Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Communications Policy and Information Technology: Promises, Problems, Prospects (Telecommunications Policy Research Conference)

Buy
New technologies, although developed with optimism, often fall short of their predicted potential and create new problems. Communications technologies are no different. Their utopian proponents claim that universal access to advanced communications technologies can help to feed the hungry, cure the sick, educate the illiterate, improve the global standard of living, and ultimately bring about world peace. The sobering reality is that while communications technologies have a role to play in making the world a better place, the impact of any specific technological advance is likely to be modest. The limitations of new technologies are often not inherent in the technologies themselves but the result of regulatory or economic constraints. While the capability may exist to deliver any information anywhere in the world, many people lack the money to pay for it, the equipment to access it, the skills to use it, or even the knowledge that it might be useful to them. This book examines the complex ways in which communication technologies and policies affect the people whose lives they are intended to improve. The areas of discussion include Internet regulation, electronic voting and petitioning, monopoly and competition in communications markets, the future of wireless communications, and the concept of universal service.

About the Author

Lorrie Faith Cranor is a Principal Technical Staff Member in the Secure Systems Research Department at AT&T Labs-Research.

Shane Greenstein is Elinor and Wendall Hobbs Professor of Management and Strategy at the Kellogg School of Management, Northwestern University.
(HTML tags aren't allowed.)

Designing Data-Intensive Web Applications
Designing Data-Intensive Web Applications

The most prominent Web applications in use today are data-intensive. Scores of database management systems across the Internet access and maintain large amounts of structured data for e-commerce, on-line trading, banking, digital libraries, and other high-volume sites.

Developing and maintaining these data-intensive applications is...

Machine Audition: Principles, Algorithms and Systems (Premier Reference Source)
Machine Audition: Principles, Algorithms and Systems (Premier Reference Source)

Machine audition is the field of the study of algorithms and systems for the automatic analysis and understanding of sound by machine. It plays an important role in many applications, such as automatic audio indexing for internet searching, robust speech recognition in un-controlled natural environment, untethered audio communication...

Optimizing Hadoop for MapReduce
Optimizing Hadoop for MapReduce

This book is the perfect introduction to sophisticated concepts in MapReduce and will ensure you have the knowledge to optimize job performance. This is not an academic treatise; it's an example-driven tutorial for the real world.

Overview

  • Optimize your MapReduce job performance
  • ...

Jerry Hofmann on Final Cut Pro® 4
Jerry Hofmann on Final Cut Pro® 4
Final Cut Pro is the only nonlinear editing tool available that supports the entire range of editing formats. Jerry Hofmann on Final Cut Pro is broken up into a collection of hands-on seminars that focus on teaching a specific aspect of Final Cut Pro. Dealing with version 4, each seminar begins with a lesson that...
Mac OS X Unix 101 Byte-Sized Projects
Mac OS X Unix 101 Byte-Sized Projects
Unix is no longer someone else's OS. With Mac OS X built on top of it, Unix  is becoming a household name, and more and more Mac users are ready to take it on. This book is for them! Based on a popular series of Unix tips, this book promises to deliver what most other Unix guides fail to: comprehensive tutorials and instruction on specific...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy