Search:

Net neutrality / by Higgins, Melissa,author.(CARDINAL)625979; Regan, Michael,author.(CARDINAL)738409; Lyons, Daniel,1960-consultant.(CARDINAL)375660;
Includes bibliographical references (pages 106-109) and index.Anything but neutral -- From the early internet to broadband -- ISPs versus the FCC -- The new neutrality pendulum swings -- Net neutrality supporters -- Opposition to net neutrality -- Net neutrality worldwide -- The future of net neutrality.The flow of information through our modern digital world has led to many new issues and controversies. Net Neutrality examines the question of whether Internet service providers should be able to charge content providers for faster connections, introducing readers to the history behind the issue and the modern arguments surrounding it.Ages 11-17.1290L
Subjects: Young adult literature.; Young adult literature.; Telecommunication policy.; Network neutrality.; Internet.;
Available copies: 1 / Total copies: 1
unAPI

Internet law / by Grey House Publishing, Inc.,compiler.(CARDINAL)381300;
Includes bibliographical references and index.Who is responsible for online content? -- The Trump-Twitter fight ropes in the rest of Silicon Valley / Steven Overly and Nancy Scola, Politico, May 30, 2020 -- The law that made Facebook what it is today / Frank LoMonte, The Conversation, April 11, 2018 -- Biden wants sec. 230 gone, calls tech "totally irresponsible, "little creeps" / Kate Cox, Ars Technica, January 17, 2020 -- WSJ, WaPO, NYT spread false internet claims / Matthew Feeney, Cato Institute, August 7, 2019 -- The fight over section 230--and the internet as we know it / Matt Lasio, Wired, August 13, 2019 -- Should the internet be a public utility? -- The Wired guide to net neutrality / Klint Finley, Wired, May 5, 2020 -- FCC chairman: our job is to protect a free and open internet / Ajit Pai, CNET, June 10, 2018 -- What the Microsoft antitrust case taught us / Richard Blumenthal and Tim Wu, The New York Times, May 18, 2018 -- How the loss of net neutrality could change the internet / Margaret Harding McGill, Politico, December 14, 2017 -- Net neutrality may be dead in the US, but Europe is still strongly committed to open internet access / Saleem Bhatti, The Conversation, January 5, 2018 -- The end of private (digital) ownership? -- A brief history of open source software / Andy Updegrove, ConsortiumInfo.org, December 27, 2019 -- Reevaluating the DMCA 22 years later: let's think of the users / Katherine Trendacosta, EFF, February 12, 2020 -- To save Pepe the Frog from the alt-right, his creator has invoked copyright law's darker side / Aja Romano, Vox, September 21, 2017 -- Twitter blocks EFF tweet that criticized bogus takedown of a previous tweet / Jon Brodkin, Ars Technica, April 15, 2019 -- In 2019, multiple open source companies changed course--is it the right move? / Scott Gilbertson, Ars Technica, October 16, 2019 -- With friends like AWS, who needs an open source business? / Cliff Saran, Computer Weekly, January 7, 2020 -- Hackers, user rights, and government surveillance -- Senate Republicans unveil COVID-19 specific privacy bill / National Law Review, May 26, 2020 -- Mixed messages: encryption fight pits security against privacy / Mark Scott, Politico, December 23, 2019 -- One man's obsessive fight to reclaim his Cambridge Analytica data / Issie Lapowsky, Wired, January 25, 2019 -- A dark web tycoon pleads guilty. But how was he caught? / Patrick Howell O'Neill, MIT Technology Review, February 8, 2020 -- Hackers will be the weapon of choice for governments in 2020 / Patrick Howell O'Neill, MIT Technology Review, January 2, 2020 -- Proposed US law is "Trojan horse" to stop online encryption, critics say / Jon Brodkin, Ars Technica, March 5, 2020 -- Does the CFAA apply to voting machine hacks? / Derek B. Johnson, FCW, August 30, 2018 -- Helicopter government? How the internet of things enables pushbutton regulation from a distance / Clyde Wayne Crews Jr., Forbes, November 11, 2019 -- Doublecheck that ballot: controversial voting machines make their primary debut in South Carolina / Eric Geller, Politico, February 28, 2020 -- Zoombombing and the law / Eugene Volokh, The Volokh Conspiracy, April 7, 2020 -- From unity to division -- Society's dependence on the internet: 5 cyber issues the coronavirus lays bare / Laura DeNardis and Jennifer Daskal, The Conversation, March 27, 2020 -- Battlefield internet: a plan for securing cyberspace / Mich©·le Flournoy and Michael Sulmeyer, Foreign Affairs, September/October 2018 -- The rising threat of digital nationalism / Akash Kapur, The Wall Street Journal, November 1, 2019 -- Make the internet American again? / John Hendel, Politico, January 23, 2018 -- Should the U.S. reclaim control of the internet? Evaluating ICANN's administrative oversight since the 2016 handover / Mark Grabowski, Nebraska Law Review, August 6, 2018.
Subjects: Reference works.; Internet; Network neutrality; Intellectual property; Computer security;
Available copies: 1 / Total copies: 1
unAPI

