Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Sunday, July 8, 2007

Court Rules on Alaska Joe & His "Bong Hits 4 Jesus." Banner



“Bong Hits 4 Jesus” is a meaningless expression, idiotic, and was first thought of by an 18-year old high school senior. But that does not mean that a high schooler can say it anymore.


High school senior Joe Frederick held up a banner with the inane words in 2002 but a decision by the Supreme Court limited student free-expression rights in public schools.


The banner with the infamous “Bong” message was held aloft while students and faculty were gathered to watch the Olympic torch pass by his school in Juneau, Alaska.


Unfortunately for Mr. Frederick, the principal, Deborah Morse, asked him to take the banner down, and Frederick refused. Morse believed the message was a promotion of illegal drugs in violation of school policy and the Court has ruled against students advocating drug use. She confiscated the banner and later suspended Frederick for 10 days. Frederick sued.


With this decision, the Court sided with the principal.


In a concurring opinion, Justice Samuel Alito underscores the narrow scope of the decision, claiming as he does, that the ruling does not restrict the right of students to comment on political or social issues, including debates about drug laws.


On the other hand, the dissent, written by Justice John Paul Stevens and joined by Justices David Souter and Ruth Bader Ginsburg, describes the decision as a “ham-handed, categorical approach” that is “deaf to the constitutional imperative to permit unfettered debate, even among high school students, about the wisdom of the war on drugs or of legalizing marijuana for medicinal use.”


This is a bad decision which restricts unfettered, public free speech by juveniles.


In an odd twist, if the banner had stated, "Wine Sips 4 Jesus," Frederick could have been interpreted as promoting an illegal drug (alchohol) for minors, or, he could be advocating imbibing sacramental wine, as in a Roman Catholic Mass. Should he be restricted in discussing another element or, more troubling, have another freedom, the exercise of religion, restricted?


The decision is in very troubling waters for freedom of expression. The Court's ruling more narrowly limits the free-speech decision in Tinker v. Des Moines, the test for virtually all student speech cases since 1969.


Regardless if Frederick was referring to a song, "Bonghits For Jesus" written by a band, Twice Baked in the 1990's, or, as he claimed it was a meaningless statement, I wouldn't want to see artists limited by a Court ruling in any case.

Saturday, July 7, 2007

"I'm gonna' find her," "Searchin,'" The Coasters, 1957



I noted the other day about a search that is new to me, Mahalo, that has interesting possibilities. In addition, if you are in the market for new search engines, as a supplement to what most people seem to be using, Google, you may want to consider Kartoo, Kooltorch or Clusty.


My old standby is Dogpile--not Google--but Maholo promises a pleasant new search experience because of its utility in UI (user interface) and most searches. If it can attain the stated 2007 goal of 10,000 data entries, it will be worth another look.


Kartoo has respectable results but I am not a convert to the interface. KoolTorch is a bit awkward to use even after I tried it a few times, and I am not convinced that the results are as good as they could be.


In the meantime, I'll be using Clusty more since it is made for researchers, is handy for my usual deep searching, and the extra feature to customize results is attractive. Finally, Clusty also has a convenient "Clustybar" add-on that is handy for my typical Firefox browsing.





BTW, I checked the lyrics of Searchin' on, you guessed it, good 'ole dogpile. Besides, I really like their dog graphics.

Life is bleaker in Iraq


The BBC World Service is monitoring the extra 30,000 U.S. troops deployed in Iraq since the launch of the "surge" in February. The criteria monitored are the effects, week by week, by looking at military casualty figures, the pressure on hospitals and quality of life for ordinary civilians.


The analysis is based on figures from U.S. and Iraqi authorities, Baghdad's hospitals and three families from different neighbourhoods in the capital.


Their analysis concludes that conditions are generally worse despite the recent efforts of U.S. to improve conditions.

Friday, July 6, 2007

"Danger! Danger! Will Robinson"




A news story by Computerworld announces the realization of what was only a dream in the '60s TV Show, Lost in Space, by reporting that IRobot Corporation debuts a prototype of a remote-controlled robot armed with a Taser electroshock weapon for military or law enforcement.


This release is in line with the increasingly sophisticated use of robotics such as the Predator which has developed tremendously in the conflict in Iraq after the rather bumbling attempts to nab or eliminate Osama Bin-Laden in Afghanistan. Richard Clarke, former White House anti-terror advisor, testified before the 9/11 Commission about the efforts to use the Predator drone effectively.


Visibility by the remote operator is key which proved to be a liability in early deployments of the Predator.


The new device carries a camera mounted on a 12-inch mast. The camera is capable of tilting and rotating to provide greater visibility to its operator during scouting missions.


This new small hybrid machine is based on Burlington, Massachusetts based iRobot's Pentium-based PackBot Explorer robot. The innovation here is to add a Taser X26 stun gun to the robot, that was developed jointly by iRobot and Taser International Inc.


If an IED is going to blow up in Iraq, better one of these babies than a soldier: language warning.


The Predator is effectively deployed in Iraq.

Thursday, July 5, 2007

Why Johnny Can't Shoot


Johnny can shoot who he wants to in the Insurgency game. He can mow down Americans at will if he (or she) chooses as illustrated (click on it for a better look) in one of the screenshots for the game.


The game manual states:

If your play style is more geared towards using real tactics, teamwork, communication, and personal skill, then the Conventional teams will likely be your favorite. If you just want to get into the action and have some fun, grab your AK47 or RPG and let loose as a Guerrilla or Paramilitary fighter. . . .


Engage in urban warfare where every window, doorway or road block is a potential ambush point and every object on the street needs to be watched with care. Fight against the occupation from behind windows and burned cars, with your finger on the trigger and an unsuspecting patrol down the street getting ever closer. Whatever you choose to do, Insurgency is sure to get your pulse racing and make your breathing feel heavy while you engage in such a unique and original combat experience.





Re-up!


Graph showing the percentage of and where foreign born soldiers come from to serve in the U.S. military.


600 soldiers re-enlisted in the United States military and were naturalized on the 4th of July at Camp Victory in Baghdad. Currently, the number of foreign born in the military is consistent with historical precedent. According to Emilio T. González, director of US Citizenship and Immigration Services (USCIS), the foreign born composed half of all military recruits by the 1840s and constituted 20 percent of the 1.5 million servicemen in the Union Army during the Civil War.


Even more revealing is considering that of these 600 soldiers re-enlisting, they come from 54 nations, they are aged 19 - 51 years old, and they include at least one Palestinian refugee.


The re-enlistees are sounding like a coalition force.

Hawaii 10,000








Mahalo expects to obtain 10,000 query results for search terms by the end of this year. How? By using results hand-picked by humans according to a report in the Wall Street Journal.

Wednesday, July 4, 2007

Unity & Freedom: Terrorist? Sunni? Shi'i? Iraqi?

In the video an Iraqi is kidnapped by terrorists and asked at gunpoint if he is Sunni or Shi'i. "I am Iraqi" he finally answers.


N.B: This anti-terrorist video from Al Arabiya is funded by the Saudi government: this is not for the faint of heart.


Tuesday, July 3, 2007

Thought Experiment: Imagine a World Without America



The world without America is something to think about. Let's think a bit more on the 4th of July.

Made in China



China is the number one place for malicious software and spam.



"In June, some 40% of malicious software worldwide originated from Beijing, nearly doubling from 21% in May," said Simon Heron, managing director for security vendor Network Box Corp.


Beijing retained the number one spot for malware, followed by Wattleup, Australia, at 3.7%, and Madrid, at 2.5%, according to Network Box.


I wonder what else there is in Wattleup?

Pandemic Planning Runs Afowl in the U.S.

Update: "Power companies include IT in disaster planning: Experts confer at this week's World Conference on Disaster Management


July 11, 2007 (Computerworld Canada) -- Given the Severe Acute Respiratory Syndrome (SARS) outbreak in 2002, the idea that companies should prepare their IT systems for what health officials have warned will be an influenza pandemic isn't so far-reaching.


And, the original post is:


A Gartner Inc. analyst, Ken McGee, stated that despite a bird-flu threat most IT companies "simply would not be ready" for disruptions according to a ComputerWorld report.


