The ultimate compendium of growth hacks for the modern digital marketer, written by marketing veterans Jeff Goldenberg (Head of Growth at Borrowell and TechStars Mentor) and Mark Hayes (CEO of Rocketshp, and founder of one of the world's first growth hacking agencies). Are you ready to skyrocket your companies growth? Learn, the most effective tools, software and technology for digital and startup marketers; 100 must-know growth hacks to take your business to the next level (focusing on 3 key areas: product-market fit, transition to growth and scale); Insider info from leading startups whocasing the best growth hacks and exactly how they did it.
Learn to scale your startup with a roadmap to the all-important part of the business lifecycle between launch and IPO In The Builder’s Guide to the Tech Galaxy: 99 Practices to Scale Startups into Unicorn Companies, a team of accomplished investors, entrepreneurs, and marketers deliver a practical collection of concrete strategies for scaling a small startup into a lean and formidable tech competitor. By focusing on the four key building blocks of a successful company – alignment, team, functional excellence, and capital—this book distills the wisdom found in countless books, podcasts, and the authors’ own extensive experience into a compact and accessible blueprint for success and growth. In the book, you’ll find: Organizational charts, sample objectives and key results (OKRs), as well as guidance for divisions including technology and product management, marketing, sales, people, and service operations Tools and benchmarks for strategically aligning your company’s divisions with one another, and with your organization’s “North Star” Templates and tips to attract and retain a triple-A team with the right scale-up mindset Checklists to help you attract growth capital and negotiate term sheets Perfect for companies with two, ten, or one hundred employees, The Builder’s Guide to the Tech Galaxy belongs on the bookshelves of founders, managers, entrepreneurs, and other business leaders exploring innovative and proven ways to scale their enterprise to new heights.
The ultimate book on the worldwide movement of hackers, pranksters, and activists collectively known as Anonymous—by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets” “A work of anthropology that sometimes echoes a John le Carré novel.” —Wired Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book. The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”
Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely on intensely complex mathematical analyses and artificial examples, making it inaccessible to anyone without a strong mathematical background. Now, though, Cameron Davidson-Pilon introduces Bayesian inference from a computational perspective, bridging theory to practice–freeing you to get results using computing power. Bayesian Methods for Hackers illuminates Bayesian inference through probabilistic programming with the powerful PyMC language and the closely related Python tools NumPy, SciPy, and Matplotlib. Using this approach, you can reach effective solutions in small increments, without extensive mathematical intervention. Davidson-Pilon begins by introducing the concepts underlying Bayesian inference, comparing it with other techniques and guiding you through building and training your first Bayesian model. Next, he introduces PyMC through a series of detailed examples and intuitive explanations that have been refined after extensive user feedback. You’ll learn how to use the Markov Chain Monte Carlo algorithm, choose appropriate sample sizes and priors, work with loss functions, and apply Bayesian inference in domains ranging from finance to marketing. Once you’ve mastered these techniques, you’ll constantly turn to this guide for the working PyMC code you need to jumpstart future projects. Coverage includes • Learning the Bayesian “state of mind” and its practical implications • Understanding how computers perform Bayesian inference • Using the PyMC Python library to program Bayesian analyses • Building and debugging models with PyMC • Testing your model’s “goodness of fit” • Opening the “black box” of the Markov Chain Monte Carlo algorithm to see how and why it works • Leveraging the power of the “Law of Large Numbers” • Mastering key concepts, such as clustering, convergence, autocorrelation, and thinning • Using loss functions to measure an estimate’s weaknesses based on your goals and desired outcomes • Selecting appropriate priors and understanding how their influence changes with dataset size • Overcoming the “exploration versus exploitation” dilemma: deciding when “pretty good” is good enough • Using Bayesian inference to improve A/B testing • Solving data science problems when only small amounts of data are available Cameron Davidson-Pilon has worked in many areas of applied mathematics, from the evolutionary dynamics of genes and diseases to stochastic modeling of financial prices. His contributions to the open source community include lifelines, an implementation of survival analysis in Python. Educated at the University of Waterloo and at the Independent University of Moscow, he currently works with the online commerce leader Shopify.
