Browse Results

Showing 26 through 50 of 53,275 results

Windows VistaTM For Dummies

by Andy Rathbone

Create music CDs and photo DVDs or even watch TV Move your files to a new computer, or get your old PC ready for Vista The thing that's made Windows For Dummies so successful is that it's packed with the basics you need to make Windows work. This book gets you through all the Windows Vista tasks and tripwires, including starting programs, finding files, navigating the new see-through interface, staying safe while you cruise the Internet, and much more. Discover how to Find files when they're hiding Hook up with another computer Make Vista work like XP Block Internet bad guys Share a PC without sharing your files Fix problems yourself

Handbook of Mobile Ad Hoc Networks for Mobility Models

by Radhika Ranjan Roy

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. Handbook of Mobile Ad Hoc Networks for Mobility Models is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.

A Citizen's Guide to Artificial Intelligence

by John Zerilli

A concise but informative overview of AI ethics and policy.Artificial intelligence, or AI for short, has generated a staggering amount of hype in the past several years. Is it the game-changer it's been cracked up to be? If so, how is it changing the game? How is it likely to affect us as customers, tenants, aspiring home-owners, students, educators, patients, clients, prison inmates, members of ethnic and sexual minorities, voters in liberal democracies? This book offers a concise overview of moral, political, legal and economic implications of AI. It covers the basics of AI's latest permutation, machine learning, and considers issues including transparency, bias, liability, privacy, and regulation.

The Hidden History of Code-Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions

by Sinclair McKay

A fascinating exploration of the uncrackable codes and secret cyphers that helped win wars, spark revolutions and change the faces of nations.There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament, too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In The Hidden History of Code Breaking, Sinclair McKay explores these uncrackable codes, secret ciphers, and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, we will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created.

Architecting the Cloud

by Michael J. Kavis

An expert guide to selecting the right cloud service model for your businessCloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and technology requirements.Guides corporations through key cloud design considerationsDiscusses the pros and cons of each cloud service modelHighlights major design considerations in areas such as security, data privacy, logging, data storage, SLA monitoring, and moreClearly defines the services cloud providers offer for each service model and the cloud services IT must provideArming you with the information you need to choose the right cloud service provider, Architecting the Cloud is a comprehensive guide covering everything you need to be aware of in selecting the right cloud service model for you.

Confessions of a Successful CIO

by Brian Watson Susan Cramm Dan Roberts

Be the most effective CIO you can be--by learning from the best in the businessToday's Chief Information Officers must be an entirely new breed of technology leader. With ever-changing demands from the business, and in an increasingly technology-centric business environment, CIOs must find game-changing innovations and process improvements that make a real impact on the bottom line. Business executives need their CIOs to be real partners--speaking the language of the business and donning their strategist caps--not just commodity managers. Those IT leaders who fail to break out of the order-taker, utility manager mold will, simply put, be looking for a new job.In Confessions of a Successful CIO: How the Best CIOs Tackle Their Toughest Business Challenges, current and future CIOs will gain invaluable perspectives from the stories of today's best IT leaders. These acclaimed leaders--each profiled in their own chapter--explain the toughest business decision they had to make, and how the outcome influenced and impacted their leadership style. These in-depth anecdotes take the reader inside some of the most challenging business climates imaginable and chronicle how these elite CIOs made the decisions that mattered.Read detailed case studies of how some of the best CIOs have handled their most challenging business problemsLearn how the best CIOs anticipate changes to their business and respond--before the business comes knockingExplore how these top-flight CIOs make critical decisions around strategy and IT to not only benefit their companies, but in some cases, to save them from becoming obsolete.Analyze their perspectives on managing people, crises and balancing the risks and rewards of their "bet the farm" strategiesConfessions of a Successful CIO is the new playbook for learning how to take risks, respond to crises, and create more value from IT. Each chapter presents a different challenge, giving present-day and future IT leaders the chance to examine, analyze and learn so that they can be just as successful as the CIOs they're reading about.

Day Trade Online

by Farrell Christopher A.

