Browse Results

Showing 54,426 through 54,450 of 54,487 results

Cultural Analytics

by Lev Manovich

A book at the intersection of data science and media studies, presenting concepts and methods for computational analysis of cultural data.How can we see a billion images? What analytical methods can we bring to bear on the astonishing scale of digital culture--the billions of photographs shared on social media every day, the hundreds of millions of songs created by twenty million musicians on Soundcloud, the content of four billion Pinterest boards? In Cultural Analytics, Lev Manovich presents concepts and methods for computational analysis of cultural data. Drawing on more than a decade of research and projects from his own lab, Manovich offers a gentle, nontechnical introduction to the core ideas of data analytics and discusses the ways that our society uses data and algorithms.

Homo Ludens

by Johan Huizinga

"A happier age than ours once made bold to call our species by the name of Homo Sapiens. In the course of time we have come to realize that we are not so reasonable after all as the Eighteenth Century with its worship of reason and naive optimism, though us; "hence moder fashion inclines to designate our species as Homo Faber: Man the Maker. But though faber may not be quite so dubious as sapiens it is, as a name specific of the human being, even less appropriate, seeing that many animals too are makers. There is a third function, howver, applicable to both human and animal life, and just as important as reasoning and making--namely, playing. it seems to me that next to Homo Faber, and perhaps on the same level as Homo Sapiens, Homo Ludens, Man the Player, deserves a place in our nomenclature."--from the Foreward, by Johan Huizinga

How Not to Network a Nation: The Uneasy History of the Soviet Internet

by Benjamin Peters

Between 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation -- to construct a nationwide computer network. None of these attempts succeeded, and the enterprise had been abandoned by the time the Soviet Union fell apart. Meanwhile, ARPANET, the American precursor to the Internet, went online in 1969. Why did the Soviet network, with top-level scientists and patriotic incentives, fail while the American network succeeded? In How Not to Network a Nation, Benjamin Peters reverses the usual cold war dualities and argues that the American ARPANET took shape thanks to well-managed state subsidies and collaborative research environments and the Soviet network projects stumbled because of unregulated competition among self-interested institutions, bureaucrats, and others. The capitalists behaved like socialists while the socialists behaved like capitalists. After examining the midcentury rise of cybernetics, the science of self-governing systems, and the emergence in the Soviet Union of economic cybernetics, Peters complicates this uneasy role reversal while chronicling the various Soviet attempts to build a "unified information network." Drawing on previously unknown archival and historical materials, he focuses on the final, and most ambitious of these projects, the All-State Automated System of Management (OGAS), and its principal promoter, Viktor M. Glushkov. Peters describes the rise and fall of OGAS -- its theoretical and practical reach, its vision of a national economy managed by network, the bureaucratic obstacles it encountered, and the institutional stalemate that killed it. Finally, he considers the implications of the Soviet experience for today's networked world.

The Photographer's Story: The Art of Visual Narrative

by Michael Freeman

Having already taught you how to compose and interpret great photos, Michael Freeman now continues his best-selling series by exploring the most successful methods for presenting photography meaningfully and in an engaging format. This is the critical "next step" that separates adequate image galleries from captivating collections - and disinterested viewers from enthralled audiences.Tapping into his decades of experience shooting for such publications as Smithsonian, GEO, and Condé Nast Traveller (among many others), Michael Freeman studies the photo-essay phenomenon that took the world by storm and gave storytellers a completely new set of tools to construct their narratives. Having established how rhythm, pacing, and careful organisation build tension and cultivate interest, Freeman goes on to explain what this means for presenting your own photos, particularly in the new digital formats of online galleries, slideshows, and tablets.The Photographer's Story will enliven your images, refresh your perspective, and elevate your understanding of how photographs work together to tell a story. Your audiences will thank you for it.

Softwar: An Intimate Portrait of Larry Ellison and Oracle

by Matthew Symonds

This biography of the outspoken tech billionaire and founder of Oracle offers “a rare window on Ellison’s mind” (The New York Times).In a business where great risks, huge fortunes, and even bigger egos are common, Larry Ellison stood out as one of the most daring and driven leaders of the software industry. Oracle—the company he cofounded and ran—made pioneering advances, dominated the market, and turned Ellison into a Silicon Valley icon whose exploits are the stuff of legend.In Softwar, journalist Matthew Symonds gives readers exclusive and intimate insight into both Oracle and the man who made it. As well as relating the story of Oracle’s often bumpy path to success, Symonds deals with the private side of Ellison’s life. With unlimited insider access granted by Ellison himself, Symonds captures the intensity and, some would say, the recklessness that have made Ellison such a controversial figure.With a new and expanded epilogue that tells the story behind Oracle’s epic struggle to win control of PeopleSoft, Softwar is the most complete portrait undertaken of the man and his empire—a unique and gripping account of both an extraordinary life and the way the computing industry really works.

Aesthetics of Interaction in Digital Art

by Katja Kwastek Niamh Warde

Since the 1960s, artworks that involve the participation of the spectator have received extensive scholarly attention. Yet interactive artworks using digital media still present a challenge for academic art history. In this book, Katja Kwastek argues that the particular aesthetic experience enabled by these new media works can open up new perspectives for our understanding of art and media alike. Kwastek, herself an art historian, offers a set of theoretical and methodological tools that are suitable for understanding and analyzing not only new media art but also other contemporary art forms. Addressing both the theoretician and the practitioner, Kwastek provides an introduction to the history and the terminology of interactive art, a theory of the aesthetics of interaction, and exemplary case studies of interactive media art. Kwastek lays the historical and theoretical groundwork with discussions of processual strategies of twentieth-century art and theories of aesthetic experience, process aesthetics, play, and performance. She then develops an aesthetics of interaction, discussing such aspects as real space and data space, temporal structures, instrumental and phenomenal perspectives, and the relationship between materiality and interpretability. Finally, she applies her theory to specific works of interactive media art, including narratives in virtual and real space, interactive installations, and performance -- with case studies of works by Olia Lialina, Susanne Berkenheger, Stefan Schemat, Teri Rueb, Lynn Hershman, Agnes Heged's, Tmema, David Rokeby, Sonia Cillari, and Blast Theory.

HPC@Green IT

by Ralf Gruber Vincent Keller Erich Strohmaier

The authors present methods to reduce computer energy consumption by means of a better usage of a specific set of resources and maximizing the efficiency of the running applications. The processor frequency is adjusted to the needs of the running job, leading to a power drop by a factor of 2 and doubling battery life time of laptops. It is shown how computer resources can be optimally adapted to application needs, reducing job run time. Examples on how to optimize algorithms on single node and parallel RISC architectures are discussed. The job-related data are stored and reused to help computer managers to replace machines.

Computing

by Paul E. Ceruzzi

The history of computing could be told as the story of hardware and software, or the story of the Internet, or the story of "smart" hand-held devices, with subplots involving IBM, Microsoft, Apple, Facebook, and Twitter. In this concise and accessible account of the invention and development of digital technology, computer historian Paul Ceruzzi offers a broader and more useful perspective. He identifies four major threads that run throughout all of computing's technological development: digitization--the coding of information, computation, and control in binary form, ones and zeros; the convergence of multiple streams of techniques, devices, and machines, yielding more than the sum of their parts; the steady advance of electronic technology, as characterized famously by "Moore's Law"; and the human-machine interface. Ceruzzi guides us through computing history, telling how a Bell Labs mathematician coined the word "digital" in 1942 (to describe a high-speed method of calculating used in anti-aircraft devices), and recounting the development of the punch card (for use in the 1890 U. S. Census). He describes the ENIAC, built for scientific and military applications; the UNIVAC, the first general purpose computer; and ARPANET, the Internet's precursor. Ceruzzi's account traces the world-changing evolution of the computer from a room-size ensemble of machinery to a "minicomputer" to a desktop computer to a pocket-sized smart phone. He describes the development of the silicon chip, which could store ever-increasing amounts of data and enabled ever-decreasing device size. He visits that hotbed of innovation, Silicon Valley, and brings the story up to the present with the Internet, the World Wide Web, and social networking.

