Browse Results

Showing 49,976 through 50,000 of 85,161 results

Long-Term Preservation of Digital Documents: Principles and Practices

by Uwe M. Borghoff Peter Rödig Jan Scheffczyk Lothar Schmitz

Human culture depends on our ability to disseminate information, and then maintain and access it over time. This book addresses the problems of storing, reading, and using digital data for periods longer than 50 years. They offer concise descriptions of markup and document description languages like TIFF, PDF, HTML, and XML, explain important techniques such as migration and emulation, and present the OAIS (Open Archival Information System) Reference Model.

Long-Term Reliability of Nanometer VLSI Systems: Modeling, Analysis and Optimization

by Sheldon Tan Mehdi Tahoori Taeyoung Kim Shengcheng Wang Zeyu Sun Saman Kiamehr

This book provides readers with a detailed reference regarding two of the most important long-term reliability and aging effects on nanometer integrated systems, electromigrations (EM) for interconnect and biased temperature instability (BTI) for CMOS devices. The authors discuss in detail recent developments in the modeling, analysis and optimization of the reliability effects from EM and BTI induced failures at the circuit, architecture and system levels of abstraction. Readers will benefit from a focus on topics such as recently developed, physics-based EM modeling, EM modeling for multi-segment wires, new EM-aware power grid analysis, and system level EM-induced reliability optimization and management techniques.Reviews classic Electromigration (EM) models, as well as existing EM failure models and discusses the limitations of those models;Introduces a dynamic EM model to address transient stress evolution, in which wires are stressed under time-varying current flows, and the EM recovery effects. Also includes new, parameterized equivalent DC current based EM models to address the recovery and transient effects;Presents a cross-layer approach to transistor aging modeling, analysis and mitigation, spanning multiple abstraction levels;Equips readers for EM-induced dynamic reliability management and energy or lifetime optimization techniques, for many-core dark silicon microprocessors, embedded systems, lower power many-core processors and datacenters.

Long-Term Structural Health Monitoring by Remote Sensing and Advanced Machine Learning: A Practical Strategy via Structural Displacements from Synthetic Aperture Radar Images (SpringerBriefs in Applied Sciences and Technology)

by Alireza Entezami Bahareh Behkamal Carlo De Michele

This book offers an in-depth investigation into the complexities of long-term structural health monitoring (SHM) in civil structures, specifically focusing on the challenges posed by small data and environmental and operational changes (EOCs). Traditional contact-based sensor networks in SHM produce large amounts of data, complicating big data management. In contrast, synthetic aperture radar (SAR)-aided SHM often faces challenges with small datasets and limited displacement data. Additionally, EOCs can mimic the structural damage, resulting in false errors that can critically affect economic and safety issues. Addressing these challenges, this book introduces seven advanced unsupervised learning methods for SHM, combining AI, data sampling, and statistical analysis. These include techniques for managing datasets and addressing EOCs. Methods range from nearest neighbor searching and Hamiltonian Monte Carlo sampling to innovative offline and online learning frameworks, focusing on data augmentation and normalization. Key approaches involve deep autoencoders for data processing and novel algorithms for damage detection. Validated using simulated data from the I-40 Bridge, USA, and real-world data from the Tadcaster Bridge, UK, these methods show promise in addressing SAR-aided SHM challenges, offering practical tools for real-world applications. The book, thereby, presents a comprehensive suite of innovative strategies to advance the field of SHM.

Longing, Ruin, and Connection in Hideo Kojima’s Death Stranding (Routledge Advances in Game Studies)

by Amy M. Green

This volume provides an in-depth examination of the video game Death Stranding, focusing on the game’s exploration of ruin, nostalgia, and atonement as its primary symbolic, narrative, and mechanical language. Offering the first close examination of Death Stranding’s narrative, the book also incorporates a strong foundation in game studies, most especially related to the concepts of immersion and embodiment. The focus of the book lies in considering how Death Stranding expands on the themes of ruin, longing, and the need for connection, and whether a reconciliation—on a community level, national level, or even global level—might be possible. This book will appeal to scholars in a variety of disciplines in the Humanities and the Social Sciences, from video game studies and media studies to English, history, philosophy, and popular culture.

Longing, Ruin, and Connection in Hideo Kojima’s Death Stranding (Routledge Advances in Game Studies)

by Amy M. Green

This volume provides an in-depth examination of the video game Death Stranding, focusing on the game’s exploration of ruin, nostalgia, and atonement as its primary symbolic, narrative, and mechanical language. Offering the first close examination of Death Stranding’s narrative, the book also incorporates a strong foundation in game studies, most especially related to the concepts of immersion and embodiment. The focus of the book lies in considering how Death Stranding expands on the themes of ruin, longing, and the need for connection, and whether a reconciliation—on a community level, national level, or even global level—might be possible. This book will appeal to scholars in a variety of disciplines in the Humanities and the Social Sciences, from video game studies and media studies to English, history, philosophy, and popular culture.

Longitudinal Data Analysis: Autoregressive Linear Mixed Effects Models (SpringerBriefs in Statistics)

by Ikuko Funatogawa Takashi Funatogawa

This book provides a new analytical approach for dynamic data repeatedly measured from multiple subjects over time. Random effects account for differences across subjects. Auto-regression in response itself is often used in time series analysis. In longitudinal data analysis, a static mixed effects model is changed into a dynamic one by the introduction of the auto-regression term. Response levels in this model gradually move toward an asymptote or equilibrium which depends on covariates and random effects. The book provides relationships of the autoregressive linear mixed effects models with linear mixed effects models, marginal models, transition models, nonlinear mixed effects models, growth curves, differential equations, and state space representation. State space representation with a modified Kalman filter provides log likelihoods for maximum likelihood estimation, and this representation is suitable for unequally spaced longitudinal data. The extension to multivariate longitudinal data analysis is also provided. Topics in medical fields, such as response-dependent dose modifications, response-dependent dropouts, and randomized controlled trials are discussed. The text is written in plain terms understandable for researchers in other disciplines such as econometrics, sociology, and ecology for the progress of interdisciplinary research.

Look-Ahead Based Sigma-Delta Modulation (Analog Circuits and Signal Processing)

by Erwin Janssen Arthur van Roermund

The aim of this book is to expand and improve upon the existing knowledge on discrete-time 1-bit look-ahead sigma-delta modulation in general, and to come to a solution for the above mentioned specific issues arising from 1-bit sigma-delta modulation for SA-CD. In order to achieve this objective an analysis is made of the possibilities for improving the performance of digital noise-shaping look-ahead solutions. On the basis of the insights obtained from the analysis, several novel generic 1-bit look-ahead solutions that improve upon the state-of-the-art will be derived and their performance will be evaluated and compared. Finally, all the insights are combined with the knowledge of the SA-CD lossless data compression algorithm to come to a specifically for SA-CD optimized look-ahead design.

Looking Back and Going Forward in IT (Iste Ser.)

by Jean-Pierre Corniou

This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development. Despite its ubiquity in the modern world, the author highlights that efficient use of IT by businesses can only be gained by a good understanding of its potentials and pitfalls, highlighting how its informed use in practice is essential for companies to succeed. Finally, questions are raised concerning the future of IT: who will reap the benefits and why? Will IT continue to provide solutions and will it always deliver on its promise? Will it cease to advance and thus cease to be studied or will it continue to develop and thus provide new opportunities and challenges to users?

Looking Back and Going Forward in IT

by Jean-Pierre Corniou

This book places IT in perspective by tracing its development through time, covering its origins in business, the massive expansion of the role of IT at the end of the 20th century, the growth of the internet, and the successes and failures of companies involved in this development. Despite its ubiquity in the modern world, the author highlights that efficient use of IT by businesses can only be gained by a good understanding of its potentials and pitfalls, highlighting how its informed use in practice is essential for companies to succeed. Finally, questions are raised concerning the future of IT: who will reap the benefits and why? Will IT continue to provide solutions and will it always deliver on its promise? Will it cease to advance and thus cease to be studied or will it continue to develop and thus provide new opportunities and challenges to users?