Day trading can be quite lucrative, but only if you know what you are doing. As Farrell points out: "Trading for a living is hard. Trading for a living over the Internet is even harder. There are many challenges and obstacles that confront you. Venturing into this jungle unprepared is a recipe for disaster. " This straightforward guide provides the head start and heads up necessary to thrive as a day trader, covering everything from the dangers and pitfalls of trading online to an in-depth analysis of which trading techniques work and which don't. Day Trade Online, Second Edition presents inside information on the strategies of top trading firms, including the most secretive, misunderstood, and profitable function on Wall Street. Most importantly, you will learn to look at ten different stocks and pinpoint which one to trade, when, at what price, and why. With the right know-how, you will be able to apply this knowledge to every single stock that you screen.

Digital Disciplines

by Joe Weinman

Leverage digital technologies to achieve competitive advantage through better processes, products, customer relationships and innovation How does Information Technology enable competitive advantage? Digital Disciplines details four strategies that exploit today's digital technologies to create unparalleled customer value. Using non-technical language, this book describes the blueprints that any company, large or small, can use to gain or retain market leadership, based on insights derived from examining modern digital giants such as Amazon and Netflix as well as established firms such as GE, Nike, and UPS. Companies can develop a competitive edge through four digital disciplines--information excellence, solution leadership, collective intimacy, and accelerated innovation--that exploit cloud computing, big data and analytics, mobile and wireline networks, social media, and the Internet of Things. These four disciplines represent the extension and evolution of the value disciplines of operational excellence, product leadership, and customer intimacy originally defined by Michael Treacy and Fred Wiersema in their bestselling business classic The Discipline of Market Leaders. Operational excellence must now encompass information excellence--leveraging automation, information, analytics, and sophisticated algorithms to make processes faster, better, and more cost-effective, as well as to generate new revenue Product leadership must be extended to solution leadership--smart digital products ranging from wind turbines to wearables connected to each other, cloud services, social networks, and partner ecosystems Customer intimacy is evolving to collective intimacy--as face-to-face relationships not only go online, but are collectively analyzed to provide individually targeted recommendations ranging from books and movies to patient-specific therapies Traditional innovation is no longer enough--accelerated innovation goes beyond open innovation to exploit crowdsourcing, idea markets, challenges, and contest economics to dramatically improve processes, products, and relationships This book provides a strategy framework, empirical data, case studies, deep insights, and pragmatic steps for any enterprise to follow and attain market leadership in today's digital era. Digital Disciplines can be exploited by existing firms or start-ups to disrupt established ways of doing business through innovative, digitally enabled value propositionsto win in competitive markets in today's digital era.

How to Beat the Market Makers at Their Own Game

by Fausto Pugliese

The basic skills for becoming a successful trader from a master of the gameWritten by Fausto Pugliese (founder and CEO of Cyber Trading University) this must-have resource offers a hands-on guide to learning the ins and outs of active trading. How to Beat the Market Makers at Their Own Game gives professionals, as well as those relatively new to investing, a behind-the-scenes look at the inner workings of the marketplace and a comprehensive overview of basic trading techniques. The book explains how to apply the trading strategies of acclaimed trader Fausto Pugliese. Step by step the author covers the most common market maker setups, shows how to identify market maker traps, and most importantly, reveals how to follow the direction of the lead market maker in an individual stock.Throughout the book, Pugliese puts the spotlight on Level II quotes to help investors understand how market makers drive prices and manipulate the market. This handy resource is filled with the tools needed to interpret market maker activity so traders can truly understand the market and trade accordingly.Offers an accessible guide for developing the investing skills to trade with confidenceFilled with the real-world trading experiences and techniques of Fausto PuglieseCovers simple technical patterns that are important in day tradingIncludes a website with exercises to help master the book's techniquesHow to Beat the Market Makers at their Own Game will become your well-thumbed resource for learning what it takes to succeed in short-term stock trading.

The Prop Trader's Chronicles

by Francis J. Chan

A practical guide to profiting from the strategies of professional proprietary tradersToday's technology allows traders to make faster, more price-sensitive trades and to better read the flow of market information and transactions--opening the way to a wider variety of short-term trading strategies. The Prop Trader's Chronicles unveils these strategies and techniques, which have long been the province of proprietary trading firms and other professional stock traders.This reliable guide describes author Francis Chan's experience as a prop trader in an engaging narrative, but at the same time provides an in-depth explanation of strategies employed by proprietary traders utilizing direct access technologies, Level II quotes, time and sales feeds, and electronic communication networks. Along the way, you'll be introduced to a variety of strategies involved in the rapid day trading of stocks, including: scalping, rebate trading, and advanced reading of time and sales transactions to detect short-term swings. Chang also reveals how to use time and sales data as the modern-day equivalent of 'reading the tape.'Shows active independent traders how they can perform at a higher level by replicating the professional strategies of prop tradersOffers valuable insights on how traders can 'read the tape' and better detect short term market swingsDescribes a variety of prop trading strategies, from electronic scalping to statistical arbitrageThe Prop Trader's Chronicles provides a solid foundation for traders looking to improve their performance. With this book as your guide, you'll quickly discover what it really takes to make it in today's competitive markets.

The Trend Following Bible

by Andrew Abraham David Druz

A proven approach to trading success based on the best commodity trading advisorsProfiting from long-term trends is the most common path to success for traders. The challenge is recognizing the emergence of a trend and determining where to enter and exit the market. The Trend Following Bible shows individual traders and investors how to profit from this approach by trading like today's top commodity trading advisors.In this book, author Andrew Abraham stresses the importance of a disciplined, consistent methodology, with stringent risk controls, that allows you to catch big trends, while limiting losses on unprofitable trades. By trading in this manner, he shows you how to successfully achieve market-beating returns over the long term and multiple your trading capital along the way.Reveals exactly how top commodity trading advisors operate and how individuals can incorporate these methods into their everyday trading endeavorsAddresses key issues like position sizing and risk control, which are critical to trading success, but often underemphasized in other trading literatureHighlights how to effectively execute the trading strategies outlinedEngaging and accessible, The Trend Following Bible will put you in a better position to profit as you make more informed trading decisions.

Unleashing the Power of IT

by Dan Roberts

Go from the "IT guy" to trusted business partnerIf you're in IT, quite a lot is expected of you and your team: be technologically advanced, business-minded, customer-focused, and financially astute, all at once. In the face of unforgiving competition, rampant globalization, and demanding customers, business leaders are discovering that it's absolutely essential to have a strong, active partner keeping a firm hand on the decisions and strategies surrounding information technology. Unleashing the Power of IT provides tangible, hard-hitting, real-world strategies, techniques, and approaches that will immediately transform your IT workforce and culture, presenting the new mindset, skill set, and tool set necessary for IT leaders to thrive in today's challenging environment.Includes new discussion on social mediaOffers online access to the IT Skill Builder Competency Assessment ToolFeatures top ten lists of tips and techniques, proven frameworks, and practical guidance to help you launch and sustain your IT culture change and professional development initiativesProfiling several world-class organizations that have implemented the principles in this book, Unleashing the Power of IT reveals the best practices to get you on the path to implementation.

Peripheral Vision

by Zabet Patterson

In 1959, the electronics manufacturer Stromberg-Carlson produced the S-C 4020, a device that allowed mainframe computers to present and preserve images. In the mainframe era, the output of text and image was quite literally peripheral; the S-C 4020 -- a strange and elaborate apparatus, with a cathode ray screen, a tape deck, a buffer unit, a film camera, and a photo-paper camera -- produced most of the computer graphics of the late 1950s and early 1960s. At Bell Laboratories in Murray Hill, New Jersey, the S-C 4020 became a crucial part of ongoing encounters among art, science, and technology. In this book, Zabet Patterson examines the extraordinary uses to which the Bell Labs SC-2040 was put between 1961 and 1972, exploring a series of early computer art projects shaped by the special computational affordances of the S-C 4020. The S-C 4020 produced tabular data, graph plotting and design drawings, grid projections, and drawings of axes and vectors; it made previously impossible visualizations possible. Among the works Patterson describes are E. E. Zajac's short film of an orbiting satellite, which drew on the machine's graphic capacities as well as the mainframe's calculations; a groundbreaking exhibit of "computer generated pictures" by Béla Julesz and Michael Noll, two scientists interested in visualization; animations by Kenneth Knowlton and the Bell Labs artist-in-residence Stan VanDerBeek; and Lillian Schwartz's "cybernetic" film Pixillation.Arguing for the centrality of a peripheral, Patterson makes a case for considering computational systems not simply as machines but in their cultural and historical context.

