Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
No Logo : Taking Aim at the Brand Bullies

Buy
If I squint, tilt my head, and shut my left eye, all I can see out the window is 1932, straight down to the lake. Brown warehouses, oatmeal-colored smokestacks, faded signs painted on brick walls advertising long-discontinued brands: "Lovely," "Gaywear." This is the old industrial Toronto of garment factories, furriers and wholesale wedding dresses. So far, no one has come up with a way to make a profit out of taking a wrecking ball to these boxes of brick, and in this little eight- or nine-block radius, the modern city has been layered haphazardly on top of the old.

I wrote this book while living in Toronto's ghost of a garment district in a ten-story warehouse. Many other buildings like it have long since been boarded up, glass panes shattered, smokestacks holding their breath; their only remaining capitalist function is to hoist large blinking billboards on their tar-coated roofs, reminding the gridlocked drivers on the lakeshore expressway of the existence of Molson's beer, Hyundai cars and EZ Rock FM.
(HTML tags aren't allowed.)

Business in the Cloud: What Every Business Needs to Know About Cloud Computing
Business in the Cloud: What Every Business Needs to Know About Cloud Computing

A close look at cloud computing's transformational role in business

Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they...

Java Regular Expressions: Taming the java.util.regex Engine
Java Regular Expressions: Taming the java.util.regex Engine

Java has always been an excellent language for working with objects. But Java’s text manipulation mechanisms have always been limited, compared to languages like AWK and Perl. On the flip side, a new regular expressions package in Java 2 Standard Edition (J2SE) brings hope to the Java text mechanisms. This package provides you...

Engineering Research Methodology: A Practical Insight for Researchers (Intelligent Systems Reference Library)
Engineering Research Methodology: A Practical Insight for Researchers (Intelligent Systems Reference Library)

The book covers all the important aspects of research methodology, and addresses the specific requirements of engineering students, such as methods and tools, in detail. It also discusses effective research in engineering today, which requires the ability to undertake literature reviews utilizing different online databases, to...


Extreme Programming Refactored: The Case Against XP
Extreme Programming Refactored: The Case Against XP

Extreme Programming Refactored: The Case Against XP is meant to provide an independent look at Extreme Programming. It is meant to cut through the marketing hype of Extreme Programming and expose a number of weaknesses with this approach to software development. It tries to draw a distinction between true "agility" in a...

Principles of Applied Reservoir Simulation
Principles of Applied Reservoir Simulation
Principles of Applied Reservoir Simulation and its accompanying CD offer users a fully functioning reservoir simulator. Together, the book and CD provide a hands-on introduction to the process of reservoir modeling and show how to apply reservoir simulation technology and principles.

The book begins with a reservoir engineering primer
...
Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy