Apple created iOS, the incredible operating system that their iPhones use. With so many apps and new features being added all the time, this book will help you to get started. Learn how to use this great modern system in a way that is suited to your needs. This handy guide will take you through the best apps, tips and tricks for everyday use and has a troubleshooting guide if you get into trouble. With step-by-step instructions and clear, practical text, a novice to the iPhone will learn everything they need to know.
The Internet was going to liberate us, but in truth it has not. For every story about the web's empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace (Google and Facebook, among others) make decisions that affect our physical freedom--but without our consent. Yet the traditional solution to unaccountable corporate behavior--government regulation--cannot stop the abuse of digital power on its own, and sometimes even contributes to it.A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.
What does the world want? According to John Battelle, a company that answers that question -- in all its shades of meaning -- can unlock the most intractable riddles of both business and culture. And for the past few years, that's exactly what Google has been doing.
Jumping into the game long after Yahoo, Alta Vista, Excite, Lycos, and other pioneers, Google offered a radical new approach to search, redefined the idea of viral marketing, survived the dotcom crash, and pulled off the largest and most talked about initial public offering in the history of Silicon Valley.
But "The Search" offers much more than the inside story of Google's triumph. It's also a big-picture book about the past, present, and future of search technology, and the enormous impact it is starting to have on marketing, media, pop culture, dating, job hunting, international law, civil liberties, and just about every other sphere of human interest.
More than any of its rivals, Google has become the gateway to instant knowledge. Hundreds of millions of people use it to satisfy their wants, needs, fears, and obsessions, creating an enormous artifact that Battelle calls "the Database of Intentions." Somewhere in Google's archives, for instance, you can find the agonized research of a gay man with AIDS, the silent plotting of a would-be bombmaker, and the anxiety of a woman checking out her blind date. Combined with the databases of thousands of other search-driven businesses, large and small, it all adds up to a goldmine of information that powerful organizations (including the government) will want to get their hands on.
No one is better qualified to explain this entire phenomenon than Battelle, who cofounded "Wired" and founded "The Industry Standard." Perhaps more than any other journalist, he has devoted his career to finding the holy grail of technology -- something as transformational as the Macintosh was in the mid- 1980s. And he has finally found it in search.
Battelle draws on more than 350 interviews with major players from Silicon Valley to Seattle to Wall Street, including Google cofounders Larry Page and Sergey Brin and CEO Eric Schmidt, as well as competitors like Louis Monier, who invented AltaVista, and Neil Moncrief, a soft-spoken Georgian whose business Google built, destroyed, and built again.
Battelle lucidly reveals how search technology actually works, explores the amazing power of targeted advertising, and reports on the frenzy of the Google IPO, when the company tried to rewrite the rules of Wall Street and declared "don't be evil" as its corporate motto.
For anyone who wants to understand how Google really succeeded -- and the implications of a world in which every click can be preserved forever -- THE SEARCH is an eye-opening and indispensable read.
"Battelle has written a brilliant business book, but he's also done something more... All searchers should read it."
-Walter Isaacson, CEO of the Aspen Institute
"This book ought to be called 'The Answer.' As usual, John Battelle delivers insightful, thought-provoking, and essential reading."
-Seth Godin, author of "All Marketers Are Liars" and "Purple Cow"
"Nobody, and I mean nobody, has thought longer, harder, or smarter about Google and the search business than John Battelle."
-John Heilemann, author of "Pride Before the Fall"
"A must read for anyone endeavoring to understand one of the most important trends of this generation.'"
-Mary Meeker, Managing Director, Internet Analyst, Morgan Stanley
"Battelle has... figured out why "search" is so damned important to the future of everything digital. Even more impressive, he's actually managed to turn the subject into a compelling analog story.
-John Huey, editorial director, Time inc.
"A terrific book."
