You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From the novels of Anne Rice to The Lost Boys, from The Terminator to cyberpunk science fiction, vampires and cyborgs have become strikingly visible figures within American popular culture, especially youth culture. In Consuming Youth, Rob Latham explains why, showing how fiction, film, and other media deploy these ambiguous monsters to embody and work through the implications of a capitalist system in which youth both consume and are consumed. Inspired by Marx's use of the cyborg vampire as a metaphor for the objectification of physical labor in the factory, Latham shows how contemporary images of vampires and cyborgs illuminate the contradictory processes of empowerment and exploitation that characterize the youth-consumer system. While the vampire is a voracious consumer driven by a hunger for perpetual youth, the cyborg has incorporated the machineries of consumption into its own flesh. Powerful fusions of technology and desire, these paired images symbolize the forms of labor and leisure that American society has staked out for contemporary youth. A startling look at youth in our time, Consuming Youth will interest anyone concerned with film, television, and popular culture.
This title examines the remarkable life of Jeff Bezos and his work building the groundbreaking e-commerce company Amazon.com. Readers will learn about Bezo's background and education, as well as his early career. Also covered is a look at how Amazon.com operates, issues the company faces, its successes, and its impact on society. Color photos and informative sidebars accompany easy-to-read, compelling text. Features include a timeline, facts, additional resources, Web sites, a glossary, a bibliography, and an index. Aligned to Common Core Standards and correlated to state standards. Essential Library is an imprint of Abdo Publishing, a division of ABDO.
As a unique window on the world, the cover of TIME is the most celebrated and coveted showcase in print journalism. People who have had their faces on TIME's cover--Presidents and movie stars, corporate titans and sporting legends--consider it one of the highest forms of recognition. To TIME's worldwide audience of nearly 50 million, the cover declares, "Dear reader, we've decided this is important for you to know." In Inside the Red Border, thousands of weekly statements of who and what matters are telescoped into a single, never-before-assembled volume that traces our modern history through TIME's iconic artwork and cover stories that became an influential part of the news they were covering. TIME's cover, "has never lost its power to immediately send the signal...that in some way history is being made before our eyes." That power was reasserted as recently at May 2012 by TIME's instantly famous cover, "Are You Mom Enough?" In celebration of 90 years of TIME, Inside the Red Border features interviews with former and current magazine editors to offer insight and a revealing look at how TIME chooses to cover historic moments within its iconic red border.
Providing a comprehensive and systematic commentary on the nature of overlapping Intellectual Property rights and their place in practice, this book is a major contribution to the way that IP is understood. IP rights are mostly studied in isolation, yet in practice each of the legal categories created to protect IP rights will usually only provide partial legal coverage of the broader context in which such rights are actually created, used, and enforced. Consequently, often multiple IP rights may overlap, in whole or in part, with respect to the same underlying subject matter. Some patterns, for instance, in addition to being protected from copying under the design rights regime, may also be...
Now in paperback, a sobering look at the threats to privacy posed by the new information technologies. Called ''one of the best books yet written on the new information age'' by Kirkus Reviews and now available in paperback, The End of Privacy shows how vast amounts of personal information are moving into corporate hands. Once there, this data can be combined and used to develop electronic profiles of individuals and groups that are potentially far more detailed, and far more intrusive, than the files built up in the past by state police and security agencies. Reg Whitaker shows that private e-mail can be read; employers can monitor workers' every move throughout the work day; and the U.S. Treasury can track every detail of personal and business finances. He goes on to demonstrate that we are even more vulnerable as consumers. From the familiar - bar-coding, credit and debit cards, online purchases - to the seemingly sci - -''smart cards'' that encode medical and criminal records, and security scans that read DNA - The End of Privacy reveals how ordinary citizens are losing control of the information about them that is available to anyone who can pay for it.
A collection of essays on where computer and communications technology is taking us. He explores the underlying social and political implications of the Internet and its associated technologies, based on his contention that the cyberspace experience is far more complex than it is commonly assumed.
Evaluates thought-leaders in e-commerce. This book explores the impact and significance of e-business as illustrated by the work and thinking of a number of key players in the field. Its aim is to be a guide for business people who are looking to make optimal and profitable use of e-business, as well as to students.
Intended for science and technology students, philosophy students interested in applied ethics, and others who must deal with computers and the impact they have on our society.
How Control Exists after Decentralization Is the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. He does this by treating the computer as a textual medium that is based on a technological language, code. Code, he argues, can be subject to the same kind of cultural and literary analysis as any natural language; computer languages have their own syntax, grammar, communities, and c...