Browse Results

Showing 53,101 through 53,125 of 54,151 results

White Space Is Not Your Enemy: A Beginner's Guide to Communicating Visually Through Graphic, Web & Multimedia Design

by Kim Golombisky Rebecca Hagen

White Space Is Not Your Enemy is a practical graphic design and layout guide that introduces concepts and practices necessary for producing effective visual communication across a variety of formats—from web to print. Sections on Gestalt theory, color theory, and WET layout are expanded to offer more in-depth content on those topics. This new edition features new covering current trends in web design—Mobile-first, UI/UX design, and web typography—and how they affect a designer’s approach to a project. The entire book will receive an update using new examples and images that show a more diverse set of graphics that go beyond print and web and focus on tablet, mobile and advertising designs.

White Space is Not Your Enemy

by Rebecca Hagen Kim Golombisky

Designing a brochure or web site without an art background? Step away from the computer and read this breezy introduction to visual communications first. Written for non-designers, White Space is Not Your Enemy is a practical graphic design and layout text introducing the concepts and practices necessary for producing effective visual communications across a variety of formats, from print to Web.This beautifully illustrated, full-color book covers the basics to help you develop your eye and produce attractive work. Topics include:* The basics of effective design that communicates its intended message* Pre-design planning* 13 Layout Sins to avoid* Basic typography* Working with color* Storyboarding for video, Web, and presentions* Information graphics* Mini Art School--all the basics in one chapter* Outputting your work

Who Are You?: Nintendo's Game Boy Advance Platform (Platform Studies)

by Alex Custodio

The Game Boy Advance platform as computational system and cultural artifact, from its 2001 release through hacks, mods, emulations, homebrew afterlives.In 2002, Nintendo of America launched an international marketing campaign for the Game Boy Advance that revolved around the slogan "Who Are You?"--asking potential buyers which Nintendo character, game, or even device they identified with and attempting to sell a new product by exploiting players' nostalgic connections to earlier ones. Today, nearly two decades after its release, and despite the development of newer and more powerful systems, Nintendo's Game Boy Advance lives on, through a community that continues to hack, modify, emulate, make, break, remake, redesign, trade, use, love, and play with the platform. In this book Alex Custodio traces the network of hardware and software afterlives of the Game Boy Advance platform.

Who Can You Trust?: How Technology Brought Us Together and Why It Might Drive Us Apart

by Rachel Botsman

If you can't trust those in charge, who can you trust?From government to business, banks to media, trust in institutions is at an all-time low. But this isn't the age of distrust--far from it.In this revolutionary book, world-renowned trust expert Rachel Botsman reveals that we are at the tipping point of one of the biggest social transformations in human history--with fundamental consequences for everyone. A new world order is emerging: we might have lost faith in institutions and leaders, but millions of people rent their homes to total strangers, exchange digital currencies, or find themselves trusting a bot. This is the age of "distributed trust," a paradigm shift driven by innovative technologies that are rewriting the rules of an all-too-human relationship.If we are to benefit from this radical shift, we must understand the mechanics of how trust is built, managed, lost, and repaired in the digital age. In the first book to explain this new world, Botsman provides a detailed map of this uncharted landscape--and explores what's next for humanity.

Who Goes There?: Authentication Through the Lens of Privacy

by Committee on Authentication Technologies Their Privacy Implications

Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more ubiquitous, understanding its interplay with privacy is vital. The report examines numerous concepts, including authentication, authorization, identification, privacy, and security. It provides a framework to guide thinking about these issues when deciding whether and how to use authentication in a particular context. The book explains how privacy is affected by system design decisions. It also describes government’s unique role in authentication and what this means for how government can use authentication with minimal invasions of privacy. In addition, Who Goes There? outlines usability and security considerations and provides a primer on privacy law and policy.

Who Is Bill Gates? (Who was?)

by Nancy Harrison Patricia Brennan Demuth Ted Hammond

Bill Gates, born in Seattle, Washington, in 1955, is an American business magnate, investor, philanthropist, and author. In this Who Was...? biography, children will learn of Gates' childhood passion for computer technology, which led him to revolutionize personal computers. Through the success of his now-world-famous software company, Microsoft, Bill Gates became one of the wealthiest philanthropists in history.This fascinating story of a child technology genius is sure to captivate all audiences!