Looking for Insight, Transformation, and Learning in Online Talk

by Trena M. Paulus Alyssa Friend Wise

Looking for Insight, Transformation, and Learning in Online Talk is a comprehensive guide to analyzing digital interaction in formal and informal online spaces. The book establishes a new research framework for addressing major challenges that have arisen as social exchanges, meaning-making, and knowledge-building increasingly take place in social media, discussion forums, and online communities. With a focus on methodological alignment to support valid and trustworthy knowledge claims, the authors present a series of design decisions to help researchers: frame their object of interest and unpack underlying assumptions understand key differences between researcher-influenced and pre-existing online talk ethically extract and organize data for analysis apply rigorous qualitative, quantitative, and computational methods to answer their research questions Written for scholars in education, business, communication, media studies, health sciences, political sciences, and beyond, this is a thorough approach to the research methods and concerns essential to the study of talk in online contexts.

Looking for Insight, Transformation, and Learning in Online Talk

by Trena M. Paulus Alyssa Friend Wise

Looking for Insight, Transformation, and Learning in Online Talk is a comprehensive guide to analyzing digital interaction in formal and informal online spaces. The book establishes a new research framework for addressing major challenges that have arisen as social exchanges, meaning-making, and knowledge-building increasingly take place in social media, discussion forums, and online communities. With a focus on methodological alignment to support valid and trustworthy knowledge claims, the authors present a series of design decisions to help researchers: frame their object of interest and unpack underlying assumptions understand key differences between researcher-influenced and pre-existing online talk ethically extract and organize data for analysis apply rigorous qualitative, quantitative, and computational methods to answer their research questions Written for scholars in education, business, communication, media studies, health sciences, political sciences, and beyond, this is a thorough approach to the research methods and concerns essential to the study of talk in online contexts.

The Loop: How Technology is Creating a World Without Choices and How to Fight Back

by Jacob Ward

An eye-opening narrative journey into the rapidly changing world of artificial intelligence, revealing the dangerous ways that AI is poised to exploit the unconscious habits of our mindsArtificial intelligence is going to change the world as we know it. But the real danger isn't some robot that's going to enslave us: It's our own brain. Our brains are constantly making decisions using shortcuts, biases, and hidden processes-and we're using those same techniques to create technology that makes choices for us. In The Loop, award-winning science journalist Jacob Ward reveals how we are poised to build all of our worst instincts into our AIs, creating a narrow loop where each generation has fewer, predetermined, and even dangerous choices.Taking us on a world tour of the ongoing, real-world experiment of artificial intelligence, The Loop illuminates the dangers of writing dangerous human habits into our machines. From a biometric surveillance state in India that tracks the movements of over a billion people, to a social media control system in China that punishes deviant friendships, to the risky multiple-choice simplicity of automated military action, Ward travels the world speaking with top experts confronting the perils of their research. Each stop reveals how the most obvious patterns in our behavior-patterns an algorithm will use to make decisions about what's best for us-are not the ones we want to perpetuate. Just as politics, marketing, and finance have all exploited the weaknesses of our human programming, artificial intelligence is poised to use the patterns of our lives to manipulate us. The Loop is call to look at ourselves more clearly-our most creative ideas, our most destructive impulses, the ways we help and hurt one another-so we can put only the best parts of ourselves into the thinking machines we create.

The Loop: How Technology Is Creating a World Without Choices and How to Fight Back

by Jacob Ward

This eye-opening narrative journey into the rapidly changing world of artificial intelligence reveals the dangerous ways AI is exploiting the unconscious habits of our minds, and the real threat it poses to humanity: "The best book I have ever read about AI" (New York Times bestselling author Roger McNamee). Artificial intelligence is going to change the world as we know it. But the real danger isn't some robot that's going to enslave us: It's our own brain. Our brains are constantly making decisions using shortcuts, biases, and hidden processes—and we're using those same techniques to create technology that makes choices for us. In The Loop, award-winning science journalist Jacob Ward reveals how we are poised to build all of our worst instincts into our AIs, creating a narrow loop where each generation has fewer, predetermined, and even dangerous choices. Taking us on a world tour of the ongoing, real-world experiment of artificial intelligence, The Loop illuminates the dangers of writing dangerous human habits into our machines. From a biometric surveillance state in India that tracks the movements of over a billion people, to a social media control system in China that punishes deviant friendships, to the risky multiple-choice simplicity of automated military action, Ward travels the world speaking with top experts confronting the perils of their research. Each stop reveals how the most obvious patterns in our behavior—patterns an algorithm will use to make decisions about what's best for us—are not the ones we want to perpetuate. Just as politics, marketing, and finance have all exploited the weaknesses of our human programming, artificial intelligence is poised to use the patterns of our lives to manipulate us. The Loop is call to look at ourselves more clearly—our most creative ideas, our most destructive impulses, the ways we help and hurt one another-so we can put only the best parts of ourselves into the thinking machines we create.

Loop Parallelization

by Utpal Banerjee

Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises a great practical award. There is a tremendous investment in existing sequential programs, and scientists and engineers continue to write their application programs in sequential languages (primarily in Fortran). The demand for higher speedups increases. The job of a restructuring compiler is to discover the dependence structure and the characteristics of the given machine. Much attention has been focused on the Fortran do loop. This is where one expects to find major chunks of computation that need to be performed repeatedly for different values of the index variable. Many loop transformations have been designed over the years, and several of them can be found in any parallelizing compiler currently in use in industry or at a university research facility. The book series on KappaLoop Transformations for Restructuring Compilerskappa provides a rigorous theory of loop transformations and dependence analysis. We want to develop the transformations in a consistent mathematical framework using objects like directed graphs, matrices, and linear equations. Then, the algorithms that implement the transformations can be precisely described in terms of certain abstract mathematical algorithms. The first volume, Loop Transformations for Restructuring Compilers: The Foundations, provided the general mathematical background needed for loop transformations (including those basic mathematical algorithms), discussed data dependence, and introduced the major transformations. The current volume, Loop Parallelization, builds a detailed theory of iteration-level loop transformations based on the material developed in the previous book.

Loop Tiling for Parallelism (The Springer International Series in Engineering and Computer Science #575)

by Jingling Xue

Loop tiling, as one of the most important compiler optimizations, is beneficial for both parallel machines and uniprocessors with a memory hierarchy. This book explores the use of loop tiling for reducing communication cost and improving parallelism for distributed memory machines. The author provides mathematical foundations, investigates loop permutability in the framework of nonsingular loop transformations, discusses the necessary machineries required, and presents state-of-the-art results for finding communication- and time-minimal tiling choices. Throughout the book, theorems and algorithms are illustrated with numerous examples and diagrams. The techniques presented in Loop Tiling for Parallelism can be adapted to work for a cluster of workstations, and are also directly applicable to shared-memory machines once the machines are modeled as BSP (Bulk Synchronous Parallel) machines. Features and key topics: Detailed review of the mathematical foundations, including convex polyhedra and cones; Self-contained treatment of nonsingular loop transformations, code generation, and full loop permutability; Tiling loop nests by rectangles and parallelepipeds, including their mathematical definition, dependence analysis, legality test, and code generation; A complete suite of techniques for generating SPMD code for a tiled loop nest; Up-to-date results on tile size and shape selection for reducing communication and improving parallelism; End-of-chapter references for further reading. Researchers and practitioners involved in optimizing compilers and students in advanced computer architecture studies will find this a lucid and well-presented reference work with numerous citations to original sources.

Loop Transformations for Restructuring Compilers: The Foundations

by Utpal Banerjee

Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises great practical rewards. There is a tremendous investment in existing sequential programs, and scientists and engineers continue to write their application programs in sequential languages (primarily in Fortran),but the demand for increasing speed is constant. The job of a restructuring compiler is to discover the dependence structure of a given program and transform the program in a way that is consistent with both that dependence structure and the characteristics of the given machine. Much attention in this field of research has been focused on the Fortran do loop. This is where one expects to find major chunks of computation that need to be performed repeatedly for different values of the index variable. Many loop transformations have been designed over the years, and several of them can be found in any parallelizing compiler currently in use in industry or at a university research facility. Loop Transformations for Restructuring Compilers: The Foundations provides a rigorous theory of loop transformations. The transformations are developed in a consistent mathematical framework using objects like directed graphs, matrices and linear equations. The algorithms that implement the transformations can then be precisely described in terms of certain abstract mathematical algorithms. The book provides the general mathematical background needed for loop transformations (including those basic mathematical algorithms), discusses data dependence, and introduces the major transformations. The next volume will build a detailed theory of loop transformations based on the material developed here. Loop Transformations for Restructuring Compilers: The Foundations presents a theory of loop transformations that is rigorous and yet reader-friendly.

LoRa Localization: System Design and Performance Analysis (SpringerBriefs in Computer Science)

by Shibo He Kang Hu Zhiguo Shi Chaojie Gu

This book delves deep into the world of low-power Internet of Things (IoT) node positioning, in an era where IoT is revolutionizing connectivity and communication. It focuses on the critical aspect of accurate node positioning, which has transformative potential across various industrial applications. Specifically, this book explores how LoRa (Long Range) technology, known for its long-range wireless capabilities, low power consumption and cost-effectiveness. It can be harnessed to achieve precise and efficient node localization in both indoor and outdoor environments.In Chapter 1, readers are introduced to the landscape of low-power IoT, providing background information, discussing network architecture and exploring the research landscape surrounding node positioning. Chapter 2 presents a modular hardware platform tailored for IoT applications and delves into wireless positioning techniques. Chapter 3 takes readers on a journey through wide area location using signal flight time and optimization techniques, emphasizing high accuracy, while keeping power consumption low. Chapter 4 showcases a cost-effective LoRa Mesh networking-based positioning system with wide-area coverage capabilities. This book continues by addressing the intricacies of indoor positioning challenges in Chapter 5, leveraging signal arrival angles and antenna array structures for precise localization. Chapter 6 explores fusion localization and tracking through mobile robots, enhancing position estimation and trajectory tracking in diverse environments. Finally, Chapter 7 offers a comprehensive conclusion, summarizing key insights and proposing future research directions in LoRa's fusion positioning for both indoor and outdoor scenarios.This book is designed for researchers, engineers, and practitioners keen on unlocking the potential of low-power IoT node positioning and contributing to the advancement of IoT technologies. Advanced level students in computer science and electrical engineering interested in this topic will find this book useful as well.

Losing the Cybersecurity War: And What We Can Do to Stop It

by Steve King

This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.” Steve King is the Managing Director; CyberTheory and Founder/Executive Director, CyberEd.io; cybersecurity Expert certified CISM and CISSP. He has 20 years’ experience in cybersecurity markets as CISO, CEO, and CMO; he is a Cybersecurity Technology Product and Services Sector founder and innovator; Digital Branding and Ad Agency founder, and his clients have included Starbucks, Matson, Abercrombie & Fitch, Harley Davidson, Lucky Brand, United Airlines, and Nike. He is a 3x Cybersecurity Start-up Founder and Exec, he has raised $40 million in VC, and he possesses multiple patents. Kiren Chaudry is the product manager for CyberEd.io, the leading platform for cybersecurity education.

Losing the Cybersecurity War: And What We Can Do to Stop It

by Steve King

This book explains the five pillars or battlefields of cybersecurity and how a Zero Trust approach can change the advantage on each battlefield. We have taken a deep dive into each of five battlefields where we have a decided disadvantage due to constitutional structure and moral behavioral guidelines, where we provide examples of how we got here, what we can do about it, why we got here, and how we can avoid these traps in the future. This is a unique viewpoint that has never been explored – the five battlefields include Economics, Technology, Information, Education, and Leadership – and how each has contributed to our current disadvantage on the global stage. We go on to discuss how Zero Trust can change the game to create an advantage for us going forward. The credibility of Zero Trust stems directly from the father of Zero Trust, John Kindervag, who says, “And now, Steve has written a new book on Zero Trust called Losing the Cybersecurity War: And What We Can Do to Stop It. It is undeniably the best Zero Trust book yet written. While other writers have focused on implementing Zero Trust from their perspectives, Steve focuses on why Zero Trust is so important on the modern cybersecurity battlefield. His concept of the five cyber battlefields is a great insight that will help us win the cyberwar. By weaving Zero Trust principles throughout these five concepts, Steve demonstrates how the ideas and efforts involved in building Zero Trust environments will lead to a profound shift in terrain advantage. No longer will attackers own the high ground. As defenders and protectors, we can leverage modern technology in a Zero Trust way to keep our data and assets safe from infiltration and exploitation.” Steve King is the Managing Director; CyberTheory and Founder/Executive Director, CyberEd.io; cybersecurity Expert certified CISM and CISSP. He has 20 years’ experience in cybersecurity markets as CISO, CEO, and CMO; he is a Cybersecurity Technology Product and Services Sector founder and innovator; Digital Branding and Ad Agency founder, and his clients have included Starbucks, Matson, Abercrombie & Fitch, Harley Davidson, Lucky Brand, United Airlines, and Nike. He is a 3x Cybersecurity Start-up Founder and Exec, he has raised $40 million in VC, and he possesses multiple patents. Kiren Chaudry is the product manager for CyberEd.io, the leading platform for cybersecurity education.

Lossless Information Hiding in Images

by Zhe-Ming Lu Shi-Ze Guo

Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that enables images to be authenticated and then restored to their original forms by removing the watermark and replacing overridden images. This book focuses on the lossless information hiding in our most popular media, images, classifying them in three categories, i.e., spatial domain based, transform domain based, and compressed domain based. Furthermore, the compressed domain based methods are classified into VQ based, BTC based, and JPEG/JPEG2000 based.Focuses specifically on lossless information hiding for imagesCovers the most common visual medium, images, and the most common compression schemes, JPEG and JPEG 2000Includes recent state-of-the-art techniques in the field of lossless image watermarkingPresents many lossless hiding schemes, most of which come from the authors' publications in the past five years

Lossy Image Compression: Domain Decomposition-Based Algorithms (SpringerBriefs in Computer Science)

by K K Shukla M.V. Prasad

Image compression is concerned with minimization of the number of information carrying units used to represent an image. Lossy compression techniques incur some loss of information which is usually imperceptible. In return for accepting this distortion, we obtain much higher compression ratios than is possible with lossless compression. Salient features of this book include: four new image compression algorithms and implementation of these algorithms; detailed discussion of fuzzy geometry measures and their application in image compression algorithms; new domain decomposition based algorithms using image quality measures and study of various quality measures for gray scale image compression; compression algorithms for different parallel architectures and evaluation of time complexity for encoding on all architectures; parallel implementation of image compression algorithms on a cluster in Parallel Virtual Machine (PVM) environment.

