p19velcdebf7u19t0fs1p5dr7c6.jpg
James Kaplan, a principal in McKinsey’s New York office and one of the authors of Wiley & Sons’ “Beyond Cybersecurity: Protecting Your Digital Business,” recently posted a list of the books that influenced him as a business technologist. The list, with some of his comments on the books, follows.
p19velcgll1ksn1psb1dm1121c1d667.jpg

Code: The Hidden Language of Computer Hardware and Software, by Charles Petzold

“I don’t have a background in electrical engineering, and this book helped me get beneath the logical to the physical layers in the stack…. Having read this book, you won’t be able to design circuits, but you’ll be able to understand how circuits get designed.” --Kaplan
p19velcj23pb8clea7kcdt9ph8.jpg

Accidental Empires: How the Boys of Silicon Valley Make Their Millions, Battle Foreign Competition, and Still Can’t Get a Date, by Robert X. Cringely

“Yes, Cringely touches on some many-told tales, but he also delves into aspects of the technology industry that few talk about. Just one example: how Microsoft [built] a ‘software factory’ that hired thousands of inexperienced computer-science majors to build the world-conquering applications of the 1980s and 1990s.” --Kaplan
p19velcogj3leg21hap62g1t5b9.jpg

The Reckoning, by David Halberstam

“Why is this an important technology book? Because it provides a cautionary tale of many of the pitfalls business technologists must avoid.” --Kaplan
p19velcr4362f178v1tqg1bhi5q8a.jpg

The Visual Display of Quantitative Information, by Edward Tufte

“Think of a newspaper front page. You can scan all the headlines, then look at the sub-headlines for interesting articles, and then decide whether to read the first few paragraphs. Fortunately, the same type of layered structure can be used to communicate the business case for new initiative or project.” --Kaplan
p19velctg3htu11h1m7iulgogab.jpg

Military Power: Explaining Victory and Defeat in Modern Battle, by Stephen Biddle

“Breakthrough value in business technology seems to depend on how organizations can employ people and technology in a coherent and consistent fashion. One could even ask if there’s a ‘modern system’ for enterprise IT that combines agile, lean, service orientation, and other practices.” --Kaplan
p19velcvni8c6li61mbqmp11lmcc.jpg

A Fiery Peace in a Cold War: Bernard Schriever and the Ultimate Weapon, by Neil Sheehan

“A Fiery Peace in a Cold War provides fascinating insights into how … Schriever and his team convinced the Eisenhower administration to bet on a generational leap from bombers to missiles." --Kaplan
p19veld1urdkb1t946klfl5tq1d.jpg

Why the Allies Won, by Richard Overy

“Any IT executive who has argued that his or her servers must be configured just so should read the passages comparing how the Red Army deployed a few types of trucks and tanks at scale, even as Wehrmacht infighting resulted in a hard-to-maintain array of vehicles.” --Kaplan
p19veld3urkbe3ds1jv92a73te.jpg

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, by Cliff Stoll

“It provides an invaluable reminder that protecting sensitive information depends far more on the ability to ask intelligent questions than on the latest and most loudly promoted security tools.” –Kaplan
p19veld63r1os876hekp1vtl24ff.jpg

Show Stopper! The Breakneck Race to Create Windows NT and the Next Generation at Microsoft, by G. Pascal Zachary

“Zachary’s book provides an all-but-unique window into the mechanics of a complicated, expensive, multiyear development effort.” --Kaplan
p19veldehr5sg1jbj1ufi1hopa15g.jpg

Racing the Beam: The Atari Video Computer System, by Nick Montfort and Ian Bogost

“Montfort and Bogost’s … creativity and problem solving is an inspiration to technologists struggling to deliver compelling user experiences with today’s far more advanced platforms.” --Kaplan
p19veldkjj1f6510ua1ibcoqg1r1jh.jpg