Free computers and the internet Kindle books for 14 Jan 19

Big Data in Context: Legal, Social and Technological Insights (SpringerBriefs in Law)

This book is open access under a CC BY 4.0 license.
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of researchers and practitioners alike, it provides a comprehensive overview of and introduction to the emerging challenges regarding big data.All contributions are based on papers submitted in connection with ABIDA (Assessing Big Data), an interdisciplinary research project exploring the societal aspects of big data and funded by the German Federal Ministry of Education and Research.This volume was produced as a part of the ABIDA project (Assessing Big Data, 01IS15016A-F). ABIDA is a four-year collaborative project funded by the Federal Ministry of Education and Research. However the views and opinions expressed in this book reflect only the authors’ point of view and not necessarily those of all members of the ABIDA project or the Federal Ministry of Education and Research.



GUI Design for Android Apps

by Ryan Cohen

GUI Design for Android Apps is the perfectâ??and conciseâ??introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices.

This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform.



Time Predictions: Understanding and Avoiding Unrealism in Project Planning and Everyday Life (Simula SpringerBriefs on Computing Book 5)

by Torleif Halkjelsvik

This book is published open access under a CC BY 4.0 license.

Predicting the time needed to complete a project, task or daily activity can be difficult and people frequently underestimate how long an activity will take. This book sheds light on why and when this happens, what we should do to avoid it and how to give more realistic time predictions. It describes methods for predicting time usage in situations with high uncertainty, explains why two plus two is usually more than four in time prediction contexts, reports on research on time prediction biases, and summarizes the evidence in support of different time prediction methods and principles. Based on a comprehensive review of the research, it is the first book summarizing what we know about judgment-based time predictions.
Large parts of the book are directed toward people wishing to achieve better time predictions in their professional life, such as project managers, graphic designers, architects, engineers, film producers, consultants, software developers, or anyone else in need of realistic time usage predictions. It is also of benefit to those with a general interest in judgment and decision-making or those who want to improve their ability to predict and plan ahead in daily life.



Building the Infrastructure for Cloud Security: A Solutions View (Expert’s Voice in Internet Security)

by Raghuram Yeluri

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

“A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!” â??Vince Lubsey, Vice President, Product Development, Virtustream Inc.

” Raghu provides a valuable reference for the new ‘inside out’ approach, where trust in hardware, software, and privileged users is never assumedâ??but instead measured, attested, and limited according to least privilege principles.” â??John Skinner, Vice President, HyTrust Inc.

“Traditional parameter based defenses are in sufficient in the cloud. Raghu’s book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud.” â??Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation



Office 365: Migrating and Managing Your Business in the Cloud

by Matthew Katzer

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included.

Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it.

The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services.



Amazon EMR: Management Guide

by Amazon Web Services

Official Amazon Web Services (AWS) documentation for Amazon EMR. Amazon EMR provides a managed framework to run Apache Hadoop, Spark, HBase, Presto, Flink, and other big-data applications in the cloud on dynamically scalable Amazon EC2 instances. This guide covers the fundamentals of cluster planning, configuration, monitoring, and security. Use it together with the Amazon EMR Release Guide, which covers application installation, configuration, and optimization.



Building a Modular and Scalable Virtual Network Architecture with Amazon VPC: VPC Quick Start

by Amazon Web Services

This is official Amazon Web Services (AWS) documentation for the VPC Quick Start. This Quick Start provides a networking foundation based on AWS best practices for your AWS Cloud infrastructure. It builds an Amazon Virtual Private Cloud (Amazon VPC) environment with public and private subnets where you can launch AWS services and other resources. Use this Quick Start as a building block for your own deployments. You can scale it up or down as needed, and add other infrastructure components and software layers to complete your AWS environment. The Quick Start includes a deployment guide that describes the VPC infrastructure and provides step-by-step deployment instructions, and AWS CloudFormation templates that automate the deployment. The deployment guide is offered here as a free Kindle book, or you can read it online or in PDF format; see https://aws.amazon.com/quickstart/architecture/vpc/.



Fashion Figures: How Missy the Mathlete Made the Cut

by Melissa A. Borza

Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it’s too geeky. Missy hears that the school math club needs more members, but she’s worried about what her friends will think if she joins, and she’s already committed to joining the fashion club.

After an epic internal struggle and with the support of her peers and her quirky, loving family, Missy finds that she can be both a Mathlete and a Fashionista. Missy figures out how to bring the two clubs together to help both groups win. In the process, she discovers that she can openly excel in math and science and still be popular with her peers. She also learns how her math and science skills can help her artistic endeavors.
Gain an inside perspective on what it’s like when you love math and science and happen to be a girl. Fashion Figures highlights the societal and internal pressures preteen and early-teen girls often face when they excel in these subjects, and it shows strategies for overcoming barriers to being themselves and doing what they love while still fitting in socially.

What You’ll Learn

  • Girls can have a passion for STEM (science, technology, engineering and math) subjects and still be cool
  • Girls can be great at math
  • Math skills are important in non-STEM centered subject areas like fashion and art
  • Math can be fun

Who This Book Is For

Pre-teen and early-teen girls (9-14 years old)



Foundations of Trusted Autonomy (Studies in Systems, Decision and Control Book 117)

This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness.
 Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a single volume. The book is structured in three parts, with chapters written by eminent researchers and outstanding practitioners and users in the field. The first part covers foundational artificial intelligence technologies, while the second part covers philosophical, practical and technological perspectives on trust. Lastly, the third part presents advanced topics necessary to create future trusted autonomous systems. The book augments theory with real-world applications including cyber security, defence and space.



Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers

by Manoel Ramon

Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux.

Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com).



The Rise and Development of FinTech: Accounts of Disruption from Sweden and Beyond (Routledge International Studies in Money and Banking Book 94)

This comprehensive guide serves to illuminate the rise and development of FinTech in Sweden, with the Internet as the key underlying driver. The multiple case studies examine topics such as: the adoption of online banking in Sweden; the identification and classification of different FinTech categories; process innovation developments within the traditional banking industry; and the Venture Capital (VC) landscape in Sweden, as shown through interviews with VC representatives, mainly from Sweden but also from the US and Germany, as well as offering insight into the companies that are currently operating in the FinTech arena in Sweden. The authors address questions such as: How will the regulatory landscape shape the future of FinTech companies? What are the factors that will likely drive the adoption of FinTech services in the future? What is the future role of banks in the context of FinTech and digitalization? What are the policies and government initiatives that aim to support the FinTech ecosystem in Sweden? Complex concepts and ideas are rendered in an easily digestible yet thought-provoking way.



The book was initiated by the IIS (the Internet Foundation in Sweden), an independent organization promoting the positive development of the Internet in the country. It is also responsible for the Internet’s Swedish top-level domain .se, including the registration of domain names, and the administration and technical maintenance of the national domain name registry. The book illustrates how Sweden acts (or does not act) as a competitive player in the global FinTech arena, and is a vital addition to students and practitioners in the field.



Rethinking the Internet of Things: A Scalable Approach to Connecting Everything

by Francis daCosta

Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book.

Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources.

Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information – “chirps”. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership.

This must change. The architecture of the Internet of Things must evolve now by incorporating simpler protocols toward at the edges of the network, or remain forever inefficient. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored.



Got a new Kindle or know someone who has? Check out the ultimate guide to finding free books for your Kindle. Also available in the UK.