Recoding Gender

by Janet Abbate

Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male "computer geek" seems to be everywhere in popular culture. Few people know that women were a significant presence in the early decades of computing in both the United States and Britain. Indeed, programming in postwar years was considered woman's work (perhaps in contrast to the more manly task of building the computers themselves). In Recoding Gender, Janet Abbate explores the untold history of women in computer science and programming from the Second World War to the late twentieth century. Demonstrating how gender has shaped the culture of computing, she offers a valuable historical perspective on today's concerns over women's underrepresentation in the field. Abbate describes the experiences of women who worked with the earliest electronic digital computers: Colossus, the wartime codebreaking computer at Bletchley Park outside London, and the American ENIAC, developed to calculate ballistics. She examines postwar methods for recruiting programmers, and the 1960s redefinition of programming as the more masculine "software engineering." She describes the social and business innovations of two early software entrepreneurs, Elsie Shutt and Stephanie Shirley; and she examines the career paths of women in academic computer science. Abbate's account of the bold and creative strategies of women who loved computing work, excelled at it, and forged successful careers will provide inspiration for those working to change gendered computing culture.

Live Work Work Work Die: A Journey into the Savage Heart of Silicon Valley

by Corey Pein

A scathing, sardonic exploration of Silicon Valley tech culture, laying bare the greed, hubris, and retrograde politics of an industry that aspires to radically transform society for its own benefitAt the height of the startup boom, journalist Corey Pein set out for Silicon Valley with little more than a smartphone and his wits. His goal: to learn how such an overhyped industry could possibly sustain itself as long as it has. But to truly understand the delirious reality of the tech entrepreneurs, he knew he would have to inhabit that perspective—he would have to become an entrepreneur himself. Thus Pein begins his journey—skulking through gimmicky tech conferences, pitching his over-the-top business ideas to investors, and rooming with a succession of naive upstart programmers whose entire lives are managed by their employers—who work endlessly and obediently, never thinking to question their place in the system.In showing us this frantic world, Pein challenges the positive, feel-good self-image that the tech tycoons have crafted—as nerdy and benevolent creators of wealth and opportunity—revealing their self-justifying views and their insidious visions for the future. Vivid and incisive, Live Work Work Work Die is a troubling portrait of a self-obsessed industry bent on imposing its disturbing visions on the rest of us.

Moving without a Body

by Stamatia Portanova

Digital technologies offer the possibility of capturing, storing, and manipulating movement, abstracting it from the body and transforming it into numerical information. In Moving without a Body, Stamatia Portanova considers what really happens when the physicality of movement is translated into a numerical code by a technological system. Drawing on the radical empiricism of Gilles Deleuze and Alfred North Whitehead, she argues that this does not amount to a technical assessment of software's capacity to record motion but requires a philosophical rethinking of what movement itself is, or can become. Discussing the development of different audiovisual tools and the shift from analog to digital, she focuses on some choreographic realizations of this evolution, including works by Loie Fuller and Merce Cunningham. Throughout, Portanova considers these technologies and dances as ways to think -- rather than just perform or perceive -- movement. She distinguishes the choreographic thought from the performance: a body performs a movement, and a mind thinks or choreographs a dance. Similarly, she sees the move from analog to digital as a shift in conception rather than simply in technical realization. Analyzing choreographic technologies for their capacity to redesign the way movement is thought, Moving without a Body offers an ambitiously conceived reflection on the ontological implications of the encounter between movement and technological systems.

Lee de Forest

by Mike Adams

The life-long inventor, Lee de Forest invented the three-element vacuum tube used between 1906 and 1916 as a detector, amplifier, and oscillator of radio waves. Beginning in 1918 he began to develop a light valve, a device for writing and reading sound using light patterns. While he received many patents for his process, he was initially ignored by the film industry. In order to promote and demonstrate his process he made several hundred sound short films, he rented space for their showing; he sold the tickets and did the publicity to gain audiences for his invention. Lee de Forest officially brought sound to film in 1919. Lee De Forest: King of Radio, Television, and Film is about both invention and early film making; de Forest as the scientist and producer, director, and writer of the content. This book tells the story of de Forest's contribution in changing the history of film through the incorporation of sound. The text includes primary source historical material, U.S. patents and richly-illustrated photos of Lee de Forest's experiments. Readers will greatly benefit from an understanding of the transition from silent to audio motion pictures, the impact this had on the scientific community and the popular culture, as well as the economics of the entertainment industry.

