Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Monday, July 9, 2007

Archive of Computing Reviews: 2003-2007

Game programming gems 6
Dickheiser M., Charles River Media, Inc., Rockland, MA, 2006. 736 pp. Type: Book
Date Reviewed: May 31 2007


This is the sixth volume of the popular and practical “Game Programming Gems” series. From the first volume, the series has addressed issues as they have emerged; currently, teams are growing larger and increasingly developers are specialists. The series addresses this need by providing state-of-the-art, readily available material for the specialist and handy resources that may be outside your bailiwick. Current machines and player expectations require higher fidelity models and animations, fancier physics and graphics effects, and more intelligent artificial intelligence (AI). The rising expectations of the work of programmers and the greater level of sophistication required demand flexible teams and longer production schedules, especially in light of scripting and data-driven systems. Of course, the biggest issue is cost. The 50-plus articles in this volume address these demands and expectations.


An important fact the book addresses is the collaborative reach of game technology experts who come from various backgrounds and over 20 countries. The experts include gaming experts, as well as experts from outside the industry. Moreover, this collaboration involves nearly every region of the world, including Eastern Europe, Latin America, North America, Singapore, and Japan.


This volume is not recommended for faint-of-heart, newer game programmers, since it does not function as a primer. It is likely that the specialist will pick and choose from the topics covered and the dedicated programmer will learn a great deal by reading more thoroughly. The series is aptly named “Gems,” and there are nuggets galore.


A pragmatic way to find the gems relevant to you is to peruse the seven parts: “General Programming,” “Mathematics and Physics,” “Artificial Intelligence,” “Scripting and Data-Driven Systems,” “Graphics,” “Audio,” and “Network and Multiplayer.” Most programmers will find their particular areas of interest and then look for handy tools in other sections.


“General Programming” is not for the novice, as the name may imply; rather, it involves multiprocessor techniques, unit testing, and security fingerprinting. “Mathematics and Physics” involves all things related to the floating point unit (FPU), central processing unit (CPU), and graphics processing unit (GPU). “Artificial Intelligence” demonstrates current work in cognitive science and machine intelligence, with a strong representation from academia; the AI techniques shown here can be applied in “other systems in the engine.” “Scripting and Data-Driven Systems” is a worthwhile addition to the series. The most popular and emerging languages provide a starting point for your engine with a flexible backbone. “Graphics” combines old and new technologies with numerous sharp techniques. “Audio” includes insightful ideas for advanced uses of the audio system. Finally, “Network and Multiplayer” is another emerging area as global players plug in to play. As the gaming content has increased, so too has the multiplicity of players across networks.


The editor notes that gaming is not just for game developers anymore. Game-based learning, edutainment, commercial and military training simulations, academics, and other “serious games” have all made their mark. The upshot of this newfound attention is that the “noobs” (p. xvi, a slang insult for newbies) are starting to put their feedback into gaming. At this point, the implications of this feedback are not clear, but what is obvious is that gaming will be transforming into new and potentially complex areas.


This volume takes into account the complexity of gaming and focuses on providing cutting-edge developments that are of interest to those outside the industry. Another sign of the maturity of gaming is the rise of growth and complexity issues related to the size and intricacy of games. The section on “Scripting and Data-Driven Systems,” along with “Network and Multiplayer,” converge in the two areas of most interest to those outside gaming. Some of the most exciting topics involve these two, especially when converged. A related area of convergence is how AI is of interest to those inside and outside gaming. If coded well, AI can provide the behavior of characters that are seemingly more intelligent and human-like, yielding a more involving game.


This volume, although replete with complex topics, is readable, relevant, and just about the best in its field. The enclosed CD has source code illustrating points in the articles. The index is useful as well, and includes information on all six volumes in the series. The illustrations are well done and add desirable visual examples.
Reviewer: G. Mick Smith Review #: CR134340


Evolutionary scheduling: a review
Hart E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220, 2005. Type: Article
Date Reviewed: Sep 27 2006


For those who need an update on research material that applies evolutionary computing methods to scheduling problems, this review paper is of substantial value. The last major survey was performed in 1999, when a major statement emerged from the European Network of Excellence on Evolutionary Computing (EVONET). The three coauthors here have provided an admirable overview and report on current trends and achievements, and “[suggest] the way forward.” In particular, this paper will interest a wide audience, since its ideas can be applied to many common scheduling issues, such as job-shop scheduling problems, an area much discussed in academic literature. The authors point out that algorithms today are capable of tackling enormous and difficult real-world problems, a major advance over earlier surveys, such as the EVONET report.
Reviewer: G. Mick Smith Review #: CR133355 (0707-0716)


IT professionals as organizational citizens
Moore J., Love M. Communications of the ACM 48(6): 88-93, 2005. Type: Article
Date Reviewed: Jun 12 2006


Information technology (IT) workers exhibit significantly less occupational citizenship behavior (OCB) than non-IT workers. This is the major finding of this work. Five types of OCB (altruism, courtesy, sportsmanship, civic virtue, and conscientiousness) are measured in this study. “Investigations of a situational factor--fairness perception--as a predictor of OCB have been ... fruitful.”


People seem to feel that if the exchange between them and their organization is positive, then their OCB will be enhanced. Procedural justice within an organization, or the perceived fairness of policies and procedures, how company policies are undertaken, and the dignity and respect with which they are communicated, are critical factors. Alarmingly, IT workers are plagued by significantly lower management trust and faith in procedural justice than their non-IT colleagues.


Some of the results in this study are not surprising. A fair amount of working life is similar to what you find in other fields. People don’t work particularly hard if they are only working for the money, especially if they do not feel like they are being treated fairly. The hazard for the IT field, though, is that the potentially devastating consequences of not helping others are acute in IT work. IT workers need to be proactive in stymieing malware, viruses, security issues, and a whole host of threats. If they are not helpful, these threats proliferate. The authors do not report this fact, though it does seem to be a central implication of their important research.
Reviewer: G. Mick Smith Review #: CR132910 (0704-0418)


Ethical engagement with data collection efforts related to fighting terrorists and terrorism in the context of recent events
Pohlhaus W. Innovation and technology in computer science education (Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, Capacrica, Portugal, Jun 27-29, 2005) 401-401. 2005. Type: Proceedings
Date Reviewed: Jan 3 2006


Pohlhaus discusses data collection problems with regard to civil liberties, and notes three problems deriving from data collection: misinformation, a lack of accountability, and the anonymity of those collecting the data.


Pohlhaus regards data collectors as unethically collecting information, and argues that the “community of computer scientists” should respond. He reviews historical and current narratives to outline problems concerning data collection. The examples that he draws on in particular are the Orion software system for classifying people and groups, and the scandal at ChoicePoint, Inc., where con artists used social engineering techniques to obtain personal information about people. These cases illustrate the ease with which programmers trust in those responsible for the collection and security of information. Of particular concern is the manner in which the Federal Bureau of Investigation (FBI) gathered and used information in COINTELPRO (an FBI counterintelligence program) during the 1960s and 1970s.


The author does not identify how the worldwide community of scientists could agree to take concerted action. Currently, there is not a vehicle to carry out his program. The issues are sound, but more work needs to be done in this area.
Reviewer: G. Mick Smith Review #: CR132225 (0610-1082)


Prefiguring cyberculture : an intellectual history
Tofts D., Jonson A., Cavallaro A., The MIT Press, Cambridge, MA, 2004. 328 pp. Type: Book
Date Reviewed: Nov 17 2005


The premise of this work is that we are who we are as humans because of the limitless social apparatus of technology, primarily the computer network. The interwoven nature of the human-computer interface has made it impossible to distinguish technology from the social and cultural production of being human. Cyberculture is the broader name given to this process of becoming through technological means. “Prefiguring” is a word that describes and predicts posthuman construction and adaptation to cyberculture. Prefiguring cyberculture, then, is a volume dedicated to tracing the intellectual history of cyberculture.


The surprise in this book, though, is that cyberculture has been arriving for quite some time, centuries in fact. In the book, cyber history is tracked by media critics and theorists, philosophers, and historians of science who explore the antecedents of contemporary technological culture sprinkled throughout key works and writers that anticipate cybercultural practice and theory, including Plato’s “The simile of the cave”; Descartes’ Meditations; Sir Thomas More’s Utopia; Francis Bacon’s New Atlantis; Mary Shelley’s Frankenstein; Butler’s Erewhon; de Chardin; Alan Turing; Philip K. Dick; William Gibson’s Neuromancer; Ray Bradbury; Arthur C. Clarke; Alvin Toffler; and the film, The Matrix. Also, artists explore how cybercultural themes have been envisioned in the visual arts with accompanying text.


The key works frame, but do not inhibit, the stimulating themes addressed by this volume. The 28 essays and artist statements, edited by three others, do not slavishly follow irrelevant historical texts or simply rehash old arguments, but they tease out meanings, reflections, and meditations on what it means to be cybernetic. Tofts suggests that the culture created by the human-computer interface has created an innovative creature: a posthuman. This new being is an intermingling of humanity and technology, which some have labeled cyborg, and others, one giant step for evolution.


These Western writers are hindered by the mostly rather weak middle portion of the book dedicated as it is to the oppressive mood of postmodernism, which bogs down the text. Gregory Ulmer’s “Reality Tables: Virtual Furniture” is unintelligible, spinning around textual tables, diagrams, and language, and throws in Elvis’ pelvis to boot. The highlight in the second section, though, is Scott McQwire’s definitive consideration of William Gibson’s cyberpunk novel Neuromancer. Although the volume as a whole is well done, too much of this middle portion of the book is stifled with jargon and parochial interests.


Yet the text is more than redeemed by an impressive opening section, and it ends with an impressive flourish in the last section of the book (punctuated by an artistic section in an interlude). Some of the contributions, noted below, are standouts. Erik Davis contributes a masterful opening salvo that rescues Descartes’ Meditations from the “punching bag” of criticism. In his capable hands, virtual reality, cyberspace, and The Matrix demonstrate that humans develop “authentic consciousness” by reawakening to ourselves. Samuel J. Umland and Karl Wessel consider Philip K. Dick’s work, as his work permeates the atmosphere for other writers in the text as well. In their prescient if somewhat disturbing essay, the authors maintain that technoscience is a sort of autistic endeavor, yet it generates an unintelligible message.


The fourth section is provocative as well. Margaret Wertheim illuminatingly finds an ideological discontinuity between More’s Utopia and Bacon’s New Atlantis. In contemporary positions, these two are represented by the utopian and idealistic virtual community (a la Howard Rheingold and Esther Dyson), or the era of the “dot.com barons,” paralleled by Atlantian figures. Bruce Mazlish contributes an impeccable study of Samuel Butler’s Erewhon as seen particularly in relief and in dialogue with Charles Darwin. The coda belongs to Mark Dery, who views Eero Saarinen’s TWA Terminal at New York’s JFK airport as a failed statement of contemporary society--air travel as a nervous endeavor, filled with freewheeling machines, monitored by defective humans.


Russell Blackford offers what is arguably the most important essay in this volume, “Stranger Than You Think: Arthur C. Clarke’s ‘Profile of the Future.’” This essay is timely and deserves a wider audience. Blackford notes that Clarke is not correct in a detailed exposition of the future, but he has been aptly prescient and thus deserves a reading. Clarke concludes that humanity may envision a “postbiological enhancement of the brain and body (page 1,261),” which is well worth considering.


This text deserves a broad readership and is replete with fascinating--even vital--ideas. As I progressed through the text, I found myself wondering whether the quality and suggestive ideas could really be that first-rate and be sustained throughout nearly the entire text. They were. This is quite an achievement for a work that is as ambitious and daring as cyberculture itself.
Reviewer: G. Mick Smith Review #: CR132044 (0610-1036)


Reviewer Selected


Establishing and maintaining long-term human-computer relationships
Bickmore T., Picard R. ACM Transactions on Computer-Human Interaction 12(2): 293-327, 2005. Type: Article
Date Reviewed: Nov 8 2005


Bickmore and Picard investigate the meaning of “human-computer relationships,” and present techniques for “constructing, maintaining, and evaluating such relationships.” Their primary conclusion is that they “have motivated the development of relational agents as a new field of research.”


Two particular relational benefits motivate the authors’ research: trust and task outcomes (like improved learning) known to be associated with relationship quality. The authors are concerned with evaluating whether agents “establish and maintain long-term social-emotional relationships with their users.” In their experiment, 101 users interacted daily with an exercise adoption system, for one month. Compared to an equivalent task-oriented agent, the computer-based relational agent was trusted more.


Placing agents on mobile devices could provide a potent combination of relationship building (an ever-present “buddy”) and behavior change (providing timely and appropriate interventions). Work should be done regarding the nature of the buddy. Examples of conversational systems, such as R2D2 in Star Wars, and the Microsoft Office Assistant, engendered mixed results: the former was cute and helpful, and the latter was intrusive and grating. There are also political and ethical considerations in designing a buddy. Should the buddy be a thing or a neuter object, as in the two examples above, or should it perhaps be a male, or, as in the authors’ study, a female? And, finally, as the authors note, these proactive buddy scenarios, which are monitoring us, raise issues of privacy and security: with whom do you let the buddy share which pieces of relational or personal information, and how does it earn your trust to do so?
Reviewer: G. Mick Smith Review #: CR132005 (0606-0637)


Privacy policies of the largest privately held companies: a review and analysis of the Forbes Private 50
Peslak A. Computer personnel research (Proceedings of the 2005 ACM SIGMIS CPR Conference on Computer Personnel Research, Atlanta, Georgia, USA, Apr 14-16, 2005) 104-111. 2005. Type: Proceedings
Date Reviewed: Sep 29 2005


This study reviews the Internet privacy policies of the 50 largest privately held companies in the US, as identified by Forbes magazine. The Web sites of these companies were examined to see if they complied with practices that the Federal Trade Commission (FTC) issued as guidelines, including posting information about the fair information practices promulgated by the FTC. In addition, the author compared the policies of these private companies to the largest publicly traded companies in the US.


One of the important findings of the study is the discovery that privately held companies are inconsistent in following fair information practices or consumer-centered Internet policies. More troubling, the 50 largest privately held companies are generally more lax in publicly revealing their fair information practices and consumer-centered policies than the 50 largest publicly held companies. To a large extent, this is due to the lack of any privacy policies for many privately held companies.


What this study demonstrates, more than anything else, is that there is cause for concern regarding the lack of a forthcoming nature among private companies. Further study on this topic is needed.
Reviewer: G. Mick Smith Review #: CR131837 (0608-0874)


Oracle insights, tales of the oak table
Kyte T., Ensor D., Gorman T., Lewis J., McDonald C., Millsap C., Morle J., APress, LP, Berkeley, CA, 2004. 419 pp. Type: Book
Date Reviewed: Feb 14 2005


This volume contains works by 11 leading Oracle experts, who share their first-hand, in-the-trenches expertise. This format allows a database administrator to read about expert experiences, using features that are “not exactly in the manual” and approved by Oracle, but arise from the practical and possibly unapproved uses of Oracle’s inner workings. In fact, the Oracle kernel has evolved over the years, and some of its most important innovations are in direct response to the projects described in this important work. The lessons honed here were first reported at conferences, in coffee shops, restaurants, bars, and, most especially, with pleasant camaraderie around a particular oak table.


The “oak table” reference in the subtitle refers to an international and informal network of Oracle experts who coalesced at Mogens Norgard’s house near Copenhagen. This informal network and companionship informs the expert knowledge that characterizes the approach taken in this volume, to relate war stories and seasoned problem solving capabilities. The decision to release a volume of this type means that we learn such things as who took only one philosophy/ethics class in college, whose ex is a physician, and who relieves themselves where while at Mogens’ house.


All of this is not to suggest that the contributors are less than serious in their Oracle capabilities. It does, however, typify how to read this work. It suggests that you can relish Oracle war stories, related with both expertise and accessibility, while you relaxingly think through knotty Oracle issues.


So, with its more light-hearted approach than most technical books, and a sense of humor, there is quite a bit to glean from this work. The 11 experts consider the patterns in building their respective systems, and relate them to Oracle issues. There is a rather broad range of problems discussed; some are old, some are new, but all can be related to contemporary issues likely to be encountered in Oracle applications.


The most general, but most accessible, chapter is “Testing and Risk Management.” As long as major software concerns release products that are as complex, unwieldy, and deficient as they are (and even the otherwise excellent Oracle product is), an inordinate amount of time will be spent managing software development with database administrators, or responding to business imperatives. This chapter, by Ruthven, is a sound, useful, and accessible introduction to overcoming these inevitable restrictions, as applied to Oracle applications. Another chapter, “Bad CaRMa,” makes a point similar to Ruthven’s, and is also along the same lines, lamenting a most spectacular failure: a customer relations management (CRM) debacle (hence the playful chapter title).


In fact, I found the inability to communicate across business areas to be the connecting theme in this volume, since it also appears in the chapter titled “Why I Invented YAPP” (page 152), as well as in “Extended SQL Trace Data” (page 163). This overarching theme, that information technology (IT) failures are often due to the silo mentality of separate business units, is not explicitly made, or summarized in an introductory piece, but perhaps it should have been.


The authors’ claim to “represent a wide spectrum of experience and knowledge...[that] would...allow all the OakTable network to share a lot of our stories” (page xxix). I feel they have achieved their goals. Though this work is often conversational, it is not for the faint of heart, given the detailed and technical nature of the topic. In order to profit from the text, one needs to be intimately associated with Oracle’s inner workings. Entire pages and sections are often nothing but technical code.


This is not a snazzy tips and nifty features type of Oracle book. You can find that in some other volumes on the market. In fact, some of the projects described herein are ten or more years old, and involve earlier versions of Oracle. However, there are certain consistencies in software projects, and these authors rightly derive their lessons from sound scientific principles, observation, prediction, experiments, and proofs. In any case, if you are a database practitioner in need of expert guidance, you can probably benefit from an international cast of Oracle characters to assist you through your biggest challenges, in a conversational and easily accessible volume filled with helpful tips.


This playful bunch never quits. A number of them report on the mythical, but based-on-real-life experiences of Brushco, a firm supposedly renting toilet brushes. I just know I’m missing out on some inside jokes there. Read this work if you want to know more about the inner workings of Oracle, with a healthy dash of puns and humor thrown into the mix.
Reviewer: G. Mick Smith Review #: CR130815 (0511-1217)


Shaping the network society : the new role of civic society in cyberspace
Schuler D., Day P., MIT Press, Cambridge, MA, 2004. Type: Book
Date Reviewed: Nov 29 2004


Is there a technological or a social imperative with regard to the Internet? Does the ’Net have a definite direction, in light of its development? These are some of the most important “big picture” concerns of the editors, Douglas Schuler and Peter Day, former chair of Computer Professionals for Social Responsibility (CPSR), and lecturer at the University of Brighton, UK, respectively.


Technology is predominant in the business world, but this volume examines the activities of progressive community activists, in nongovernmental organizations (NGOs), to meet the challenges of society. The primary concern of the editors, then, is to publish the contributors who describe the emergence of civil society in cyberspace.


Their range is far reaching: they describe human rights in the “global billboard society”; public computing in Toledo, Ohio; public digital culture in Amsterdam; “civil networking” in the former Yugoslavia; information technology and the international public sphere; “historical archaeologies” of community networks; “technographical” reflections on the future; libraries as information commons; and globalization and media democracy, as portrayed by Indymedia, a global collective of independent media organizations.


One major limitation of this volume is its belated appearance, and the meager results of civility that are described. The Internet has been around for some time, long enough if truly progressive activities were to be forthcoming, but the activities described herein appear paltry in a historical perspective.


Interesting in itself, one typical example is the self-titled “slow food” movement, originally from Italy, with all of 65,000 members. The contributors make no reference to existing cultural mores, in pre-network society, which may be part and parcel of such movements. A European cultural ideal may favor dining, and slowly, without the mechanism of cyber society. This point should be grounded in possible historical precedents. Perhaps more importantly, these admirable socially conscious movements make no reference to preexisting impulses for authentic human existence, something both adherents advocate. These preexisting movements, namely, religious communities in monasteries, have been around for centuries, and additionally offer trenchant critiques of issues the contributors claim is their central concern. However, the religionists are totally ignored.


On the other hand, a focus to be more inclusive could have included some aspects of the business world, although the editors seek to be unsullied by the world of profit. An entire volume without a discussion of instant messaging and speeded up communication seems shortsighted in a work such as this. At the very least, some discussion of what community means via the ’Net seems appropriate, and a consideration of advocacy in these new forms of communication would be well placed.


My point here is that the editors end up being more parochial than I’m sure they intend to be, and unnecessarily. The shaping of network civil society by cultural critics may be broader and more historically grounded than they suspect.


Also disturbing, as noted above, is the limited scope of the cited examples of progressivism. Holland’s experiment with free ’Net access proved unworkable; in South America, the civil society has had limited success; libraries which might be beacons of free inquiry have filters even for adults; and the lessons of Blacksburg and Seattle seem to demonstrate that small- to medium-sized cities can only muster relative success on a local basis.


These comments are not to disparage the real and fascinatingly positive accounts provided in the text, however. Veran Matic artfully describes civil networking in the hostile former Yugoslavia. In this antagonistic environment, he outlines the struggles to maintain a reliable flow of news and information, and the heroic, resourceful means to do so. If only this example were replicated on a global basis, and in repressive areas, I would find the cyberspace civil society more convincing. Likewise, Scott Robinson’s “Rethinking Telecenters” examines the largely positive example of Mexican migrant organizations as a catalyst for change in the microbank rollout. Another one of the volume’s strong analyses of a mid-sized city, Toledo, is instructive, at least, for Americans who base their progressivism on a mostly typical American community.


The volume is best viewed as an updating of analyses from the renowned Frankfurt School in Germany. Juergen Habermas wrote before the Internet era, but the contributors here are of the same vein. Their contribution is that they have extended his analysis to Internet civil society. The question is whether the School is well served by a volume that treats the Internet as if it is yet to come, when it has in fact arrived, matured, and spun off in distinctly unprogressive directions. This volume will not allay fears that the unprogressive aspects of ’Net culture will be mitigated by progressive movements. They are too small to have much of an impact, and remain on the fringes of networking, if they are a blip on the radar at all.
Reviewer: G. Mick Smith Review #: CR130468 (0507-0783)


From airline reservations to Sonic the Hedgehog : a history of the software industry
Campbell-Kelly M., MIT Press, Cambridge, MA, 2004. Type: Book
Date Reviewed: Sep 15 2004


In this book, Campbell-Kelly concentrates on the history of software companies, but not the software or the technology itself. Software history is defined specifically as the history of software businesses. This book is clearly in the business history camp; if you are interested in software history, or a history of the technology, you will not find it here, except in passing. The subtitle is telling: “a history of the software industry.”


Given the author’s focus, certain topics are highlighted as illustrative of the software industry, which has grown to become the fourth largest industrial sector of the US economy. There are “three main vectors of explanation” (page 3). The first is chronological, tracing software developments from the mid-1950s to the book’s ending point (about 1995). Second is the industry’s developed sectors: software contractors and corporate software products. Last is mass-market software products.


Roughly, though coincidently, these three sectors of software businesses emerged in decade-long intervals. The software contracting sector developed alongside the corporate mainframe computer, in the mid-1950s. Typically, this solo contractor period is characterized by programmers who wrote one-of-a-kind, expensive programs for a corporate client. By the mid-1960s, and with the release of IBM’s System/360 computer family, corporate software products emerged in larger numbers, creating a broader market for lower cost software, as contrasted with the first period of software history. With the arrival of the personal computer in the mid-1970s, a market opened for mass-market software. Relatively cheap (typically $100 to $500 in cost), these commonly available shrink-wrapped packages sold in large volume.


Campbell-Kelly’s taxonomy of the software industry correctly observes that no one firm is at the center of the software world, specifically, not the one that many people seem to believe is there, namely Microsoft. He describes other lucrative software products, such as IBM’s Customer Information Control System (CICS), a terrific example of the “invisible software infrastructure that runs the modern corporation” (page 149). For more than 30 years, CICS “has been the world’s best-selling computer program” (page 149). Where there is an automated teller machine (ATM) accessed, a travel reservation made, or a retail credit card purchase made, chances are CICS is employed. Along these lines, SAP’s R/3 product is dominating as well. SAP’s market share of the enterprise resource planning (ERP) software market stood at 33 percent in 1995.


These critical products run unobtrusively in the background of the modern corporation, and are little recognized by the general public; the author hopes to “provide a corrective to the common misconception that Microsoft is the center of the software universe” (page 9). Microsoft’s market share is roughly ten percent, approximating the amount of space that Campbell-Kelly devotes to the firm in this work.


I am, however, uncomfortable with the author’s discussion of Microsoft. He takes pains to diminish Microsoft’s importance in the history of software, though he recognizes its impact, and articulates the company’s accomplishments clearly enough. This is the major limitation of the work. Since, as Campbell-Kelly acknowledges, Microsoft is one of the few companies to survive the tumultuous rise of the personal computer era, more needs to be explained. A corrective is sorely needed, as he points out, since much previous literature on Microsoft is lacking in explanatory power. A business that placed so many of its products on desktops in America requires elucidation.


The author is also weak on programming developments. His discussion of the FORTRAN and COBOL programming languages could be considerably stronger. His account of how COBOL became, with FORTRAN, one of the twin peaks, accounting “for two-thirds of the applications programming activity of the 1960s and the 1970s” is lacking (page 36); this development occupies less than two pages of the text. The author does not provide enough reasons for how COBOL became so crucial; he only mentions that the US Department of Defense encouraged private companies to adopt this as a standard.


One troublesome aspect of the author’s analysis is his tendency to expect that a statement of raw dollars and financial figures is explicative. The finances are not adjusted for inflation, or placed in clear enough historical contexts for the numbers to be meaningful. The author even states, at one point, that the statistics speak for themselves. No, they don’t. The historian must interpret and interpose a meaningful framework on the explicated numbers for the figures to make sense.


By and large, this is a useful book, but with the above-noted limitations. I feel that a person interested solely in company history can read the volume beneficially. Expanding the areas noted above, on the historical context, and the technology used, would not deviate from, but I think would have enhanced, the author’s intended purposes.


Last, I love the title, with one important caveat. It does imply that Sonic the Hedgehog somehow equals the truly revolutionary and durable Sabre airline reservation system. But this is, of course, not the case.
Reviewer: G. Mick Smith Review #: CR130128 (0504-0438)


An information systems perspective on ethical trade and self-regulation
Duncombe R., Heeks R. Information Technology for Development 10(2): 123-138, 2003. Type: Article
Date Reviewed: Jul 28 2004


Duncombe and Heeks describe how ethical trade initiatives are increasing due to the concern that globalizing trade does not benefit “producers in developing countries” (page 123). “Ethical trade” is represented by organizations such as the UK’s Ethical Trading Initiative, which is a voluntary code of conduct among large producers, intended to benefit workers’ rights, human rights, and other social and environmental development goals.


This self-regulation is an alternative to more traditional forms of regulation, originating from state control, or from binding national or international agreements. According to the authors, ethical trade allows stakeholders to harmonize their efforts to set voluntary standards governing developing country workplaces enveloped by the global supply chain.


The liberal concerns of the authors are all well and good; however, I am uncomfortable with their working assumptions, which are that ethical trade “moves beyond” (page 123) other forms of regulation, and that it is also “more appropriate to a globalized, liberalized economy” (page 123).


In regards to its moral superiority, ethical trade wins hands down over traditional regulation, which I might agree with; however, in what way ethical trade is moving beyond state sanctions is not clear, nor am I convinced that ethical trade is more appropriate, or, most importantly, advantageous over other forms of the liberal, global economy.


I’m not sure developing world programmers, for example, have been harmed by American companies outsourcing their work. They indeed may have benefited by the cruel and inhumane Hobbesian world of traditional economics.
Reviewer: G. Mick Smith Review #: CR129935 (0501-0115)


Computer ethics and professional responsibility : introductory text and readings
Bynum T., Rogerson S., Blackwell Publishers, Inc., Cambridge, MA, 2003. 400 pp. Type: Book
Date Reviewed: Jun 17 2004


This book is a direct response to the need for “social and professional” undergraduate content, called for in a key educational guideline, Computing curricula 1991 (page xvii). The premise of the editors is that the information revolution is not merely technological, but fundamentally social and ethical (page 2). In fact, over the years, the professional associations of computer practitioners have recognized and required “standards of professional responsibility for their members” (page 2).


The editors note the crucial, but still exploratory connections between computer ethics and human values; in addition, they summarize the historical milestones in computer ethics. Their brief, but important introductory essay provides useful background for what follows. Thereafter, the book’s sound organization easily allows an instructor to use the text, in part or in total. The editors state: “the book is divided into four parts, each of which includes (1) an editors’ introduction to provide background and context, (2) relevant essays by computer ethics thinkers, (3) a specific case to consider and analyze, (4) a set of helpful study questions, and (5) a short list of additional readings and Web resources to deepen one’s knowledge of the topic (page 10).”


The text’s organization lends itself to ease of adoption. Supplemental Web materials are available at http://www.computerethics.org and http://www.ccsr.cse.dmu.ac.uk. The four topic areas of the text are “What Is Computer Ethics?” “Professional Responsibility,” “Codes of Ethics,” and “Sample Topics in Computer Ethics.” As with any multi-authored edited volume, the individual chapters are of varying worth and utility, depending on interests or pedagogical needs, but I do want to emphasize the high quality of these selections.


I enthusiastically welcome this much-needed volume. In it, important terms by seminal thinkers elucidate the key issues in computer ethics. James Moor describes computing as a “universal tool,” which is “logically malleable” because the technology is “shaped and molded to perform nearly any task” (page 2).


My enthusiasm for this volume is tempered, however, by a caveat or two. Many people are so dazzled by technology that they optimistically view things like computing as liberating. Moor states: “the Gulf War was about information and the lack of it” (page 24) and “better that data die, than people” (page 25). Although General Schwarzkopf remarked that the enemy capitulated because of a lack of information, and Moor speculates that computing may allow fewer physical combatants, physical death is still just as brutally real as ever, nor is there any evidence to suggest that technology humanizes atrocities. The recent beheading of Nicholas Berg in Iraq springs immediately to mind.


Nonetheless, Moor views computers as special and unique, and thus the ethical issues associated with them are largely unprecedented historically. “Computer ethics is a special field” is something he states repeatedly (page 26). However, with this optimistic premise, Moor overstates the case for the special civilizing qualities of computing. Heidegger provides a useful caution: modern technology also is a means to an end.


Bynum also too sharply associates ethical knowledge with formal training, in describing his program for a method in case analysis. In contrast, Jack Rogers and Forrest Baird wrote a fine introductory philosophy textbook using case analysis, and assuming very little background for readers, in their book [1].


Bynum intellectualizes ethics unnecessarily. Bynum’s method includes an admonition to “call upon your own ethical knowledge and skills” (page 68), but then he also states that readers should “take advantage of one or more systematic analysis techniques” (page 69). He maintains that people usually do not have recourse to professional philosophy “or attempt to use broad philosophical principles” derived from, typically let’s say, Kant or Bentham (page 62).


This is surely wrong though. We can point out an analogy to the field of health care. Although most of us are not educated as physicians, almost all of us practice medical knowledge culled from schools, training, reading, hear-say, family stories, and so on. Likewise, commonly held ethical views are derived from these sources as well, and during somewhat more formal instruction in churches, synagogues, and temples. Not surprisingly, after teaching ethics to undergraduates for years, I am no longer surprised to scratch the surface and find pseudo-Kantians and Benthamites abounding.


When all is said and done, however, this volume deserves a wide reading. Although it addresses the specific need for undergraduate ethical content, many more computer practitioners should read this work. These handily collected essays are not only worthwhile reading, but should also be required reading for most computer professionals. If computing professionals have not read, or are not familiar with, this volume’s contents, they would be well served by a sound consideration of the issues contained therein.
Reviewer: G. Mick Smith Review #: CR129776 (0412-1466)
1) Rogers, J.; Baird, F. Introduction to philosophy: a case study approach. Harper and Row, New York, NY, 1981.


The government machine : a revolutionary history of the computer
Agar J., MIT Press, Cambridge, MA, 2003. 576 pp. Type: Book
Date Reviewed: May 7 2004


In this book, the author describes how the British government exemplifies the metaphor of organization as machine, and consequently adopts systematic procedures, statistical methods, and ultimately, electronic computers.


Agar examines philosophical metaphors associated with two centuries of Western thought. Central to this examination are philosophical warhorses ranging from Machiavelli, through Bodin, Hobbes, Rousseau, and Mill, to Marx and Bagehot. The author is on illuminating ground here, and he interestingly demonstrates the interplay between these various mechanistic metaphors, and the practical politics of early nineteenth century politicians such as Charles Babbage, with the scholarly understanding of the period as demonstrated in the work of Otto Mayr. This is all well and good.


Agar's real concern, however, is the "relationship of humans and machines,"; as it relates "to a peculiarly important machine: the general-purpose computer" (page 3). Furthermore, he argues "that the apotheosis of the civil servant can be found," albeit, surprisingly, in the computer (page 3). Agar's argument is that the government machine par excellence is the permanent civil service. Following Habermas' argument, regarding the "scientization of politics," nineteenth century British governance relies less on gentlemanly codes of conduct, and more on rational and professional routines of specialist expertise (page 7).


The standard historiography [1,2] maintains that experts degenerated to mere specialists, demoted to generalist products as servants to the civil service. Agar takes issue with this perspective, and demonstrates that overlapping and succeeding experts continue to arise.


He is convincing here, and I do not doubt that the civil service continued to be characterized by specialized technocrats, the expert statisticians of the nineteenth and early twentieth centuries. Bureaucratization of Britain most significantly takes place in the Treasury. Most importantly, though, for the history of computing, is that warfare alters informational techniques.


Expertise informs "the culture of the wartime command economy" (page 12). It is at this moment that the first stored-program electronic computer enters the story. Wartime organizations combine their expertise, concerned as they are with military prowess, and at Manchester University, a computer is built.


The main course of Agar's argument is that government administration and office mechanization are inextricably connected, and thus, from 1945 through the 1970s, the Treasury's Organization and Methods movement held sway. Thereafter, though, computerization is more controversial, since it failed to deliver (circa the 1980s through 1990s). More recently, computers have been embroiled in debates concerning big government (page 12).


I do take issue with certain aspects of this book. Agar is on good ground with the philosophical metaphor of mechanization. I find more troubling, though, his analysis of the relationship between humans and machines, and a point he never addresses regarding his own use of evidence.


A series of illustrations is used to supplement his points regarding the civil servant as a computing machine. Although an arranged Victorian bureaucrat's desk set is displayed, as typical for museum viewing, in an idealized fashion, the same conclusion should not be drawn for human subjects. Thus, the circa 1920 Egyptians pictured in Figure 5.3, the woman operating a 1930s machine in Figure 5.9, a "typical government office of the early twentieth century"; (Figure 5.13), "more mechanized government" (Figure 5.13), and the six Royal Air Force pictures (Figure 6.9) do not support Agar's contention. The machines, the people, and thus the portrayals are completely staged and sanitized for formal pictures. These offices look like no real offices that people inhabit. Not a hair on their heads is mussed, and not a snippet of paper is out of place. Servants are machines? Not in genuine offices inhabited by human beings.