Who Knew?: Inside the Complexity of American Health Care

by Lynn H. Vogel

Despite all the writing and the research, America’s health care industry continues to fail at providing health care that is accessible and affordable, with measurable quality. The fundamental reason we have failed is that health care is not only a complex business, but the most complex in our economy. Other industries are disrupted, some readily adapt to new markets; some leverage information technology and innovative and cost-saving ways. But to date, health care has resisted. The customary approaches tried in other industries seem not to apply to health care. Why? Why is the health care industry so politically divisive? Why is the quality of health care services so difficult to measure? Why do patients often fail to understand their own health care? Why are security and privacy such unique challenges in health care? Why is the payment process for health care services so complicated and challenging? This book seeks to answer these questions. This book written by a well know industry ‘insider’ with 35+ years working at senior levels in hospital operations and information technology, discusses nine major factors that in combination contribute to health care’s complexity. The author concludes that until we understand why health is so complex, we will continue to see books complaining about the poor state of health care in the U.S., and proposals for change that are generally unsuccessful, and innovative technology products that fail to deliver expected results.

Who Owns the Future?

by Jaron Lanier

Jaron Lanier is the father of virtual reality and one of the world's most brilliant thinkers. Who Owns the Future? is his visionary reckoning with the most urgent economic and social trend of our age: the poisonous concentration of money and power in our digital networks. Lanier has predicted how technology will transform our humanity for decades, and his insight has never been more urgently needed. He shows how Siren Servers, which exploit big data and the free sharing of information, led our economy into recession, imperiled personal privacy, and hollowed out the middle class. The networks that define our world--including social media, financial institutions, and intelligence agencies--now threaten to destroy it. But there is an alternative. In this provocative, poetic, and deeply humane book, Lanier charts a path toward a brighter future: an information economy that rewards ordinary people for what they do and share on the web. grow. It is time for ordinary people to be rewarded for what they do and share on the web. Insightful, original, and provocative, Who Owns the Future? is necessary reading for everyone who lives a part of their lives online.

WHOIS Running the Internet

by Garth O. Bruen

Discusses the evolution of WHOIS and how policy changes will affect WHOIS' place in IT today and in the futureThis book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and how WHOIS fits in the overall structure of the Domain Name System (DNS). Other technical topics covered include WHOIS query code and WHOIS server details. The book also discusses current policy developments and implementations, reviews critical policy documents, and explains how they will affect the future of the Internet and WHOIS. Additional resources and content updates will be provided through a supplementary website. Includes an appendix with information on current and authoritative WHOIS services around the world Provides illustrations of actual WHOIS records and screenshots of web-based WHOIS query interfaces with instructions for navigating them Explains network dependencies and processes related to WHOIS utilizing flowcharts Contains advanced coding for programmers WHOIS Running the Internet: Protocol, Policy, and Privacy is written primarily for internet developers, policy developers, industry professionals in law enforcement, digital forensic investigators, and intellectual property attorneys.Garth O. Bruen is an Internet policy and security researcher whose work has been published in the Wall Street Journal and the Washington Post. Since 2012 Garth Bruen has served as the North American At-Large Chair to the Internet Corporation of Assigned Names and Numbers (ICANN). In 2003 Bruen created KnujOn.com with his late father, Dr. Robert Bruen, to process and investigate Internet abuse complaints (SPAM) from consumers. Bruen has trained and advised law enforcement at the federal and local levels on malicious use of the Domain Name System in the way it relates to the WHOIS record system. He has presented multiple times to the High Technology Crime Investigation Association (HTCIA) as well as other cybercrime venues including the Anti-Phishing Working Group (APWG) and the National Center for Justice and the Rule of Law at The University of Mississippi School of Law. Bruen also teaches the Fisher College Criminal Justice School in Boston where he develops new approaches to digital crime.

