- Table View
- List View
How Not to Fail at Projects: Stopping the Project Management Insanity Spiral
by Claude H. MaleyThey say that repeating the same thing and expecting a different result is insanity. This book aims to analyze the reasons for failure in project management. It is filled with stories, anecdotes and satires that highlight how organizations and project managers fall into an “insanity spiral”. It provides seven Sanity Checks designed to keep project managers from repeating the same mistakes and to help them become project champions: The first sanity check is how and when to appoint a project manager. This first sanity check may be familiar and may well bring back memories of starting a career in project management. The second sanity check is the comprehension of why a project is needed. It helps to overcome the misunderstanding that many have on the nature of projects and its management. The third sanity check is the understanding of the unknown and emphasizes the importance of risk management. The fourth sanity check is capturing who needs what. It is about the constant pursuit to satisfy a host of individuals and at times the, sometimes seemingly, unsurmountable quest to secure resources for a project. The fifth sanity check is who does what. It also deals with satisfying stakeholders and obtaining resources. The sixth sanity check is outside assistance. It is all about breaking the us versus them syndrome when outsourcing in a project. The seventh and most important sanity check is engaging the efforts of others as it deals with people—the lifeblood of any organization. The book concludes with a chapter on composing and building powerful microservices. With the exponential growth of IoT devices, microservices are being developed and deployed on resource-constrained but resource-intensive devices in order to provide people-centric applications. The book discusses the challenges of these applications. Finally, the book looks at the role of microservices in smart environments and upcoming trends including ubiquitous yet disappearing microservices.
How Not to Network a Nation: The Uneasy History of the Soviet Internet
by Benjamin PetersBetween 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation -- to construct a nationwide computer network. None of these attempts succeeded, and the enterprise had been abandoned by the time the Soviet Union fell apart. Meanwhile, ARPANET, the American precursor to the Internet, went online in 1969. Why did the Soviet network, with top-level scientists and patriotic incentives, fail while the American network succeeded? In How Not to Network a Nation, Benjamin Peters reverses the usual cold war dualities and argues that the American ARPANET took shape thanks to well-managed state subsidies and collaborative research environments and the Soviet network projects stumbled because of unregulated competition among self-interested institutions, bureaucrats, and others. The capitalists behaved like socialists while the socialists behaved like capitalists. After examining the midcentury rise of cybernetics, the science of self-governing systems, and the emergence in the Soviet Union of economic cybernetics, Peters complicates this uneasy role reversal while chronicling the various Soviet attempts to build a "unified information network." Drawing on previously unknown archival and historical materials, he focuses on the final, and most ambitious of these projects, the All-State Automated System of Management (OGAS), and its principal promoter, Viktor M. Glushkov. Peters describes the rise and fall of OGAS -- its theoretical and practical reach, its vision of a national economy managed by network, the bureaucratic obstacles it encountered, and the institutional stalemate that killed it. Finally, he considers the implications of the Soviet experience for today's networked world.
How Not to Network a Nation: The Uneasy History of the Soviet Internet (Information Policy)
by Benjamin PetersHow, despite thirty years of effort, Soviet attempts to build a national computer network were undone by socialists who seemed to behave like capitalists.Between 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation—to construct a nationwide computer network. None of these attempts succeeded, and the enterprise had been abandoned by the time the Soviet Union fell apart. Meanwhile, ARPANET, the American precursor to the Internet, went online in 1969. Why did the Soviet network, with top-level scientists and patriotic incentives, fail while the American network succeeded? In How Not to Network a Nation, Benjamin Peters reverses the usual cold war dualities and argues that the American ARPANET took shape thanks to well-managed state subsidies and collaborative research environments and the Soviet network projects stumbled because of unregulated competition among self-interested institutions, bureaucrats, and others. The capitalists behaved like socialists while the socialists behaved like capitalists. After examining the midcentury rise of cybernetics, the science of self-governing systems, and the emergence in the Soviet Union of economic cybernetics, Peters complicates this uneasy role reversal while chronicling the various Soviet attempts to build a “unified information network.” Drawing on previously unknown archival and historical materials, he focuses on the final, and most ambitious of these projects, the All-State Automated System of Management (OGAS), and its principal promoter, Viktor M. Glushkov. Peters describes the rise and fall of OGAS—its theoretical and practical reach, its vision of a national economy managed by network, the bureaucratic obstacles it encountered, and the institutional stalemate that killed it. Finally, he considers the implications of the Soviet experience for today's networked world.
How Open Source Ate Software: Understand The Open Source Movement And So Much More
by Gordon HaffLearn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately, how we think about business values.You’ll look at project and community examples including Linux, BSD, Apache, and Kubernetes, understand the open source development model, and how open source has influenced approaches more broadly, even proprietary software, such as open betas. You'll also examine the flipside, the "Second Machine Age," and the challenges of open source-based business models.Today, open source serves as shorthand for much broader trends and behaviors. It’s not just about a free (in all senses of the word) alternative to commercial software. It increasingly is the new commercial software. How Open Source Ate Software reveals how open source has much in common, and is often closely allied, with many other trends in business and society. You'll see how it enables projects that go beyond any individual company. That makes open source not just a story about software, but a story about almost everything.What You'll LearnUnderstand open source opportunities and challengesSell software if you’re giving it awayApply open source principles more broadly to openorg, devops, etc.Review which organizational incentives you can implement Who This Book Is ForAnyone who has an interest in what is happening in open source and the open source community, and anyone who is contemplating making a business that involves open source.
How Open Source Ate Software: Understand the Open Source Movement and So Much More
by Gordon HaffLearn how free software became open source and how you can sell open source software. This book provides a historical context of how open source has thoroughly transformed how we write software, how we cooperate, how we communicate, how we organize, and, ultimately, how we think about business values. This fully updated second edition includes an entire chapter on legal considerations such as trademarks and the latest happenings in open source licensing. It also expands on open hardware trends such as RISC-V, open governance, and the difference between community projects and commercial products, especially as seen through the lens of security. You’ll look at project and community examples including Linux, BSD, Apache, and Kubernetes, understand the open source development model, and how open source has influenced approaches more broadly, even within proprietary software, such as open betas. You'll also examine the flipside, the "Second Machine Age," and the challenges of open source-based business models. Today, open source serves as shorthand for much broader trends and behaviors. It’s not just about a free (in all senses of the word) alternative to commercial software. It increasingly is the new commercial software. How Open Source Ate Software, second edition reveals how open source has much in common, and is often closely allied, with many other trends in business and society. You'll see how it enables projects that go beyond any individual company. That makes open source not just a story about software, but a story about almost everything. What You'll Learn The opportunities that open source creates and the challenges that come with themThe ways in which companies can create business models to successfully sell "free" softwareHow the open source development model works from creating communities to selling commercial productsThe important issues associated with open source project and product governance and licensingHow open source principles can apply more broadly to DevOps and other organizational practices Who This Book Is For Anyone who is contemplating building a community and a business around open source software.
How Pac-Man Eats
by Noah Wardrip-FruinHow the tools and concepts for making games are connected to what games can and do mean; with examples ranging from Papers, Please to Dys4ia.In How Pac-Man Eats, Noah Wardrip-Fruin considers two questions: What are the fundamental ways that games work? And how can games be about something? Wardrip-Fruin argues that the two issues are related. Bridging formalist and culturally engaged approaches, he shows how the tools and concepts for making games are connected to what games can and do mean.
How Partisan Media Polarize America
by Matthew LevenduskyForty years ago, viewers who wanted to watch the news could only choose from among the major broadcast networks, all of which presented the same news without any particular point of view. Today we have a much broader array of choices, including cable channels offering a partisan take. With partisan programs gaining in popularity, some argue that they are polarizing American politics, while others counter that only a tiny portion of the population watches such programs and that their viewers tend to already hold similar beliefs. <P><P> In How Partisan Media Polarize America, Matthew Levendusky confirms--but also qualifies--both of these claims. Drawing on experiments and survey data, he shows that Americans who watch partisan programming do become more certain of their beliefs and less willing to weigh the merits of opposing views or to compromise. And while only a small segment of the American population watches partisan media programs, those who do tend to be more politically engaged, and their effects on national politics are therefore far-reaching. <P>< In a time when politics seem doomed to partisan discord, How Partisan Media Polarize America offers a much-needed clarification of the role partisan media might play.
How Partisan Media Polarize America (Chicago Studies In American Politics Ser.)
by Matthew LevenduskyForty years ago, viewers who wanted to watch the news could only choose from among the major broadcast networks, all of which presented the same news without any particular point of view. Today we have a much broader array of choices, including cable channels offering a partisan take. With partisan programs gaining in popularity, some argue that they are polarizing American politics, while others counter that only a tiny portion of the population watches such programs and that their viewers tend to already hold similar beliefs. In How Partisan Media Polarize America, Matthew Levendusky confirms—but also qualifies—both of these claims. Drawing on experiments and survey data, he shows that Americans who watch partisan programming do become more certain of their beliefs and less willing to weigh the merits of opposing views or to compromise. And while only a small segment of the American population watches partisan media programs, those who do tend to be more politically engaged, and their effects on national politics are therefore far-reaching. In a time when politics seem doomed to partisan discord, How Partisan Media Polarize America offers a much-needed clarification of the role partisan media might play.
