You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The emergence of the cloud as infrastructure: experts from a range of disciplines consider policy issues including reliability, privacy, consumer protection, national security, and copyright. The emergence of cloud computing marks the moment when computing has become, materially and symbolically, infrastructure—a sociotechnical system that is ubiquitous, essential, and foundational. Increasingly integral to the operation of other critical infrastructures, such as transportation, energy, and finance, it functions, in effect, as a meta-infrastructure. As such, the cloud raises a variety of policy and governance issues, among them market regulation, fairness, access, reliability, privacy, nat...
During the brutal and destructive King Philip's War, the New England Indians combined new European weaponry with their traditional use of stealth, surprise, and mobility.
An examination of the challenges of establishing the authenticity of electronic documents—in particular the design of a cryptographic equivalent to handwritten signatures. The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines the challenge of defining a new evidentiary framework for electronic documents, focusing on the design of a digital equivalent to handwritten signatures. From the blackboards of mathematicians to t...
Information matters to us. Whether recorded, recoded, or unregistered, information co-shapes our present and our becoming. This book advances new views on information and surveillance practices. Starting with a methodology for studying the liveliness of information, Kaufmann provides four empirical examples of making information matter: association, conversion, secrecy, and speculation. In so doing, she presents an original and comprehensive argument about the materiality of information and invites us to investigate, and to reflect about what matters. This is a go-to text for scholars and professionals working in the fields of surveillance, data studies, and the digitization of specific societal sectors.
In the past twenty years, interest in wood-fired ovens has increased dramatically in the United States and abroad, but most books focus on how to bake bread or pizza in an oven. From the Wood-Fired Oven offers many more techniques for home and artisan bakers--from baking bread and making pizza to recipes on how to get as much use as possible out of a single oven firing, from the first live-fire roasting to drying wood for the next fire. From the Wood-Fired Oven offers a new take on traditional techniques for professional bakers, but is simple enough to inspire any nonprofessional baking enthusiast. Leading baker and instructor Richard Miscovich wants people to use their ovens to fulfill the ...
How the blockchain—a system built on foundations of mutual mistrust—can become trustworthy. The blockchain entered the world on January 3, 2009, introducing an innovative new trust architecture: an environment in which users trust a system—for example, a shared ledger of information—without necessarily trusting any of its components. The cryptocurrency Bitcoin is the most famous implementation of the blockchain, but hundreds of other companies have been founded and billions of dollars invested in similar applications since Bitcoin's launch. Some see the blockchain as offering more opportunities for criminal behavior than benefits to society. In this book, Kevin Werbach shows how a te...
This volume consists of a general inventory of Marius Barbeau’s Northwest Coast Files and related material from the Barbeau collection.
What the Open Government Partnership tells us about how international initiatives can and do shape domestic public sector reform. At the 2011 meeting of the UN General Assembly, the governments of eight nations—Brazil, Indonesia, Mexico, Norway, Philippines, South Africa, the United Kingdom, and the United States—launched the Open Government Partnership, a multilateral initiative aimed at promoting transparency, empowering citizens, fighting corruption, and harnessing new technologies to strengthen governance. At the time, many were concerned that the Open Government Partnership would end up toothless, offering only lip service to vague ideals and misguided cyber-optimism. The Power of P...
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from techn...