in prison. A vivid, powerful piece of investigative reporting, the book takes us behind the headlines to show the full human cost of Madoff's crimes, and offers a cogent analysis of the reforms necessary to prevent it from happening again.Meticulously researched and relentlessly riveting, Madoff Talks is the full story of an American tragedy.
Spam: A Shadow History of the Internet
Finn Brunton - 2013
Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand.This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms--spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.