Written with the verve of such works as The Big Short, The History of the Future, and The Spider Network, here is the fascinating, true story of the rise of Ethereum, the second-biggest digital asset in the world, the growth of cryptocurrency, and the future of the internet as we know it. Everyone has heard of Bitcoin, but few know about the second largest cryptocurrency, Ethereum, which has been heralded as the "next internet." The story of Ethereum begins with Vitalik Buterin, a supremely gifted nineteen-year-old autodidact who saw the promise of blockchain when the technology was in its earliest stages. He convinced a crack group of coders to join him in his quest to make a super-charged, global computer. The Infinite Machine introduces Vitalik’s ingenious idea and unfolds Ethereum’s chaotic beginnings. It then explores the brilliant innovation and reckless greed the platform—an infinitely adaptable foundation for experimentation and new applications—has unleashed and the consequences that resulted as the frenzy surrounding it grew: increased regulatory scrutiny, incipient Wall Street interest, and the founding team’s effort to get the Ethereum platform to scale so it can eventually be accessible to the masses. Financial journalist and cryptocurrency expert Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how this new foundation for the internet will spur both transformation and fraud—turning some into millionaires and others into felons—and revolutionize our ideas about money.
Features the book, "The Hacker Crackdown," by Bruce Sterling. Includes a preface to the electronic release of the book and the chronology of the hacker crackdown. Notes that the book has chapters on crashing the computer system, the digital underground, law and order, and the civil libertarians.
Based on his work at some of the world's largest companies, including Ford, Adidas, and Chanel, Christian Madsbjerg's Sensemaking is a provocative stand against the tyranny of big data and scientism, and an urgent, overdue defense of human intelligence. Humans have become subservient to algorithms. Every day brings a new Moneyball fix--a math whiz who will crack open an industry with clean fact-based analysis rather than human intuition and experience. As a result, we have stopped thinking. Machines do it for us. Christian Madsbjerg argues that our fixation with data often masks stunning deficiencies, and the risks for humankind are enormous. Blind devotion to number crunching imperils our businesses, our educations, our governments, and our life savings. Too many companies have lost touch with the humanity of their customers, while marginalizing workers with liberal arts-based skills. Contrary to popular thinking, Madsbjerg shows how many of today's biggest success stories stem not from "quant" thinking but from deep, nuanced engagement with culture, language, and history. He calls his method sensemaking. In this landmark book, Madsbjerg lays out five principles for how business leaders, entrepreneurs, and individuals can use it to solve their thorniest problems. He profiles companies using sensemaking to connect with new customers, and takes readers inside the work process of sensemaking "connoisseurs" like investor George Soros, architect Bjarke Ingels, and others. Both practical and philosophical, Sensemaking is a powerful rejoinder to corporate groupthink and an indispensable resource for leaders and innovators who want to stand out from the pack.
WHAT VALUABLE COMPANY IS NOBODY BUILDING? The next Bill Gates will not build an operating system. The next Larry Page or Sergey Brin won’t make a search engine. If you are copying these guys, you aren’t learning from them. It’s easier to copy a model than to make something new: doing what we already know how to do takes the world from 1 to n, adding more of something familiar. Every new creation goes from 0 to 1. This book is about how to get there. ‘Peter Thiel has built multiple breakthrough companies, and Zero to One shows how.’ ELON MUSK, CEO of SpaceX and Tesla ‘This book delivers completely new and refreshing ideas on how to create value in the world.’ MARK ZUCKERBERG, CEO of Facebook ‘When a risk taker writes a book, read it. In the case of Peter Thiel, read it twice. Or, to be safe, three times. This is a classic.’ NASSIM NICHOLAS TALEB, author of The Black Swan
Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment. Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail. As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.
Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Smart contracts are an innovative application of blockchain technology. Acting as decentralized custodians of digital assets, they allow us to transfer value and information more effectively by reducing the need to trust a third party. By eliminating the need for intermediaries, smart contracts have the potential to massively scale the world economy and unleash the potential for faster and more efficient solutions than traditional systems could ever provide. But there's one catch: while blockchains are secure, smart contracts are not. Security vulnerabilities in smart contracts have led to over $250 million USD in value to be lost or stolen. For smart contract technology to achieve its full potential, these security vulnerabilities need to be addressed. Written by security experts at the forefront of this dynamic industry, this book teaches state-of-the-art smart contract security principles and practices. Help us secure the future of blockchain technology and join us at the forefront today!