Data-Driven Security

by Jay Jacobs Bob Rudis

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.

Windows PowerShell 2.0 Scripting für Administratoren

by Tobias Weltner Dr.

Wenn Sie sich für die Automatisierung der Verwaltung von Windows-Systemen mit den vielfältigen Möglichkeiten von Windows PowerShell 2.0 interessieren, finden Sie in diesem Buch zahlreiche Beispielskripts aus allen wichtigen administrativen Bereichen. Einer der bekanntesten Scripting-Experten Deutschlands stellt Ihnen die wichtigsten Cmdlets vor und liefert Ihnen viele Beispielskripts, die Sie sofort einsetzen, anpassen und erweitern können. Dieses Buch ist ein Nachschlagewerk für die PowerShell-Praxis, die vielen hilfreichen Codebeispiele in diesem Buch sind ohne größeres Vorwissen für den Praktiker sofort einsetzbar.

Interface

by Branden Hookway

In this book, Branden Hookway considers the interface not as technology but as a form of relationship with technology. The interface, Hookway proposes, is at once ubiquitous and hidden from view. It is both the bottleneck through which our relationship to technology must pass and a productive encounter embedded within the use of technology. It is a site of contestation -- between human and machine, between the material and the social, between the political and the technological -- that both defines and elides differences. A virtuoso in multiple disciplines, Hookway offers a theory of the interface that draws on cultural theory, political theory, philosophy, art, architecture, new media, and the history of science and technology. He argues that the theoretical mechanism of the interface offers a powerful approach to questions of the human relationship to technology. Hookway finds the origin of the term interface in nineteenth-century fluid dynamics and traces its migration to thermodynamics, information theory, and cybernetics. He discusses issues of subject formation, agency, power, and control, within contexts that include technology, politics, and the social role of games. He considers the technological augmentation of humans and the human-machine system, discussing notions of embodied intelligence. Hookway views the figure of the subject as both receiver and active producer in processes of subjectification. The interface, he argues, stands in a relation both alien and intimate, vertiginous and orienting to those who cross its threshold.

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

by Jean-Francois Blanchette

An examination of the challenges of establishing the authenticity of electronic documents—in particular the design of a cryptographic equivalent to handwritten signatures.The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures.From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects.Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

Burdens of Proof

by Jean-François Blanchette

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to the halls of legislative assemblies, Blanchette traces the path of such an equivalent: digital signatures based on the mathematics of public-key cryptography. In the mid-1990s, cryptographic signatures formed the centerpiece of a worldwide wave of legal reform and of an ambitious cryptographic research agenda that sought to build privacy, anonymity, and accountability into the very infrastructure of the Internet. Yet markets for cryptographic products collapsed in the aftermath of the dot-com boom and bust along with cryptography's social projects. Blanchette describes the trials of French bureaucracies as they wrestled with the application of electronic signatures to real estate contracts, birth certificates, and land titles, and tracks the convoluted paths through which electronic documents acquire moral authority. These paths suggest that the material world need not merely succumb to the virtual but, rather, can usefully inspire it. Indeed, Blanchette argues, in renewing their engagement with the material world, cryptographers might also find the key to broader acceptance of their design goals.

Atari Age: The Emergence of Video Games in America

by Michael Z. Newman

Beginning with the release of the Magnavox Odyssey and Pong in 1972, video games, whether played in arcades and taverns or in family rec rooms, became part of popular culture, like television. In fact, video games were sometimes seen as an improvement on television because they spurred participation rather than passivity. These "space-age pinball machines" gave coin-operated games a high-tech and more respectable profile. In Atari Age, Michael Newman charts the emergence of video games in America from ball-and-paddle games to hits like Space Invaders and Pac-Man, describing their relationship to other amusements and technologies and showing how they came to be identified with the middle class, youth, and masculinity.Newman shows that the "new media" of video games were understood in varied, even contradictory ways. They were family fun (but mainly for boys), better than television (but possibly harmful), and educational (but a waste of computer time). Drawing on a range of sources -- including the games and their packaging; coverage in the popular, trade, and fan press; social science research of the time; advertising and store catalogs; and representations in movies and television -- Newman describes the series of cultural contradictions through which the identity of the emerging medium worked itself out. Would video games embody middle-class respectability or suffer from the arcade's unsavory reputation? Would they foster family togetherness or allow boys to escape from domesticity? Would they make the new home computer a tool for education or just a glorified toy? Then, as now, many worried about the impact of video games on players, while others celebrated video games for familiarizing kids with technology essential for the information age.

Debugging Game History: A Critical Lexicon

by Raiford Guins Henry Lowood

Even as the field of game studies has flourished, critical historical studies of games have lagged behind other areas of research. Histories have generally been fact-by-fact chronicles; fundamental terms of game design and development, technology, and play have rarely been examined in the context of their historical, etymological, and conceptual underpinnings. This volume attempts to "debug" the flawed historiography of video games. It offers original essays on key concepts in game studies, arranged as in a lexicon -- from "Amusement Arcade" to "Embodiment" and "Game Art" to "Simulation" and "World Building." Written by scholars and practitioners from a variety of disciplines, including game development, curatorship, media archaeology, cultural studies, and technology studies, the essays offer a series of distinctive critical "takes" on historical topics. The majority of essays look at game history from the outside in; some take deep dives into the histories of play and simulation to provide context for the development of electronic and digital games; others take on such technological components of games as code and audio. Not all essays are history or historical etymology -- there is an analysis of game design, and a discussion of intellectual property -- but they nonetheless raise questions for historians to consider. Taken together, the essays offer a foundation for the emerging study of game history. ContributorsMarcelo Aranda, Brooke Belisle, Caetlin Benson-Allott, Stephanie Boluk, Jennifer deWinter, J. P. Dyson, Kate Edwards, Mary Flanagan, Jacob Gaboury, William Gibbons, Raiford Guins, Erkki Huhtamo, Don Ihde, Jon Ippolito, Katherine Isbister, Mikael Jakobsson, Steven E. Jones, Jesper Juul, Eric Kaltman, Matthew G. Kirschenbaum, Carly A. Kocurek, Peter Krapp, Patrick LeMieux, Henry Lowood, Esther MacCallum-Stewart, Ken S. McAllister, Nick Monfort, David Myers, James Newman, Jenna Ng, Michael Nitsche, Laine Nooney, Hector Postigo, Jas Purewal, Reneé H. Reynolds, Judd Ethan Ruggill, Marie-Laure Ryan, Katie Salen Tekinbas, Anastasia Salter, Mark Sample, Bobby Schweizer, John Sharp, Miguel Sicart, Rebecca Elisabeth Skinner, Melanie Swalwell, David Thomas, Samuel Tobin, Emma Witkowski, Mark J.P. Wolf

Putting People On The Map: Protecting Confidentiality With Linked Social-spatial Data

by National Research Council of the National Academies

Precise, accurate spatial information linked to social and behavioral data is revolutionizing social science by opening new questions for investigation and improving understanding of human behavior in its environmental context. At the same time, precise spatial data make it more likely that individuals can be identified, breaching the promise of confidentiality made when the data were collected. Because norms of science and government agencies favor open access to all scientific data, the tension between the benefits of open access and the risks associated with potential breach of confidentiality pose significant challenges to researchers, research sponsors, scientific institutions, and data archivists. Putting People on the Map finds that several technical approaches for making data available while limiting risk have potential, but none is adequate on its own or in combination. This book offers recommendations for education, training, research, and practice to researchers, professional societies, federal agencies, institutional review boards, and data stewards.

Creators Take Control: How NFTs Revolutionize Art, Business, and Entertainment

by Edward Lee

A leading legal scholar offers a compelling new theory to explain the meteoric rise of non-fungible tokens (NFTs) and their impact on art, business, entertainment, and society, and explains how they are revolutionizing our understanding of ownership.If you buy an NFT, do you own anything? Critics say no. Then why are people spending so much money to own them—to the tune of $27 billion in 2021? And why are big businesses and venture capital firms investing hundreds of millions to develop NFTs for people’s use in the metaverse, a purely imaginary world? In Creators Take Control, Edward Lee offers a compelling new theory he calls “Tokenism” that answers these perplexing questions. Using vivid examples, Lee lucidly explains how NFTs operate—and how they fundamentally change our understanding of ownership. Tokenism is an artistic, cultural, and technological movement that creates value in a new kind of ownership of a new type of property—symbolized by a virtual token—through a process of technological abstraction and artificial scarcity effectuated by NFTs. Ownership becomes virtual. What Cubism did in radically changing the twentieth-century perspective of creating and viewing art through cubes, Tokenism does today in altering our perspective of owning art and other things through tokens. Both movements radically reimagine what’s possible. Creators and businesses have seized upon this profound transformation. In a short time, they have developed a new market for digital art, important new rights for creators, innovative business models based on decentralized collaboration, and a new type of interactive ownership that enables identity, community, and patronage through NFTs. These innovations are just the start of revolutionary changes to society. Lee shows how NFTs create a new form of decentralized intellectual property, or De-IP. Comparable to the movement to decentralized finance (DeFi), De-IP empowers creators to take control of their artistic productions and livelihood. Lee’s intellectual tour de force is filled with practical insights—and hope—for fostering creativity and a Virtual Renaissance for the ages.

Application Interoperability: Microsoft® .NET and J2EE

by Microsoft Corporation

Get the best information available for enabling application interoperability between the Microsoft .NET and Java 2 Enterprise Edition (J2EE) development platforms. This book offers practical and prescriptive guidance for developers responsible for creating enterprise-level business solutions where platform interoperability is a requirement and a reality. If you're experienced with one set of enterprise technologies but new to the other, you can ramp up quickly with focused introductions written from either the .NET or Java developer perspective. The book delivers expert technical information and recommendations for using Web services, runtime bridges, and asynchronous techniques; interoperability methods for point-to-point and resource tiers; and designing application architecture for interoperability. The companion CD-ROM includes a functional sample application, trial software, and a complete eBook. PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers?delivering accurate, real-world information that's been technically validated and tested. A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Lee de Forest

by Mike Adams

The life-long inventor, Lee de Forest invented the three-element vacuum tube used between 1906 and 1916 as a detector, amplifier, and oscillator of radio waves. Beginning in 1918 he began to develop a light valve, a device for writing and reading sound using light patterns. While he received many patents for his process, he was initially ignored by the film industry. In order to promote and demonstrate his process he made several hundred sound short films, he rented space for their showing; he sold the tickets and did the publicity to gain audiences for his invention. Lee de Forest officially brought sound to film in 1919. Lee De Forest: King of Radio, Television, and Film is about both invention and early film making; de Forest as the scientist and producer, director, and writer of the content. This book tells the story of de Forest's contribution in changing the history of film through the incorporation of sound. The text includes primary source historical material, U.S. patents and richly-illustrated photos of Lee de Forest's experiments. Readers will greatly benefit from an understanding of the transition from silent to audio motion pictures, the impact this had on the scientific community and the popular culture, as well as the economics of the entertainment industry.

Turing's Legacy: Developments from Turing's Ideas in Logic

by Rod Downey

Alan Turing was an inspirational figure who is now recognised as a genius of modern mathematics. In addition to leading the Allied forces' code-breaking effort at Bletchley Park in World War II, he proposed the theoretical foundations of modern computing and anticipated developments in areas from information theory to computer chess. His ideas have been extraordinarily influential in modern mathematics and this book traces such developments by bringing together essays by leading experts in logic, artificial intelligence, computability theory and related areas. Together, they give insight into this fascinating man, the development of modern logic, and the history of ideas. The articles within cover a diverse selection of topics, such as the development of formal proof, differing views on the Church–Turing thesis, the development of combinatorial group theory, and Turing's work on randomness which foresaw the ideas of algorithmic randomness that would emerge many years later.

Refine Search

Showing 26 through 50 of 53,275 results