| |
Being "always on" is being always off, to something. |
|
Topic: Technology |
11:16 am EST, Apr 1, 2006 |
The increasing use of satellites for vital communication services, environmental monitoring, navigation, weather prediction, and scientific research is mirrored by the development of military capabilities in space that go far beyond the traditional intelligence and early warning missions of the Cold War period. Protecting and enhancing U.S. military capability in space has emerged as an important focus of military planning, with recent official documents proposing various anti-satellite and space-based weapons. Serious public discussion of military space plans has not yet occurred in the United States, although important questions of policy, planning, and budgeting loom. The development of space affects a range of government, commercial, and scientific interests around the world, but U.S. leaders have yet to propose a policy framework that adequately balances these different forces. Space Security examines the implications of U.S. space policy and planning. It considers the physical constraints on securing objects in space, the interaction of military, scientific, and commercial activities in space, Chinese and Russian perspectives on U.S. space plans, and the possible elements of a more comprehensive space security system. Contributors: Steve Fetter, Nancy Gallagher, Laura Grego, Lisbeth Gronlund, Jeffrey Lewis, Martin Malin, David Mosher, Xavier Pasco, Pavel Podvig, John Steinbruner, David Wright, Hui Zhang
Space Security |
|
The Venture Capital Cycle |
|
|
Topic: Business |
11:16 am EST, Apr 1, 2006 |
In The Venture Capital Cycle, Paul Gompers and Josh Lerner correct widespread misperceptions about the nature and role of the venture capitalist and provide an accessible and comprehensive overview of the venture capital industry. Bringing together fifteen years of ground-breaking research into the form and function of venture capital firms, they examine the fund-raising, investing, and exit stages of venture capitalists. Three major themes run throughout the process: venture investors confront tremendous information and incentive problems; venture capital processes are inherently interrelated, and a complete understanding of the industry requires a full understanding of the venture cycle; and, unlike most financial markets, the venture capital industry adjusts very slowly to shifts in the demand for and the supply of investment capital. This second edition has been thoroughly revised in light of recent research findings, and includes six new chapters. The first part, on fund-raising, now includes a chapter that examines what determines the level of venture capital fund-raising and how tax policy influences the demand for venture capital. Three new chapters in the second part, on investing, examine what kind of distortions are introduced when the venture capital market goes dramatically up, a question prompted by the 1999-2000 market bubble; demonstrate that the venture capital industry does indeed spur innovation, an important determinant of economic growth; and examine whether and under what circumstances governments can be effective venture capitalists. Two new chapters in the third part, on exiting venture capital investments, discuss whether venture capital firms affiliated with investment-banks are prone to conflicts of interest with public offerings and how lockups on initial public offerings are used to limit conflicts of interest.
The Venture Capital Cycle |
|
Understanding Terror Networks |
|
|
Topic: Society |
11:16 am EST, Apr 1, 2006 |
For decades, a new type of terrorism has been quietly gathering ranks in the world. America's ability to remain oblivious to these new movements ended on September 11, 2001. The Islamist fanatics in the global Salafi jihad (the violent, revivalist social movement of which al Qaeda is a part) target the West, but their operations mercilessly slaughter thousands of people of all races and religions throughout the world. Marc Sageman challenges conventional wisdom about terrorism, observing that the key to mounting an effective defense against future attacks is a thorough understanding of the networks that allow these new terrorists to proliferate. Based on intensive study of biographical data on 172 participants in the jihad, Understanding Terror Networks gives us the first social explanation of the global wave of activity. Sageman traces its roots in Egypt, gestation in Afghanistan during the Soviet-Afghan war, exile in the Sudan, and growth of branches worldwide, including detailed accounts of life within the Hamburg and Montreal cells that planned attacks on the United States. U.S. government strategies to combat the jihad are based on the traditional reasons an individual was thought to turn to terrorism: poverty, trauma, madness, and ignorance. Sageman refutes all these notions, showing that, for the vast majority of the mujahedin, social bonds predated ideological commitment, and it was these social networks that inspired alienated young Muslims to join the jihad. These men, isolated from the rest of society, were transformed into fanatics yearning for martyrdom and eager to kill. The tight bonds of family and friendship, paradoxically enhanced by the tenuous links between the cell groups (making it difficult for authorities to trace connections), contributed to the jihad movement's flexibility and longevity. And although Sageman's systematic analysis highlights the crucial role the networks played in the terrorists' success, he states unequivocally that the level of commitment and choice to embrace violence were entirely their own. Understanding Terror Networks combines Sageman's scrutiny of sources, personal acquaintance with Islamic fundamentalists, deep appreciation of history, and effective application of network theory, modeling, and forensic psychology. Sageman's unique research allows him to go beyond available academic studies, which are light on facts, and journalistic narratives, which are devoid of theory. The result is a profound contribution to our understanding of the perpetrators of 9/11 that has practical implications for the war on terror.
Understanding Terror Networks |
|
Topic: Science |
11:16 am EST, Apr 1, 2006 |
In Biotech, Eric J. Vettel chronicles the story behind genetic engineering, recombinant DNA, cloning, and stem-cell research. It is a story about the meteoric rise of government support for scientific research during the Cold War, about activists and student protesters in the Vietnam era pressing for a new purpose in science, about politicians creating policy that alters the course of science, and also about the release of powerful entrepreneurial energies in universities and in venture capital that few realized existed. Most of all, it is a story about people—not just biologists but also followers and opponents who knew nothing about the biological sciences yet cared deeply about how biological research was done and how the resulting knowledge was used. Vettel weaves together these stories to illustrate how the biotechnology industry was born in the San Francisco Bay area, examining the anomalies, ironies, and paradoxes that contributed to its rise. Culled from oral histories, university records, and private corporate archives, including Cetus, the world's first biotechnology company, this compelling history shows how a cultural and political revolution in the 1960s resulted in a new scientific order: the practical application of biological knowledge supported by private investors expecting profitable returns eclipsed basic research supported by government agencies.