More troubling, perhaps, is the title of this volume. A review is necessary to elucidate the actual contents of this text. People interested in computing history will find less that interests them here than they might expect in a volume subtitled "A revolutionary history of the computer." Along these lines, this is, indeed, not a general history of the computer at all, but, more strictly speaking, an examination of how the British governmental bureaucracy mechanized its operations, and unwittingly paved the way for the ultimate efficiency, the mechanical tool of the computer, and the drones who run them. People not interested in this more peculiarly British development should pass on this volume.


Finally, the volume needs minor editing. Randomly, I noted a necessary article needed on page 2, and a second parenthesis required on page 501. I am a bit taken aback that the publisher did not catch these edits before publishing. Also, the text would be clearer with a list of illustrations (there is none), and, most importantly, a bibliography would have been very helpful.
Reviewer: G. Mick Smith Review #: CR129566 (0411-1332)
1) MacLeod, R. Government and expertise. Cambridge University Press, New York, NY, 1988.
2) MacDonagh, O. The nineteenth century revolution in government: a reappraisal. Historical Journal 1, (1958), 52 & 67.


Technology in the social studies classroom
Agostino V. In Challenges of teaching with technology across the curriculum. Hershey, PA: Idea Group Publishing, 2003. Type: Book Chapter
Date Reviewed: Jan 6 2004


Agostino’s essay surveys technology in the K-12 social studies classroom. Claude Shannon, digital visionary at MIT, is his starting point, as is the seminal thinker, Marshall McCluhan (1911-1980), of “the medium is the message” fame. From the historical basis of how significant the media is, rather than content, the substance of Shannon’s and McCluhan’s research justifies Agostino’s leap to examine social studies-based technologies.


Hot or cold media, according to McCluhan’s key insight, discriminates between effective and useless mediums, and thus is key for using technology in the social sciences. How instruction is packaged electronically--whether TV, radio, or Internet--affects the perceiver’s understanding of the information.


A hot medium enflames the mind and imagination of the user; the user participates and reacts emotionally and intellectually. Cold media, by contrast, negates involvement, sending information regardless of receivership. Who has not seen a TV blaring away, privately or publicly, without human connection?


Agostino promisingly notes how the technologies associated with social studies matured from cold to hot media. However, other than a summary of the National Council for the Social Studies (NCSS) standards, an evaluation of criteria for social studies software and Web sites, and references to key sources, there is little here that is original, easily found elsewhere, or is all that helpful. Agostino’s suggestion that social studies teachers might integrate technology in their classes--central to his alleged interest in the classroom--is evocative of a sound chapter topic that would have been a genuine contribution, but that is not the chapter we have here.
Reviewer: G. Mick Smith Review #: CR128850 (0405-0615)


Who invented the computer? : The Legal Battle That Changed Computing History
Burks A., Hofstadter D., Prometheus Books, 2002. 415 pp. Type: Book
Date Reviewed: Oct 10 2003


Burks’ history attempts to uncover the critical relationship, and divergent accounts of invention between, two computing pioneers. In 1941, University of Pennsylvania physicist John Mauchly visited physics professor John Atanasoff at Iowa State University to discuss Atanasoff’s current project, thereafter known as the Atanasoff-Berry Computer (ABC). Interestingly, not five years later, Mauchly was acclaimed as the inventor of the Electronic Numerical Integrator and Computer (ENIAC). What ideas germinated between Mauchly and Atanasoff became grist for an exhaustive patent trial, and a source of historical controversy. In 1973, Judge Earl L. Larson named Atanasoff as the computer’s inventor. Despite Larson’s decision, credit for inventing the computer often favors Mauchly.


In light of the lengthy Larson trial, Burks asserts two critical points. First, Atanasoff rightly deserves due recognition for inventing the computer among scholars, and, second, there is a popular lack in acknowledging Larson’s verdict (p. 17). It should be noted, however, that Burks is a principal in published debates over computer origins, and her husband, Arthur, was an associate of Mauchly’s on the ENIAC project. Despite a suspicion of favoritism, I admire her even tone; she remains dispassionate throughout the text, despite contentious debate over her work in collaboration with, and as an associate of, her husband. On the other hand, I found Burk’s potential bias troubling, but not for the obvious reason; the Burks possibly favor Atanasoff, precisely because Arthur did know Mauchly well. This point is not addressed.


In any case, Burks exhibits a trial-like presentation, first placing the computer competitors at odds, then testifying, then subsequently offering a closing argument. The trial arrangement is clever, but distracting; academic voices are not incorporated well throughout the work.


Unorthodox distractions mar the work. I am sidetracked by Burks, busy with her trial presentation, arranging countervailing voices (Herman Goldstine, for example, and nemesis Nancy Stern et al., introduced late in her text). Burks is aware, according to a note in her bibliography, that Goldstine published a computer history with Princeton University Press. Goldstine’s history, however, is not noted in her index.


Moreover, Stern’s various works, in particular her From ENIAC to UNIVAC, are still regarded well by historians, which Burks acknowledges. Nonetheless, the historical profession can and does make mistakes, thus a revisionist history would be welcome. Burks, however, does not provide enough evidence to convince historians to disagree with Stern’s conclusions regarding innovation versus invention. Mauchly adapted ideas and rendered them practical, thus, for historians, Mauchly is best viewed as the computer’s key innovator.


Two other academic fields are represented in Burks’ work. Gerald U. Brock and David J. Kuck, an economist and a computer scientist, respectively, both recognize Atanasoff’s priority in computer history. Chapter 7 (of 13 chapters), “Other Voices,” addresses other works on this question. This chapter’s topic should be discussed early, and incorporated throughout the book.


Burks also has a troubling, non-academic way of attributing credit, quoting sources, and following academic convention. She refers at one point (p. 31), in a statement with no footnote or attributed source, to a discussion between Arthur and Mauchly. This is hearsay evidence quoted as fact. At another point (p. 405), she states that a friend told “us” (presumably herself and Arthur) about a Philadelphia presentation favoring Mauchly, a statement with which Burks obviously does not agree. Nonetheless, this third-hand information is assumed to be reliable, and is included. In short, the work suffers from the lack of a meticulous academic editor, who would have pruned these shortcomings to strengthen the book.


If this is not a scholarly history, is it valueless? No. The text correctly identifies Atanasoff as the genuine inventor of the computer, and Burks’ engaging writing style is accessible to a popular audience: those most likely to view Mauchly as the inventor of the computer. The text includes a clever, well done “As It Happened” section, which reads more like a novel, and is a fresh, clarifying approach to a complex history. I also appreciated the extensive quotes from Larson’s decision (p. 146 - 148), which is generally not given serious weight in popular presentations of computer history, a fact the author documents well throughout her work.


Thanks to Burks, the public will read of a scientific community far more divided, disorganized, and contentious than they suspect. The intended audience for this book is a well-versed reader; such readers will benefit greatly from a favorably designed, illustrated, and accurate account of computer history.
Reviewer: G. Mick Smith Review #: CR128354 (0401-0013)

"My Generation"

Good to see that the Who re-formed and are going strong. "Rock is dead; long live rock."

Review of: Founders At Work: Stories of Startups’ Early Days, Livingston, Jessica. Apress, Berkeley, CA: 2007, Computing Reviews.


Founders features thirty two interviews from the past twenty five years with the founders of startups and key employees of tech companies. The work is chockfull of interesting tidbits and practical lessons for would be or current entrepreneurs. Often overly technical people are not thought of as socially adept but most of these people are likable or interesting tech types. Hardly any of them characterize a cut-throat--though they are extremely competitive--mentality but many of them make decisions based on, somewhat surprisingly, a personal understanding of ethos.


The founder’s ethos is rooted in providing a needed service for themselves, users, or customers. They listened closely to user preferences and built something of value for them, and sometimes unwittingly, a profitable company ensues. Evan Williams relates how Blogger was the second idea for Pyra, and how the founders focused on their pet project, leaving their original product behind. Paul Graham, Co-founder of Viaweb, relates how he initially did not set out to found a company but inadvertently stumbled on a great product. Mitchell Kapor, Co-founder of Lotus Development, only pestered Personal Software with his ideas but ended up with “the killer app killer (p. 89)” by developing Lotus 1-2-3 and crushing VisiCalc, the leading application of its day.


Products evolved and the founders adjusted quickly, as in the case of PayPal and TiVo, and for Flickr and Blogger, the authoritative idea got in the way of the eventual product. For several founders, a good idea that helped themselves solved problems of their users so there already was a ready and willing client base, e.g., Hotmail, Del.ici.ous, Craigslist, and Firefox.


However, the book does not relate simple business common sense, pay attention to your customers. The devil, as they say, is in the details, and the execution of startup success is not a simple track to easily follow. The `as told to’ nature of the interviewees, actual stories of their challenges and strategies is captivating.


The founders share certain characteristics in common: hard-working, bright, responsive, innovative, and efficient. The startups' founders created value for their customers and in this, there is a major lesson here to learn for technologists in companies large and small. These founders demonstrate how to take a great idea and how these ideas evolve to fruition.


The book is valuable then for understanding the process of taking a key technical insight to completion. All of their methods may not work at larger companies, since these are startups, but in the course of the work larger companies passed on ideas that proved to be advantageous and money-making. Larger companies could learn a great deal about programmers and how to take their ideas respectfully to profit from them.


Several founders were unsure about starting a startup--Mitch Kapor, Steve Wozniak, and Mena Trott--or, were unsure about what their product should be: Joe Kraus and Max Levchin. Charles Geschke, while working at Xerox PARC, could never convince Xerox that PostScript was useful, thus, he started Adobe Systems. Critically though, these founders were quick studies, learned quickly, and moved to their own startups. The bottom line is that the founders came out ahead. Wozniak, most well-known of all, worked for HP while developing both Apple I and Apple II.


There are numerous points where the stories are charming. One of the best is offered by Ann Winblad of Open Systems who related her story of chutzpah:


So I get in front of these 60 or 70 guys and these guys are probably all in their 50s and I’m in my 20s, and we had a ‘blue light special,’ where we said, ‘If you give me a check today for $10,000, you can have unlimited rights to one of our modules.’ . . . . I went home with, I think, like 12 or 15 of these $10,000 checks in my purse (p. 301).


Livingston interviews the tedious as well, as in the case of one of the thorniest and most difficult stories: Phil Greenspun’s detailed description on the rise and fall of ArsDigita.


A final instructive lesson is the process of angel and venture capital funding: particularly in the case of ArsDigita. You will not find an in-depth analysis of venture capital but funding for ArsDigita led to its demise, oddly enough. The experience of the founder, Greenspun, among the other founders, offer insights on when to not accept, to be open to, or to garnish venture funding.


The conversational style of writing is unfortunately one of the weaknesses of the work as well. The prose could be improved without compromising the actual ideas of the speakers. The interviews seem to have been transcribed directly without editing. The repetitive reading of "yeah" for example proves grating. “Yes” is still accurate but proper as a substitute. Editing is needed: "of" should be off (p. 335).

Sunday, July 8, 2007

Court Rules on Alaska Joe & His "Bong Hits 4 Jesus." Banner



“Bong Hits 4 Jesus” is a meaningless expression, idiotic, and was first thought of by an 18-year old high school senior. But that does not mean that a high schooler can say it anymore.


High school senior Joe Frederick held up a banner with the inane words in 2002 but a decision by the Supreme Court limited student free-expression rights in public schools.


The banner with the infamous “Bong” message was held aloft while students and faculty were gathered to watch the Olympic torch pass by his school in Juneau, Alaska.


Unfortunately for Mr. Frederick, the principal, Deborah Morse, asked him to take the banner down, and Frederick refused. Morse believed the message was a promotion of illegal drugs in violation of school policy and the Court has ruled against students advocating drug use. She confiscated the banner and later suspended Frederick for 10 days. Frederick sued.


With this decision, the Court sided with the principal.


In a concurring opinion, Justice Samuel Alito underscores the narrow scope of the decision, claiming as he does, that the ruling does not restrict the right of students to comment on political or social issues, including debates about drug laws.


On the other hand, the dissent, written by Justice John Paul Stevens and joined by Justices David Souter and Ruth Bader Ginsburg, describes the decision as a “ham-handed, categorical approach” that is “deaf to the constitutional imperative to permit unfettered debate, even among high school students, about the wisdom of the war on drugs or of legalizing marijuana for medicinal use.”


This is a bad decision which restricts unfettered, public free speech by juveniles.


In an odd twist, if the banner had stated, "Wine Sips 4 Jesus," Frederick could have been interpreted as promoting an illegal drug (alchohol) for minors, or, he could be advocating imbibing sacramental wine, as in a Roman Catholic Mass. Should he be restricted in discussing another element or, more troubling, have another freedom, the exercise of religion, restricted?


The decision is in very troubling waters for freedom of expression. The Court's ruling more narrowly limits the free-speech decision in Tinker v. Des Moines, the test for virtually all student speech cases since 1969.


Regardless if Frederick was referring to a song, "Bonghits For Jesus" written by a band, Twice Baked in the 1990's, or, as he claimed it was a meaningless statement, I wouldn't want to see artists limited by a Court ruling in any case.

Saturday, July 7, 2007

"I'm gonna' find her," "Searchin,'" The Coasters, 1957



I noted the other day about a search that is new to me, Mahalo, that has interesting possibilities. In addition, if you are in the market for new search engines, as a supplement to what most people seem to be using, Google, you may want to consider Kartoo, Kooltorch or Clusty.


My old standby is Dogpile--not Google--but Maholo promises a pleasant new search experience because of its utility in UI (user interface) and most searches. If it can attain the stated 2007 goal of 10,000 data entries, it will be worth another look.


Kartoo has respectable results but I am not a convert to the interface. KoolTorch is a bit awkward to use even after I tried it a few times, and I am not convinced that the results are as good as they could be.


In the meantime, I'll be using Clusty more since it is made for researchers, is handy for my usual deep searching, and the extra feature to customize results is attractive. Finally, Clusty also has a convenient "Clustybar" add-on that is handy for my typical Firefox browsing.





BTW, I checked the lyrics of Searchin' on, you guessed it, good 'ole dogpile. Besides, I really like their dog graphics.

Life is bleaker in Iraq


The BBC World Service is monitoring the extra 30,000 U.S. troops deployed in Iraq since the launch of the "surge" in February. The criteria monitored are the effects, week by week, by looking at military casualty figures, the pressure on hospitals and quality of life for ordinary civilians.


The analysis is based on figures from U.S. and Iraqi authorities, Baghdad's hospitals and three families from different neighbourhoods in the capital.


Their analysis concludes that conditions are generally worse despite the recent efforts of U.S. to improve conditions.

Friday, July 6, 2007

"Danger! Danger! Will Robinson"




A news story by Computerworld announces the realization of what was only a dream in the '60s TV Show, Lost in Space, by reporting that IRobot Corporation debuts a prototype of a remote-controlled robot armed with a Taser electroshock weapon for military or law enforcement.


This release is in line with the increasingly sophisticated use of robotics such as the Predator which has developed tremendously in the conflict in Iraq after the rather bumbling attempts to nab or eliminate Osama Bin-Laden in Afghanistan. Richard Clarke, former White House anti-terror advisor, testified before the 9/11 Commission about the efforts to use the Predator drone effectively.


Visibility by the remote operator is key which proved to be a liability in early deployments of the Predator.


The new device carries a camera mounted on a 12-inch mast. The camera is capable of tilting and rotating to provide greater visibility to its operator during scouting missions.


This new small hybrid machine is based on Burlington, Massachusetts based iRobot's Pentium-based PackBot Explorer robot. The innovation here is to add a Taser X26 stun gun to the robot, that was developed jointly by iRobot and Taser International Inc.


If an IED is going to blow up in Iraq, better one of these babies than a soldier: language warning.


The Predator is effectively deployed in Iraq.

Thursday, July 5, 2007

Why Johnny Can't Shoot


Johnny can shoot who he wants to in the Insurgency game. He can mow down Americans at will if he (or she) chooses as illustrated (click on it for a better look) in one of the screenshots for the game.


The game manual states:

If your play style is more geared towards using real tactics, teamwork, communication, and personal skill, then the Conventional teams will likely be your favorite. If you just want to get into the action and have some fun, grab your AK47 or RPG and let loose as a Guerrilla or Paramilitary fighter. . . .


Engage in urban warfare where every window, doorway or road block is a potential ambush point and every object on the street needs to be watched with care. Fight against the occupation from behind windows and burned cars, with your finger on the trigger and an unsuspecting patrol down the street getting ever closer. Whatever you choose to do, Insurgency is sure to get your pulse racing and make your breathing feel heavy while you engage in such a unique and original combat experience.





Re-up!


Graph showing the percentage of and where foreign born soldiers come from to serve in the U.S. military.


600 soldiers re-enlisted in the United States military and were naturalized on the 4th of July at Camp Victory in Baghdad. Currently, the number of foreign born in the military is consistent with historical precedent. According to Emilio T. González, director of US Citizenship and Immigration Services (USCIS), the foreign born composed half of all military recruits by the 1840s and constituted 20 percent of the 1.5 million servicemen in the Union Army during the Civil War.


Even more revealing is considering that of these 600 soldiers re-enlisting, they come from 54 nations, they are aged 19 - 51 years old, and they include at least one Palestinian refugee.


The re-enlistees are sounding like a coalition force.

Hawaii 10,000








Mahalo expects to obtain 10,000 query results for search terms by the end of this year. How? By using results hand-picked by humans according to a report in the Wall Street Journal.

Wednesday, July 4, 2007

Unity & Freedom: Terrorist? Sunni? Shi'i? Iraqi?

In the video an Iraqi is kidnapped by terrorists and asked at gunpoint if he is Sunni or Shi'i. "I am Iraqi" he finally answers.


N.B: This anti-terrorist video from Al Arabiya is funded by the Saudi government: this is not for the faint of heart.


Tuesday, July 3, 2007

Thought Experiment: Imagine a World Without America



The world without America is something to think about. Let's think a bit more on the 4th of July.

Made in China



China is the number one place for malicious software and spam.



"In June, some 40% of malicious software worldwide originated from Beijing, nearly doubling from 21% in May," said Simon Heron, managing director for security vendor Network Box Corp.


Beijing retained the number one spot for malware, followed by Wattleup, Australia, at 3.7%, and Madrid, at 2.5%, according to Network Box.


I wonder what else there is in Wattleup?

Pandemic Planning Runs Afowl in the U.S.

Update: "Power companies include IT in disaster planning: Experts confer at this week's World Conference on Disaster Management


July 11, 2007 (Computerworld Canada) -- Given the Severe Acute Respiratory Syndrome (SARS) outbreak in 2002, the idea that companies should prepare their IT systems for what health officials have warned will be an influenza pandemic isn't so far-reaching.


And, the original post is:


A Gartner Inc. analyst, Ken McGee, stated that despite a bird-flu threat most IT companies "simply would not be ready" for disruptions according to a ComputerWorld report.


The World Health Organization (WHO) reported statistics on confirmed human cases of the Avian flu (H5N1) virus since 2003. The WHO recorded in 2006 that 79 people died from avian flu. This year, there have been 33 deaths.


If an avian influenza virus combines with a human influenza virus the new subtype created could be both highly contagious and highly lethal in humans. A likely scenario is a global influenza pandemic, similar to the Spanish Flu, or the lower mortality pandemics such as the Asian Flu and the Hong Kong Flu.


In May 2005, scientists urgently call nations to prepare for a global influenza pandemic that could strike as much as 20% of the world's population but this warning has largely been ignored.


To be clear, the avian flu cannot yet be categorized as a "pandemic" because the virus cannot yet cause sustained and efficient human-to-human transmission; the reported cases are recognized to have been transmitted from bird to human, but as of December 2006 there have been very few (if any) cases of proven human-to-human transmission.


On the other hand, if the avian flu imitates the "Spanish flu" of 1918–1919, it could spread to become a world-wide pandemic on all continents, unusually deadly and virulent as the 1918-19 event. Within 18 months the pandemic petered out but before doing so, in six months, 25 million people died: some estimates put the total of those killed worldwide at over twice that number. An estimated 500,000 died in the United States alone.



We are not ready for another 1918-19 event.

Monday, July 2, 2007

The French Want to "Berry" the Canadians


You have to hand it to the French. They are right on top of every international threat to their way of life. The Washington Post and Le Monde reported--I wouldn't make this up--carried a story dated 21 June 2007 that the French General Secretariat for National Defense has banned the use of BlackBerrys inside the presidential palace and government ministries.


Why?


BlackBerry data passes through servers in the United States and Britain.


Uhh, France, although the data may pass through those troublesome countries such as the U.S. and Britain, keep in mind that Research In Motion Limited (RIM) (TSX: RIM, NASDAQ: RIMM) is a Canadian wireless device company: RIM is headquartered in Waterloo, Ontario.


Once the lovely Canadians are suspected as international threats it is time to pack it in.


Rock on RIM!


The French seem to epitomize untruths as a part of their national character and they suspect anyone who is straightforward.


"Truths!" Charles de Gaulle is supposed to have shouted. "Did you think I could have created a (Free French) government against the English and the Americans with truths? You make History with ambition, not with truths," quoted in Thierry Pfister, "Lettre Ouverte aux Gardiens du Mensonge" (Open Letter to the Keepers of the Lie), Albin Michel, 1999.


Sunday, July 1, 2007

Lugar Senate Floor Speech Calls for Course Change in Iraq

Richard Lugar (R-Indiana) is basically correct on one point: Iraqis Don’t Want to Be Iraqis.


To make the point more directly I would argue that there is no Iraq. There never was. The world is still paying the price of the October 3rd 1932 decision to create Iraq under King Faisal.


The historical fiction that is Iraq is common to newer nations:


Common Themes in New Nations


Borders drawn by European colonial powers left nations with diverse religions and ethnic groups.


Ethnic and religious conflicts brought instability.


Military coups, one-party systems, and dictatorships kept some countries from achieving democracy.


Citizens and foreign lenders have forced former dictatorships to hold elections and transition to democracy.


Natural resources such as oil have been a source of wealth for some nations but have fueled conflicts.

Friday, June 29, 2007

Is the Internet Replacing TV?




In a significant development the Internet is on the cusp of surpassing TV as an "essential medium" for Americans according to a poll announced on 28 June 2007 by the Edison Media Research Inc. 33% of Americans selected the Internet as crucial for news and entertainment while TV elicited 36%. Radio could garner only a 17% loyalty and newspapers a distant 10%, according to the Internet and Multimedia 2007 report by the Somerville, N.J.-based market research firm. In 2002, only 20% of U.S. consumers said they preferred the Internet, compared to 39% for TV. The Internet has made significant gains in the intervening time. The survey polled 1,853 telephone interviews conducted in January and February with respondents age 12 and older who were chosen at random. Those polled were representative of the American population.


The point to take away from this survey is to conclude that the Internet has become just as important as television as a source of information and entertainment. While TV has limitations, the Internet may be even more of a handicap. The Net has an advantage in speed and is even more immediate of a medium than TV but the notion of balance, fairness, and depth of thought is even less.


In einer bedeutenden Entwicklung ist das Internet auf der Spitze des Übertreffens von von Fernsehapparat als "wesentliches Mittel" für Amerikaner entsprechend einer Abstimmung, die am Juni 28 2007 durch die Edison Mittel-Forschung Inc. verkündet wird. 33% von Amerikanern wählte das Internet vor, das für Nachrichten und Unterhaltung, während Fernsehapparat, entscheidend ist 36% herausbekam. Radio konnte nur 17% und Zeitungen 10%, entsprechend dem Internet- und Multimedia2007 Report durch das Somerville ansammeln, N.J.-based Marktforschungsunternehmen. 2002 sagte nur 20% von VEREINIGTE STAATEN Verbrauchern, daß sie das Internet bevorzugten, verglichen bis 39% für Fernsehapparat. Das Internet hat bedeutende Gewinne in der intervenierenden Zeit gebildet. Die Übersicht stimmten 1.853 Telefoninterviews ab, die im Januar geleitet wurden und Februar mit Antwortendalter 12 und älteres, wer zufällig gewählt wurden. Abgestimmte die waren Repräsentant der amerikanischen Bevölkerung. Der Punkt, zum von dieser Übersicht wegzunehmen soll feststellen, daß das Internet gerade so wichtig wie Fernsehen als Quelle der Informationen und der Unterhaltung geworden ist. Während Fernsehapparat Beschränkungen hat, kann das Internet sogar mehr eines Handikaps sein. Das Netz hat einen Vorteil in der Geschwindigkeit und ist von einem Mittel als Fernsehapparat sogar sofortiger, aber der Begriff der Balance, der Gerechtigkeit und der Tiefe des Gedankens ist sogar kleiner.

Tuesday, June 12, 2007

Blogs



Blogs are a new way to communicate although many are not read or are dying at the same time. The format is easy to use and not at all like the old days where everything was hard coded. I enjoy participating.

Review of: Establishing and Maintaining Long-Term Human-Computer Relationships


Date: Tue 26-07-2005 02:05 PM


Review Number: 38526


Establishing and maintaining long-term human-computer relationships


Establishing and maintaining long-term human-computer relationships Bickmore T., Picard R. ACM Transactions on Computer-Human Interaction 12(2): 293-327, 2005. Type: Article


The authors investigate the meaning of “human-computer relationship” and present techniques for “constructing, maintaining, and evaluating such relationships.” Their primary conclusion is that they “have motivated the development of relational agents as a new field of research.”


Two particular relational benefits motivate their research: trust and task outcomes (like improved learning) known to be associated with relationship quality. The authors are concerned with evaluating whether agents “establish and maintain long-term social-emotional relationships with their users.” Their experiment with 101 users interacted daily with an exercise adoption system for a month. Compared to an equivalent task-oriented agent the computer based relational agent was trusted
more.


Placing agents on mobile devices could provide a potent combination of relationship building (an ever-present “buddy”) and for behavior change (providing timely and appropriate interventions).


Work should be done regarding the nature of the buddy. Examples of conversational systems such as R2D2 in StarWars and Microsoft Office Assistant (“Clippit”) engendered mixed results: the former was cute and helpful, the latter intrusive and grating. And, there are political and ethical considerations in designing a buddy. Should the buddy be a thing or a neutered object as the two examples above, or perhaps a male, or as in the authors study a female? And, finally as the authors note, in these proactive buddy scenarios, which are monitoring us, raise issues
of privacy and security: with whom do you let it share which pieces of relational or personal information, and how does it earn your trust to do so?

Monday, June 11, 2007

When did the U.S. first commit ground troops to the Middle East?


When did the United States commit to placing ground troops in the Middle East? Did George Bush, Sr., or Jr., invent the doctrine? No.


The Eisenhower Doctrine, a message to Congress on 5 January 1957, was the foreign policy of U.S. President Dwight D. Eisenhower. The doctrine stated that the United States would use armed forces upon request in response to imminent or actual aggression to the United States. The doctrine made it clear that the U.S. would intervene in the Middle East against aggression. George Bush did not invent the doctrine; the Eisenhower Doctrine was U.S. policy for years before Bush.


The military action provisions of the Doctrine were applied in the Lebanon Crisis the following year,
in 1958, when America intervened in response to a request by that country's president.


The more things change, the more things stay the same.

Monday, June 4, 2007

American Hijab: non-American Hijab



Men don't cover themselves in Islam. Men do enforce women covering themselves. Guess who has the problem? Male Muslims. A Bahraini cleric even provides the guidelines on how to properly beat your wife. Or, a girl's actions may result in an "honor" killing.


Women pursued higher education and the professions for well over a hundred years in the West. Isn't it about time for Islam as well? Is there to be a Reformation in Islam? A French Revolution? I suppose if you never had the equivalent of a French Revolution you would tend to be backward: e.g., Olympe de Gouges.


Muslim women are oppressed. I hope there is no need to mention clitorectomies is there? This is exclusively a Muslim phenomenon: Christians, Jews, Buddhists, and Hindus do not practice this in any appreciable numbers. If human beings scar themselves or harm themselves is it any less oppressive because free will and choice is involved? Western law will still intervene in cases of attempted suicide or the harming of one's own person. The discussion of human rights is Western, not Islamist.


In Brasil street children are shot in the struggle for food and basic existence. An unpleasant, although based on a real story is the Brazilian film, City of God (Portuguese: Cidade de Deus), in which this brutal struggle for subsistence occurs. As it happens, City of God is a four-time Academy Award-nominated 2002 Brazilian film. Most of the actors had never acted before, and were, in fact, residents of favelas such as Vidigal and the Cidade de Deus itself. If I had any opportunity at all I would impose my own values, my own culture, and my own Western way of life on behalf of Third World children. Western culture is superior; the Third World values here are inferior.


The U.S. has imposed American values in the Afghan and Iraqi constitutions to require that a specific number of representatives be women. Progress comes slow to Islamism and is in response to Western American pressure. American feminists have not done tangibly as much to liberate women elsewhere.


As diplomats come to the U.S. they should respect American values so as not to offend any of us and wear American flag pins, and Africans and Arabs should remove their own traditional style of dress, in favor of Western attire. American male Muslims adopt Western dress easily, but contradictorily, the removal of the Hijab may be considered an invitation to rape according to Zakir Naik, a male Muslim apologist who often speaks in the U.S. But who would require, and agree, with a ridiculous proposition such as non-Westeners should be required to adopt American dress as an example of `when in Rome, do as the Romans do.' But this is precisely the thinking of a Pelosi who as American politician adopts non-Western dress: gutless.


There is no Arabic equivalent for citizen or democracy. Japan and Germany learned about how democracy really worked following their destruction in a World War. Likewise, some cultures may have to learn how to prosper economically and politically, like Japan and Germany following their defeat, at the hands of Western conquerors.


Please note:
Palestinian Female Suicide Bombers who are heavily covered (not to mention heavily armed).


And, if this is not enough to turn your stomach you can always watch how the children are raised. Small Palestinian children perform while dressed as suicide bombers and terrorists, heavily armed waving guns and knives. The crowd of approving parents waves and applauds the kids. I guess they never heard of baseball. I liked the kid with a doll: and, an assault rifle. All the girls are well-covered though and I suppose that is the important thing. An Islamist generation is coming.

When you are tired, when you are hungry, when you are feeling sorry for yourself, think about someone fighting for freedom.





Wednesday, May 30, 2007

al-Qaeda Slithers to Algeria


Police officers inspect the government palace in Algiers, Algeria, following a car bomb attack on April 11. Mohamed Messara/EPA FILE


The recent suicide bombers in Algeria have all the earmarks of an al-Qaeda operation accoring to counter-terrorism experts. Authorities seem to have uncovered an Iraqi connection once they cracked down on 60 local belligerants in the Saharan city of El Oued. Hamida Ayachi, editor of the Algiers-based daily Djazair News, has noted that contacts between Iraq and Algeria have intensified within the past year.

Who is prepared?

A recent IT study by AT&T ranked U.S. cities for disaster preparedness. In this survey New York and Houston received high marks while the Twin Cities and Cleveland did not.


The results arose from about 1,000 corporate IT managers collectively from 10 cities surveyed.


According to the survey, the rankings were based primarily on three criteria: "the state of a city's business continuity plan; whether the city has adequately educated employees about the plan and installed systems to implement it; and on cybersecurity policies and the use of managed security."

Tuesday, May 29, 2007

China Virus First Strike in Cyberwar

No, this is not today's headline, but, it could be. China's military is investigating their information warfare capabilities.


The Department of Defense (DoD) confirmed that China's military has developed cyberwarfare first-strike capabilities that include units charged with developing viruses to attack enemy computer networks.


In 2005, the People's Liberation Army began to incorporate offensive operations into its exercises, "primarily in first strikes against enemy networks," a DoD report stated.


This is the best level of unclassified American thought on China's capabilities.

MRAP to the rescue?



Like many Americans dismayed with the apparent lack of results in Iraq and the deaths of many fine young people, I've wondered if there is any hope. A reason for optimism is the MRAP (Mine Resistant Ambush Protected Vehicle). The new vehicles provide much improved protection, specifically against Improvised Explosive Devices (IEDs), which cause 70% of all U.S. casualties in Iraq. The IEDs are armor piercing and the MRAP offers some hope that our troops will be better protected. This is a step in the right direction. 58 of the 62 members of the House Armed Services Committee voted on 9 May for a $508.3 billion military authorization bill for fiscal 2008; the MRAP is a part of the new appropriations.


The day after the appropriations, the Pentagon announced plans to phase out its armored Humvees in Iraq and Afghanistan and send in vehicles that better withstand roadside bomb blasts, according to Defense Secretary Robert Gates.


The shift in appropriations means that modernization plans would be put on hold but given the seriousness of our troops vulnerability, this seems like sound planning.


Friday, May 18, 2007

Review: The Tertullian Project, by Roger Pearse

Revno: 000000547224 The Tertullian Project, by Roger Pearse, http://www.tertullian.org/


Date: Sun 29-05-2005 02:46 PM


The Tertullian Project, by Roger Pearse, http://www.tertullian.org/


In the Wikipedia age we live in Choice editors have wisely chosen
resources that seem likely to be of particular use to undergraduate
students. These are sites mostly likely consulted by the search mavens seeking a quick fix for instant info, i.e., our students. If a site is too flighty this is not reliably for our students but by the same token a too specialized site will be of little value at the undergraduate level.


Keeping these guidelines in mind, I evaluated the Tertullian Project. Pearse openly declares his amateur status, however, Pearse has helpfully assembled an impressive amount of work about this second and third century Christian apologist.


The assembler has artfully collected Tertullian references including more difficult to access textual material. In this type of endeavor, we need more enlightened amateurs such as Pearse because of its utility.


There are a variety of subsections dealing with various aspects of Tertullian’s life, writings and modern scholarship. The author has also conveniently ranked the more academic pages from the more light hearted areas. In addition to a brief historical outline on Tertullian the real strength of this compilation is the wealth of resources and information on Tertullian’s writings. The series of online shots of Tertullian’s pages provides a next best experience to dusting off an original text of Tertullian. The pages load quickly and easily which should be adequate even for slow modems and I found the navigation logically arranged.


Although this site is geared towards the seeking to be enlightened reader, there are a number of features that are useful to more advanced readers and specialists. The age of Wikipedia indeed is constructive in that specialists have not done what the Wikipedias have done so quickly and pleasantly.


Im Wikipedia Alter leben wir in den auserlesenen Herausgebern haben gewählt klug Betriebsmittel, die wahrscheinlich scheinen, vom bestimmten Gebrauch zu den Nichtgraduierten Kursteilnehmern zu sein. Diese sind der Aufstellungsorte meistens beraten durch die Suchemavens wahrscheinliches, die eine schnelle Verlegenheit für sofortiges Info d.h. unsere Kursteilnehmer suchen. Wenn ein Aufstellungsort zu flighty ist, ist dieser nicht zuverlässig für unsere Kursteilnehmer, aber aus dem gleichen Grunde ist ein auch fachkundiger Aufstellungsort von wenig Wert auf dem Nichtgraduiertniveau.


Diese Richtlinien im Verstand halten, wertete ich das Tertullian Projekt aus. Pearse erklärt öffentlich seinen laienhaften Status, jedoch hat Pearse hilfreich eine indrucksvolle Menge Arbeit über diesen zweiten und dritten Jahrhundert Christapologet zusammengebaut.


Der Versammlungsteilnehmer hat artfully Tertullian Hinweise einschließlich schwierigeres, Textmaterial zugänglich zu machen gesammelt.


