General Internet and PCs
How to Do Everything iPod & iTunes
Paperback ISBN: 0071786740
Get the most out of your iPod and iTunes Fully revised throughout, How to Do Everything: iPod and iTunes, Sixth Edition covers the iPod classic, iPod nano, and iPod shuffle as well as the latest version of iTunes. Find out how to easily load music, podcasts, and video, customize settings, enhance audio quality, manage your iTunes library, convert file formats, recover data, and much more. This step-by-step guide helps you maximize the versatile features of your iPod and iTunes. - Configure iTunes and load your iPod with music, video, and photos - Enhance your iPod with accessories such as speakers, cases, adapters, stands, docks, and radio transmitters - Use your iPod as a home stereo and car stereo - Learn how to make music sound great in iTunes and on your iPod - Create high-quality AAC, MP3, or Apple Lossless Encoding files from CDs, vinyl, or other sources - Buy and download content from the iTunes store or find free songs online - Create video files that work with the iPod classic - Sync your iPod with multiple computers - Use your iPod as an external drive or backup device - Recover songs and videos from your iPod - Troubleshoot problems with your iPod or iTunes
The Inside Story of Intrigue, Egomania, and Business Blunders
1st Edition Hardcover ISBN: 0812928512
Drawing on exclusive interviews with industry insiders, a journalist looks at the corporate intrigues, personality conflicts, and serious mistakes that led to the tumultuous fall of Apple from the pinnacle of the business world. 50,000 first printing. Tour.
Mapping the Personal Information Economy
Hardcover ISBN: 0262050730
In this book Greg Elmer brings the perspectives of cultural and media studies to the subject of consumer profiling and feedback technology in the digital economy. He examines the multiplicity of processes that monitor consumers and automatically collect, store, and cross-reference personal information. When we buy a book at Amazon.com or a kayak from L.L. Bean, our transactions are recorded, stored, and deployed to forecast our future behavior -- thus we may receive solicitations to buy another book by the same author or the latest in kayaking gear. Elmer charts this process, explaining the technologies that make it possible and examining the social and political implications. Elmer begins by establishing a theoretical framework for his discussion, proposing a "diagrammatic approach" that draws on but questions Foucault's theory of surveillance. In the second part of the book, he presents the historical background of the technology of consumer profiling, including such pre-electronic tools as the census and the warranty card, and describes the software and technology in use today for demographic mapping. In the third part, he looks at two case studies -- a marketing event sponsored by Molson that was held in the Canadian Arctic (contrasting the attendees and the indigenous inhabitants) and the use of "cookies" to collect personal information on the World Wide Web, which (along with other similar technologies) automate the process of information collection and cross-referencing. Elmer concludes by considering the politics of profiling, arguing that we must begin to question our everyday electronic routines.
Windows Xp Hacks and Mods for Dummies
Paperback ISBN: 0471748978
Offers tips, techniques, and tools to modify Windows XP, covering such topics as customizing the taskbar, searching on the desktop, using Firefox, using Windows Event Viewer, and changing security settings.
The Hacked World Order
How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
Hardcover ISBN: 1610394151
"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked World Order, Adam Segal shows how governments use the webto wage war and spy on, coerce, and damage each other. Israel is intent on derailing the Iranian nuclear weapons program. India wants to prevent Pakistani terrorists from using their Blackberries to coordinate attacks. Brazil has plans to lay new fiber cables and develop satellite links so its Internet traffic no longer has to pass through Miami. China does not want to be dependent on the West for its technology needs. These new digital conflicts pose no physical threat--no one has ever died from a cyberattack--but they serve to both threaten and defend the integrity of complex systems like power grids, financial institutions, and security networks"--