How Smart Is Your City?: Technological Innovation, Ethics and Inclusiveness (Intelligent Systems, Control and Automation: Science and Engineering #98)
by Maria Isabel Aldinhas FerreiraThis book focuses on the potential benefits that the so-called smart technologies have been bringing to the urban reality and to the management and governance of the city, simultaneously highlighting the necessity for its responsible and ethically guided deployment, respecting essential humanistic values. The urban ecosystem has been, in the last decades, the locus to where the most advanced forms of technological innovation converge, creating intelligent management platforms meant to produce models of energy, water consumption, mobility/transportation, waste management and efficient cities. Due to the coincidence of the punctual overlap of its own genesis with the pandemics outbreak, the present book came to embody both the initial dream and desire of an intelligent city place of innovation, development and equity – a dream present in most of the chapters – and the fear not just of the pandemics per se, but of the consequences that this may have for the character of the intelligent city and for the nature of its relationship with its dwellers that, like a mother, it is supposed to nurture, shelter and protect.
How Smart Machines Think (The\mit Press Ser.)
by Sean GerrishEverything you've always wanted to know about self-driving cars, Netflix recommendations, IBM's Watson, and video game-playing computer programs.The future is here: Self-driving cars are on the streets, an algorithm gives you movie and TV recommendations, IBM's Watson triumphed on Jeopardy over puny human brains, computer programs can be trained to play Atari games. But how do all these things work? In this book, Sean Gerrish offers an engaging and accessible overview of the breakthroughs in artificial intelligence and machine learning that have made today's machines so smart.Gerrish outlines some of the key ideas that enable intelligent machines to perceive and interact with the world. He describes the software architecture that allows self-driving cars to stay on the road and to navigate crowded urban environments; the million-dollar Netflix competition for a better recommendation engine (which had an unexpected ending); and how programmers trained computers to perform certain behaviors by offering them treats, as if they were training a dog. He explains how artificial neural networks enable computers to perceive the world—and to play Atari video games better than humans. He explains Watson's famous victory on Jeopardy, and he looks at how computers play games, describing AlphaGo and Deep Blue, which beat reigning world champions at the strategy games of Go and chess. Computers have not yet mastered everything, however; Gerrish outlines the difficulties in creating intelligent agents that can successfully play video games like StarCraft that have evaded solution—at least for now. Gerrish weaves the stories behind these breakthroughs into the narrative, introducing readers to many of the researchers involved, and keeping technical details to a minimum. Science and technology buffs will find this book an essential guide to a future in which machines can outsmart people.
How Software Works: The Magic Behind Encryption, CGI, Search Engines, and Other Everyday Technologies
by V. Anton SpraulWe use software every day to perform all kinds of magical, powerful tasks. It's the force behind stunning CGI graphics, safe online shopping, and speedy Google searches. Software drives the modern world, but its inner workings remain a mystery to many.How Software Works explains how computers perform common-yet-amazing tasks that we take for granted every day.Inside you'll learn:–How data is encrypted–How passwords are used and protected–How computer graphics are created–How video is compressed for streaming and storage–How data is searched (and found) in huge databases–How programs can work together on the same problem without conflict–How data travels over the InternetHow Software Works breaks down these processes with patient explanations and intuitive diagrams so that anyone can understand—no technical background is required, and you won't be reading through any code. In plain English, you'll examine the intricate logic behind the technologies you constantly use but never understood.If you've ever wondered what really goes on behind your computer screen, How Software Works will give you fascinating look into the software all around you.
How They Broke Britain: The Instant Sunday Times Bestseller
by James O'Brien***THE RUNAWAY BESTSELLER, WITH NEW MATERIAL FOR THE PAPERBACK***THE REVEALING, DEFINING ACCOUNT OF THE DARK NETWORK THAT BROKE OUR COUNTRY.Something has gone really wrong in Britain.Our economy has tanked, our freedoms are shrinking, and social divisions are growing. Our politicians seem most interested in their own careers, and much of the media only make things worse. We are living in a country almost unrecognisable from the one that existed a decade ago. But whose fault is it really? Who broke Britain and how did they do it?Bold and incisive as ever, James O'Brien reveals the shady network of influence that has created a broken Britain of strikes, shortages and scandals. He maps the web connecting dark think tanks to Downing Street, the journalists involved in selling it to the public and the media bosses pushing their own agendas. Over ten chapters, each focusing on a particular person complicit in the downfall, James O'Brien reveals how a select few have conspired - sometimes by incompetence, sometimes by design - to bring Britain to its knees.
How Things Work: The Computer Science Edition (How Things Work Series)
by Charles F. BowmanIt’s axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
How Things Work: The Technology Edition (How Things Work Series)
by Charles F. BowmanIt is beyond trite to say that technology is prevalent in our daily lives. However, many of us remain clueless as to how much of it works. Unfortunately, even for the curious among us, the Web is not always the best vehicle to acquire such knowledge: Information appears in fragments, some of it is incorrect or dated, and much of it serves as jargon-laden discussions intended for professionals. How Things Work: The Technology Edition will serve as a compendium of tutorials. Each section will focus on one technology or concept and provide the reader with a thorough understanding of the subject matter. After finishing the book, readers will understand the inner workings of the technologies they use every day and, more importantly, they will learn how they can make these tools work for them. In addition, the book will also inform readers about the darker side of modern technology: Security and privacy concerns, malware, and threats from the dark web.
How To Be A Complete and Utter Blunt: Diary of a Reluctant Social Media Sensation
by James Blunt'Opinions are like arseholes - everybody has one'James Blunt, 6 December 2014Once upon a time, James Blunt's most enduring legacy was a three-minute, thirty-second pop song about a girl he saw on the underground, and a nation's worth of abuse. But with the invention of Twitter, James found his real voice, and with it, the chance to reply with a simple 'up yours'. Now the King of Twitter has ascended to the heady heights of occasionally 'winning the internet'. Selected and introduced by James himself, this is a year in the life of the world's most reluctant social media sensation. Now learn for yourself how to be a complete and utter Blunt . . .
How To Be A Complete and Utter Blunt: Diary of a Reluctant Social Media Sensation
by James Blunt'Opinions are like arseholes - everybody has one'James Blunt, 6 December 2014Once upon a time, James Blunt's most enduring legacy was a three-minute, thirty-second pop song about a girl he saw on the underground, and a nation's worth of abuse. But with the invention of Twitter, James found his real voice, and with it, the chance to reply with a simple 'up yours'. Now the King of Twitter has ascended to the heady heights of occasionally 'winning the internet'. Selected and introduced by James himself, this is a year in the life of the world's most reluctant social media sensation. Now learn for yourself how to be a complete and utter Blunt . . .
How To Be a Professional Gamer: An eSports Guide to League of Legends
by Fnatic Kikis YellOwStar Spirit Febiven Rekkles Mike DiverIt’s time to become a Legend.Watched by millions and contested by the best professional gamers in the world, League of Legends is more than a game. Since the very beginnning of eSports, Fnatic have been competing at the highest level. In 2011, they won the World Championships and in 2015 they achieved the impossible: an entire regular season undefeated. In How to be a Professional Gamer, they take you inside the elite world of the sport, and into the world of competitive gaming. Sharing their knowledge, expertise, and strategies, it’s only a matter of time before you’re a world champion, too.Including tips on game strategy, teamwork and mental strength, How to be a Professional Gamer is both a guide for how to improve as a regular gamer, and the story of Fnatic and how they’ve conquered the world of eSports.Are you ready?
How To Cheat in Photoshop Elements 11: Release Your Imagination
by David AschHave you ever wanted to summon magical powers? Create a stained glass style masterpiece? Or turn Summer into Fall? There’s a whole world of opportunity out there for creating fun photomontages, powerful panoramas, and dynamic distortions. Redesigned and completely rewritten for Elements 11, this book starts you at the basics of photomontage with selection techniques, layers and transformations; leading up to full-length projects for creating magazine covers, fantasy scenes, poster artwork and much, much more. This book also features a dedicated website where you can download images and tutorial videos that show you how to expand, develop, and master top techniques. As well as, full color images, a glossary of terms, useful keyboard shortcuts, and a detailed index that will help you locate that fantastic technique in a flash.
How To Cheat in Photoshop Elements 12: Release Your Imagination
by David AschHave you ever wanted to summon magical powers? Appear in a graphic novel? Or control the weather and seasons? There’s a whole world of opportunity out there for creating fun photomontages, powerful panoramas, and dynamic distortions. <P><P> How to Cheat in Photoshop Elements 12 starts you at the basics of photomontage with selection techniques, layers and transformations; leading up to full-length projects for creating magazine covers, fantasy scenes, poster artwork and much, much more. <P><P> This book also features: A dedicated website where you can download images and tutorial videos that show you how to expand, develop, and master top techniques. Full color images, a glossary of terms, useful keyboard shortcuts, and a detailed index that will help you locate that fantastic technique in a flash.
