![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
An insider's account of Apple's creative process during the golden years of Steve Jobs. 'If you’ve ever wondered what it’s like to work in a hotbed of innovation, you’ll enjoy this inside view of life at Apple. Ken Kocienda pioneered the iPhone keyboard, and this book gives a play-by-play of their creative process –from generating ideas to doing a demo for Steve Jobs.' Adam Grant Hundreds of millions of people use Apple products every day; several thousand work on Apple's campus in Cupertino, California; but only a handful sit at the drawing board. Creative Selection recounts the life of one of the few who worked behind the scenes, a highly-respected software engineer who worked in the final years of the Steve Jobs era, the Golden Age of Apple. Ken Kocienda offers an inside look at Apple’s creative process. For fifteen years, he was on the ground floor of the company as a specialist, directly responsible for experimenting with novel user interface concepts and writing powerful, easy-to-use software for products including the iPhone, the iPad and the Safari web browser. His stories explain the symbiotic relationship between software and product development for those who have never dreamed of programming a computer, and reveal what it was like to work on the cutting edge of technology at one of the world's most admired companies. Kocienda shares moments of struggle and success, crisis and collaboration, illuminating each with lessons learned over his Apple career. He introduces the essential elements of innovation, inspiration, collaboration, craft, diligence, decisiveness, taste, and empathy, and uses these as a lens through which to understand productive work culture. An insider's tale of creativity and innovation at Apple, Creative Selection shows readers how a small group of people developed an evolutionary design model, and how they used this methodology to make groundbreaking and intuitive software which countless millions use every day.
Examining the flow of technical knowledge between the US, Taiwan and Mainland China over the last sixty-five years, this book shows that the technical knowledge that has moved between these states is vast and varied. It includes the invention and production of industrial goods, as well as knowledge of the patterns of corporate organization and management. Indeed, this diversity is reflected in the process itself, which is driven both by returning expatriates with knowledge acquired overseas and by successful government intervention in acquiring technology from multinational firms. Technology Transfer Between the US, China and Taiwan engages with the evolving debates on the merits, importance and feasibility of technology transfer in the process of economic development globally, and uses the example of Taiwan to show that multinational corporations can indeed play a positive role in economic development. Further, it reveals the underlying tension between international cooperation and nationalism which inevitably accompanies international exchanges, as well as the delicate balancing act required between knowledge acquisition and dangerous levels of dependency, and the beneficial role of the US in East Asia's technological development. With contributors from disciplines ranging from history, geography, urban planning, sociology, political science and electrical engineering, this multi-disciplinary book will be of great interest to students and scholars working across a broad range of subjects including Taiwan studies, Chinese studies, economics, business studies and development studies.
When one considers broadband, the Internet immediately springs to mind. However, broadband is impacting society in many ways. For instance, broadband networks can be used to deliver healthcare or community related services to individuals who don't have computers, have distance as an issue to contend with, or don't use the internet. Broadband can support better management of scarce energy resources with the advent of smart grids, enables improved teleworking capacity and opens up a world of new entertainment possibilities. Yet scholarly examinations of broadband technology have so far examined adoption, usage, or diffusion but missed exploring the capacity of broadband networks to enable new applications, the management aspects of funding and developing broadband-enabled services, or the policy environment in which such networks are developed. This book explores a wide range of issues associated with the deployment and use of broadband including its impacts on individuals, organizations, and society, and offers a generalist understanding of the technical aspects of broadband. Management of Broadband Technology and Innovation offers insights on broadband from the perspectives of Information Systems, Management, Strategy, and Communications Policy scholars, drawing on research from these disciplines to inform diverse aspects of broadband deployment, policy, and use. Issues associated with a subject technical in nature, but now researched in many ways, are emphasised. This book explains various softer aspects of broadband deployment and use, focusing on the benefits of broadband rather than on details of the technology.
The latest edition of this international edited book series, based on the formation and growth problems of High Technology Small Firms (HTSF), contains the best papers presented at the 2011 and 2013 conferences, both held at Manchester Business School. This volume remains true to the initial mission of the HTSF Conference, established in 1993, to advance our knowledge of high-technology entrepreneurship and to advocate the need for more and better designed policy to promote such entrepreneurship. The need is as great as ever it was, not least given the continued economic stagnation of the European economy in the wake of the Financial Crisis and the Euro crisis. These papers address key themes relating to improving our understanding of the processes involved in high-technology entrepreneurship and of the design of effective policy to promote this research. The first two groups of papers examine the start-up and commercialization processes and the internationalization processes, which are often important for new high-technology businesses. Other papers examine topics like entrepreneurship clusters, inter-firm collaboration, and growth strategy for high-technology small firms.
Originally published in 1988 this book was the culmination of 7 years of research in micro-electronics by the Center for Science and Technology Policy in New York. It includes original comparative study of corporate strategy in American, Japanese, and European firms, as well as an account of the evolution of technical alliances. It provides a detailed examination of the global micro-electronics industry in all its aspects - technological, economic, strategic and institutional and goes beyond organizing and presenting the facts to offer new perspectives, analyses and opinions.
Originally published in 1990 this book provides an authoritative and detailed account of the initiatives of US state governments with science and technology programs designed to foster economic growth. Two key questions are posed: Do state governments have policy instruments that are sufficiently powerful to affect thelevels and growth rates of their regional economies? and Are national and global economic forces so powerful that they render state action ineffective? Several subsidiary themes are discusses in this context, namely: the most commonly used policy instruments, the impacts on federalism and on governance and how well the universities and other educational institutions serve the economic activities imposed on them.
Originally published in 1987, this book explores the history and geography of the computer industry in Britain and the evolution of the market leader firms, STC ICL and IBM (UK). It also examines the rising rate of new firm formation in the 1980s and the technology policies adopted by successive governments and analyses how well the industry is placed to cope with the challenges of technological change and increased international competition.
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.
The mobile communications market in developing countries is growing at a rapid rate. This is evident in the rapid spread of mobile broadband cellular networks such as 3G. 4G is also being deployed in developing countries around the world. As the global communications market proceeds towards 5G, it is evident that developing countries will not be left behind. However, there are challenges and barriers on the road ahead specific to developing countries. To aid policy makers, researchers and members of the academia make informed decision that will help the advancement of 5G, this handbook provides an insight into the impact of existing mobile cellular networks in some developing countries. Topics discussed in this handbook include: * Digital divide * Policy outlook * 5G and rural areas * 5G readiness * Telco Business models * Telecom tower pricing * Mobile application adoption
Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.
A myriad of security vulnerabilities in the software and hardware we use today can be exploited by an attacker, any attacker. The knowledge necessary to successfully intercept your data and voice links and bug your computers is widespread and not limited to the intelligence apparatus. Consequently, the knowledge required can - at least in part - also easily be accessed by criminals trying to 'transfer your wealth' and competitors looking for your trade secrets. The temptation to use these easily accessible resources to the disadvantage of a rival company grows as global competition gets fiercer. Corporate espionage is nothing new, but since the dawn of the Internet Age the rules have changed. It is no longer necessary to be on-site to steal proprietary information. Cyberattacks today are cheap and attackers run a very low risk of getting caught, as attacks can be executed from anywhere in the world - an ideal breeding ground for criminal activities - and the consequences can be disastrous. In Understanding Cyber Risk: Protecting your Corporate Assets the author provides a wealth of real world examples from diverse industries from all over the world on how company assets are attacked via the cyber world. The cases clearly show that every organization can fall victim to a cyberattack, regardless of the size or country of origin. He also offers specific advice on how to protect core assets and company secrets. This book is essential reading for anyone interested in cyber security, and the use of cyberattacks in corporate espionage.