The World Health Organization (WHO) reported statistics on confirmed human cases of the Avian flu (H5N1) virus since 2003. The WHO recorded in 2006 that 79 people died from avian flu. This year, there have been 33 deaths.


If an avian influenza virus combines with a human influenza virus the new subtype created could be both highly contagious and highly lethal in humans. A likely scenario is a global influenza pandemic, similar to the Spanish Flu, or the lower mortality pandemics such as the Asian Flu and the Hong Kong Flu.


In May 2005, scientists urgently call nations to prepare for a global influenza pandemic that could strike as much as 20% of the world's population but this warning has largely been ignored.


To be clear, the avian flu cannot yet be categorized as a "pandemic" because the virus cannot yet cause sustained and efficient human-to-human transmission; the reported cases are recognized to have been transmitted from bird to human, but as of December 2006 there have been very few (if any) cases of proven human-to-human transmission.


On the other hand, if the avian flu imitates the "Spanish flu" of 1918–1919, it could spread to become a world-wide pandemic on all continents, unusually deadly and virulent as the 1918-19 event. Within 18 months the pandemic petered out but before doing so, in six months, 25 million people died: some estimates put the total of those killed worldwide at over twice that number. An estimated 500,000 died in the United States alone.



We are not ready for another 1918-19 event.

Monday, July 2, 2007

The French Want to "Berry" the Canadians


You have to hand it to the French. They are right on top of every international threat to their way of life. The Washington Post and Le Monde reported--I wouldn't make this up--carried a story dated 21 June 2007 that the French General Secretariat for National Defense has banned the use of BlackBerrys inside the presidential palace and government ministries.


Why?


BlackBerry data passes through servers in the United States and Britain.


Uhh, France, although the data may pass through those troublesome countries such as the U.S. and Britain, keep in mind that Research In Motion Limited (RIM) (TSX: RIM, NASDAQ: RIMM) is a Canadian wireless device company: RIM is headquartered in Waterloo, Ontario.


Once the lovely Canadians are suspected as international threats it is time to pack it in.


Rock on RIM!


The French seem to epitomize untruths as a part of their national character and they suspect anyone who is straightforward.


"Truths!" Charles de Gaulle is supposed to have shouted. "Did you think I could have created a (Free French) government against the English and the Americans with truths? You make History with ambition, not with truths," quoted in Thierry Pfister, "Lettre Ouverte aux Gardiens du Mensonge" (Open Letter to the Keepers of the Lie), Albin Michel, 1999.


Sunday, July 1, 2007

Lugar Senate Floor Speech Calls for Course Change in Iraq

Richard Lugar (R-Indiana) is basically correct on one point: Iraqis Don’t Want to Be Iraqis.


To make the point more directly I would argue that there is no Iraq. There never was. The world is still paying the price of the October 3rd 1932 decision to create Iraq under King Faisal.


The historical fiction that is Iraq is common to newer nations:


Common Themes in New Nations


Borders drawn by European colonial powers left nations with diverse religions and ethnic groups.


Ethnic and religious conflicts brought instability.


Military coups, one-party systems, and dictatorships kept some countries from achieving democracy.


Citizens and foreign lenders have forced former dictatorships to hold elections and transition to democracy.


Natural resources such as oil have been a source of wealth for some nations but have fueled conflicts.

Friday, June 29, 2007

Is the Internet Replacing TV?




In a significant development the Internet is on the cusp of surpassing TV as an "essential medium" for Americans according to a poll announced on 28 June 2007 by the Edison Media Research Inc. 33% of Americans selected the Internet as crucial for news and entertainment while TV elicited 36%. Radio could garner only a 17% loyalty and newspapers a distant 10%, according to the Internet and Multimedia 2007 report by the Somerville, N.J.-based market research firm. In 2002, only 20% of U.S. consumers said they preferred the Internet, compared to 39% for TV. The Internet has made significant gains in the intervening time. The survey polled 1,853 telephone interviews conducted in January and February with respondents age 12 and older who were chosen at random. Those polled were representative of the American population.


The point to take away from this survey is to conclude that the Internet has become just as important as television as a source of information and entertainment. While TV has limitations, the Internet may be even more of a handicap. The Net has an advantage in speed and is even more immediate of a medium than TV but the notion of balance, fairness, and depth of thought is even less.


In einer bedeutenden Entwicklung ist das Internet auf der Spitze des Übertreffens von von Fernsehapparat als "wesentliches Mittel" für Amerikaner entsprechend einer Abstimmung, die am Juni 28 2007 durch die Edison Mittel-Forschung Inc. verkündet wird. 33% von Amerikanern wählte das Internet vor, das für Nachrichten und Unterhaltung, während Fernsehapparat, entscheidend ist 36% herausbekam. Radio konnte nur 17% und Zeitungen 10%, entsprechend dem Internet- und Multimedia2007 Report durch das Somerville ansammeln, N.J.-based Marktforschungsunternehmen. 2002 sagte nur 20% von VEREINIGTE STAATEN Verbrauchern, daß sie das Internet bevorzugten, verglichen bis 39% für Fernsehapparat. Das Internet hat bedeutende Gewinne in der intervenierenden Zeit gebildet. Die Übersicht stimmten 1.853 Telefoninterviews ab, die im Januar geleitet wurden und Februar mit Antwortendalter 12 und älteres, wer zufällig gewählt wurden. Abgestimmte die waren Repräsentant der amerikanischen Bevölkerung. Der Punkt, zum von dieser Übersicht wegzunehmen soll feststellen, daß das Internet gerade so wichtig wie Fernsehen als Quelle der Informationen und der Unterhaltung geworden ist. Während Fernsehapparat Beschränkungen hat, kann das Internet sogar mehr eines Handikaps sein. Das Netz hat einen Vorteil in der Geschwindigkeit und ist von einem Mittel als Fernsehapparat sogar sofortiger, aber der Begriff der Balance, der Gerechtigkeit und der Tiefe des Gedankens ist sogar kleiner.

Tuesday, June 12, 2007

Blogs



Blogs are a new way to communicate although many are not read or are dying at the same time. The format is easy to use and not at all like the old days where everything was hard coded. I enjoy participating.

Review of: Establishing and Maintaining Long-Term Human-Computer Relationships


Date: Tue 26-07-2005 02:05 PM


Review Number: 38526


Establishing and maintaining long-term human-computer relationships


Establishing and maintaining long-term human-computer relationships Bickmore T., Picard R. ACM Transactions on Computer-Human Interaction 12(2): 293-327, 2005. Type: Article


The authors investigate the meaning of “human-computer relationship” and present techniques for “constructing, maintaining, and evaluating such relationships.” Their primary conclusion is that they “have motivated the development of relational agents as a new field of research.”


Two particular relational benefits motivate their research: trust and task outcomes (like improved learning) known to be associated with relationship quality. The authors are concerned with evaluating whether agents “establish and maintain long-term social-emotional relationships with their users.” Their experiment with 101 users interacted daily with an exercise adoption system for a month. Compared to an equivalent task-oriented agent the computer based relational agent was trusted
more.


Placing agents on mobile devices could provide a potent combination of relationship building (an ever-present “buddy”) and for behavior change (providing timely and appropriate interventions).


Work should be done regarding the nature of the buddy. Examples of conversational systems such as R2D2 in StarWars and Microsoft Office Assistant (“Clippit”) engendered mixed results: the former was cute and helpful, the latter intrusive and grating. And, there are political and ethical considerations in designing a buddy. Should the buddy be a thing or a neutered object as the two examples above, or perhaps a male, or as in the authors study a female? And, finally as the authors note, in these proactive buddy scenarios, which are monitoring us, raise issues
of privacy and security: with whom do you let it share which pieces of relational or personal information, and how does it earn your trust to do so?

Monday, June 11, 2007

When did the U.S. first commit ground troops to the Middle East?


When did the United States commit to placing ground troops in the Middle East? Did George Bush, Sr., or Jr., invent the doctrine? No.


