Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Business & Economics > Industry & industrial studies > Media, information & communication industries > Information technology industries
An in-depth examination of Google's innovative approach to M&A Semi-Organic Growth presents a unique analysis of Google's distinctive expertise in the area of mergers and acquisitions, derived from more than 150 acquisitions carried out over the company's short history. While organizational growth has traditionally been characterized as organic (internally generated) or inorganic (from acquisition), this book examines Google's semi-organic strategy for accelerating product and service revenue, explained through a unique sector/subsector classification scheme that dynamically maps the media, Internet, and technology platform markets. You'll gain insight into Google's disclosure strategies for private company transactions, and more importantly, their methods for integrating acquisitions into product and service offerings to achieve ecosystem synergy. Unique perspective reveals the lessons learned along the way from both successes and failures, and the companion website gives you access to the tools that help you implement what you've learned. Google's extensive use of M&A as a growth strategy has been in sharp contrast to the practices of rivals like Apple, and further contrasts with the failures of many other companies in corporate business development. This book shows you the thinking behind the company's successful methods, and demonstrates the mechanisms behind the success. * Learn why corporate M&A activity often fails to add value * Delve deep into the complex dimensions of M&A integration * Discover what Google has learned through specific deals * Consider innovative integration methods that foster synergy Google is an iconic, premiere company, and it didn't happen by accident. Their success is driven by their innovative approach to strategy in all areas, and their M&A expertise has been a major contributing factor. Semi-Organic Growth takes you through the core workings of Google M&A to provide insight into successful strategy for the modern market.
On the threshold of the 21st century, an intensive debate about
globalisation of R&D and technology markets is of crucial
importance. Globalisation will carry on changing the framework for
company strategies and subsequently for public policies.
A behind-the-scenes look at the struggles between visual journalists and officials over what the public sees—and therefore much of what the public knows—of the criminal justice system. In the contexts of crime, social justice, and the law, nothing in visual media is as it seems. In today's mediated social world, visual communication has shifted to a democratic sphere that has significantly changed the way we understand and use images as evidence. In Seeing Justice, Mary Angela Bock examines the way criminal justice in the US is presented in visual media by focusing on the grounded practices of visual journalists in relationship with law enforcement. Drawing upon extended interviews, participant observation, contemporary court cases, and critical discourse analysis, Bock provides a detailed examination of the way digitization is altering the relationships between media, consumers, and the criminal justice system. From tabloid coverage of the last public hanging in the US to Karen-shaming videos, from mug shots to perp walks, she focuses on the practical struggles between journalists, police, and court officials to control the way images influence their resulting narratives. Revealing the way powerful interests shape what the public sees, Seeing Justice offers a model for understanding how images are used in news narrative.
The editor of this new Routledge title argues that our economic and social lives are now utterly dependent upon the successful coordination of the Internet. Moreover, as the Internet expands from its current form to an 'Internet of things', she suggests that its stability and security will soon be recognized as important as other global concerns, like battling terrorism and fighting climate change. Who controls the Internet? The question has profound implications for our access to knowledge, the pace of economic growth, and the protection of human rights, not least freedom of expression and the right to privacy. And the question's importance has been underscored in recent times by landmark events, including revelations about the actual and potential power of social-media companies, and the breathtaking extent of surveillance by intelligence and security organizations, such as the NSA in the United States and Britain's GCHQ. It is perhaps only in the last several years that issues about and around the governance of the Internet have entered the public consciousness, but serious academic and policy work dates back decades. And now there is a critical mass of scholarship that can usefully be collected under the rubric of 'Internet Governance'. Like the Internet itself, leading theorists and researchers in the field are distributed globally, and work in disciplines across the social sciences and humanities. Indeed, much of the relevant literature remains inaccessible or is highly specialized and compartmentalized, so that it is difficult for many of those who are interested in the subject to obtain an informed, balanced, and comprehensive overview. This new four-volume collection, published as part of Routledge's acclaimed series, Critical Concepts in Sociology, meets the need for a reference work to make sense of the subject's vast and dispersed literature and the continuing explosion in research output.
Public dissatisfaction with the news media frequently gives rise to calls for journalists to live up to the ethical standards of their profession. But what if the fault lies in part with the standards themselves?Jeremy Iggers argues that journalism's institutionalized conversation about ethics largely evades the most important issues regarding the public interest and the civic responsibilities of the press. Changes in the ownership and organization of the news media make these issues especially timely; although journalism's ethics rest on the idea of journalism as a profession, the rise of market-driven journalism has undermined journalists' professional status.Ultimately, argues Iggers, journalism is impossible without a public that cares about the common life. A more meaningful approach to journalism ethics must begin with a consideration of the role of the news media in a democratic society and proceed to look for practical ways in which journalism can contribute to the vitality of public life.Written in an accessible style, Good News, Bad News is important reading for journalists, communication scholars, and students.
