Crypto Anarchy, Cyberstates, and Pirate Utopias
In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...
Corporate Sigma: Optimizing the Health of Your Company with Systems Thinking
One study after the next shows that most employees are unhappy with their jobs and that less than a third actively engage with their work. That means that two out of every three are merely putting in their time, rather than maximizing productivity and attaining satisfaction. One could argue that such a malaise is the symptom of an unhealthy...
IP-Traffic Theory and Performance (Signals and Communication Technology) This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.
The book provides an ideal starting point for detailed studies of traffic analysis...
Any Way You Slice It: The Past, Present, and Future of Rationing
Rationing: it’s a wordÂand ideaÂthat people often loathe and fear. Health care expert Henry Aaron has compared mentioning the possibility of rationing to Âshouting an obscenity in church.” Yet societies in fact ration food, water, medical care, and fuel all the time, with those who can pay the most getting the most. As...
Mutiny and Leadership
Whenever leadership emerges within a group, there will be resistance to that leadership. Discontent may manifest in a number of ways, and action will always be determined by factors such as resource, numbers, time, space, and the legitimacy of the resistance. What, then, turns discontent into
Mutiny is often...
For a while now, we have been hearing a lot about collaboration in Enterprise space.
We speak day in and day out to our customers who have recognized the need to
have a tool for use within their organization for better and efficient collaboration. We
talk to customers who have done implementations of proprietary software, and have... Codes and Ciphers: Julius Caesar, the Enigma, and the Internet For at least two thousand years there have been people who wanted to
send messages which could only be read by the people for whom they
were intended. When a message is sent by hand, carried from the sender
to the recipient, whether by a slave, as in ancient Greece or Rome, or by
the Post Office today, there is a risk of it...
Inquiring Organizations: Moving From Knowledge Management To Wisdom Inquiring Organizations: Moving from Knowledge Management to Wisdom assembles into one volume a comprehensive collection of the key current thinking regarding the use of C. West Churchman's Design of Inquiring Systems as a basis for computer-based inquiring systems design and implementation. Inquiring systems are systems that go beyond knowledge...
|Result Page: 21 20 19 18 17 16 15 14 13 12 |