The Eisenhower Doctrine, a message to Congress on 5 January 1957, was the foreign policy of U.S. President Dwight D. Eisenhower. The doctrine stated that the United States would use armed forces upon request in response to imminent or actual aggression to the United States. The doctrine made it clear that the U.S. would intervene in the Middle East against aggression. George Bush did not invent the doctrine; the Eisenhower Doctrine was U.S. policy for years before Bush.


The military action provisions of the Doctrine were applied in the Lebanon Crisis the following year,
in 1958, when America intervened in response to a request by that country's president.


The more things change, the more things stay the same.

Monday, June 4, 2007

American Hijab: non-American Hijab



Men don't cover themselves in Islam. Men do enforce women covering themselves. Guess who has the problem? Male Muslims. A Bahraini cleric even provides the guidelines on how to properly beat your wife. Or, a girl's actions may result in an "honor" killing.


Women pursued higher education and the professions for well over a hundred years in the West. Isn't it about time for Islam as well? Is there to be a Reformation in Islam? A French Revolution? I suppose if you never had the equivalent of a French Revolution you would tend to be backward: e.g., Olympe de Gouges.


Muslim women are oppressed. I hope there is no need to mention clitorectomies is there? This is exclusively a Muslim phenomenon: Christians, Jews, Buddhists, and Hindus do not practice this in any appreciable numbers. If human beings scar themselves or harm themselves is it any less oppressive because free will and choice is involved? Western law will still intervene in cases of attempted suicide or the harming of one's own person. The discussion of human rights is Western, not Islamist.


In Brasil street children are shot in the struggle for food and basic existence. An unpleasant, although based on a real story is the Brazilian film, City of God (Portuguese: Cidade de Deus), in which this brutal struggle for subsistence occurs. As it happens, City of God is a four-time Academy Award-nominated 2002 Brazilian film. Most of the actors had never acted before, and were, in fact, residents of favelas such as Vidigal and the Cidade de Deus itself. If I had any opportunity at all I would impose my own values, my own culture, and my own Western way of life on behalf of Third World children. Western culture is superior; the Third World values here are inferior.


The U.S. has imposed American values in the Afghan and Iraqi constitutions to require that a specific number of representatives be women. Progress comes slow to Islamism and is in response to Western American pressure. American feminists have not done tangibly as much to liberate women elsewhere.


As diplomats come to the U.S. they should respect American values so as not to offend any of us and wear American flag pins, and Africans and Arabs should remove their own traditional style of dress, in favor of Western attire. American male Muslims adopt Western dress easily, but contradictorily, the removal of the Hijab may be considered an invitation to rape according to Zakir Naik, a male Muslim apologist who often speaks in the U.S. But who would require, and agree, with a ridiculous proposition such as non-Westeners should be required to adopt American dress as an example of `when in Rome, do as the Romans do.' But this is precisely the thinking of a Pelosi who as American politician adopts non-Western dress: gutless.


There is no Arabic equivalent for citizen or democracy. Japan and Germany learned about how democracy really worked following their destruction in a World War. Likewise, some cultures may have to learn how to prosper economically and politically, like Japan and Germany following their defeat, at the hands of Western conquerors.


Please note:
Palestinian Female Suicide Bombers who are heavily covered (not to mention heavily armed).


And, if this is not enough to turn your stomach you can always watch how the children are raised. Small Palestinian children perform while dressed as suicide bombers and terrorists, heavily armed waving guns and knives. The crowd of approving parents waves and applauds the kids. I guess they never heard of baseball. I liked the kid with a doll: and, an assault rifle. All the girls are well-covered though and I suppose that is the important thing. An Islamist generation is coming.

When you are tired, when you are hungry, when you are feeling sorry for yourself, think about someone fighting for freedom.





Wednesday, May 30, 2007

al-Qaeda Slithers to Algeria


Police officers inspect the government palace in Algiers, Algeria, following a car bomb attack on April 11. Mohamed Messara/EPA FILE


The recent suicide bombers in Algeria have all the earmarks of an al-Qaeda operation accoring to counter-terrorism experts. Authorities seem to have uncovered an Iraqi connection once they cracked down on 60 local belligerants in the Saharan city of El Oued. Hamida Ayachi, editor of the Algiers-based daily Djazair News, has noted that contacts between Iraq and Algeria have intensified within the past year.

Who is prepared?

A recent IT study by AT&T ranked U.S. cities for disaster preparedness. In this survey New York and Houston received high marks while the Twin Cities and Cleveland did not.


The results arose from about 1,000 corporate IT managers collectively from 10 cities surveyed.


According to the survey, the rankings were based primarily on three criteria: "the state of a city's business continuity plan; whether the city has adequately educated employees about the plan and installed systems to implement it; and on cybersecurity policies and the use of managed security."

Tuesday, May 29, 2007

China Virus First Strike in Cyberwar

No, this is not today's headline, but, it could be. China's military is investigating their information warfare capabilities.


The Department of Defense (DoD) confirmed that China's military has developed cyberwarfare first-strike capabilities that include units charged with developing viruses to attack enemy computer networks.


In 2005, the People's Liberation Army began to incorporate offensive operations into its exercises, "primarily in first strikes against enemy networks," a DoD report stated.


This is the best level of unclassified American thought on China's capabilities.

MRAP to the rescue?



Like many Americans dismayed with the apparent lack of results in Iraq and the deaths of many fine young people, I've wondered if there is any hope. A reason for optimism is the MRAP (Mine Resistant Ambush Protected Vehicle). The new vehicles provide much improved protection, specifically against Improvised Explosive Devices (IEDs), which cause 70% of all U.S. casualties in Iraq. The IEDs are armor piercing and the MRAP offers some hope that our troops will be better protected. This is a step in the right direction. 58 of the 62 members of the House Armed Services Committee voted on 9 May for a $508.3 billion military authorization bill for fiscal 2008; the MRAP is a part of the new appropriations.


The day after the appropriations, the Pentagon announced plans to phase out its armored Humvees in Iraq and Afghanistan and send in vehicles that better withstand roadside bomb blasts, according to Defense Secretary Robert Gates.


The shift in appropriations means that modernization plans would be put on hold but given the seriousness of our troops vulnerability, this seems like sound planning.


Friday, May 18, 2007

Review: The Tertullian Project, by Roger Pearse

Revno: 000000547224 The Tertullian Project, by Roger Pearse, http://www.tertullian.org/


Date: Sun 29-05-2005 02:46 PM


The Tertullian Project, by Roger Pearse, http://www.tertullian.org/


In the Wikipedia age we live in Choice editors have wisely chosen
resources that seem likely to be of particular use to undergraduate
students. These are sites mostly likely consulted by the search mavens seeking a quick fix for instant info, i.e., our students. If a site is too flighty this is not reliably for our students but by the same token a too specialized site will be of little value at the undergraduate level.


Keeping these guidelines in mind, I evaluated the Tertullian Project. Pearse openly declares his amateur status, however, Pearse has helpfully assembled an impressive amount of work about this second and third century Christian apologist.


The assembler has artfully collected Tertullian references including more difficult to access textual material. In this type of endeavor, we need more enlightened amateurs such as Pearse because of its utility.


There are a variety of subsections dealing with various aspects of Tertullian’s life, writings and modern scholarship. The author has also conveniently ranked the more academic pages from the more light hearted areas. In addition to a brief historical outline on Tertullian the real strength of this compilation is the wealth of resources and information on Tertullian’s writings. The series of online shots of Tertullian’s pages provides a next best experience to dusting off an original text of Tertullian. The pages load quickly and easily which should be adequate even for slow modems and I found the navigation logically arranged.


Although this site is geared towards the seeking to be enlightened reader, there are a number of features that are useful to more advanced readers and specialists. The age of Wikipedia indeed is constructive in that specialists have not done what the Wikipedias have done so quickly and pleasantly.


Im Wikipedia Alter leben wir in den auserlesenen Herausgebern haben gewählt klug Betriebsmittel, die wahrscheinlich scheinen, vom bestimmten Gebrauch zu den Nichtgraduierten Kursteilnehmern zu sein. Diese sind der Aufstellungsorte meistens beraten durch die Suchemavens wahrscheinliches, die eine schnelle Verlegenheit für sofortiges Info d.h. unsere Kursteilnehmer suchen. Wenn ein Aufstellungsort zu flighty ist, ist dieser nicht zuverlässig für unsere Kursteilnehmer, aber aus dem gleichen Grunde ist ein auch fachkundiger Aufstellungsort von wenig Wert auf dem Nichtgraduiertniveau.