In dieser Art der Bemühung, benötigen wir mehr erleuchtete Bewunderer wie Pearse wegen seines Dienstprogrammes. Es gibt eine Vielzahl der Unterabschnitte, die verschiedene Aspekte des Tertullian's Lebens beschäftigen, Schreiben und moderne Gelehrsamkeit. Der Autor hat auch bequem die akademischeren Seiten vom mehr Licht hearted Bereiche geordnet. Zusätzlich zu einer kurzen historischen umreiß auf Tertullian ist die reale Stärke dieser Kompilation die Fülle der Betriebsmittel und der Informationen über Tertullian?s Schreiben. Die Reihe der on-line-Schüsse der Tertullian's Seiten stellt eine folgende beste Erfahrung zum Abwischen weg von einem ursprünglichen Text von Tertullian zur Verfügung. Die Seiten laden schnell und leicht, die sogar für langsame Modem ausreichend sein sollten und ich fand die Navigation logisch geordnet.


Obgleich dieser Aufstellungsort in Richtung zum Suchen, erleuchteter Leser zu sein übersetzt wird, gibt es eine Anzahl von Eigenschaften, die vorgerücktere Leser und Fachleute nützlich sind. Das Alter von Wikipedia ist in der Tat dadurch konstruktiv, daß Fachleute nicht getan haben, was das Wikipedias so schnell und angenehm getan haben.

Thursday, May 17, 2007

While we slept . . .

One of the most frustrating aspects of understanding our tepid response to Islamism is how America was so slow to react. The distrust between the CIA and the FBI made both agencies less effective and in fact we've made little progress on the IT issues in the meantime. Years after the fact data collection and sharing is still problematic between law enforcement. The handling by law enforcement and political administrations in viewing the original 1993 attack on the World Trade Center as individual criminal issues, and not part of a concerted effort against Western infidels, was wrong-headed. While the American public was dazzled by the O.J. Simpson trial and the Jon Benet Ramsay murder investigation the West was under attack. The blind Sheik Rahman and his fellow terrorists were already conspiring to blow up N.Y. city landmarks and bridges. This nation slept during the Reagan years when we withdrew from Lebanon after the Marine barracks truck bombing right through the Clinton years when we pulled out of Somalia after the downing of a Blackhawk.


It is little wonder that America was viewed as a tepid power. Weakness emboldens the desperate to increase their efforts. The victims on 9/11 paid the price.

Monday, May 14, 2007

The Caliphate


The Times of London notes the increasing importance the al Qaeda-affiliated groups on Iraq are placing on establishing a militant Islamist state in the Sunni regions of Iraq.


In particular, al Qaeda's Islamic State of Iraq emphasizes an important theme, the conquest of specific territory in order to establish the beginnings of God's kingdom on earth.


The jihadists place a physical caliphate on earth. It is to be achieved in conjunction with the divinely-blessed spread of jihad across the globe.


The U.S. military faces insurgents with this conviction and the use of classic Al-Qaeda tactics.

DHS and Privacy vs. Real ID


I have to agree with a privacy committee of the DHS (Department of Homeland Security) assessment: oppose the Real ID bill, which proposes to create a national standard for state driver's licenses and other forms of state-issued identification.


This bill raises too many privacy, security, and logistical concerns.


The Real ID Act of 2005, in the wake of terrorism, sets minimum national standards that states must use when issuing driver's licenses and other identification. For example, this includes a photo ID, documentation of birth date and address, proof of citizenship or immigration status, and verification of Social Security numbers. As proposed, this law would go into effect in about a year.


Individuals would need Read ID-compliant cards for air travel, accessing federal buildings, or for receiving federal benefits. Moreover, all state driver's license databases would be linked.


The act is objectionable on the grounds that this is a de facto national ID system. Eventually, the U.S. government could spy on ordinary, law-abiding citizen.


Also troubling is that there is no plan for securing the stored identity data. The states are not accountable for the data.


"Failure to provide openness and transparency undermines accountability and trust," the DHS committee noted in its comments.


Concerns along these lines have been expressed by the National Governors Association, National Conference of State Legislatures, and the American Association of Motor Vehicle Administrators.


Several members of Congress have also expressed their objection: Sens. Daniel Akaka (D-Hawaii) and John Sununu (R-N.H.), who proposed the Identification Security Enhancement Act of 2007. The bills co-sponsors include Sens. Patrick Leahy (D-Vt.) and John Lester (D-Mont.).


If the government had thinkers, they would enact a Real ID for criminals and skofflaws. The identification targets the wrong people, the compliant. Of course, people could voluntarily join the program, in fact, this would advantageous for frequent travelers and those who need consistent, easy transit.


As it stands, this is a bad law.


In an update on 6 July 2007, the Governor of New Hampshire signed a bill that rejects federal Real ID law

Sunday, May 13, 2007

On 11 May 2007 a Guilty Verdict was handed down in a U.S. - China Spy Case

This is a troublesome case in that it may be indicative of how difficult it may be to nab spies. After a six-week trial a federal jury convicted a Chinese-born engineer of conspiring to export U.S. defense technology to China, including information on an electronic propulsion system that would make submarines virtually undetectable.


Chi Mak exploited his low-key lifestyle and his good reputation to hide his real intent: conspiring to pass U.S. secrets to China for over two decades. Mak is a naturalized U.S. citizen who confessed to the crime and revealed that he lied to investigators.


This individual apparently had no warning signs that he was suspect until he finally was found out and revealed his real intent on his own.


How you combat a clever individual like this without infringing upon individual liberties is an open question.

The U.N. next door

America is filled with communities where it appears as though the U.N. lives next door. However, in the case of the recently charged six terrorists in Pennsylvania and New Jersey, were there any signs that perhaps something was amiss? The terrorists might stand out but it was not considered a major point to note their Muslim religious garb. It is common enough in many communities in the U.S., especially in urban areas, that characteristic Muslim garb is not out of the ordinary.


To wit, the six did have minor, but consistent run-ins with the law. The three arrested brothers regularly attended South Jersey Islamic Center in Palmyra, N.J., where, according to U.S. Attorney Christopher J. Christie, they recruited another alleged conspirator. In short, the accused were no strangers to the police. They were habitual offenders, stopped dozens of times a year for speeding, illegal passing, and driving without a license. One of the accused, Dritan Duka was issued four citations during one five-week period. The three had driving privileges suspended, meaning that they could not even apply for a license, 54 times in less than a decade. Moreover, in 2000, Dritan Duka pled guilty to possession of drug paraphernalia and Shain Duka to possession of marijuana.


One characteristic to look for where the U.N. will break down is the flagrant, habitual, and lawless approach of potential troublemakers. The six, despite their protests that their Muslim background attracted attention, is not true. The accused brought about attention upon themselves by their anti-social behavior. America is a great country, too great to allow those who violate community standards unfettered freedom.

Tuesday, May 8, 2007

Is this war?

Six men arrested as two attempted to buy guns Monday; and, I might add, this is close to home. Apparently, the men laughed as they watched videos of attacks on Americans, including one video where a marine's arm is blown off. The arrested are "Islamic radicals," according to the U.S. Attorney's office. The men were planning to shoot soldiers at Ft. Dix Army base according to the indictment.

The six include three brothers, all with the last name Duka, who were born in the former Yugoslavia and are illegally residing in the United States. The three are: Eljvir, 23, Shain, 26, and Dritan, 28, and said the three operate businesses known as Qadr Inc., Colonial Roofing and National Roofing.

The other three men charged are Mohamad Ibrahim Shnewer, 22, of Cherry Hill, New Jersey, a U.S. citizen born in Jordan who is employed as a taxicab driver in Philadelphia; Serdar Tatar, 23, of Philadelphia, born in Turkey, whose last known employment was at a 7-Eleven; and Agron Abdullahu, 24, of Buena Vista Township, born in the former Yugoslavia and employed at a Shop-Rite Supermarket.

One twist to the story is to see if there is any difference in the disposition of the case in that they are illegal, a U.S. citizen, or another classification.

Saturday, May 5, 2007

How Jews, Christians, and Muslims celebrate the Sabbath

The idea to survey this topic came about in preparing a review of: Ringwald, Christopher D. A day apart: how Jews, Christians, and Muslims find faith, freedom, and joy on the Sabbath. Oxford, 2007.

G. Mick Smith, review of Armstrong, Karen, The Great Transformation, Choice, February 2007.

G. Mick Smith, review of Armstrong, Karen, The Great Transformation, Choice, February 2007.

The following review appeared in the February 2007 issue of CHOICE.

44-3239 BL430 2005-47536 CIP
Armstrong, Karen. The great transformation: the beginning of our
religious traditions. Knopf, 2006. 469p bibl index ISBN 0375413170,
$30.00

In this current age of "the great transformation," independent scholar
Armstrong postulates how the sages of the foundational Axial Age would address unspeakable horror, violence, and desperation. The distinctive and historic Axial Age faiths announced the abandonment of selfishness and a spirituality of compassion. They stated that first must come personal responsibility and self-criticism, and that practical, effective action must follow. Herein lie the problematic aspects of Armstrong's work and the reasons why this book can be misleading. Its most serious flaw is its finding evidence for ethical behavior in almost all religious behavior and ritual. Armstrong seems to miss the insights of René Girard and Walter Burkert, who have demonstrated how violence and the sacred are inextricably linked. Another problem is that, oddly, she states that Hitler expressed a "militant exclusion of religion from public policy." In fact, Hitler divided German Christians by founding the Patriotic Church in contrast to the Confessing Church. One other interesting side note is that Armstrong's research is based on older published works (only 36 of 284 works cited in the bibliography were published in 2000 or later). Summing Up: Optional. Lower-/upper-level undergraduates; general readers.

Review: The Forgotten Revolution, Lucio Russo

25 Jan 2006
Computing Reviews

The Forgotten Revolution describes the explosion of science in the third
and second centuries BCE. In the age of Archimedes, Eratosthenes, and
Euclid science as we ordinarily recognize the field began as a category
of human knowledge. The forgotten in the title refers to the Alexandrian texts
that were lost and the notion that the breakthroughs of the Renaissance
were based on these texts. Unfortunately, these texts were lost in the
ancient period and subsequently during the Renaissance as well. The
author, Lucio Russo, notes that both scientific revolutions were also
accompanied by great changes and an invigorated awareness in related
fields, such as art and medicine.

The revolution in science is surveyed in ten chapters, an epilogue, and
a mathematical appendix. In chapters 1-7 there is detailed coverage of the
birth, rise, decline and fall of Hellenistic science and technology:
mathematics, mechanics of solids and fluids, topography and geodesy,
optics, astronomy; civil, mechanical, naval, and military engineering; anatomy,
physiology, biology, and medicine; economics and mass production
techniques; architecture and urban development; psychoanalysis and cognitive
sciences.

An interesting inquiry of Russo¹s is the methodological nature of
Hellenistic mathematics. More important than the discoveries of the
Greeks noted above is the method they introduced, that is, the axiomatic,
deductive manner of argumentation that typifies mathematics. In general, the
deductive method, allied to the experimental method also introduced by the
Hellenistic scientists, is a modern approach to exact sciences.

The brilliance of the Hellenistic scientific revolution was lost in that
scientific method was abandoned in antiquity and its renaissance was
incredibly lax and centuries in coming. As late as the age of Newton,
who was representative Renaissance thinker, scientists worked at a level
still far below the Hellenistic level of rigorous method. This in itself is a
worthwhile point to make. When Russo relies on the philological evidence
alone he makes a convincing argument.

Another key inquiry is the idea that the heliocentric theories of
planetary motions were discovered far before the Hellenistic era. Aristarchus of
Samos and a century later with Hipparchus of Nicea Russo convincingly
demonstrates evidence that some Hellenistic writers knew of heliocentric ideas. They
developed a dynamical theory of planetary motions based on the attractions
of the planets toward the Sun. The work of Hipparchus is unfortunately
no longer extant but in an obscure work of Plutarch, sprinkled throughout
the Natural History of Plinius, the Natural Questions of Seneca, and the
Architecture of Vitruvius, enough philological evidence suggests that
the cultural elites of the early Roman Imperial period knew heliocentric
theories.

Much later Newton, who had the complete works of Plutarch in his
library, apparently included the heliocentric idea but without a credit attached.
Although some may think this an unethical act, it was in fact commonly
done if an author works in an academic field and elsewhere clearly credits
one¹ssources, and Newton does.