Biotech |
|
Evolution and Structure of the Internet |
|
|
Topic: Technology |
11:16 am EST, Apr 1, 2006 |
This book describes the application of statistical physics and complex systems theory to the study of the evolution and structure of the internet. Using a statistical physics approach the internet is viewed as a growing system that evolves in time through the addition and removal of nodes and links. This perspective permits us to outline the dynamical theory required for a description of the macroscopic evolution of the internet. The presence of such a theoretical framework appears to be a revolutionary and promising path towards our understanding of the internet and the various processes taking place on this network, including, for example, the spread of computer viruses or resilience to random or intentional damages. This book will be of interest to graduate students and researchers in statistical physics, computer science and mathematics studying in this subject.
Evolution and Structure of the Internet |
|
Information Theory, Inference and Learning Algorithms |
|
|
Topic: Technology |
11:16 am EST, Apr 1, 2006 |
Information theory and inference, taught together in this exciting textbook, lie at the heart of many important areas of modern technology - communication, signal processing, data mining, machine learning, pattern recognition, computational neuroscience, bioinformatics and cryptography. The book introduces theory in tandem with applications. Information theory is taught alongside practical communication systems such as arithmetic coding for data compression and sparse-graph codes for error-correction. Inference techniques, including message-passing algorithms, Monte Carlo methods and variational approximations, are developed alongside applications to clustering, convolutional codes, independent component analysis, and neural networks. Uniquely, the book covers state-of-the-art error-correcting codes, including low-density-parity-check codes, turbo codes, and digital fountain codes - the twenty-first-century standards for satellite communications, disk drives, and data broadcast. Richly illustrated, filled with worked examples and over 400 exercises, some with detailed solutions, the book is ideal for self-learning, and for undergraduate or graduate courses. It also provides an unparalleled entry point for professionals in areas as diverse as computational biology, financial engineering and machine learning.
Information Theory, Inference and Learning Algorithms |
|
Advances in Elliptic Curve Cryptography |
|
|
Topic: Technology |
11:16 am EST, Apr 1, 2006 |
Since the appearance of the authors’ first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
Advances in Elliptic Curve Cryptography |
|
Topic: Technology |
11:16 am EST, Apr 1, 2006 |
An anthology of original essays from our most intriguing young writers, Bookmark Now boldly addresses the significance of the production of literature in the twenty-first century. Or simply, “How do we talk about writing and reading in an age where they both seem almost quaint?” The book features authors in their twenties and thirties—those raised when TV, video games, and then the Internet supplanted books as dominant cultural mediums—and their intent is to examine: (1) how this generation came to writing as a calling, (2) what they see as literature’s relevance when media consumption and competition have reached unprecedented levels, and (3) how writing and reading fit in with the rest of our rapid, multitasking world. The result will offer a voyeuristic peek into the private, creative lives of today’s writers and shed light on what their work means at a time when the book business is changing, yet—almost paradoxically—a time when storytelling as a means of both self-realization and community building (be it via e-mail, weblogs, or “This American Life”) seems more relevant than ever before. Edited by Kevin Smokler, a Bay Area entrepreneur who has devoted himself to fostering literary culture and cultivating fresh talent, Bookmark Now is a collection that both captures the state of the art and provides inspiration to aspiring writers at all levels.
Bookmark Now |
|
The Beginner's Guide to Winning the Nobel Prize |
|
|
Topic: Science |
11:16 am EST, Apr 1, 2006 |
In A Beginner's Guide to Winning the Noble Prize, Doherty recounts his unlikely path to becoming a Nobel Laureate. Beginning with his humble origins in Australia, he tells how he developed an interest in immunology and describes his award-winning, influential work with Rolf Zinkernagel on T-cells and the nature of immune defense. In prose that is at turns amusing and astute, Doherty reveals how his nonconformist upbringing, sense of being an outsider, and search for different perspectives have shaped his life and work. Doherty offers a rare, insider's look at the realities of being a research scientist. He lucidly explains his own scientific work and how research projects are selected, funded, and organized; the major problems science is trying to solve; and the rewards and pitfalls of a career in scientific research. For Doherty, science still plays an important role in improving the world, and he argues that scientists need to do a better job of making their work more accessible to the public. Throughout the book, Doherty explores the stories of past Nobel winners and considers some of the crucial scientific debates of our time, including the safety of genetically modified foods and the tensions between science and religion. He concludes with some “tips” on how to win a Nobel Prize, including advice on being persistent, generous, and culturally aware, and he stresses the value of evidence. A Beginner's Guide to Winning the Noble Prize is essential reading for anyone interested in a career in science.
The Beginner's Guide to Winning the Nobel Prize |
|
Who Controls the Internet? |
|
|
Topic: Technology |
11:16 am EST, Apr 1, 2006 |
Gets good reviews from the Washington Post, Daniel Drezner, Larry Lessig, ... Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Who's really in control of what's happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
Who Controls the Internet? |
|