Net neutrality and the battle for the open internet / by Kimball, Danny,1983-author.(CARDINAL)864104;
Includes bibliographical references (pages 251-264) and index.Machine generated contents note: List of Illustrations -- Acknowledgments -- Introduction -- The Broadband Battle -- Chapter 1 -- Democratic Communications Infrastructure, Discourse, Policy, and Advocacy -- Chapter 2 -- Defining Broadband -- Chapter 3 -- Clash of Titans or Best of Frenemies? -- Chapter 4 -- Nuclear Net Neutrality -- Chapter 5 -- The Title II Turn -- Chapter 6 -- Organizing for Net Neutrality -- Conclusion -- Boring Points -- Bibliography -- Index.""Net neutrality," a dry but crucial standard of openness in network access, began as a technical principle informing obscure policy debates but became the flashpoint for an all-out political battle for the future of communications and culture. Net Neutrality and the Struggle for the Open Internet is a critical cultural history of net neutrality that reveals how this intentionally "boring" world of internet infrastructure and regulation hides a fascinating and pivotal sphere of power, with lessons for communication and media scholars, activists, and anyone interested in technology and politics. While previous studies and academic discussions of net neutrality have been dominated by legal, economic, and technical perspectives, Net Neutrality and the Struggle for the Open Internet offers a humanities-based critical theoretical approach to net neutrality, telling the story of how activists and millions of everyday people, online and in the streets, were able to challenge the power of the phone and cable corporations that historically dominated communications policy-making to advance equality and justice in media and technology"--
Subjects: Network neutrality; Internet and activism.; Internet; Internet service providers.; Political activists.;
Available copies: 1 / Total copies: 1
unAPI

Infrastructure : the social value of shared resources / by Frischmann, Brett M.(CARDINAL)831212;
Includes bibliographical references and index.Defining infrastructure and commons management -- Overview of infrastructure economics -- Microeconomic building blocks -- Infrastructural resources -- Managing infrastructure as commons -- Infrastructure pricing -- Congestion -- Supply side incentives -- Transportation infrastructure-roads -- Communications infrastructure-telecommunications -- Environmental infrastructure -- Intellectual infrastructure -- Network neutrality -- Application to other modern debates.
Subjects: Infrastructure (Economics);
Available copies: 2 / Total copies: 2
unAPI

