Feeds

How to stuff all of Silicon Valley in a stocking

The ultimate geek gift

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Exclusive Are you a geek? Do you have a geek in your family? Yes, I thought so.

Well, why not warm your heart or someone else's this holiday season by buying my new book - Geek Silicon Valley. See, there's Geek right there in the title.

The various blurbs about my tome floating around the internet portray the book as a guide book to Silicon Valley. And, in may ways, it is.

The book, however, goes way beyond detailing nice places to eat and drink or where to find the birthplace of the microprocessor industry. It provides a rich history of how Silicon Valley became what it is, starting way back at the turn of last century when electronics and radio pioneers got their start in the region.

I'm rather proud to admit that the book has been heralded as a fantastic toilet read. You get easy to digest sections about Intel, Google, Sun Microsystems, HP and Apple. (That's right Mac fans. Prove your love to Steve.) Beyond that, there's more bits on the history of Fairchild Semiconductor, Lawrence Livermore National Lab, the Computer History Museum, NASA Ames and the list goes on and on.

If it's idle Valley gossip that you're after, then the book takes care of you as well. I tell you what restaurants Intel used to sweep for bugs before board meetings and where Bono likes to dine when he's in town.

All told, this book should appeal to three sorts of people - those of you with pulses, those of you with a historical bent and technophiles. I also happen to think the book stands as a great primer for new people coming to Silicon Valley. So large companies, start-ups and PR firms should buy a ton of these and hand them out to new workers. That goes for SMBs as well. Go on. Do it.

Best of all, it doesn't matter whether you live out here or not. Geek Silicon Valley will enrich the mind of anyone interested in technology.

Is the book fully-integrated? Does it have an AJAX WSDL? Has it been vetted by a standards body such as AGRTAINEIENMS? Yes, yes and yes.

What else can you ask for?

Anywho, you can purchase the book at many bookstores around the globe or at, say, Amazon US, Amazon UK and the Reg bookshop.

I'm happy to answer any questions you might have about this stellar work. Just click the link. You can also check out my creds here.

For the price of three cups of coffee, you can make an African very happy these holidays. Show your spirit.

Here ends the verbose, shameless self-promotion. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.