Turing's Legacy: Developments from Turing's Ideas in Logic

by Rod Downey

Alan Turing was an inspirational figure who is now recognised as a genius of modern mathematics. In addition to leading the Allied forces' code-breaking effort at Bletchley Park in World War II, he proposed the theoretical foundations of modern computing and anticipated developments in areas from information theory to computer chess. His ideas have been extraordinarily influential in modern mathematics and this book traces such developments by bringing together essays by leading experts in logic, artificial intelligence, computability theory and related areas. Together, they give insight into this fascinating man, the development of modern logic, and the history of ideas. The articles within cover a diverse selection of topics, such as the development of formal proof, differing views on the Church–Turing thesis, the development of combinatorial group theory, and Turing's work on randomness which foresaw the ideas of algorithmic randomness that would emerge many years later.

Application Interoperability: Microsoft® .NET and J2EE

by Microsoft Corporation

Get the best information available for enabling application interoperability between the Microsoft .NET and Java 2 Enterprise Edition (J2EE) development platforms. This book offers practical and prescriptive guidance for developers responsible for creating enterprise-level business solutions where platform interoperability is a requirement and a reality. If you're experienced with one set of enterprise technologies but new to the other, you can ramp up quickly with focused introductions written from either the .NET or Java developer perspective. The book delivers expert technical information and recommendations for using Web services, runtime bridges, and asynchronous techniques; interoperability methods for point-to-point and resource tiers; and designing application architecture for interoperability. The companion CD-ROM includes a functional sample application, trial software, and a complete eBook. PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers?delivering accurate, real-world information that's been technically validated and tested. A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Creators Take Control: How NFTs Revolutionize Art, Business, and Entertainment

by Edward Lee

A leading legal scholar offers a compelling new theory to explain the meteoric rise of non-fungible tokens (NFTs) and their impact on art, business, entertainment, and society, and explains how they are revolutionizing our understanding of ownership.If you buy an NFT, do you own anything? Critics say no. Then why are people spending so much money to own them—to the tune of $27 billion in 2021? And why are big businesses and venture capital firms investing hundreds of millions to develop NFTs for people’s use in the metaverse, a purely imaginary world? In Creators Take Control, Edward Lee offers a compelling new theory he calls “Tokenism” that answers these perplexing questions. Using vivid examples, Lee lucidly explains how NFTs operate—and how they fundamentally change our understanding of ownership. Tokenism is an artistic, cultural, and technological movement that creates value in a new kind of ownership of a new type of property—symbolized by a virtual token—through a process of technological abstraction and artificial scarcity effectuated by NFTs. Ownership becomes virtual. What Cubism did in radically changing the twentieth-century perspective of creating and viewing art through cubes, Tokenism does today in altering our perspective of owning art and other things through tokens. Both movements radically reimagine what’s possible. Creators and businesses have seized upon this profound transformation. In a short time, they have developed a new market for digital art, important new rights for creators, innovative business models based on decentralized collaboration, and a new type of interactive ownership that enables identity, community, and patronage through NFTs. These innovations are just the start of revolutionary changes to society. Lee shows how NFTs create a new form of decentralized intellectual property, or De-IP. Comparable to the movement to decentralized finance (DeFi), De-IP empowers creators to take control of their artistic productions and livelihood. Lee’s intellectual tour de force is filled with practical insights—and hope—for fostering creativity and a Virtual Renaissance for the ages.

Putting People On The Map: Protecting Confidentiality With Linked Social-spatial Data

by National Research Council of the National Academies

Precise, accurate spatial information linked to social and behavioral data is revolutionizing social science by opening new questions for investigation and improving understanding of human behavior in its environmental context. At the same time, precise spatial data make it more likely that individuals can be identified, breaching the promise of confidentiality made when the data were collected. Because norms of science and government agencies favor open access to all scientific data, the tension between the benefits of open access and the risks associated with potential breach of confidentiality pose significant challenges to researchers, research sponsors, scientific institutions, and data archivists. Putting People on the Map finds that several technical approaches for making data available while limiting risk have potential, but none is adequate on its own or in combination. This book offers recommendations for education, training, research, and practice to researchers, professional societies, federal agencies, institutional review boards, and data stewards.