Diese Richtlinien im Verstand halten, wertete ich das Tertullian Projekt aus. Pearse erklärt öffentlich seinen laienhaften Status, jedoch hat Pearse hilfreich eine indrucksvolle Menge Arbeit über diesen zweiten und dritten Jahrhundert Christapologet zusammengebaut.


Der Versammlungsteilnehmer hat artfully Tertullian Hinweise einschließlich schwierigeres, Textmaterial zugänglich zu machen gesammelt.


In dieser Art der Bemühung, benötigen wir mehr erleuchtete Bewunderer wie Pearse wegen seines Dienstprogrammes. Es gibt eine Vielzahl der Unterabschnitte, die verschiedene Aspekte des Tertullian's Lebens beschäftigen, Schreiben und moderne Gelehrsamkeit. Der Autor hat auch bequem die akademischeren Seiten vom mehr Licht hearted Bereiche geordnet. Zusätzlich zu einer kurzen historischen umreiß auf Tertullian ist die reale Stärke dieser Kompilation die Fülle der Betriebsmittel und der Informationen über Tertullian?s Schreiben. Die Reihe der on-line-Schüsse der Tertullian's Seiten stellt eine folgende beste Erfahrung zum Abwischen weg von einem ursprünglichen Text von Tertullian zur Verfügung. Die Seiten laden schnell und leicht, die sogar für langsame Modem ausreichend sein sollten und ich fand die Navigation logisch geordnet.


Obgleich dieser Aufstellungsort in Richtung zum Suchen, erleuchteter Leser zu sein übersetzt wird, gibt es eine Anzahl von Eigenschaften, die vorgerücktere Leser und Fachleute nützlich sind. Das Alter von Wikipedia ist in der Tat dadurch konstruktiv, daß Fachleute nicht getan haben, was das Wikipedias so schnell und angenehm getan haben.

Thursday, May 17, 2007

While we slept . . .

One of the most frustrating aspects of understanding our tepid response to Islamism is how America was so slow to react. The distrust between the CIA and the FBI made both agencies less effective and in fact we've made little progress on the IT issues in the meantime. Years after the fact data collection and sharing is still problematic between law enforcement. The handling by law enforcement and political administrations in viewing the original 1993 attack on the World Trade Center as individual criminal issues, and not part of a concerted effort against Western infidels, was wrong-headed. While the American public was dazzled by the O.J. Simpson trial and the Jon Benet Ramsay murder investigation the West was under attack. The blind Sheik Rahman and his fellow terrorists were already conspiring to blow up N.Y. city landmarks and bridges. This nation slept during the Reagan years when we withdrew from Lebanon after the Marine barracks truck bombing right through the Clinton years when we pulled out of Somalia after the downing of a Blackhawk.


It is little wonder that America was viewed as a tepid power. Weakness emboldens the desperate to increase their efforts. The victims on 9/11 paid the price.

Monday, May 14, 2007

The Caliphate


The Times of London notes the increasing importance the al Qaeda-affiliated groups on Iraq are placing on establishing a militant Islamist state in the Sunni regions of Iraq.


In particular, al Qaeda's Islamic State of Iraq emphasizes an important theme, the conquest of specific territory in order to establish the beginnings of God's kingdom on earth.


The jihadists place a physical caliphate on earth. It is to be achieved in conjunction with the divinely-blessed spread of jihad across the globe.


The U.S. military faces insurgents with this conviction and the use of classic Al-Qaeda tactics.

DHS and Privacy vs. Real ID


I have to agree with a privacy committee of the DHS (Department of Homeland Security) assessment: oppose the Real ID bill, which proposes to create a national standard for state driver's licenses and other forms of state-issued identification.


This bill raises too many privacy, security, and logistical concerns.


The Real ID Act of 2005, in the wake of terrorism, sets minimum national standards that states must use when issuing driver's licenses and other identification. For example, this includes a photo ID, documentation of birth date and address, proof of citizenship or immigration status, and verification of Social Security numbers. As proposed, this law would go into effect in about a year.


Individuals would need Read ID-compliant cards for air travel, accessing federal buildings, or for receiving federal benefits. Moreover, all state driver's license databases would be linked.


The act is objectionable on the grounds that this is a de facto national ID system. Eventually, the U.S. government could spy on ordinary, law-abiding citizen.


Also troubling is that there is no plan for securing the stored identity data. The states are not accountable for the data.


"Failure to provide openness and transparency undermines accountability and trust," the DHS committee noted in its comments.


Concerns along these lines have been expressed by the National Governors Association, National Conference of State Legislatures, and the American Association of Motor Vehicle Administrators.


Several members of Congress have also expressed their objection: Sens. Daniel Akaka (D-Hawaii) and John Sununu (R-N.H.), who proposed the Identification Security Enhancement Act of 2007. The bills co-sponsors include Sens. Patrick Leahy (D-Vt.) and John Lester (D-Mont.).


If the government had thinkers, they would enact a Real ID for criminals and skofflaws. The identification targets the wrong people, the compliant. Of course, people could voluntarily join the program, in fact, this would advantageous for frequent travelers and those who need consistent, easy transit.


As it stands, this is a bad law.


In an update on 6 July 2007, the Governor of New Hampshire signed a bill that rejects federal Real ID law

Sunday, May 13, 2007

On 11 May 2007 a Guilty Verdict was handed down in a U.S. - China Spy Case

This is a troublesome case in that it may be indicative of how difficult it may be to nab spies. After a six-week trial a federal jury convicted a Chinese-born engineer of conspiring to export U.S. defense technology to China, including information on an electronic propulsion system that would make submarines virtually undetectable.


Chi Mak exploited his low-key lifestyle and his good reputation to hide his real intent: conspiring to pass U.S. secrets to China for over two decades. Mak is a naturalized U.S. citizen who confessed to the crime and revealed that he lied to investigators.


This individual apparently had no warning signs that he was suspect until he finally was found out and revealed his real intent on his own.


How you combat a clever individual like this without infringing upon individual liberties is an open question.

The U.N. next door

America is filled with communities where it appears as though the U.N. lives next door. However, in the case of the recently charged six terrorists in Pennsylvania and New Jersey, were there any signs that perhaps something was amiss? The terrorists might stand out but it was not considered a major point to note their Muslim religious garb. It is common enough in many communities in the U.S., especially in urban areas, that characteristic Muslim garb is not out of the ordinary.


To wit, the six did have minor, but consistent run-ins with the law. The three arrested brothers regularly attended South Jersey Islamic Center in Palmyra, N.J., where, according to U.S. Attorney Christopher J. Christie, they recruited another alleged conspirator. In short, the accused were no strangers to the police. They were habitual offenders, stopped dozens of times a year for speeding, illegal passing, and driving without a license. One of the accused, Dritan Duka was issued four citations during one five-week period. The three had driving privileges suspended, meaning that they could not even apply for a license, 54 times in less than a decade. Moreover, in 2000, Dritan Duka pled guilty to possession of drug paraphernalia and Shain Duka to possession of marijuana.


One characteristic to look for where the U.N. will break down is the flagrant, habitual, and lawless approach of potential troublemakers. The six, despite their protests that their Muslim background attracted attention, is not true. The accused brought about attention upon themselves by their anti-social behavior. America is a great country, too great to allow those who violate community standards unfettered freedom.

Tuesday, May 8, 2007

Is this war?

Six men arrested as two attempted to buy guns Monday; and, I might add, this is close to home. Apparently, the men laughed as they watched videos of attacks on Americans, including one video where a marine's arm is blown off. The arrested are "Islamic radicals," according to the U.S. Attorney's office. The men were planning to shoot soldiers at Ft. Dix Army base according to the indictment.

The six include three brothers, all with the last name Duka, who were born in the former Yugoslavia and are illegally residing in the United States. The three are: Eljvir, 23, Shain, 26, and Dritan, 28, and said the three operate businesses known as Qadr Inc., Colonial Roofing and National Roofing.

The other three men charged are Mohamad Ibrahim Shnewer, 22, of Cherry Hill, New Jersey, a U.S. citizen born in Jordan who is employed as a taxicab driver in Philadelphia; Serdar Tatar, 23, of Philadelphia, born in Turkey, whose last known employment was at a 7-Eleven; and Agron Abdullahu, 24, of Buena Vista Township, born in the former Yugoslavia and employed at a Shop-Rite Supermarket.

One twist to the story is to see if there is any difference in the disposition of the case in that they are illegal, a U.S. citizen, or another classification.

Saturday, May 5, 2007

How Jews, Christians, and Muslims celebrate the Sabbath

The idea to survey this topic came about in preparing a review of: Ringwald, Christopher D. A day apart: how Jews, Christians, and Muslims find faith, freedom, and joy on the Sabbath. Oxford, 2007.

G. Mick Smith, review of Armstrong, Karen, The Great Transformation, Choice, February 2007.

G. Mick Smith, review of Armstrong, Karen, The Great Transformation, Choice, February 2007.

The following review appeared in the February 2007 issue of CHOICE.

44-3239 BL430 2005-47536 CIP
Armstrong, Karen. The great transformation: the beginning of our
religious traditions. Knopf, 2006. 469p bibl index ISBN 0375413170,
$30.00

In this current age of "the great transformation," independent scholar
Armstrong postulates how the sages of the foundational Axial Age would address unspeakable horror, violence, and desperation. The distinctive and historic Axial Age faiths announced the abandonment of selfishness and a spirituality of compassion. They stated that first must come personal responsibility and self-criticism, and that practical, effective action must follow. Herein lie the problematic aspects of Armstrong's work and the reasons why this book can be misleading. Its most serious flaw is its finding evidence for ethical behavior in almost all religious behavior and ritual. Armstrong seems to miss the insights of René Girard and Walter Burkert, who have demonstrated how violence and the sacred are inextricably linked. Another problem is that, oddly, she states that Hitler expressed a "militant exclusion of religion from public policy." In fact, Hitler divided German Christians by founding the Patriotic Church in contrast to the Confessing Church. One other interesting side note is that Armstrong's research is based on older published works (only 36 of 284 works cited in the bibliography were published in 2000 or later). Summing Up: Optional. Lower-/upper-level undergraduates; general readers.

Review: The Forgotten Revolution, Lucio Russo

25 Jan 2006
Computing Reviews

The Forgotten Revolution describes the explosion of science in the third
and second centuries BCE. In the age of Archimedes, Eratosthenes, and
Euclid science as we ordinarily recognize the field began as a category
of human knowledge. The forgotten in the title refers to the Alexandrian texts
that were lost and the notion that the breakthroughs of the Renaissance
were based on these texts. Unfortunately, these texts were lost in the
ancient period and subsequently during the Renaissance as well. The
author, Lucio Russo, notes that both scientific revolutions were also
accompanied by great changes and an invigorated awareness in related
fields, such as art and medicine.

The revolution in science is surveyed in ten chapters, an epilogue, and
a mathematical appendix. In chapters 1-7 there is detailed coverage of the
birth, rise, decline and fall of Hellenistic science and technology:
mathematics, mechanics of solids and fluids, topography and geodesy,
optics, astronomy; civil, mechanical, naval, and military engineering; anatomy,
physiology, biology, and medicine; economics and mass production
techniques; architecture and urban development; psychoanalysis and cognitive
sciences.

An interesting inquiry of Russo¹s is the methodological nature of
Hellenistic mathematics. More important than the discoveries of the
Greeks noted above is the method they introduced, that is, the axiomatic,
deductive manner of argumentation that typifies mathematics. In general, the
deductive method, allied to the experimental method also introduced by the
Hellenistic scientists, is a modern approach to exact sciences.

The brilliance of the Hellenistic scientific revolution was lost in that
scientific method was abandoned in antiquity and its renaissance was
incredibly lax and centuries in coming. As late as the age of Newton,
who was representative Renaissance thinker, scientists worked at a level
still far below the Hellenistic level of rigorous method. This in itself is a
worthwhile point to make. When Russo relies on the philological evidence
alone he makes a convincing argument.

Another key inquiry is the idea that the heliocentric theories of
planetary motions were discovered far before the Hellenistic era. Aristarchus of
Samos and a century later with Hipparchus of Nicea Russo convincingly
demonstrates evidence that some Hellenistic writers knew of heliocentric ideas. They
developed a dynamical theory of planetary motions based on the attractions
of the planets toward the Sun. The work of Hipparchus is unfortunately
no longer extant but in an obscure work of Plutarch, sprinkled throughout
the Natural History of Plinius, the Natural Questions of Seneca, and the
Architecture of Vitruvius, enough philological evidence suggests that
the cultural elites of the early Roman Imperial period knew heliocentric
theories.

Much later Newton, who had the complete works of Plutarch in his
library, apparently included the heliocentric idea but without a credit attached.
Although some may think this an unethical act, it was in fact commonly
done if an author works in an academic field and elsewhere clearly credits
one¹ssources, and Newton does.

One simple reason the tradition of heliocentric theory is lost is that
the commonly cited Principia only included this portion in a Scholia or an
annotation on the original manuscript not appearing in the commonly
printed version.

Russo should be appreciated not only in the detailed transmission of
specific ideas but within a major historical problem of antiquity. The
decline and fall of antique civilization was occurring as Hellenistic
ideaswere pushed to the background as Max Weber thoroughly discussed the
issue of decadence. As trade in antiquity declined, so did the accompanied
flowering of art, literature, and scientific inquiry. The key insights of
Hellenistic thought languished then until the Renaissance and their re-discovery by
modern scientific thought.

This volume would not be of interest for most computing professionals
because the only closely related topic are analog computational aids. It
would however be of note for a general educated audience with an
interest in history of science, mathematics, physics, engineering, astronomy,
medicine and classical civilizations.

Four works read in tandem with Russo¹s would be instructive: The
Mathematics of Plato's Academy, by David H. Fowler (Oxford, 1999), and
The Shaping of Deduction in Greek Mathematics, by Reviel Netz
(Cambridge, 1999), Otto Neugebauer, Exact Sciences in Antiquity, and Sir Thomas
Heath, A History of Greek Mathematics. In addition, these four works are often on
sounder ground than Russo¹s volume.

Review: Dis/integrating animals, Warkentin

Date: Mon 26-06-2006 11:14 AM

Computing Reviews:

"Dis/integrating animals: ethical dimensions of the genetic engineering of animals for human consumption" Warkentin T. AI & Society 20(1): 82-102, 2005

IT professionals should be reflecting on this piece to answer questions of identity. What we are as humans is more typically posed to technologists by thinkers such as George Dyson who argues that machines, specifically computers, will evolve beyond humans. On the other hand, Warkentin provocatively claims that we become less human by genetically altering animal bodies.

The question is: are we becoming something beyond human because of our machines or is genetic engineering robbing us of our humanity?

Warkentin ranges over feminism, biology, and philosophy to lament that genetic technologies engineer impure food and ending the suffering of animals through genetic modification diminishes both animals and humans.

Warkentin reveals a secular sensibility for long-standing religious issues of identity, purification, and suffering.

Religions generally maintain that food or anything that enters the body may pollute. Indeed, contamination by polluted food is a pervasive danger, typically involving intricate avoidance principles which Orthodox Judaism, particularly kosher rules, artfully articulates.

In the classic work Purity and Danger (1966) Mary Douglas focuses on pollution with a cogent analysis of food taboos. Religions outline an agenda for congregants to follow maintaining their sense of identity.

Warkentin maintains that human identity is diminished or defiled by eating genetically engineered food, what Douglas introduces as “dirt.”

But that ingesting a given food which has a spiritually polluting quality independent of our post-modern cultural context does not seem to be based on an objective fact. Warkentin ultimately does not demonstrate how genetically modified food pollutes us.