This book details qualitative research focusing on Internet startups, digital entrepreneurship, race and sex discrimination, and the sharing economy. Addressing the intersections between issues of gender, age, ethnicity and class, the author interviews startup founders, including many husband and wife teams, in order to understand the working and private lives of digital entrepreneurs in and from Taiwan who utilise Internet and mobile technologies, against a backdrop of the country's political, social and economic history. It investigates contemporary debates about entrepreneurship as they are experienced by new generations of start-uppers who challenge existing social and cultural norms by becoming creative workers and embracing the precarity that exists in the volatile digital economy.
The role of service level manager is a critical one in that the agreements negotiated with customers should inform the activities of the service provider. This book aims to help those whose role is to establish, negotiate, manage or update service level agreements and to use these as the basis of continual service improvement. It covers areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role.
The Internet once promised to be a place of extraordinary freedom beyond the control of money or politics, but today corporations and platforms exercise more control over our ability to access information and share knowledge to a greater extent than any state. In Silicon Values, leading campaigner Jillian York, looks at how our rights have become increasingly undermined by the major corporations desire to harvest our personal data and turn it into profit. She also looks at how governments have used the same technology to monitor citizens and threatened our ability to communicate. As a result our daily lives, and private thoughts, are being policed in an unprecedented manner. Who decides the difference between political debate and hate speech? How does this impact on our identity, our ability to create communities and to protest? Who regulates the censors? In response to this threat to our democracy, York proposes a user-powered movement against the platforms that demands change and a new form of ownership over our own data.
Are entrepreneurs essentially the same everywhere? Are the
processes of entrepreneurship similar? Or are they shaped by their
environments? If so, how?
A fascinating look at the trailblazing companies using artificial intelligence to create new competitive advantage, from the author of the business classic, Competing on Analytics, and the head of Deloitte's US AI practice. Though most organizations are placing modest bets on artificial intelligence, there is a world-class group of companies that are going all-in on the technology and radically transforming their products, processes, strategies, customer relationships, and cultures. Though these organizations represent less than 1 percent of large companies, they are all high performers in their industries. They have better business models, make better decisions, have better relationships with their customers, offer better products and services, and command higher prices. Written by bestselling author Tom Davenport and Deloitte's Nitin Mittal, All-In on AI looks at artificial intelligence at its cutting edge from the viewpoint of established companies like Anthem, Ping An, Airbus, and Capital One. Filled with insights, strategies, and best practices, All-In on AI also provides leaders and their teams with the information they need to help their own companies take AI to the next level. If you're curious about the next phase in the implementation of artificial intelligence within companies, or if you're looking to adopt this powerful technology in a more robust way yourself, All-In on AI will give you a rare inside look at what the leading adopters are doing, while providing you with the tools to put AI at the core of everything you do.
The global impact of so-called 'offshoring', including of information technology (IT) and related services, continues to be a topic of great interest to academics, practitioners and policy makers. The Indian IT industry has sustained high levels of growth in revenues and employment since the late 1980s. Even following the global financial crisis and meltdown in 2008, the industry has reported growth, albeit at a lower rate. Furthermore, the high rates of technological change and increased competition has forced businesses and managers to be innovative and create new business models. This book examines how managers and entrepreneurs in the Indian IT industry have explored and exploited human capital opportunities at various stages of the industry's evolution to create innovative human resources (HR) practices and new business models. Based on extensive academic research and deep reflective practitioner accounts, this collection presents expert content, views and a coherent picture of the challenges and changes in the Indian IT industry and analyses how the industry has remained competitive in a constantly changing environment. This book will appeal to researchers, students and practitioners, particularly in the fields of human resources and strategic management.