Atari Age: The Emergence of Video Games in America

by Michael Z. Newman

Beginning with the release of the Magnavox Odyssey and Pong in 1972, video games, whether played in arcades and taverns or in family rec rooms, became part of popular culture, like television. In fact, video games were sometimes seen as an improvement on television because they spurred participation rather than passivity. These "space-age pinball machines" gave coin-operated games a high-tech and more respectable profile. In Atari Age, Michael Newman charts the emergence of video games in America from ball-and-paddle games to hits like Space Invaders and Pac-Man, describing their relationship to other amusements and technologies and showing how they came to be identified with the middle class, youth, and masculinity.Newman shows that the "new media" of video games were understood in varied, even contradictory ways. They were family fun (but mainly for boys), better than television (but possibly harmful), and educational (but a waste of computer time). Drawing on a range of sources -- including the games and their packaging; coverage in the popular, trade, and fan press; social science research of the time; advertising and store catalogs; and representations in movies and television -- Newman describes the series of cultural contradictions through which the identity of the emerging medium worked itself out. Would video games embody middle-class respectability or suffer from the arcade's unsavory reputation? Would they foster family togetherness or allow boys to escape from domesticity? Would they make the new home computer a tool for education or just a glorified toy? Then, as now, many worried about the impact of video games on players, while others celebrated video games for familiarizing kids with technology essential for the information age.

Debugging Game History: A Critical Lexicon

by Raiford Guins Henry Lowood

Even as the field of game studies has flourished, critical historical studies of games have lagged behind other areas of research. Histories have generally been fact-by-fact chronicles; fundamental terms of game design and development, technology, and play have rarely been examined in the context of their historical, etymological, and conceptual underpinnings. This volume attempts to "debug" the flawed historiography of video games. It offers original essays on key concepts in game studies, arranged as in a lexicon -- from "Amusement Arcade" to "Embodiment" and "Game Art" to "Simulation" and "World Building." Written by scholars and practitioners from a variety of disciplines, including game development, curatorship, media archaeology, cultural studies, and technology studies, the essays offer a series of distinctive critical "takes" on historical topics. The majority of essays look at game history from the outside in; some take deep dives into the histories of play and simulation to provide context for the development of electronic and digital games; others take on such technological components of games as code and audio. Not all essays are history or historical etymology -- there is an analysis of game design, and a discussion of intellectual property -- but they nonetheless raise questions for historians to consider. Taken together, the essays offer a foundation for the emerging study of game history. ContributorsMarcelo Aranda, Brooke Belisle, Caetlin Benson-Allott, Stephanie Boluk, Jennifer deWinter, J. P. Dyson, Kate Edwards, Mary Flanagan, Jacob Gaboury, William Gibbons, Raiford Guins, Erkki Huhtamo, Don Ihde, Jon Ippolito, Katherine Isbister, Mikael Jakobsson, Steven E. Jones, Jesper Juul, Eric Kaltman, Matthew G. Kirschenbaum, Carly A. Kocurek, Peter Krapp, Patrick LeMieux, Henry Lowood, Esther MacCallum-Stewart, Ken S. McAllister, Nick Monfort, David Myers, James Newman, Jenna Ng, Michael Nitsche, Laine Nooney, Hector Postigo, Jas Purewal, Reneé H. Reynolds, Judd Ethan Ruggill, Marie-Laure Ryan, Katie Salen Tekinbas, Anastasia Salter, Mark Sample, Bobby Schweizer, John Sharp, Miguel Sicart, Rebecca Elisabeth Skinner, Melanie Swalwell, David Thomas, Samuel Tobin, Emma Witkowski, Mark J.P. Wolf