The essays in this volume explore the educational implications of unsettling shifts in contemporary culture associated with postmodernism. These shifts include the fragmentation of established power blocs, the emergence of a politics of identity, growing inequalities between the haves and the have-nots in a new global economy, and the rise in influence of popular culture in defining who we are. In the academy, postmodernism has been associated with the emergence of new theoretical perspectives that are unsettling the way we think about education. These shifts, the authors suggest, are deeply contradictory and may lead in divergent political directions--some of them quite dangerous. "Power/Knowledge/Pedagogy" examines these issues with regard to four broad domains of educational inquiry: state educational policy and curriculum reform, student identity formation, the curriculum as a text, and critical pedagogy. The book contributes to the dialogue on the forging of a new commonsense discourse on democratic educational renewal, attuned to the changing times in which we live.
This book starts with the basic premise that a service is comprised of the 3Ps-products, processes, and people. Moreover, these entities and their sub-entities interlink to support the services that end users require to run and support a business. This widens the scope of any availability design far beyond hardware and software. It also increases the potential for service failure for reasons beyond just hardware and software; the concept of logical outages. High Availability IT Services details the considerations for designing and running highly available "services" and not just the systems infrastructure that supports those services. Providing an overview of virtualization and cloud computing, it supplies a detailed look at availability, redundancy, fault tolerance, and security. It also stresses the importance of human factors. The book starts off by providing an availability primer and detailing the reasons why you need to be concerned with high availability. Next, it outlines the theory of reliability and availability and the elements of actual practices in this high availability (HA) area, including Service Level Agreements (SLAs) and Change Management. Examining what the major hardware and software vendors have to offer in the HA world, the book considers the ubiquitous world of clouds and virtualization as well as the availability considerations they present. The book examines high availability concepts and architectures such as reliability, availability, and serviceability (RAS); clusters; grids; and redundant arrays of independent disks (RAID) storage. It also covers the role of security in providing high availability, cluster offerings, emergent Linux clusters, online transaction processing (OLTP), and relational databases.
President Trump has raised the intriguing question of bringing the manufacturing of companies like Apple back from China to the U.S. This book, however, argues that in this age of the knowledge-based economy and increased globalization, that value creation and distribution based on knowledge and innovation activities are at the core of economic development. The double-edged sword of globalization has transformed China's economic development in the past few decades. Although China has benefitted from globalization and is now the second largest economy in the world, having become a global manufacturing power and the biggest exporter of high-tech products, it continues to be highly dependent on foreign sources of capital and technology. This book will explore the core of the Chinese economy from the perspective of the Global Value Chain (GVC), combining analysis of inward investment, international trade, Science and Technology and Innovation (S&TI) and economic development. Specifically, it investigates China's evolving role in GVCs with some innovative Chinese companies emerging in the global market and China's ongoing efforts to become an innovation-driven economy. China's impressive economic record and experience provides an impressive role model for other developing countries.
President Trump has raised the intriguing question of bringing the manufacturing of companies like Apple back from China to the U.S. This book, however, argues that in this age of the knowledge-based economy and increased globalization, that value creation and distribution based on knowledge and innovation activities are at the core of economic development. The double-edged sword of globalization has transformed China's economic development in the past few decades. Although China has benefitted from globalization and is now the second largest economy in the world, having become a global manufacturing power and the biggest exporter of high-tech products, it continues to be highly dependent on foreign sources of capital and technology. This book will explore the core of the Chinese economy from the perspective of the Global Value Chain (GVC), combining analysis of inward investment, international trade, Science and Technology and Innovation (S&TI) and economic development. Specifically, it investigates China's evolving role in GVCs with some innovative Chinese companies emerging in the global market and China's ongoing efforts to become an innovation-driven economy. China's impressive economic record and experience provides an impressive role model for other developing countries.
In Blockchain Democracy, William Magnuson provides a breathtaking tour of the world of blockchain and bitcoin, from their origins in the online scribblings of a shadowy figure named Satoshi Nakamoto, to their furious rise and dramatic crash in the 2010s, to their ignominious connections to the dark web and online crime. Magnuson argues that blockchain's popularity stands as a testament both to the depth of distrust of government today, and also to the fervent and undying belief that technology and the world of cyberspace can provide an answer. He demonstrates how blockchain's failings provide broader lessons about what happens when technology runs up against the stubborn realities of law, markets, and human nature. This book should be read by anyone interested in understanding how technology is changing our democracy, and how democracy is changing our technology.