Lost and Founder: A Painfully Honest Field Guide to the Startup World

by Rand Fishkin

'You won't find a more honest, raw and helpful look into the trenches of founding a tech startup than this book' Nir Eyal, author of Hooked'Rand Fishkin is the real deal' Seth Godin, entrepreneur and author -----------Everyone knows how a startup story is supposed to go: a young, brilliant entrepreneur has an cool idea, drops out of college, defies the doubters, overcomes all odds, makes billions and becomes the envy of the technology world. This is not that story.Rand Fishkin, the founder and former CEO of Moz, is one of the world's leading experts on SEO. Moz is now a $45 million a year business, but Fishkin's business and reputation took 15 years to grow, and his startup began not in a Harvard dorm room but as a mother-and-son family business that fell deeply into debt. Now Fishkin pulls back the curtain on tech startup mythology, exposing the ups and downs of startup life that most CEOs would rather keep secret. For instance: a minimally viable product can be destructive if you launch at the wrong moment. Growth hacking may be the buzzword du jour, but initiatives to your business can fizzle quickly. Revenue and profitability won't protect you from layoffs. And venture capital always comes with strings attached. In Lost and Founder Fishkin reveals the mostly awful, sometimes awesome truth about startup culture with the transparency and humour that his hundreds of thousands of blog readers have come to love. Fishkin's hard-won lessons are applicable to any kind of business environment and this book can help solve your problems, and make you feel less alone for having them.-----------'This is a truly courageous book. It's one part business-building guide and two parts Indiana Jones-style adventure memoir' Chris Guillebeau, author of Side Hustle and The $100 Startup'Rand Fishkin is like the industry friend we all wish we had - funny, warm, and refreshingly honest about the rollercoaster ride that is founding your own company' Julie Zhou, VP of Product Design at Facebook

The Lost Blogs: From Jesus to Jim Morrison--The Historically Inaccurate and Totally Fictitious Cyber Diaries of Everyone Worth Knowing

by Paul Davidson

Over 13,000,000 people are currently blogging with thousands being created each day. But what about the blogs you haven't seen, written by the iconic men and women you're dying to know the most intimate details about but who died before the internet was invented? This original take on the biggest literary development since the paperback offers 200 blogs inspired by the most famous minds in history, detailing their hysterical personal revelations, such as: John Lennon's thoughts after meeting Yoko Ono (and her obsession with the Beatles' publishing rights): Marilyn Monroe's annoyance at her new beau 'J', who breaks off their dates with excuses like having to avert a war in Costa Rica: Read Shakespeare on a treatment for a new play about two princes who misplace their horse and carriage and spend the entire play trying to find it or how a stray hot dog nearly derailed Ghandi's hunger strike: There's also the transcript of Neil Armstrong and Buzz Aldrin's intensely competitive game of "Rocks, Paper, Scissors," to decide who would be the first man to set foot on the moon and much, much more. In this book Paul Davidson proves that matters, proving there's no such thing as "too much information."

Lost in a Good Game: Why we play video games and what they can do for us

by Pete Etchells

'Etchells writes eloquently ... A heartfelt defence of a demonised pastime' The Times 'Once in an age, a piece of culture comes along that feels like it was specifically created for you, the beats and words and ideas are there because it is your life the creator is describing. Lost In A Good Game is exactly that. It will touch your heart and mind. And even if Bowser, Chun-li or Q-Bert weren't crucial parts of your youth, this is a flawless victory for everyone' Adam Rutherford When Pete Etchells was 14, his father died from motor neurone disease. In order to cope, he immersed himself in a virtual world - first as an escape, but later to try to understand what had happened. Etchells is now a researcher into the psychological effects of video games, and was co-author on a recent paper explaining why WHO plans to classify ‘game addiction’ as a danger to public health are based on bad science and (he thinks) are a bad idea. In this, his first book, he journeys through the history and development of video games - from Turing’s chess machine to mass multiplayer online games like World of Warcraft- via scientific study, to investigate the highs and lows of playing and get to the bottom of our relationship with games - why we do it, and what they really mean to us. At the same time, Lost in a Good Game is a very unusual memoir of a writer coming to terms with his grief via virtual worlds, as he tries to work out what area of popular culture we should classify games (a relatively new technology) under.

Lösung linearer Gleichungssysteme auf Parallelrechnern

by Andreas Frommer

Refine Search

Showing 49,976 through 50,000 of 85,161 results