Connect to the Net In Children's Classic

The Way Things Work 2.0 is an Internet-enhanced version of the multimedia interpretation of David Macaulay's classic book.

Contests, free downloads and more will be featured on a new "Mammoth" Web site that will be hyperlinked directly from the program. Students can now meet Macaulay online, and join other young would-be inventors for fun and learning.

Single versions of The Way Things Work 2.0 include Inventions, a DK Pocket book. DK Multimedia, New York, NY, (212) 213-4800, www.dk.com. WM

Featured

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    Cloud Security Auditing Tool Uses AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has unveiled a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • laptop with a neural network image, surrounded by books, notebooks, a magnifying glass, a pencil cup, and a desk lamp

    D2L Updates Lumi with Personalized Study Supports

    Learning platform D2L has introduced new artificial intelligence features for D2L Lumi that help provide more personalized study supports for students.

  • cloud with binary code and technology imagery

    Hybrid and AI Expansion Outpacing Cloud Security

    A survey from the Cloud Security Alliance and Tenable finds that rapid adoption of hybrid, multi-cloud and AI systems is outpacing the security measures meant to protect them, leaving organizations exposed to preventable breaches and identity-related risks.