How To Crush Social Media In Only 2 Minutes A Day: Twitter, Facebook, Instagram, Kred, Goodreads, Linkedin
by Ndeye Labadens James Goonwrite. ComPrepare to Crush the Game of Social Media! This is a fun and powerful method to promote your business, book, or item. Why Do You Need to Crush Social Network? This book offers step- by- step instructions to build your social media presence with your platforms and /or blog. You'll have access to multiple resources to help increase your sales and your online presence. For example, do you know the best keywords to use? When is the most beneficial time to use Twitter? How do you change listings on Goodreads? You'll find answers to these questions and many more. Prepare to Crush the Social Media in Only 2 Minutes a Day is a must-have!
How To Diagnose And Fix Everything Electronic
by Michael Jay GeierRepair all kinds of electrical products, from modern digital gadgets to analog antiques, with help from this updated book. How to Diagnose and Fix Everything Electronic, Second Edition, offers expert insights, case studies, and step-by-step instruction from a lifelong electronics guru. Discover how to assemble your workbench, use the latest test equipment, zero in on and replace dead components, and handle reassembly. Instructions for specific devices, including stereos, MP3 players, digital cameras, flat-panel TVs, laptops, headsets, and mobile devices are also included in this do-it-yourself guide. Choose the proper tools and set up your workbench Ensure personal safety and use proper eye and ear protection Understand how electrical components work and why they fail Perform preliminary diagnoses based on symptoms Use test equipment, including digital multimeters, ESR meters, frequency counters, and oscilloscopes Interpret block, schematic, and pictorial diagrams Disassemble products and identify sections Analyze circuits, locate faults, and replace dead parts Re-establish connections and reassemble devices
How To Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish Without A Trace (Globe Pequot Ser.)
by Eileen Horan Frank AhearnHow to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence. <p><p> Written by the world’s leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker. <p> Frank Ahearn and Eileen Horan provide field-tested methods for maintaining privacy, as well as tactics and strategies for protecting personal information and preventing identity theft. They explain and illustrate key tactics such as misinformation (destroying all the data known about you); disinformation (creating fake trails); and, finally, reformation—the act of getting you from point A to point B without leaving clues. <p> Ahearn illustrates every step with real-life stories of his fascinating career, from undercover work to nab thieving department store employees to a stint as a private investigator; and, later, as a career “skip tracer” who finds people who don’t want to be found. In 1997, when news broke of President Bill Clinton’s dalliance with a White House intern, Ahearn was hired to find her. When Oscar statuettes were stolen in Beverly Hills, Ahearn pinpointed a principal in the caper to help solve the case. When Russell Crowe threw a telephone at a hotel clerk in 2005, Ahearn located the victim and hid him from the media. <p> An indispensable resource not just for those determined to become utterly anonymous, but also for just about anyone in the brave new world of on-line information, How to Disappear sums up Ahearn’s dual philosophy: Don’t break the law, but know how to protect yourself.
How To Get Back Links: 10 Extremely Powerful Backlinks Sources To Building Website Backlinks And Exploding Your Traffic
by Brian GravesOver 60 website examples where you can find these 10 different back linking types, ranging from PR4-PR9.You also get strategies for each link type that you can use to increase website traffic.
How To Grow Your Business On The Internet
by Vincent EmeryFor the computer challenged potential entrepreneur, extols the benefits of opening shop on Cyberstreet, explains the requirements and protocols, outlines business strategies, warns against accidents and attacks, and suggests 11 businesses that might work. Further information is available free on the World Wide Web. A list of free business resources on the Internet stands in for a bibliography. Annotation c. by Book News, Inc. , Portland, Or.
How To Hack Like A God: Master The Secrets Of Hacking Through Real Life Scenarios (Hack The Planet Ser.)
by Sparc FlowFollow me on a step-by-step hacking journey where we pwn a high-profile fashion company. From zero initial access to remotely recording board meetings, we will detail every custom script and technique used in this attack, drawn from real-life findings, to paint the most realistic picture possible. Whether you are a wannabe pentester dreaming about real-life hacking experiences or an experienced ethical hacker tired of countless Metasploit tutorials, you will find unique gems in this book for you to try: -Playing with Kerberos -Bypassing Citrix & Applocker -Mainframe hacking -Fileless WMI persistence -NoSQL injections -Wiegand protocol -Exfiltration techniques -Antivirus evasion tricks -And much more advanced hacking techniques I have documented almost every tool and custom script used in this book. I strongly encourage you to test them out yourself and master their capabilities (and limitations) in an environment you own and control. Hack (safely) the Planet! (Previously published as How to Hack a Fashion Brand)