No response from democracynow.org

Date:
Tue 11-07-2006 04:16 PM

I object to McCarthyism

I happened to view your broadcasting today (democracynow.org) for the first time and I am
writing to express how appalled I am by your abysmal ethics. The anchor,
Ms. Goodman, sequed into a story with the line, "we go now from a story
of an American soldier raping and murdering Iraqi civilians to a story
of a soldier who went AWOL." I am horrified that a broadcaster would try
and convict an individual on live television a la' McCarthy. Correct me
if I'm wrong but does not this individual, as reprehensible as many
people would find him if he is in fact quilty, have the right to due
process and a jury of his peers to convict him? This has not happened.
Perhaps it will, perhaps it will not but this person has the right in a
democracy to his day in court and you have no right to convict anyone on
television. Ms. Goodman had the perfect opportunity to instruct the
Iraqi journalist--employed by the L.A. Times--in the rules of evidence
and how democracy works but she squandered the moment and uncritically
accepted the hearsay evidence presented by the journalist. I object to
McCarthyism and the fraud that is entitled "Democracy Now." Indeed,
democracy works and your broadcasting should attempt to live out the
ideals, ethics, and the objective journalist responsibility that it
entails.
Regards,
G. Mick Smith, PhD

Review: A Companion to Nietzsche, ed. Keith Ansell Pearson

The following review appeared in the July 2006 issue of CHOICE.

A Companion to Nietzsche, ed. by Keith Ansell Pearson. Blackwell
Publishing, 2006. 600p bibl index (Blackwell companions to philosophy,
33) ISBN 1405116226, $149.95

This worthwhile collection portrays many of the most preeminent
Nietzschean scholars in Europe and the US. The volume adds to an
excellent series in philosophy by Blackwell. It offers a moving array
of Nietzsche scholars who represent a plethora of approaches. Following
the two practical introductions to Nietzsche's life, philosophy, and
style, the varied essays address the most familiar Nietzschean themes,
as well as important but more neglected ones such as Nietzsche's notion
of science. The major sections include "Art, Nature, and
Individuation," "Nietzsche's Philosophy of the Future," "Philosophy of
Mind," "Philosophy and Genealogy," "Ethics," "Politics," "Aesthetics,"
and "Evolution and Life." Moreover, contributors offer innovative
treatments of Nietzsche's core and enigmatic ideas such as eternal
recurrence, the will to power, and the "overhuman." Interestingly woven
together are Nietzsche's published and unpublished Nachlass. Among the
contributors are a stimulating selection of scholars and new writers on
Nietzschean themes. They include Jill Marsden, Babette E. Babich,
Volker Gerhardt, Kathleen Marie Higgins, Laurence Lampert, Richard
Schacht, Andreas Urs Sommer, and Paul van Tongeren. Summing Up:
Recommended. Graduate students and above.

Review: Evolutionary Scheduling

"Evolutionary Scheduling: A Review," Hart, E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220.

Date: Wed 13-09-2006 08:33 AM

ComputingReviews.com

Review Number: 54703

Evolutionary Scheduling

“Evolutionary Scheduling: A Review” Hart E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220.

This review article is of substantial value for those who need an update on research material that applies evolutionary computing methods to scheduling problems. The last major survey has not been performed since 1999, when a major statement emerged from the European Network of Excellence on Evolutionary Computing (EVONET). The three co-authors here have done an admirable overview and report on “current trends, achievements, and suggesting the way forward” (191) in this regard. In particular, this article is of wide interest since the ideas can be applied to many common scheduling issues such as job-shop scheduling problems, an area much discussed in academic literature. The authors point out that algorithms today are capable of tackling enormous and difficult real-world problems, a major advance over earlier surveys such as the EVONET report.

Review: Hempel, Sandra, The Strange Case of the Broad Street Pump

The following review appeared in the July 2007 issue of CHOICE.

CHOICE: 000000561309

Hempel, Sandra. The Strange Case of the Broad Street Pump: John Snow and the Mystery of Cholera, University of California Press, Berkeley: 2007.

Reviewed: 03/20/2007

In this well-written medical history the author, Sandra Hempel,
fascinatingly portrays the mysterious transmission of cholera in 1831
London. Although written at the level of sound academic standards,
Hempel relates a ripping yarn by demonstrating how the monk-like
physician John Snow alone methodically, but insightfully, investigated
how cholera proliferated through drinking water. Snow disregarded
conventional medical wisdom while scientifically identifying the origin, conveyance, and contagious nature of the cholera pandemic. Still this work is not for the faint of heart. In excruciating detail Hempel recounts how the most vulnerable, in one poor unfortunate case, three-year old William Somerville, underwent an alleged cure that was far more barbaric than the cholera itself which may have cleared up on its own. However, the pandemic necessitated a scientific cure as cholera bafflingly seized millions from the squalor of Soho to the elite confines of the Royal Medical College and the Privy Council. In her masterful hands, Hempel is to be commended for writing an intriguing account of an historic plague, sprinkled with a vibrant cast of actors offering instructive and timely insights for current challenges of infectious diseases: malaria, yellow fever, and cholera.


Hempel, Sandra. The strange case of the Broad Street pump: John Snow
and the mystery of cholera. California, 2007. 321p bibl index afp
ISBN 0520250494, $24.95

Wednesday, May 2, 2007

Review: Dickheiser, M. Game Programming Gems 6, Charles River Media, Boston: Massachusetts, 2006.

This is the sixth volume of the popular and practical Game Programming Gems series. The series from the 1st volume has addressed timely issues as they have emerged; currently, teams are growing larger and developers are increasingly specialists. The Gems series addresses this need by providing state-of-art, readily available material for the specialist and handy resources that may be outside your bailiwick. Also timely is that current machines and player expectations are requiring higher-fidelity models and animations, fancier physics and graphics effects, and more intelligent AI. With these rising expectations on the work of programmers and the greater level of sophistication required, these demands entail flexible teams and longer production schedules, especially in light of scripting and data-driven systems (p. 319). Of course, the biggest issue is cost (p. xi). Helpfully, the over 50 articles in the volume address these demands and expectations.

An important fact is the collaborative reach of the game technology experts in that they arise from sundry backgrounds and over twenty countries. The experts are not only gaming experts but some are from outside the industry. Moreover, collaboration is truly global: from every part of the world, encompassing such diverse places as Eastern Europe, Latin America, North America, Singapore, and Japan.

This volume is not recommended for a faint of heart newer game programmer since this does not really function as a primer although it is very readable nonetheless. More likely is that the specialist will pick and choose their topics of interest and the dedicated programmer will learn a great deal of interest by reading more thoroughly. The series is aptly named Gems and there are nuggets galore.

A pragmatic way to find the needed gems is to peruse the seven parts for something of interest: Section 1 General Programming; Section 2 Mathematics and Physics; Section 3 Artificial Intelligence; Section 4 Scripting and Data-Driven Systems; Section 5 Graphics; Section 6 Audio; and Section 7 Network and Multiplayer. Most programmers would benefit by finding their particular areas of interest and then look for handy tools in other sections.

General Programming is not for the novice, as the name may imply but rather involves multiprocessor techniques, unit testing, and security fingerprinting. Mathematics and Physics is a constant and involves all things FPU, CPU, and GPU. Artificial Intelligence is always popular, and in this volume demonstrates current work in cognitive science and machine intelligence, with a strong representation from academia. AI techniques shown here can be applied in “other systems in the engine” (p. xvii). The inaugural appearance of Scripting and Data-Driven Systems is a worthwhile addition to the Gems series. The most popular and emerging languages (with the main core C++: Python, Lua, GameMonkey, and AngelScript) provide a starting point for your engine with a flexible backbone. Graphics combines old and new technologies with numerous sharp techniques. Audio includes insightful ideas for advanced uses of the audio system. Finally, Network and Multiplayer is another emerging area as global players, Massively Multiplayer Online Prototype (MMOP), plug in to play. As the gaming content has increased so too has the multiplicity of players and now, across networks.

The Editor notes that gaming is not just for game developers anymore. Game-based Learning, Edutainment, commercial and military training simulations, academics, and other "serious games" have all made their mark (p. xv). The upshot of this new found attention is that the "noobs" (p. xvi, a slang insult for newbies) are starting to feed back their input into gaming. At this point, the implications of this feed back is not at all clear but what is obvious is that gaming will be transforming into new and potentially very excitingly complex areas.