Principles of programming & coding / by Franceschetti, Donald R.,1947-editor.(CARDINAL)651222;
Includes bibliographical references and index3D printing -- Algorithms -- American Standard Code for Information -- Interchange (ASCII) -- Android OS -- Application -- Autonomic computing -- Avatars and simulation -- Binary hexadecimal representations -- Boolean operators -- Branching logic -- Characters and strings -- Cloud computing -- Coding and encryption -- Color coding -- Combinatorics -- Comment programming -- Comparison operators -- Computer animation -- Computer memory -- Computer modeling -- Computer security -- Computer-aided design (CAD) -- Computer-aided design and computer-aided manufacturing software (CAD/CAM) -- Computer-assisted instruction (CAI) -- Conditional operators -- Constraint programming -- Control systems -- Cowboy coding -- CPU design -- Crowdfunding -- Crowdsourcing -- Cryptography -- Data mining -- Data warehouse -- Database design -- Database structuring conventions -- Debugging -- Device drivers -- Diffusion of innovations -- Digital divide -- Digital forensics -- Digital libraries -- Digital native -- Digital photography -- Digital signal processors (DSP) -- Digital watermarking -- Disk operating system (DOS) -- Drone warfare -- Drones -- E-banking -- E-learning -- Electronic circuits -- Electronic communication software -- Encryption -- Error handling -- Event-driven marketing (EDM) -- Expectancy theory -- Experimenter's bias -- Extreme programming -- Firewalls -- Firmware -- Functional electrical stimulation (FES) -- Game programming -- Gamification -- Graphical user interface (GUI) -- Graphics formats -- Guard clause -- HTTP cookie -- Imagined communities -- Incremental development -- Informational technology (IT) -- Information visualization -- Internet Protocol (IP) -- Inversion of control (Hollywood Principle) -- iOS -- Iterative constructs -- Java programming language -- JavaScript -- Knowledge worker -- Levels of processing theory -- Logic synthesis -- Logistics -- Machine learning -- Malware -- Massive open online course (MOOC) -- Meta-analysis -- Metacomputing -- Metadata -- Microprocessors -- Mixed methods research (MMR) -- Mobile apps -- Mobile technology -- Motherboards -- Multiprocessing operating systems (OS) -- Multi-user operating system (OS) -- Naming conventions -- Net neutrality -- Network security -- Neuro-linguistic programming (NLP) -- Neuromarketing -- Neuromorphic chips -- Objectivity -- Object-oriented design (OOD) -- Object-oriented programming (OOP) -- Privacy rights -- Programming languages -- Prototyping -- Quantum computing -- Random access memory (RAM) -- Rapid application development (RAD) -- Rational choice theory -- Search engine optimization (SEO) -- Semantic memory -- Semantics -- Signal processing -- Source code comments -- Spiral development -- Standard deviation -- Standpoint theory -- Statistical inference -- String-oriented symbolic languages (SNOBOL) -- Structural equation modeling (SEM) -- Technology in education -- Test doubles -- Theory of multiple intelligences -- Theory X and Theory Y -- Transformation priority premise (TPP) -- Tree structures -- Turing test -- Uncertainty reduction theory (URT) -- Unicode -- UNIX -- Variables and values -- Waterfall development -- Web design -- Web graphic design -- Working memory -- Worse-is-better -- Time Line of Inventions and Advancements in Programming and CodingThis new volume makes sense of the jumble of techno-jargon and programming acronyms for high school and undergraduate students. More than 125 entries explain the fundamental concepts, popular languages, systems, and protocols that go into computer programming.
Subjects: Computer programming.; Coding theory.;
Available copies: 1 / Total copies: 1
unAPI

Thirty-six and a half motives / by Swank, Denise Grover.(CARDINAL)353939;
Rose Gardner should be celebrating the arrest of her fiercest enemy J.R. Simmons. But problems are like weeds--pluck one and five more spring up, Rose's boyfriend is on the verge of leaving her for good, her best friend, Neely Kate, is grappling with marriage problems, and her sister has a devastating secret. To make matters worse, she discovers J.R. Simmons has not been neutralized. His network of allies and henchman extends further than she suspected, and J.R.'s so intent on revenge, his lackeys might just destroy Fenton County to get it for him. But the girl who once spent her days alone and afraid is now a strong, independent woman with a network of her own, including Neely Kate. Skeeter Malcolm--the reigning king of the Fenton County underworld--and other loyal friends on both sides of the law. Racing against time, they must dig up J.R.'s empire by the roots, unmasking his allies and unearthing his secrets, both the behind-the-scenes manipulation he's been orchestrating in Fenton County for decades and the dark stains of his personal life. If Rose succeeds, she tells herself the quiet and peaceful life she once dreamed of will be at the end of the tunnel. But her quest to destroy J.R. will require her to explore the person she has become, what she wants, and what that means for her future.
Subjects: Detective and mystery fiction.; Man-woman relationships;
Available copies: 1 / Total copies: 1
unAPI

Everyday bias : identifying and navigating unconscious judgments in our daily lives / by Ross, Howard J.,author.(CARDINAL)396627;
Includes bibliographical references and index.Blinded by the light of our bias -- If you are human, you are biased -- Thinking about thinking -- The many faces of bias -- Life, death, and unconscious bias on a rainy night -- Who has the power? -- Like water for the fish : networks of bias in everyday life -- Shifting to neutral : how we can learn to disengage from bias -- Incubators of consciousness : creating more conscious organizations -- Conclusion: a brave new world, a grand new journey -- Appendix: A top ten list of ways to identify and navigate bias in talent management -- Bibliography -- Notes -- Index.If you are human, you are biased. Bias is natural to the human mind, a survival mechanism that is fundamental to our identity. And overwhelmingly it is unconscious. Ross explores the biases we each carry within us. He explains that most people do not see themselves as biased towards people of different races or different genders, and yet in virtually every area of modern life disparities remain.
Subjects: Prejudices.;
Available copies: 1 / Total copies: 1
unAPI