--L. Gordon Crovitz, Dow Jones
Cut hardware costs, expand your capacity, and manage an entire fleet of virtual machines in your enterprise with the leading virtualization solution, VMware Infrastructure 3 (VI3), by applying the step-by-step instructions in Mastering VMware(R) Infrastructure 3. Packed with the technical details, best practices, and how-tos you need to install, configure, and run a virtual infrastructure at maximum efficiency, this guide is comprehensive and essential. Learn how to create and manage virtual networks and machines, configure every product in the VI3 suite, monitor resources and performance, maintain security, and much more.
This book gives an in-depth philosophical analysis of moral problems to which information technology gives rise, for example, problems related to privacy, intellectual property, responsibility, friendship, and trust, with contributions from many of the best-known philosophers writing in the area.
Most history is hierarchical: it's about emperors, presidents, prime ministers and field marshals. It's about states, armies and corporations. It's about orders from on high. Even history "from below" is often about trade unions and workers' parties. But what if that's simply because hierarchical institutions create the archives that historians rely on? What if we are missing the informal, less well documented social networks that are the true sources of power and drivers of change? The 21st century has been hailed as the Age of Networks. However, in The Square and the Tower, Niall Ferguson argues that networks have always been with us, from the structure of the brain to the food chain, from the family tree to freemasonry. Throughout history, hierarchies housed in high towers have claimed to rule, but often real power has resided in the networks in the town square below. For it is networks that tend to innovate. And it is through networks that revolutionary ideas can contagiously spread. Just because conspiracy theorists like to fantasize about such networks doesn't mean they are not real. From the cults of ancient Rome to the dynasties of the Renaissance, from the founding fathers to Facebook, The Square and the Tower tells the story of the rise, fall and rise of networks, and shows how network theory--concepts such as clustering, degrees of separation, weak ties, contagions and phase transitions--can transform our understanding of both the past and the present. Just as The Ascent of Money put Wall Street into historical perspective, so The Square and the Tower does the same for Silicon Valley. And it offers a bold prediction about which hierarchies will withstand this latest wave of network disruption--and which will be toppled.
All the PC essentials at your fingertips
If you like your answers quick and your information up-to-date, look no further. This concise, superbly organized reference walks you through setting up a PC, the new interface and features of Windows Vista, using basic applications, organizing your stuff, getting on the Internet, networking (wired and wireless), burning CDs, upgrading your hardware, revving up your PC for high-speed game playing, and much more
Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media. You'll learn how to:
-Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
-Protect attached evidence media from accidental modification
-Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
-Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
-Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
-Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
-Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.
A practical guide for visual learners who are eager to get started with Windows 7
Windows 7 is Microsoft's highly anticipated operating system used by millions of people around the world. If you're a visual learner and are new to Windows 7, then this book is an ideal introduction to the new features of this operating system. Seasoned author Paul McFedries walks you through the basics and beyond of Windows 7 in a straightforward manner.
You'll discover how to install and repair programs, maintain your system, set up password-protected accounts, load images from a digital camera, play music and other media files, secure Internet and e-mail accounts, and much more. More than 150 tasks are accompanied by full-color screen shots as they guide you to becoming a confident user of Windows 7.
- Experienced author Paul McFedries walks you through Microsoft's eagerly awaited new operating system: Windows 7
- Clear and succinct explanations, step-by-step instructions, and full-color screen shots take you through the newest features of Windows 7
- More than 150 Windows 7 tasks show you the basics and beyond, including installing and repairing programs, maintaining your system, loading images from a digital camera, and more
This book is essential if you are a visual learner who is enthusiastic about diving in and exploring all that Windows 7 has to offer
The cultural and media studies perspectives on the technology of electronic consumer profiling.
In this book Greg Elmer brings the perspectives of cultural and media studies to the subject of consumer profiling and feedback technology in the digital economy. He examines the multiplicity of processes that monitor consumers and automatically collect, store, and cross-reference personal information. When we buy a book at Amazon.com or a kayak from L.L. Bean, our transactions are recorded, stored, and deployed to forecast our future behavior--thus we may receive solicitations to buy another book by the same author or the latest in kayaking gear. Elmer charts this process, explaining the technologies that make it possible and examining the social and political implications.