The focus in this volume accounts for gaming complexity focusing as it does on providing cutting-edge development that is of interest to those outside the gaming industry. Another sign of gaming maturity is the rise of growth and complexity issues related to the size and intricacy of games. The section on Scripting and Data-Driven Systems, along with Network and Multiplayer, converge in the two emerging areas of interest to those outside gaming. Some of the most exciting topics are these two, especially when converged. A related area of convergence is how AI is of interest to those inside gaming and outside it as well. If well coded, AI can provide the behavior of characters that are seemingly more intelligent, more human-like, hence yielding a more involving game.

This volume, although replete with complex topics, is readable, current, and just about the best in its field. The enclosed CD has source code illustrating points in the articles. The Index is really handy as well, including as it does information on all six volumes in the series. The illustrations are well done and add desirable visual examples.

Monday, April 30, 2007

How long has terrorism been a genuine threat?

Former CIA Director George Tenet discloses in his newly released book how far al-Qaida was willing to go while targeting Americans. The group apparently wanted to outdo 9/11 in a spectacular attack.


The attacks never materialized because they were thwarted or aborted. The proposed attempts though included an attack on Vice President Al Gore with anti-tank missiles while he visited Saudi Arabia. Another proposal was to release cyanide in the New York subway system. And finally, an attempt was made to procure nuclear weapons of mass destruction from Pakistani scientists.


Saudi officials foiled Abdel Rahim al-Nashiri in the anti-tank attack. The Saudis though did not easily pass along this vital intelligence.


Most alarming is the attempt to develop nuclear capability. In the fall of 2001 this was to be detonated in New York. In fact, Tenet charges that a nuclear detonation in a U.S. city is al-Qaida's ultimate goal.


In the fall of 2003 a more spectacular attack than 9/11 was planned in the New York subway system. In June of 2006 the New York Subway Plot was broken by Time Magazine. Chronicled by journalist Ron Suskind's book, The One Percent Doctrine, which describes al-Qaeda's apparently successful development of a portable device that can be used to disperse cyanide gas. The gas kills upon inhalation. In fact, according to Suskind a cyanide gas attack on New York City's subway system was within 45 days of occurring when al-Qaeda's deputy commander, Ayman al-Zawahiri, called off the attack. 3,000 people would most likely have died in such an attack.


The attack was called off because it was not seen as spectacular enough. However, the calling off of an attack is no solace. For if 3,000 Americans killed by chemical weapons in the New York subway system were not enough for al-Qaeda, what sort of attack is? The answer, unfortunately, may well be the detonation of a nuclear weapon of some sort.


While we will all be arguing about Tenet's role in intelligence for some time I find it revealing that the reach of terrorism is more extensive and ambitious than many are willing to believe.

Sunday, April 29, 2007

Can't Get No?

The IMS Global Learning Consortium (www.imsglobal.org) spots learning technology satisfaction and trends. The report (www.imsglobal.org/ltst/index.cfm) noted the responses from about 200 leaders of internet-supported learning initiatives in North American higher education.


In the CMS (content management systems) category, eCollege (www.ecollege.com), Angel Learning (www.angellearning.com) were rated higher for satisfaction than either market leader Blackboard (www.blackboard.com) or its WebCT property.


Also, the report noted the high marks for Google (www.google.com), Wikipedia (www.wikipedia.org), and Apple's iPod (www.apple.com), "indicating that non-education-specific technologies are being perceived, by those who incorporate them, as adding value to the educational experience."

Sprawl

**YOUNG INVOLVED PHILADELPHIA READING GROUP**

Robert Bruegmann's ‘Sprawl: A Compact History’
Monday, April 30th, 6:15-8:00 pm
Brew Haha! (212 S. 12th Street - 12th and Locust)


What's so bad about the suburbs? Perhaps the urban hipsters who condemn them as socially- isolating, culturally-homogenous, environmental wastelands are just narrow-minded snobs? Perhaps they are jealous?

Robert Bruegmann argues in Sprawl: A Compact History that the suburbs are part of a healthy, growing metropolis, and represent the ideal living space for most people around the world. His arguments and his book have been the battle-flag of many pro-suburban planners.

A challenge to this controversial argument can be found in the Brookings Institution report, ‘Back to Prosperity,’ which argues that Pennsylvanians should invest in older and urban communities rather than pay the hidden costs of sprawl. It can be found online at www.brookings.edu/es/urban/pa/executivesummary.pdf.

Join other civic-minded young folks to discuss these two points of view, and to hash out the value and cost of the suburbs in the warm embrace of an urban, independent coffee shop.

**Joseph Fox Booksellers, 1724 Sansom Street, will be offering a 10% discount to YIP members on ‘Sprawl.’

Just in case you don’t have time to read the whole book, you should know that our discussion will focus on the introduction, and chapters 1, 10, and 13.

Please RSVP for this event by contacting YIPReading@gmail.com.

Thursday, April 26, 2007

Funding and Veto

Is President Bush ready? The Senate passed a war funding bill Thursday that sets a deadline for withdrawal of U.S. combat forces from Iraq by next April.

Bush seems to win out in this round given the fact that his opposition does not have enough votes to override his expected veto. The vote was 51-46. Republican Sens. Chuck Hagel of Nebraska and Gordon Smith of Oregon joined Democrats in supporting the bill. Connecticut independent Joe Lieberman, who caucuses with the Democrats, voted with Republicans opposing it. Two supporters of Bush's Iraq policy: Republican Senator John McCain of Arizona and Lindsey Graham of South Carolina did not vote. [Senator Tim Johnson, D-South Dakota, recovering from a brain hemorrhage, did not vote.]

The bill would be sent to the president's desk Monday or Tuesday.

The 218-208 House vote stops short of the 290 yeas needed to trump Bush. Two Republicans voted for the bill but 13 Democrats voted no.

The Pentagon is on record that it can fund the war through June. The real battle, over funds, will begin in earnest this summer.

As Congressional opposition increased, the U.S. ended involvement in Somalia in 1994. That resulted in no greater security than before.

Wednesday, April 25, 2007

Will China or India, or "Chindia" eclipse the U.S. on IT?

Gartner analysts weigh the question of America's "unmatched" business environment vs. rapid growth in upstart countries. This seems to be the key question as the Symposium ITxpo 2007 got underway.

Over the past decade, China has become the leaders in high-tech manufacturing and India has performed the same in IT services. The question is, could either of these rapid growth countries, or a combined, "Chindia" overcome the U.S. in these high stake global game.?

The position that the U.S. is maintaining its lead in high-tech innovation belongs to Gartner's Jamie Popkin. He points out that America continues to attract the best students from overseas, most of whom decide to stay. One key is the entrepreneurial environment in the U.S., in his word, "unmatched." U.S. consumers and corporate buyers are the most demanding in the world.

The U.S. survived and then prospered following the tour other recent waves of globalization. Japan for example, took a leadership position in the automotive industry, not too mention the recent note that Toyota has outsold GM for the first three months of 2007. But in the 1970s consumer electronics industries also took off in Japan. South Korea and Taiwan, starting in the 1970s, shifted to leadership in chip manufacturing plants as it did for Korea and Taiwan in the 1980s. China grabbed a large-scale shift of low-cost manufacturing that started in the 1990s. Finally, in India there was a subsequent outsourcing of software development and IT services since 2000.

On the other hand, Sandy Shen, promoted the idea that China will be supreme in a decade. Impressively, China is experiencing a 11% economic growth rate last year while the U.S. only grew 3.4%. Moreover, China increased its R&D by 20% last year which is second only to the U.S.

Entreprenership is alive and well in China in that the number of patent applications filed in China in 2005 is more than the U.S. in the same year. 2 million students graduated with engineering degrees annually in China, although without detailing exactly what skills in involved weakens the case for Chinese strength. They are voting with the feet, to return to China, so they must prefer their native country to the U.S.

Although individual products may not be all that revealing. They are only as good as the last fad, more interestingly, Shen's note that China is developing national technology standards that the country's government is pushing to be adopted internationally is more intriguing.

Tuesday, April 24, 2007

In the light of a tragedy: electronic messaging systems are an essential tool of public safety

Messaging system companies offer effective electronic messaging systems that are essential tools of public safety on campus.

Mobile Campus Incorporated markets an advertiser-supported campus text-messaging system that is otherwise free to affiliated universities. This is a free service capable of immediately and simultaneously alerting students, university employees, and others via text messages on cell phones.

Netpresenter Incorporated is a XML-based screen-saver and pop-up notification service.

MIR3 provides emergency notification technology.

ClearTXT is a mobile messaging provider to keep students and faculty informed during emergencies.

Tuesday, April 10, 2007

Graphical MyMaps supports point-and-click construction of interactive Google Maps.

Google delivers a maps mashup tool for non-Techies and I've adapted this development for an educational use. I teach a course entitled World History II, for example, and students can now create an interactive map geared to learning geographical sites of importance for the course. I can check their progress and the sites that they created in a public file available on Google.

Previously these mashup tools were only available to programmers through mashup capabilities that have been available for several years to developers via application programming interfaces (APIs).

However, this handy tool allows those less knowledgable about technology to still benefit from it.

The feature, called My Maps, is designed to let users who don't have formal programming knowledge to create, annotate, and publish online maps on the Google Maps platform. Developers have created over 35,000 Google Maps mashups, marrying the Google mapping platform with external data sources such as where users can find information on apartments for rent, bike routes, hotels, gas station fuel prices, parking garage fares, and so on.

Very helpfully, My Maps has a graphical, drag-and-drop interface that lets users create a map, add placemarks to it, as well as draw lines and shapes. Users can also add notes, photos, audio clips and videos to placemarks.

Users can label "public" the maps they create, but they can also keep maps private by tagging them "unlisted" so they are only available for viewing by people they choose to share them with.

In addition to My Maps, Google is also adding KML files to its Maps search engine. KML stands for Keyhole Markup Language and it's the language used to create data files for both Google Maps and its sister desktop application Google Earth. KML overlays have been created by casual users as well as by large organizations like Discovery Networks, the U.S. National Park Service, the Smithsonian Institution and National Geographic.

What is the financial driver here? Kelsey Group expects advertisers to spend $11.1 billion in 2011 to market their goods and services in local search engines, compared with $4.1 billion last year, an average annual growth of 22.3 percent.

Sunday, April 8, 2007

On Throwing Down Gauntlets, Iraq

Let's consider a new work:

Can Might Make Rights?: Building the Rule of Law after Military Interventions by Jane Stromseth, David Wippman, and Rosa Brooks, on Cambridge University Press.

This book is critical because is it not clear that the world's major power is limiting its capabilities in regards to peacemaking after conflict?

Why is American policy so apparently mired?

Americans seem dazzled by sound bites: ""Bush lied, people died," "Support the troops," "No Blood for Oil."

I don't buy it.

In 1983, Richard J. Barnet wrote an excellent book, "The Alliance: America-Europe-Japan Makers of the Postwar World, in which he hauntingly anticipates the criticisms of American Presidents and policies; yet, the world recovered from the most devastating war ever seen.

Moreover, Japan and Germany were the bitterest of enemies of the U.S., yet they are considered genuine successes. Was it our enlightened supervision that totally changed their governments to democracies reflecting the will of the people and making them good neighbors?

What happened then in Haiti? East Timor? Somalia? Bosnia? Rwanda? Afghanistan? Iraq?

The authors of this volume clearly identify some prerequisites to establish the rule of law in post-intervention societies: security, judicial reform, and a competent, uncorrupted police force. In Iraq, the insurgents dominate news coverage with their car bombs and kidnappings.

"Public order, at least outside of a police state, rests on a societal consensus about the legitimacy of state institutions and confidence in the capacity of such institutions to deliver basic services," according to the authors.

Pity the Iraqi people, who are brutalized in the middle between a foreign power and the elusive insurgents.

The message of this book is that an international force can go in knowing everything it must do, but that this doesn't guarantee success.

Consider one salient point: in many of these countries, the rule of law is "elusive to begin with, and striving for the rule of law requires a constant juggling act on the part of the interveners. It is little wonder that so many past efforts in this area have been so disappointing."

Should Americans conclude that the Iraqi situation was a preordained debacle? I don't think so. The first step in understanding post-war Iraq is to appreciate that even under the best of conditions, post-war settlements are precarious at best.

What I wish the authors would have stressed, and Barnett makes clear in his work, is the crucial aspect of native leaders who step up to the plate on behalf of their own countries.

The earlier post-war successess are just as attributable to they dynamism of Herrs Adenauer and Brandt, and the docility of Hirohito.

If there is a gauntlet to be thrown, it should be thrown down towards Iraqi leaders who to date have not produced anyone of their statesmanship.

Saturday, April 7, 2007

Browser Wars

A 5 April 2007 report from Computerworld reports that Windows Vista "more than doubled its market share in March from the prior month, while the share of computers running Mac OS X fell for the first time in nine months, according to statistics released today by market research firm Net Applications."

This no doubt marks the end of Mac's highpoint of penetration for its much heralded new OS.

Vista has had limited success itself but it still improved its standing vis a vis Mac. Although in comparison with the earlier XP release Vista, eclipsed the 17 million licenses for XP it had sold in its first two months of general release. Vista has been around, at least for consumers, for only two months: to businesses for four months. Some analysts predict that most conversions from XP won't be the norm until 2009.

More importantly, research by Net Applications shows Internet Explorer's share continuing to lose ground to Firefox: IE enjoyed a 78.57% share in March, down from 79.09% in February. Firefox gained nearly a whole percentage point, going from 14.18% to 15.10%. Trailing behind all is Opera which ranked 4th with 0.80% while Netscape fell again, to 0.70%.

Thursday, April 5, 2007

Pelosian Diplomacy

Graphic source: Atlas Shrugged.
Syrian President Bashar Assad met with U.S. House Speaker Nancy Pelosi, in Damascus although I note that Pelosi did nothing to negotiate the release of the British soldiers held for the past two weeks by Iran. I wonder if this is the new era of Middle Eastern diplomacy promised by Pelosi. To be an adroit force in Middle Eastern politics during the post-Bush era Pelosi will need to demonstrate a more effective application of her policies. For example, a Presidential hopeful, the Reverend Jesse Jackson, proved himself useful in hostage negotiations. In 1984, Jackson successfully secured the release of a Navy pilot held in Syria. Moreover, in 1991, he helped secure the release of 500 "international guests" held in Iraq and in 1999, he worked to convince Yugoslavia to release three U.S. soldiers held there during the Kosovo conflict. Finally, Jackson involved himself in hostage situations in Iraq.

Monday, March 19, 2007

Review: Sandra Hempel, The Strange Case of The Broad Street Pump

In this well-written medical history the author, Sandra Hempel, fascinatingly portrays the mysterious transmission of cholera in 1831 London. Although written at the level of sound academic standards, Hempel relates a ripping yarn by demonstrating how the monk-like physician John Snow alone methodically, but insightfully, investigated how cholera proliferated through drinking water. Snow disregarded conventional medical wisdom while scientifically identifying the origin, conveyance, and contagious nature of the cholera pandemic. Still this work is not for the faint of heart. In excruciating detail Hempel recounts how the most vulnerable, in one poor unfortunate case, three-year old William Somerville, underwent an alleged cure that was far more barbaric than the cholera itself which may have cleared up on its own. However, the pandemic necessitated a scientific cure as cholera bafflingly seized millions from the squalor of Soho to the elite confines of the Royal Medical College and the Privy Council. In her masterful hands, Hempel is to be commended for writing an intriguing account of an historic plague, sprinkled with a vibrant cast of actors offering instructive and timely insights for current challenges of infectious diseases: malaria, yellow fever, and cholera.

G. Mick Smith, PhD, Review of "The Strange Case of the Broad Street Pump," Sandra Hempel, University of California Press, Berkeley, 2007, Choice: Current Reviews for Academic Libraries.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.