The age of reform, 1890 to 1920 / by Carlisle, Rodney P.(CARDINAL)157654;
MARCIVE 09/21/09Includes bibliographical references and index.Introduction -- Family and daily life -- Material culture -- Social attitudes -- Cities and urban life -- Rural life -- Religion -- Education -- Science and technology -- Entertainment and sports -- Crime and violence -- Labor and employment -- Military and wars -- Population trends and migration -- Transportation -- Public health, medicine, and nutrition."The early 20th-century in America was characterized by technological advancements. Chief among these was the rapid replacement of horse-drawn vehicles by gasoline-powered cars, which necessitated a nationwide network of paved highways and filling stations. Concern over unchecked industrialization and pollution led to a new awareness of nature and the creation of the nation's national park system. As well, the racial landscape of America was altered by the exodus of large numbers of African Americans from the rural South to the cities of the North. While U.S. participation in World War I was limited due to a lengthy policy of neutrality, the conflict produced a shift in the country's values that shaped both popular and political culture for the rest of the century, exemplified by the ratification in 1920 of the Nineteenth Amendment, granting women the right to vote."--p.[4] of cover.
Subjects: Roosevelt, Theodore, 1858-1919.; Prohibition; World War, 1914-1918.; African Americans; Telephone; African Americans; Influenza Epidemic, 1918-1919; Labor unions; Indians of North America; Rural-urban migration; Railroads; Chinese Americans; Automobiles; Families; Education; Technology; Amusements; National characteristics, American.;
Available copies: 1 / Total copies: 1
unAPI

Spark [sound recording]/ by Twelve Hawks, John,author.(CARDINAL)470031; Brick, Scott(CARDINAL)344793; Books on Tape, Inc.(CARDINAL)534890;
Read by Scott Brick.Jacob Underwood is a contract employee of the Special Services Section, a shadow department in the faceless multinational corporation DBG. Jacob is not a businessman, he is a hired assassin, and his job is to neutralize problems deemed unacceptable by the corporation. Jacob is not like other employees, nor is he like other people. Suffering from Cotard's syndrome, a real condition that causes people to believe they are dead, Jacob perceives himself as nothing but a Shell with no emotion and no sense of right or wrong. Emily Buchanan is a bright young second-year associate for DBG, and she has disappeared without a trace. Suspecting she may have stolen valuable information and a fortune from the company, Miss Holquist, Jacob's handler at DBG, assigns him the task of tracking her down and neutralizing her. Jacob's condition allows him to carry out assignments with ruthless, logical precision, devoid of guilt, fear, or dishonor. But as his new assignment draws him inside a labyrinthine network of dark dealings, Jacob finds himself up against something he is completely incapable of understanding. Spark is an ingenious and chilling vision of modern-day humanity under constant, invasive surveillance and a pulse-pounding game of cat and mouse.Compact disc.
Subjects: Audiobooks; Assassins; Dystopias; Suspense fiction;
Available copies: 1 / Total copies: 1
unAPI

Firewall : Tom Clancy's splinter cell / by Swallow, James,author.(CARDINAL)421516; Clancy, Tom,1947-2013.(CARDINAL)293728;
"Veteran Fourth Echelon agent Sam Fisher has a new mission recruiting and training the next generation of Splinter Cell operatives for the NSA's covert action division, including his daughter Sarah. But when a lethal assassin from Fisher's past returns from the dead on a mission of murder, father and daughter are thrust into a race against time as a sinister threat to global security is revealed. A dangerous cyberwarfare technology known as Gordian Sword - capable of crashing airliners, destroying computer networks and plunging entire cities into darkness - is being auctioned off to whichever rogue state makes the highest bid. Sam and Sarah must call on their very singular set of skills to neutralize Gordian Sword and stop the weapon falling into the wrong hands - at any cost..."--
Subjects: Novels.; Computer crimes; Intelligence officers; Terrorism;
Available copies: 2 / Total copies: 2
unAPI