Whole Body Interaction

by David England

Whole Body Interaction is "The integrated capture and processing of human signals from physical, physiological, cognitive and emotional sources to generate feedback to those sources for interaction in a digital environment" (England 2009). Whole Body Interaction looks at the challenges of Whole Body Interaction from the perspectives of design, engineering and research methods. How do we take physical motion, cognition, physiology, emotion and social context to push boundaries of Human Computer Interaction to involve the complete set of human capabilities? Through the use of various applications the authors attempt to answer this question and set a research agenda for future work. Aimed at students and researchers who are looking for new project ideas or to extend their existing work with new dimensions of interaction.

Who's #1?: The Science of Rating and Ranking

by Amy N. Langville Carl D. Meyer

The mathematics behind today's most widely used rating and ranking methodsA website's ranking on Google can spell the difference between success and failure for a new business. NCAA football ratings determine which schools get to play for the big money in postseason bowl games. Product ratings influence everything from the clothes we wear to the movies we select on Netflix. Ratings and rankings are everywhere, but how exactly do they work? Who's #1? offers an engaging and accessible account of how scientific rating and ranking methods are created and applied to a variety of uses.Amy Langville and Carl Meyer provide the first comprehensive overview of the mathematical algorithms and methods used to rate and rank sports teams, political candidates, products, Web pages, and more. In a series of interesting asides, Langville and Meyer provide fascinating insights into the ingenious contributions of many of the field's pioneers. They survey and compare the different methods employed today, showing why their strengths and weaknesses depend on the underlying goal, and explaining why and when a given method should be considered. Langville and Meyer also describe what can and can't be expected from the most widely used systems.The science of rating and ranking touches virtually every facet of our lives, and now you don't need to be an expert to understand how it really works. Who's #1? is the definitive introduction to the subject. It features easy-to-understand examples and interesting trivia and historical facts, and much of the required mathematics is included.

Who's Afraid of AI?: Fear And Promise In The Age Of Thinking Machines

by Thomas Ramge

A penetrating guide to artificial intelligence: what it is, what it does, and how it will change our lives At a breathtaking pace, artificial intelligence is getting better and faster at making complex decisions. AI can already identify malignant tumors on CT scans, give legal advice, out-bluff the best poker players in the world, and, with ever-increasing skill, drive our cars. In Who’s Afraid of AI?, award-winning author Thomas Ramge expertly explains how machines are learning to learn, and he questions what today’s explosion of AI capability could mean for tomorrow: Is it ethical to allow robots—endlessly patient—to replace human caregivers in providing comfort and companionship to the elderly? Since AI feeds on big data, can we prevent its misuse by corporations or the government? Will AI ever be capable of runaway self-improvement? And if “the singularity” does arrive, with AI’s intelligence exponentially outpacing our own, what will become of us when, in many ways, we’re obsolete?

Who's Laughing Now?: Feminist Tactics in Social Media

by Jenny Sunden Susanna Paasonen

Exploring feminist social media tactics that use humor and laughter as a form of resistance to misogyny, rewiring feelings of shame into shamelessness.Online sexism, hate, and harassment aim to silence women through shaming and fear. In Who's Laughing Now? Jenny Sundén and Susanna Paasonen examine a somewhat counterintuitive form of resistance: humor. Sundén and Paasonen argue that feminist social media tactics that use humor, laughter, and a sense of the absurd to answer name-calling, offensive language, and unsolicited dick pics can reroute and rewire shame into a self-assured shamelessness.

Why AI?: All your questions about artificial intelligence answered by a computer scientist

by Dr Dharini Balasubramaniam

All your questions and worries about Al today - the who, what, where, when and WHY - answered by a computer scientist.It's here and it's not going away - AI is on everyone's mind, but many of us don't know what it is never mind what to think about it! Why AI? is a question-and-answer based exploration of the topic for ages 8 and up, from Dr Dharini Balasubramaniam, a computer scientist at University of St Andrews and a passionate advocate for ethics and education in her field. Dr Balasubramaniam's clear and balanced explanations put our mind at ease, while challenging readers to consider how far AI can and should go in certain areas. She introduces us to the history of the concept of machine learning, the pioneers in the field of AI and the amazing AI doing good in the world today. The book includes case studies on fascinating topics, such as search-engine AI and exciting robotics, and answers questions, such as: What did AI start?; Why do we need AI?; What can AI DO?; What should AI do?; What is the future of AI?

Why AI Undermines Democracy and What To Do About It

by Mark Coeckelbergh

Across the world, AI is used as a tool for political manipulation and totalitarian repression. Stories about AI are often stories of polarization, discrimination, surveillance, and oppression. Is democracy in danger? And can we do anything about it? In this compelling and balanced book, Mark Coeckelbergh reveals the key risks posed by AI for democracy. He argues that AI, as currently used and developed, undermines fundamental principles on which liberal democracies are founded, such as freedom and equality. How can we make democracy more resilient in the face of AI? And, more positively, what can AI do for democracy? Coeckelbergh advocates not only for more democratic technologies, but also for new political institutions and a renewal of education to ensure that AI promotes, rather than hinders, the common good for the twenty-first century. Why AI Undermines Democracy and What to Do About It is illuminating reading for anyone who is concerned about the fate of democracy.

Why Brains Don't Compute

by Dale Purves

This book examines what seems to be the basic challenge in neuroscience today: understanding how experience generated by the human brain is related to the physical world we live in. The 25 short chapters present the argument and evidence that brains address this problem on a wholly trial and error basis. The goal is to encourage neuroscientists, computer scientists, philosophers, and other interested readers to consider this concept of neural function and its implications, not least of which is the conclusion that brains don’t “compute.”

Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Internal Audit and IT Audit)

by Barak Engel

This book serves as an introduction into the world of security and provides insight into why and how current security management practices fail, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and suggests how to fix them. The resulting improvement is highly beneficial to any corporation that chooses to pursue this approach or strategy and from a bottom-line and business operations perspective, not just in technical operations. This book transforms the understanding of the role of the CISO, the selection process for a CISO, and the financial impact that security plays in any organization.

Why CISOs Fail: The Missing Link In Security Management--and How To Fix It (Security, Audit and Leadership Series)

by Barak Engel

Released in 2017, the first edition of Why CISOs Fail reimagined the role of the Chief Information Security Officer in a new and powerful way. Written to be easily consumable by both security pros as well as everyone who must deal with them, the book explores the different realms in which security leaders fail to deliver meaningful impact to their organizations, and why this happens. Its central thesis—that security is primarily a human behavioral discipline rather than a technology one—has been gaining increased attention as a core tenet of the field, and the book was ultimately inducted into the cybersecurity canon as a leading book on security management.In this freshly updated edition, Barak Engel adds new sections that correspond with the chapters of the original book: security as a discipline; as a business enabler; in sales; in legal; in compliance; in technology; and as an executive function. He explores new ideas in each operational area, providing essential insights into emerging aspects of the discipline. He then proposes two critical concepts for security management—the concept of "digital shrinkage" and the transition from CISO to CI/SO—that together offer a new paradigm for any organization that wants to become truly successful in its security journey.Why CISOs (Still) Fail is delivered in Barak's conversational, humoristic style, that has attracted a global audience to this and his other book, The Security Hippie. As he notes, the book's goal is to entertain as much as to inform, and he dearly hopes that you have fun reading it.

Why Digital Displays Cannot Replace Paper: The Cognitive Science of Media for Reading and Writing

by Hirohito Shibata Kengo Omura

From readability to operability, this book presents a number of experiments to analyze the characteristics of paper and digital displays in reading and writing. Why is it easy to read on paper? Why is it easy to concentrate on reading on paper? Why is it easy to think while writing or drawing on paper? This book answers these questions based on cognitive experiments on media. Paper is easy to read because it is easy to handle. If we emphasize the strengths of paper, paper is an operation media rather than a presentation media. These experiments also indicate how to develop digital media for reading and writing.This book will interest those who want to gain a scientific understanding of reading and writing on paper, those who want to work more effectively by selectively using paper and digital tools (e.g. knowledge workers and educators), and those who develop digital devices or services for reading and writing.

Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy

by Robert H. Sloan Richard Warner

The wave of data breaches raises two pressing questions: Why don’t we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Why Engagement Matters

by Heather O'Brien Paul Cairns

User Engagement (UE) is a complex concept to investigate. The purpose of this book is not to constrain UE to one perspective, but to offer a well-rounded appreciation for UE across various domains and disciplines. The text begins with two foundational chapters that describe theoretical and methodological approaches to user engagement; the remaining contributions examine UE from different disciplinary perspectives and across a range of computer-mediated environments, including social and communications media, online search, eLearning, games, and eHealth. The book concludes by bringing together the cross-disciplinary perspectives presented in each chapter and proposing an agenda for future research in this area. The book will appeal to established and emerging academic and industry researchers looking to pursue research and its challenges. This includes scholars at all levels with an interest in user engagement with digital media, from students to experienced researchers, and professionals in the fields of computer science, web technology, information science, museum studies, learning and health sciences, human-computer interaction, information architecture and design, and creative arts.

Why Greatness Cannot Be Planned

by Kenneth O. Stanley Joel Lehman

Why does modern life revolve around objectives? From how science is funded, to improving how children are educated -- and nearly everything in-between -- our society has become obsessed with a seductive illusion: that greatness results from doggedly measuring improvement in the relentless pursuit of an ambitious goal. In Why Greatness Cannot Be Planned, Stanley and Lehman begin with a surprising scientific discovery in artificial intelligence that leads ultimately to the conclusion that the objective obsession has gone too far. They make the case that great achievement can't be bottled up into mechanical metrics; that innovation is not driven by narrowly focused heroic effort; and that we would be wiser (and the outcomes better) if instead we whole-heartedly embraced serendipitous discovery and playful creativity. Controversial at its heart, yet refreshingly provocative, this book challenges readers to consider life without a destination and discovery without a compass.

Why Hackers Win: Power and Disruption in the Network Society

by Patrick Burkart Tom McCourt

When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.

Why Information Grows: The Evolution of Order, from Atoms to Economies

by César Hidalgo

What is economic growth? And why, historically, has it occurred in only a few places? Previous efforts to answer these questions have focused on institutions, geography, finances, and psychology. But according to MIT's antidisciplinarian César Hidalgo, understanding the nature of economic growth demands transcending the social sciences and including the natural sciences of information, networks, and complexity. To understand the growth of economies, Hidalgo argues, we first need to understand the growth of order. At first glance, the universe seems hostile to order. Thermodynamics dictates that over time, order--or information--disappears. Whispers vanish in the wind just like the beauty of swirling cigarette smoke collapses into disorderly clouds. But thermodynamics also has loopholes that promote the growth of information in pockets. Although cities are all pockets where information grows, they are not all the same. For every Silicon Valley, Tokyo, and Paris, there are dozens of places with economies that accomplish little more than pulling rocks out of the ground. So, why does the US economy outstrip Brazil's, and Brazil's that of Chad? Why did the technology corridor along Boston's Route 128 languish while Silicon Valley blossomed? In each case, the key is how people, firms, and the networks they form make use of information. Seen from Hidalgo's vantage, economies become distributed computers, made of networks of people, and the problem of economic development becomes the problem of making these computers more powerful. By uncovering the mechanisms that enable the growth of information in nature and society, Why Information Grows lays bear the origins of physical order and economic growth. Situated at the nexus of information theory, physics, sociology, and economics, this book propounds a new theory of how economies can do not just more things, but more interesting things.

Why Muslim Women and Smartphones: Mirror Images (Criminal Practice Ser.)

by Karen Waltorp

Using an assemblage approach to study how Muslim women in Norrebro, Denmark use their phones, Karen Waltorp examines how social media complicates the divide between public and private in relation to a group of people who find this distinction of utmost significance. Building on years of ethnographic fieldwork, Waltorp's ethnography reflects the trust and creativity of her relationships with these women which in turn open up nuanced discussions about both the subject at hand and best practice in conducting anthropological research. Combining rich ethnography with theoretical contextualization, Waltorp's book alternates between ethnography and analysis to illuminate a thoroughly modern community, and reveals the capacity of image-making technology to function as an infrastructure for seeing, thinking and engaging in fieldwork as an anthropologists. Waltorp identifies a series of important issues around anthropological approaches to new media, contributing to new debates around the anthropology of automation, data and self-tracking.

Refine Search

Showing 53,101 through 53,125 of 54,151 results