Computer Hardware
-
-
After Steve
- How Apple Became a Trillion-Dollar Company and Lost its Soul
- Auteur(s): Tripp Mickle
- Narrateur(s): Will Damron
- Durée: 14 h et 42 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Steve Jobs called Jony Ive his “spiritual partner at Apple.” The London-born genius was the second-most powerful person at Apple and the creative force who most embodies Jobs’s spirit, the man who designed the products adopted by hundreds of millions the world over: the iPod, iPad, MacBook Air, the iMac G3, and the iPhone.
-
-
Intersting, but a lot of suposition
- Écrit par Kyle le 2022-10-09
-
After Steve
- How Apple Became a Trillion-Dollar Company and Lost its Soul
- Narrateur(s): Will Damron
- Durée: 14 h et 42 min
- Date de publication: 2022-05-03
- Langue: Anglais
-
Steve Jobs called Jony Ive his “spiritual partner at Apple.” The London-born genius was the second-most powerful person at Apple and the creative force who most embodies Jobs’s spirit, the man who designed the products adopted by hundreds of millions the world over....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,28$ ou 1 crédit
Prix réduit: 37,28$ ou 1 crédit
-
-
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Auteur(s): Aaron Blum, Kevin Dillon, Brendan Egan, Autres
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day. This trend isn't just specific to households - it exists at companies, government entities, and virtually every organization and establishment around the world, including in developing countries. This has created a massive electronic waste issue, which is the largest growing stream of solid waste in the world.
-
The Insecurity of Everything
- How Hardware Data Security Became the Biggest Issue Facing the World Today
- Narrateur(s): James Osborn
- Durée: 6 h et 1 min
- Date de publication: 2021-10-07
- Langue: Anglais
-
Just 30 years ago, the average household only had a few electronics consisting of a television, landline phones, and appliances. Fast forward to today, and the average household has over four times this number, and it continues to grow by the day....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 25,00$ ou 1 crédit
Prix réduit: 25,00$ ou 1 crédit
-
-
-
Cyber Hacking
- Wars in Virtual Space
- Auteur(s): Scientific American
- Narrateur(s): George Newbern
- Durée: 4 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. Next, we take a broad look at issues of privacy and the technology used to gather and track personal information.
-
Cyber Hacking
- Wars in Virtual Space
- Narrateur(s): George Newbern
- Durée: 4 h et 50 min
- Date de publication: 2020-07-14
- Langue: Anglais
-
In Cyber Hacking: Wars in Virtual Space, we peer behind the cyber curtain. First, we look at the hackers - who they are, how they work, their motivations, and methods. The opening article examines hardware - specifically microprocessors and why they are vulnerable to tampering....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 15,10$ ou 1 crédit
Prix réduit: 15,10$ ou 1 crédit
-