This book is a multidisciplinary study of the translation and localisation of video games. It offers a descriptive analysis of the industry - understood as a global phenomenon in entertainment - and aims to explain the norms governing present industry practices, as well as game localisation processes. Additionally, it discusses particular translation issues that are unique to the multichannel nature of video games, in which verbal and nonverbal signs must be cohesively combined with interactivity to achieve maximum playability and immerse players in the game's virtual world. Although positioned within the theoretical framework of descriptive translation studies, Bernal-Merino incorporates research from audiovisual translation, software localisation, computer assisted translation, comparative literature, and video game production. Moving beyond this framework, Translation and Localisation in Video Games challenges some of the basic tenets of translation studies and proposes changes to established and unsatisfactory processes in the video game and language services industries.
This book offers an in-depth analysis of the roles and strategies of subsidiaries of American multinational companies (MNCs) in Taiwan's IT industry. Based on semi-structured interviews with 16 managing directors of the different foreign-owned subsidiaries and 100 functional unit managers, the authors investigate (1) the roles of functional units in evaluating strategy formulation and change in foreign subsidiaries; (2) the factors that determine strategy formulation and change in foreign subsidiaries and their functional units; and (3) the linkages between cross-functional units. The research underscores the view that MNCs' strategies are composed of assorted heterogeneous elements.
Blogging and other types of social media such as wikis and social networking sites have transformed the way we use the internet in recent years. It is a transformation that business is eager to exploit. In order to do so, a clear commercial strategy needs to be established; does your organization wish to use the media actively as a business tool, or do you need to respond to the use of social media by others? Blogging and Other Social Media will address this question with practical guidance on using social media as well as the risks associated with it. A collaboration by leading thinkers and business users of social media, the book contains detailed and practical advice on the various forms of social media - their applications, advantages and disadvantages, how these technologies are evolving, and whether or not their use will benefit your business. The section covering social media and the law explains the risks and remedies related to abuse of copyright, defamation, privacy, data protection and user contracts as well as the opportunities and threats for online reputation. If you are looking to encourage your employees but want to protect your business from the threats this emerging media presents, get a copy of this practical guide and study it before you start including social media as part of your corporate marketing or communications strategy.
MANAGING INFORMATION TECHNOLOGY PROJECTS, 6e, International Edition offers the "behind-the-scene" aspect of technology. By weaving together theory and practice, this text presents an understandable, integrated view of the many concepts skills, tools, and techniques involved in project management.
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." --Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions In 2016, we reached a tipping point--a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Global corporations initiate, join and maintain socio-technological change and hence, alter the ways in which we organize our lives. Demanding significant investment of resources and time, the development and implementation of new technologies on different levels must take into consideration these subtle processes. As such, it is particularly important that we have a greater insight into the practices of hi-tech corporations, in view of the often inflated promises of and concerns about the destiny of technological breakthroughs, especially those promising sizeable economic outcomes and societal transformation. Elena Simakova undertook a lengthy ethnographic study, working alongside marketing managers in a global IT corporation in their Europe, Middle East and Africa (EMEA) headquarters in the UK. Using the experience gained through a close participation in their everyday corporate rituals and routines, her account challenges common perceptions of how corporations make the world think and act with regard to technologies in particular ways. The book contains an interesting case study on the launch of a radio frequency identification (RFID) based solution. Unravelling the construction of expectations, inclusions and exclusions around emerging technologies, this reflexive account also tackles uneasy practical and methodological questions pertinent to corporate ethnography. This book is an essential read for scholars in science and technology studies, economic sociology, anthropology, as well as management and organizational studies and research policy.
Identifying security gaps in an organisation's information systems is a first and vital step in protecting data and information. This is what makes the role of an information security (or assurance) auditor so important. However, this is a role that is often maligned as a 'check list monkey' who adds nothing to the business. This practical book confronts this stereotype and gives an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role. Based on the author's extensive experience, it gives practical guidance to those new to the role or interested in developing a better understanding of what it entails. |
You may like...
Studies on Multilingual Lexicography
Maria Jose Dominguez Vazquez, Monica Mirazo Balsa, …
Hardcover
R3,634
Discovery Miles 36 340
Grammar Acquisition and Processing…
Alessandro Benati, James F. Lee
Paperback
R928
Discovery Miles 9 280
|