How to create a profitable, sustainable business developing and marketing iPhone apps iPhone apps are hot; the average app is downloaded more than 30,000 times. If you have some great apps in mind, "Starting an iPhone Application Business For Dummies" will show you how to produce and market them effectively. "Starting an iPhone Application Business For Dummies" provides clear, reliable business information to help developers and entrepreneurs create a profitable, sustainable business in this new and exciting market.Identifies what goes into a successful iPhone application businessHelps you find the market niche your applications can fill, market and promote your business, and build your brand Explains how to develop a pricing strategy, build your applications efficiently, and get them into the App StoreExplores finding a sustainable revenue model, including free trials, social media models, ad-based revenue models, and subscription modelsDemonstrates effective ways to provide service and support to customersWritten by a team that combines knowledge of iPhone app development with sound business experience Starting an iPhone Application Business For Dummies can help you turn your ideas into income.
This deeply personal book tells the untold story of the significant contributions of technical professionals from the former Soviet Union to the US innovation economy, particularly in the sectors of software, social media, biotechnology, and medicine. Drawing upon in-depth interviews, it channels the voices and stories of more than 150 professionals who emigrated from 11 of the 15 former Soviet republics between the 1970s and 2015, and who currently work in the innovation hubs of Silicon Valley and Boston/Cambridge. Using the social science theories of institutions, imprinting, and identity, the authors analyze the political, social, economic, and educational forces that have characterized Soviet immigration over the past 40 years, showing how the particularities of the Soviet context may have benefited or challenged interviewees' work and social lives. The resulting mosaic of perspectives provides valuable insight into the impact of immigration on US economic development, specifically in high technology and innovation.
For over a decade, Working Group 8 (Nursing) of the International Medical Informatics Association has sponsored, in conjunction with a host country, a triennial international symposium on nursing informatics. Each conference consists of a main conference and an invitational working conference following the main event. In 1991, the symposium was held in Melbourne, Australia and hosted by the Nursing Computer Group, Victoria and the Royal College of Nursing, Australia. Nine Pre-Conference workshops offered participants indepth exploration of a variety of information technology topics. The main conference attracted 700 participants from 19 countries and over 150 peer-reviewed papers. The invitational working conference was held at Whitehall in Sorrento, Victoria and involved the individual and collective work of 40 experts in nursing informatics from around the world. This group addressed the theme HEALTH CARE INFORMATION TECHNOLOGY: IMPLICATIONS FOR CHANGE. Health care organizations are faced with growing demand for information technology and must cope effectively with the processes and outcomes of its introduction. As the impact of information technology is felt both on the local and the global level, the conference selected for its theme a three tiered approach to information technology and organisational change - through the lens of society, the organization, and the individual. The conference was organized around three forms of contribution: plenary talks, working groups, and individual contributions by the participants. Part one of this book contains the papers of the plenary speakers for the conference.
In Leading Matters, current Chairman of Alphabet (Google's parent company), former President of Stanford University, and "Godfather of Silicon Valley," John L. Hennessy shares the core elements of leadership that helped him become a successful tech entrepreneur, esteemed academic, and venerated administrator. Hennessy's approach to leadership is laser-focused on the journey rather than the destination. Each chapter in Leading Matters looks at valuable elements that have shaped Hennessy's career in practice and philosophy. He discusses the pivotal role that humility, authenticity and trust, service, empathy, courage, collaboration, innovation, intellectual curiosity, storytelling, and legacy have all played in his prolific, interdisciplinary career. Hennessy takes these elements and applies them to instructive stories, such as his encounters with other Silicon Valley leaders including Jim Clark, founder of Netscape; Condoleezza Rice, former U.S. Secretary of State and Stanford provost; John Arrillaga, one of the most successful Silicon Valley commercial real estate developers; and Phil Knight, founder of Nike and philanthropist with whom Hennessy cofounded Knight-Hennessy Scholars at Stanford University. Across government, education, commerce, and non-profits, the need for effective leadership could not be more pressing. This book is essential reading for those tasked with leading any complex enterprise in the academic, not-for-profit, or for-profit sector.
This is the latest in a series of proceedings of conferences on the Mathematical Foundations of Programming Semantics. The purpose of the series is to bring together mathematicians and theoretical computer scientists who share the common interests of working on problems related to programming language semantics. The purpose of the book is to bring into print as quickly as possible papers which reflect the state of research on the topics comprising this area. The intended audience for the book consists of those researchers and graduate students with an interest in the research areas which are related to those presented in the book: programming language semantics, including algebraic, denotational and operational semantics, logics of programs, specification techniques, etc., and the relevant areas of mathematics research, including category theory, domain theory, ordered structures and lattice theory, and metric space methods. The papers included in the book represent the latest results in various facets of this rather broad research area, and this is the first time some of the ideas contained in these works are appearing in print.
Building Intelligent Enterprises by leveraging the emerging and next-generation technologies to accelerate the adoption of digital transformation The speed of innovation and emerging IT technologies are changing at a very fast pace and enterprises are eager to join the digital revolution so they can stand above the competition and succeed as the enterprise of tomorrow. This book is an attempt to make the enterprise intelligent by providing the path to digital transformation and the adoption of new IT methods, tools and technologies. This book has been organized to cover the following topics: Digital Transformation, Design Thinking, Agile, DevOps, Robotic Process Automation, Internet of Things, Artificial Intelligence, Machine Learning, Blockchain, Drones, Augmented and Virtual Reality, 3D Printing, Big Data, Analytics, Cloud Computing, APIs, and SAP Leonardo. No prior knowledge of any technical coding or language is necessary to understand the content of this book. End-to-end storyline to accelerate the enterprise's digital transformation journey How an enterprise can stay relevant, compete, and perform in the digital economy How to leverage these technologies to build intelligent enterprises Understand and apply the emerging technologies across key business processes Industry-specific Use Cases for all technologies as a reference point to build the business case for implementation The book is very well suited towards the C-Suite executives, both IT and business leaders, directors and managers, project managers, solution architects, and all professionals who have an interest and desire to keep up-to-date with the latest technological trends, looking for a career change, want to help enterprise adapt and onboard the digital roadmap, or have an agenda to digitize key processes within the enterprise to make it intelligent.
Der Autor beschreibt alle Phasen eines Lizenzierungsprojektes, zeigt den Weg zur Auswahl des richtigen Produktes, beleuchtet m gliche Kostenfallen und beschreibt im Detail, welche Schnittstellen zwischen Produktmarketing, Vertrieb, Entwicklung, Support, Logistik und Hotline zu beachten sind. Es werden vor allem Softwarehersteller angesprochen, die eine elektronische Lizenzierung ihrer Produkte erstmalig einf hren oder derzeitige Verfahren am State-of-the-Art ausrichten wollen. Erfolgreiche Software-Lizenzierung ist kein reines Entwicklungsprojekt, sondern umfasst praktisch alle Bereiche eines Software-Herstellers.
As threats to the security of information pervade the fabric of everyday life, A Vulnerable System describes how, even as the demand for information security increases, the needs of society are not being met. The result is that the confidentiality of our personal data, the integrity of our elections, and the stability of foreign relations between countries are increasingly at risk. Andrew J. Stewart convincingly shows that emergency software patches and new security products cannot provide the solution to threats such as computer hacking, viruses, software vulnerabilities, and electronic spying. Profound underlying structural problems must first be understood, confronted, and then addressed. A Vulnerable System delivers a long view of the history of information security, beginning with the creation of the first digital computers during the Cold War. From the key institutions of the so-called military industrial complex in the 1950s to Silicon Valley start-ups in the 2020s, the relentless pursuit of new technologies has come at great cost. The absence of knowledge regarding the history of information security has caused the lessons of the past to be forsaken for the novelty of the present, and has led us to be collectively unable to meet the needs of the current day. From the very beginning of the information age, claims of secure systems have been crushed by practical reality. The myriad risks to technology, Stewart reveals, cannot be addressed without first understanding how we arrived at this moment. A Vulnerable System is an enlightening and sobering history of a topic that affects crucial aspects of our lives.
Originally published in 1992 this book charts the global restructuring of telecommunications industries away from the monopoly structures of the past towards increased competition, deregulation and privatization. The book's authors are international policy-makers and scholars, who examine the regulatory environment within a theoretical and historical context. The book looks at the roots of regulatory and legislative changes by discussing individually the countries at the forefront of the revolution: the UK, France, Germany, Japan and the United States. It examines the impact of new technology for consequences of change in trade and government policies.
"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot. It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." --Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions In 2016, we reached a tipping point--a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term "cybersecurity" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. |
You may like...
Research Handbook on Information Systems…
Vanessa a. Cooper, Johann J. Kranz, …
Hardcover
R5,434
Discovery Miles 54 340
Closing The Gap - The Fourth Industrial…
Tshilidzi Marwala
Paperback
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, …
Hardcover
R5,447
Discovery Miles 54 470
Handbook of Digital Entrepreneurship
Mohammad Keyhani, Tobias Kollmann, …
Hardcover
R5,350
Discovery Miles 53 500
The Digital Silk Road - China's Quest To…
Jonathan E. Hillman
Paperback
Connect: Writing For Online Audiences
Maritha Pritchard, Karabo Sitto
Paperback
(1)
|