Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wikipedia Revolution, The: How a Bunch of Nobodies Created the World's Greatest Encyclopedia

Buy
"Imagine a world in which every single person on the planet is given free access to the sum of all human knowledge. That's what we're doing."

--Jimmy Wales

With more than 2,000,000 individual articles on everything from Aa! (a Japanese pop group) to Zzyzx, California, written by an army of volunteer contributors, Wikipedia is the #8 site on the World Wide Web. Created (and corrected) by anyone with access to a computer, this impressive assemblage of knowledge is growing at an astonishing rate of more than 30,000,000 words a month. Now for the first time, a Wikipedia insider tells the story of how it all happened--from the first glimmer of an idea to the global phenomenon it's become.

Andrew Lih has been an administrator (a trusted user who is granted access to technical features) at Wikipedia for more than four years, as well as a regular host of the weekly Wikipedia podcast. In The Wikipedia Revolution, he details the site's inception in 2001, its evolution, and its remarkable growth, while also explaining its larger cultural repercussions. Wikipedia is not just a website; it's a global community of contributors who have banded together out of a shared passion for making knowledge free.

Featuring a Foreword by Wikipedia founder Jimmy Wales and an Afterword that is itself a Wikipedia creation.

From the Author

Andrew Lih was an academic in new media and journalism for ten years, at Columbia University and Hong Kong University. He has been a commentator on new media, technology, and journalism issues on CNN, MSNBC, and NPR. Lih is based in Beijing.

(HTML tags aren't allowed.)

Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Seismic Wave Theory
Seismic Wave Theory
Perfect for senior undergraduates and first-year graduate students in geophysics, physics, mathematics, geology and engineering, this book is devoted exclusively to seismic wave theory. The result is an invaluable teaching tool, with its detailed derivations of formulas, clear explanations of topics, exercises along with selected answers, and an...
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
The Asia Simulation Conference 2006 (JSST 2006) was aimed at exploring challenges in methodologies for modeling, control and computation in simulation, and their applications in social, economic, and financial fields as well as established scientific and engineering solutions. The conference was held in Tokyo from October 30 to November 1, 2006,...
Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy