The case for a smarter “prosumer law” approach to Internet regulation that would better protect online innovation, public safety, and fundamental democratic rights. Internet use has become ubiquitous in the past two decades, but governments, legislators, and their regulatory agencies have struggled to keep up with the rapidly changing Internet technologies and uses. In this groundbreakin…
"Wearable technology--whether a Walkman in the 1970s, an LED-illuminated gown in the 2000s, or Google Glass today--makes the wearer visible in a technologically literate environment. Twenty years ago, wearable technology reflected cultural preoccupations with cyborgs and augmented reality; today, it reflects our newer needs for mobility and connectedness. In this book, Susan Elizabeth Ryan exam…
The message from educators, the tech community, and even politicians is clear: everyone should learn to code. To emphasize the universality and importance of computer programming, promoters of coding for everyone often invoke the concept of "literacy," drawing parallels between reading and writing code and reading and writing text. In this book, Annette Vee examines the coding-as-literacy analo…
"Today, in the age of CCTV, drones, medical body scans, and satellite images, photography is increasingly decoupled from human agency and human vision. In Nonhuman Photography, Joanna Zylinska offers a new philosophy of photography, going beyond the human-centric view to consider imaging practices from which the human is absent. Zylinska argues further that even those images produced by humans,…
Overview: How well do children navigate the ocean of information that is available online? The enormous variety of Web-based resources represents both opportunities and challenges for Internet-savvy kids, offering extraordinary potential for learning and social connection but little guidance on assessing the reliability of online information. This book reports on the first large-scale survey to…
"This tutorial demystifies one of the most important yet poorly understood aspects of logic programming, the Warren Abstract Machine or WAM. The author's step-by-step construction of the WAM adds features in a gradual manner, clarifying the complex aspects of the design and providing the first detailed study of WAM since it was designed in 1983. Developed by David H.D. Warren, the WAM is an abs…
How the complex interplay of academic, commercial, and military interests produced an intense period of scientific discovery and technological innovation in computing during the Cold War.OCLC-licensed vendor bibliographic record.
Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations r…
This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification…
"This book proposes a framework for the design of systems that will advance social and environmental justice along with technical and economic objectives"--OCLC-licensed vendor bibliographic record.