One simple reason the tradition of heliocentric theory is lost is that
the commonly cited Principia only included this portion in a Scholia or an
annotation on the original manuscript not appearing in the commonly
printed version.

Russo should be appreciated not only in the detailed transmission of
specific ideas but within a major historical problem of antiquity. The
decline and fall of antique civilization was occurring as Hellenistic
ideaswere pushed to the background as Max Weber thoroughly discussed the
issue of decadence. As trade in antiquity declined, so did the accompanied
flowering of art, literature, and scientific inquiry. The key insights of
Hellenistic thought languished then until the Renaissance and their re-discovery by
modern scientific thought.

This volume would not be of interest for most computing professionals
because the only closely related topic are analog computational aids. It
would however be of note for a general educated audience with an
interest in history of science, mathematics, physics, engineering, astronomy,
medicine and classical civilizations.

Four works read in tandem with Russo¹s would be instructive: The
Mathematics of Plato's Academy, by David H. Fowler (Oxford, 1999), and
The Shaping of Deduction in Greek Mathematics, by Reviel Netz
(Cambridge, 1999), Otto Neugebauer, Exact Sciences in Antiquity, and Sir Thomas
Heath, A History of Greek Mathematics. In addition, these four works are often on
sounder ground than Russo¹s volume.

Review: Dis/integrating animals, Warkentin

Date: Mon 26-06-2006 11:14 AM

Computing Reviews:

"Dis/integrating animals: ethical dimensions of the genetic engineering of animals for human consumption" Warkentin T. AI & Society 20(1): 82-102, 2005

IT professionals should be reflecting on this piece to answer questions of identity. What we are as humans is more typically posed to technologists by thinkers such as George Dyson who argues that machines, specifically computers, will evolve beyond humans. On the other hand, Warkentin provocatively claims that we become less human by genetically altering animal bodies.

The question is: are we becoming something beyond human because of our machines or is genetic engineering robbing us of our humanity?

Warkentin ranges over feminism, biology, and philosophy to lament that genetic technologies engineer impure food and ending the suffering of animals through genetic modification diminishes both animals and humans.

Warkentin reveals a secular sensibility for long-standing religious issues of identity, purification, and suffering.

Religions generally maintain that food or anything that enters the body may pollute. Indeed, contamination by polluted food is a pervasive danger, typically involving intricate avoidance principles which Orthodox Judaism, particularly kosher rules, artfully articulates.

In the classic work Purity and Danger (1966) Mary Douglas focuses on pollution with a cogent analysis of food taboos. Religions outline an agenda for congregants to follow maintaining their sense of identity.

Warkentin maintains that human identity is diminished or defiled by eating genetically engineered food, what Douglas introduces as “dirt.”

But that ingesting a given food which has a spiritually polluting quality independent of our post-modern cultural context does not seem to be based on an objective fact. Warkentin ultimately does not demonstrate how genetically modified food pollutes us.

No response from democracynow.org

Date:
Tue 11-07-2006 04:16 PM

I object to McCarthyism

I happened to view your broadcasting today (democracynow.org) for the first time and I am
writing to express how appalled I am by your abysmal ethics. The anchor,
Ms. Goodman, sequed into a story with the line, "we go now from a story
of an American soldier raping and murdering Iraqi civilians to a story
of a soldier who went AWOL." I am horrified that a broadcaster would try
and convict an individual on live television a la' McCarthy. Correct me
if I'm wrong but does not this individual, as reprehensible as many
people would find him if he is in fact quilty, have the right to due
process and a jury of his peers to convict him? This has not happened.
Perhaps it will, perhaps it will not but this person has the right in a
democracy to his day in court and you have no right to convict anyone on
television. Ms. Goodman had the perfect opportunity to instruct the
Iraqi journalist--employed by the L.A. Times--in the rules of evidence
and how democracy works but she squandered the moment and uncritically
accepted the hearsay evidence presented by the journalist. I object to
McCarthyism and the fraud that is entitled "Democracy Now." Indeed,
democracy works and your broadcasting should attempt to live out the
ideals, ethics, and the objective journalist responsibility that it
entails.
Regards,
G. Mick Smith, PhD

Review: A Companion to Nietzsche, ed. Keith Ansell Pearson

The following review appeared in the July 2006 issue of CHOICE.

A Companion to Nietzsche, ed. by Keith Ansell Pearson. Blackwell
Publishing, 2006. 600p bibl index (Blackwell companions to philosophy,
33) ISBN 1405116226, $149.95

This worthwhile collection portrays many of the most preeminent
Nietzschean scholars in Europe and the US. The volume adds to an
excellent series in philosophy by Blackwell. It offers a moving array
of Nietzsche scholars who represent a plethora of approaches. Following
the two practical introductions to Nietzsche's life, philosophy, and
style, the varied essays address the most familiar Nietzschean themes,
as well as important but more neglected ones such as Nietzsche's notion
of science. The major sections include "Art, Nature, and
Individuation," "Nietzsche's Philosophy of the Future," "Philosophy of
Mind," "Philosophy and Genealogy," "Ethics," "Politics," "Aesthetics,"
and "Evolution and Life." Moreover, contributors offer innovative
treatments of Nietzsche's core and enigmatic ideas such as eternal
recurrence, the will to power, and the "overhuman." Interestingly woven
together are Nietzsche's published and unpublished Nachlass. Among the
contributors are a stimulating selection of scholars and new writers on
Nietzschean themes. They include Jill Marsden, Babette E. Babich,
Volker Gerhardt, Kathleen Marie Higgins, Laurence Lampert, Richard
Schacht, Andreas Urs Sommer, and Paul van Tongeren. Summing Up:
Recommended. Graduate students and above.

Review: Evolutionary Scheduling

"Evolutionary Scheduling: A Review," Hart, E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220.

Date: Wed 13-09-2006 08:33 AM

ComputingReviews.com

Review Number: 54703

Evolutionary Scheduling

“Evolutionary Scheduling: A Review” Hart E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220.

This review article is of substantial value for those who need an update on research material that applies evolutionary computing methods to scheduling problems. The last major survey has not been performed since 1999, when a major statement emerged from the European Network of Excellence on Evolutionary Computing (EVONET). The three co-authors here have done an admirable overview and report on “current trends, achievements, and suggesting the way forward” (191) in this regard. In particular, this article is of wide interest since the ideas can be applied to many common scheduling issues such as job-shop scheduling problems, an area much discussed in academic literature. The authors point out that algorithms today are capable of tackling enormous and difficult real-world problems, a major advance over earlier surveys such as the EVONET report.

Review: Hempel, Sandra, The Strange Case of the Broad Street Pump

The following review appeared in the July 2007 issue of CHOICE.

CHOICE: 000000561309

Hempel, Sandra. The Strange Case of the Broad Street Pump: John Snow and the Mystery of Cholera, University of California Press, Berkeley: 2007.

Reviewed: 03/20/2007

In this well-written medical history the author, Sandra Hempel,
fascinatingly portrays the mysterious transmission of cholera in 1831
London. Although written at the level of sound academic standards,
Hempel relates a ripping yarn by demonstrating how the monk-like
physician John Snow alone methodically, but insightfully, investigated
how cholera proliferated through drinking water. Snow disregarded
conventional medical wisdom while scientifically identifying the origin, conveyance, and contagious nature of the cholera pandemic. Still this work is not for the faint of heart. In excruciating detail Hempel recounts how the most vulnerable, in one poor unfortunate case, three-year old William Somerville, underwent an alleged cure that was far more barbaric than the cholera itself which may have cleared up on its own. However, the pandemic necessitated a scientific cure as cholera bafflingly seized millions from the squalor of Soho to the elite confines of the Royal Medical College and the Privy Council. In her masterful hands, Hempel is to be commended for writing an intriguing account of an historic plague, sprinkled with a vibrant cast of actors offering instructive and timely insights for current challenges of infectious diseases: malaria, yellow fever, and cholera.


Hempel, Sandra. The strange case of the Broad Street pump: John Snow
and the mystery of cholera. California, 2007. 321p bibl index afp
ISBN 0520250494, $24.95

Wednesday, May 2, 2007

Review: Dickheiser, M. Game Programming Gems 6, Charles River Media, Boston: Massachusetts, 2006.

This is the sixth volume of the popular and practical Game Programming Gems series. The series from the 1st volume has addressed timely issues as they have emerged; currently, teams are growing larger and developers are increasingly specialists. The Gems series addresses this need by providing state-of-art, readily available material for the specialist and handy resources that may be outside your bailiwick. Also timely is that current machines and player expectations are requiring higher-fidelity models and animations, fancier physics and graphics effects, and more intelligent AI. With these rising expectations on the work of programmers and the greater level of sophistication required, these demands entail flexible teams and longer production schedules, especially in light of scripting and data-driven systems (p. 319). Of course, the biggest issue is cost (p. xi). Helpfully, the over 50 articles in the volume address these demands and expectations.

An important fact is the collaborative reach of the game technology experts in that they arise from sundry backgrounds and over twenty countries. The experts are not only gaming experts but some are from outside the industry. Moreover, collaboration is truly global: from every part of the world, encompassing such diverse places as Eastern Europe, Latin America, North America, Singapore, and Japan.

This volume is not recommended for a faint of heart newer game programmer since this does not really function as a primer although it is very readable nonetheless. More likely is that the specialist will pick and choose their topics of interest and the dedicated programmer will learn a great deal of interest by reading more thoroughly. The series is aptly named Gems and there are nuggets galore.

A pragmatic way to find the needed gems is to peruse the seven parts for something of interest: Section 1 General Programming; Section 2 Mathematics and Physics; Section 3 Artificial Intelligence; Section 4 Scripting and Data-Driven Systems; Section 5 Graphics; Section 6 Audio; and Section 7 Network and Multiplayer. Most programmers would benefit by finding their particular areas of interest and then look for handy tools in other sections.

General Programming is not for the novice, as the name may imply but rather involves multiprocessor techniques, unit testing, and security fingerprinting. Mathematics and Physics is a constant and involves all things FPU, CPU, and GPU. Artificial Intelligence is always popular, and in this volume demonstrates current work in cognitive science and machine intelligence, with a strong representation from academia. AI techniques shown here can be applied in “other systems in the engine” (p. xvii). The inaugural appearance of Scripting and Data-Driven Systems is a worthwhile addition to the Gems series. The most popular and emerging languages (with the main core C++: Python, Lua, GameMonkey, and AngelScript) provide a starting point for your engine with a flexible backbone. Graphics combines old and new technologies with numerous sharp techniques. Audio includes insightful ideas for advanced uses of the audio system. Finally, Network and Multiplayer is another emerging area as global players, Massively Multiplayer Online Prototype (MMOP), plug in to play. As the gaming content has increased so too has the multiplicity of players and now, across networks.

The Editor notes that gaming is not just for game developers anymore. Game-based Learning, Edutainment, commercial and military training simulations, academics, and other "serious games" have all made their mark (p. xv). The upshot of this new found attention is that the "noobs" (p. xvi, a slang insult for newbies) are starting to feed back their input into gaming. At this point, the implications of this feed back is not at all clear but what is obvious is that gaming will be transforming into new and potentially very excitingly complex areas.

The focus in this volume accounts for gaming complexity focusing as it does on providing cutting-edge development that is of interest to those outside the gaming industry. Another sign of gaming maturity is the rise of growth and complexity issues related to the size and intricacy of games. The section on Scripting and Data-Driven Systems, along with Network and Multiplayer, converge in the two emerging areas of interest to those outside gaming. Some of the most exciting topics are these two, especially when converged. A related area of convergence is how AI is of interest to those inside gaming and outside it as well. If well coded, AI can provide the behavior of characters that are seemingly more intelligent, more human-like, hence yielding a more involving game.

This volume, although replete with complex topics, is readable, current, and just about the best in its field. The enclosed CD has source code illustrating points in the articles. The Index is really handy as well, including as it does information on all six volumes in the series. The illustrations are well done and add desirable visual examples.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.