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

by Jean-Francois Blanchette

An examination of the challenges of establishing the authenticity of electronic documents—in particular the design of a cryptographic equivalent to handwritten signatures.The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures.From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects.Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

Burdens of Proof

by Jean-François Blanchette

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects. Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

Interface

by Branden Hookway

In this book, Branden Hookway considers the interface not as technology but as a form of relationship with technology. The interface, Hookway proposes, is at once ubiquitous and hidden from view. It is both the bottleneck through which our relationship to technology must pass and a productive encounter embedded within the use of technology. It is a site of contestation -- between human and machine, between the material and the social, between the political and the technological -- that both defines and elides differences. A virtuoso in multiple disciplines, Hookway offers a theory of the interface that draws on cultural theory, political theory, philosophy, art, architecture, new media, and the history of science and technology. He argues that the theoretical mechanism of the interface offers a powerful approach to questions of the human relationship to technology. Hookway finds the origin of the term interface in nineteenth-century fluid dynamics and traces its migration to thermodynamics, information theory, and cybernetics. He discusses issues of subject formation, agency, power, and control, within contexts that include technology, politics, and the social role of games. He considers the technological augmentation of humans and the human-machine system, discussing notions of embodied intelligence. Hookway views the figure of the subject as both receiver and active producer in processes of subjectification. The interface, he argues, stands in a relation both alien and intimate, vertiginous and orienting to those who cross its threshold.

Windows PowerShell 2.0 Scripting für Administratoren

by Tobias Weltner Dr.

Wenn Sie sich für die Automatisierung der Verwaltung von Windows-Systemen mit den vielfältigen Möglichkeiten von Windows PowerShell 2.0 interessieren, finden Sie in diesem Buch zahlreiche Beispielskripts aus allen wichtigen administrativen Bereichen. Einer der bekanntesten Scripting-Experten Deutschlands stellt Ihnen die wichtigsten Cmdlets vor und liefert Ihnen viele Beispielskripts, die Sie sofort einsetzen, anpassen und erweitern können. Dieses Buch ist ein Nachschlagewerk für die PowerShell-Praxis, die vielen hilfreichen Codebeispiele in diesem Buch sind ohne größeres Vorwissen für den Praktiker sofort einsetzbar.

Data-Driven Security

by Jay Jacobs Bob Rudis

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.

Peripheral Vision

by Zabet Patterson

In 1959, the electronics manufacturer Stromberg-Carlson produced the S-C 4020, a device that allowed mainframe computers to present and preserve images. In the mainframe era, the output of text and image was quite literally peripheral; the S-C 4020 -- a strange and elaborate apparatus, with a cathode ray screen, a tape deck, a buffer unit, a film camera, and a photo-paper camera -- produced most of the computer graphics of the late 1950s and early 1960s. At Bell Laboratories in Murray Hill, New Jersey, the S-C 4020 became a crucial part of ongoing encounters among art, science, and technology. In this book, Zabet Patterson examines the extraordinary uses to which the Bell Labs SC-2040 was put between 1961 and 1972, exploring a series of early computer art projects shaped by the special computational affordances of the S-C 4020. The S-C 4020 produced tabular data, graph plotting and design drawings, grid projections, and drawings of axes and vectors; it made previously impossible visualizations possible. Among the works Patterson describes are E. E. Zajac's short film of an orbiting satellite, which drew on the machine's graphic capacities as well as the mainframe's calculations; a groundbreaking exhibit of "computer generated pictures" by Béla Julesz and Michael Noll, two scientists interested in visualization; animations by Kenneth Knowlton and the Bell Labs artist-in-residence Stan VanDerBeek; and Lillian Schwartz's "cybernetic" film Pixillation.Arguing for the centrality of a peripheral, Patterson makes a case for considering computational systems not simply as machines but in their cultural and historical context.

Architecting the Cloud

by Michael J. Kavis

An expert guide to selecting the right cloud service model for your businessCloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.Guides corporations through key cloud design considerationsDiscusses the pros and cons of each cloud service modelHighlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and moreClearly defines the services cloud providers offer for each service model and the cloud services IT must provideArming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.

Refine Search

Showing 54,426 through 54,450 of 54,487 results