It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Practical engineering ebooks that cover areas of electrical engineering, materials science, information security, communications, radar, remote sensing, and other areas of emerging technology. [2000-2018]
Full text of every article ever published by the Association for Computing Machinery (ACM) and bibliographic citations from major publishers in computing. [1954 - present]
Provides full-text access to journals, magazines, transactions, conference proceedings and newsletters published by the ACM (Association of Computing Machinery). Includes most historical and all current publications.
An interdisciplinary search through 22 of the the social sciences indexes on the ProQuest platform.
An interdisciplinary metasearch through 22 of the the social sciences indexes on the ProQuest platform. Includes EconLit, International Bibliography of the Social Sciences (IBSS), Linguistics and Language Behavior Abstracts, PAIS, PsycInfo, Sociological Abstracts, Worldwide Political Science Abstracts and more.
Online collection of over 40,000 ebooks, computer manuals, videos, case studies, and learning paths from O'Reilly and other technical book publishers Note: Berkeley users may access this resource by selecting our institution "University of California, Berkeley" and logging in with CalNet. Members of the public (walk-in users) should ask the Reference Desk for assistance accessing this resource.
Includes content from O'Reilly, Addison-Wesley, HarperCollins, Manning, New Riders, Pearson, Prentice Hall, and other technical and business publishers. Includes over 30,000 hours of instructional video content.
SAGE Research Methods’ coverage spans the full range of research methods used in the social and behavioral sciences, plus a wide range of methods commonly used in science, technology, medicine, and the humanities.
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that are strong and true. It begins with maps, diagrams, and charts -- but must push further than dry defaults to be truly effective. How do we attract attention? How can we offer audiences valuable experiences worth their time? How can we help people access complexity? Dark and mysterious, but full of potential, data is the raw material from which new understanding can emerge. Become a hero of the information age as you learn how to dip into the chaos of data and emerge with new understanding that can entertain, improve, and inspire. Whether you call the craft data storytelling, data visualization, data journalism, dashboard design, or infographic creation -- what matters is that you are courageously confronting the chaos of it all in order to improve how people see the world. Info We Trust is written for everyone who straddles the domains of data and people: data visualization professionals, analysts, and all who are enthusiastic for seeing the world in new ways.
From visionary Silicon Valley entrepreneur Tom Siebel comes a penetrating examination of the new technologies that are disrupting business and government--and how organizations can harness them to transform into digital enterprises. The confluence of four technologies--elastic cloud computing, big data, artificial intelligence, and the internet of things --writes Siebel, is fundamentally changing how business and government will operate in the 21st century. Siebel masterfully guides readers through a fascinating discussion of the game-changing technologies driving digital transformation and provides a roadmap to seize them as a strategic opportunity. He shows how leading enterprises such as Enel, 3M, Royal Dutch Shell, the U.S. Department of Defense, and others are applying AI and IoT with stunning results. Digital Transformation is the guidebook every business and government leader needs to survive and thrive in the new digital age.
The continuous evolution of internet and related social media technologies and platforms have opened up vast new means for communication, socialization, expression, and collaboration. They also have provided new resources for researchers seeking to explore, observe, and measure human opinions, activities, and interactions.
How we lost control of the internet--and how to win it back. The internet has become a battleground. Although it was unlikely to live up to the hype and hopes of the 1990s, only the most skeptical cynics could have predicted the World Wide Web as we know it today: commercial, isolating, and full of, even fueled by, bias. This was not inevitable. The Gentrification of the Internet argues that much like our cities, the internet has become gentrified, dominated by the interests of business and capital rather than the interests of the people who use it.
Drawing on research from multiple disciplines and international case studies, this book provides a comprehensive and up-to-date understanding of online disinformation and its potential countermeasures. Disinformation and Manipulation in Digital Media presents a model of the disinformation process which incorporates four cross-cutting dimensions or themes: bad actors, platforms, audiences, and countermeasures. The dynamics of each dimension are analysed alongside a diverse range of international case studies drawn from different information domains including politics, health, and society.
This book surveys and examines the most famous philosophical arguments against building a machine with human-level intelligence. From claims and counter-claims about the ability to implement consciousness, rationality, and meaning, to arguments about cognitive architecture, the book presents a vivid history of the clash between the philosophy and AI.
Off-campus users are prompted to login via CalNet for online resources from library sites, including OskiCat and guides. Install the EZproxy bookmarklet to jump to the Cal login site when you encounter licensed library resources via Google or the open web.
VPN (Virtual Private Network)
Install the VPN client software on your computer. Open and connect to the "Library VPN" to establish a secure connection with the campus network each time you want to access any library-licensed resources.
A guide to library resources that allow some kind of support for text analysis applications. New
The UC Berkeley Library maintains a research-level collection of materials which support the research and teaching programs of the School of Information (I School). The I School is a graduate research and education community "committed to expanding access to information and to improving its usability, reliability, and credibility while preserving security and privacy. This requires the insights of scholars from diverse fields—information and computer science, design, social sciences, management, law, and policy."
Photo credit: Berkeley, South Hall (in 1961, now home of the I School) by Roger Wollstadt on Flickr.