Wednesday, May 30, 2007

al-Qaeda Slithers to Algeria


Police officers inspect the government palace in Algiers, Algeria, following a car bomb attack on April 11. Mohamed Messara/EPA FILE


The recent suicide bombers in Algeria have all the earmarks of an al-Qaeda operation accoring to counter-terrorism experts. Authorities seem to have uncovered an Iraqi connection once they cracked down on 60 local belligerants in the Saharan city of El Oued. Hamida Ayachi, editor of the Algiers-based daily Djazair News, has noted that contacts between Iraq and Algeria have intensified within the past year.

Who is prepared?

A recent IT study by AT&T ranked U.S. cities for disaster preparedness. In this survey New York and Houston received high marks while the Twin Cities and Cleveland did not.


The results arose from about 1,000 corporate IT managers collectively from 10 cities surveyed.


According to the survey, the rankings were based primarily on three criteria: "the state of a city's business continuity plan; whether the city has adequately educated employees about the plan and installed systems to implement it; and on cybersecurity policies and the use of managed security."

Tuesday, May 29, 2007

China Virus First Strike in Cyberwar

No, this is not today's headline, but, it could be. China's military is investigating their information warfare capabilities.


The Department of Defense (DoD) confirmed that China's military has developed cyberwarfare first-strike capabilities that include units charged with developing viruses to attack enemy computer networks.


In 2005, the People's Liberation Army began to incorporate offensive operations into its exercises, "primarily in first strikes against enemy networks," a DoD report stated.


This is the best level of unclassified American thought on China's capabilities.

MRAP to the rescue?



Like many Americans dismayed with the apparent lack of results in Iraq and the deaths of many fine young people, I've wondered if there is any hope. A reason for optimism is the MRAP (Mine Resistant Ambush Protected Vehicle). The new vehicles provide much improved protection, specifically against Improvised Explosive Devices (IEDs), which cause 70% of all U.S. casualties in Iraq. The IEDs are armor piercing and the MRAP offers some hope that our troops will be better protected. This is a step in the right direction. 58 of the 62 members of the House Armed Services Committee voted on 9 May for a $508.3 billion military authorization bill for fiscal 2008; the MRAP is a part of the new appropriations.


The day after the appropriations, the Pentagon announced plans to phase out its armored Humvees in Iraq and Afghanistan and send in vehicles that better withstand roadside bomb blasts, according to Defense Secretary Robert Gates.


The shift in appropriations means that modernization plans would be put on hold but given the seriousness of our troops vulnerability, this seems like sound planning.


Friday, May 18, 2007

Review: The Tertullian Project, by Roger Pearse

Revno: 000000547224 The Tertullian Project, by Roger Pearse, http://www.tertullian.org/


Date: Sun 29-05-2005 02:46 PM


The Tertullian Project, by Roger Pearse, http://www.tertullian.org/


In the Wikipedia age we live in Choice editors have wisely chosen
resources that seem likely to be of particular use to undergraduate
students. These are sites mostly likely consulted by the search mavens seeking a quick fix for instant info, i.e., our students. If a site is too flighty this is not reliably for our students but by the same token a too specialized site will be of little value at the undergraduate level.


Keeping these guidelines in mind, I evaluated the Tertullian Project. Pearse openly declares his amateur status, however, Pearse has helpfully assembled an impressive amount of work about this second and third century Christian apologist.


The assembler has artfully collected Tertullian references including more difficult to access textual material. In this type of endeavor, we need more enlightened amateurs such as Pearse because of its utility.


There are a variety of subsections dealing with various aspects of Tertullian’s life, writings and modern scholarship. The author has also conveniently ranked the more academic pages from the more light hearted areas. In addition to a brief historical outline on Tertullian the real strength of this compilation is the wealth of resources and information on Tertullian’s writings. The series of online shots of Tertullian’s pages provides a next best experience to dusting off an original text of Tertullian. The pages load quickly and easily which should be adequate even for slow modems and I found the navigation logically arranged.


Although this site is geared towards the seeking to be enlightened reader, there are a number of features that are useful to more advanced readers and specialists. The age of Wikipedia indeed is constructive in that specialists have not done what the Wikipedias have done so quickly and pleasantly.


Im Wikipedia Alter leben wir in den auserlesenen Herausgebern haben gewählt klug Betriebsmittel, die wahrscheinlich scheinen, vom bestimmten Gebrauch zu den Nichtgraduierten Kursteilnehmern zu sein. Diese sind der Aufstellungsorte meistens beraten durch die Suchemavens wahrscheinliches, die eine schnelle Verlegenheit für sofortiges Info d.h. unsere Kursteilnehmer suchen. Wenn ein Aufstellungsort zu flighty ist, ist dieser nicht zuverlässig für unsere Kursteilnehmer, aber aus dem gleichen Grunde ist ein auch fachkundiger Aufstellungsort von wenig Wert auf dem Nichtgraduiertniveau.


Diese Richtlinien im Verstand halten, wertete ich das Tertullian Projekt aus. Pearse erklärt öffentlich seinen laienhaften Status, jedoch hat Pearse hilfreich eine indrucksvolle Menge Arbeit über diesen zweiten und dritten Jahrhundert Christapologet zusammengebaut.


Der Versammlungsteilnehmer hat artfully Tertullian Hinweise einschließlich schwierigeres, Textmaterial zugänglich zu machen gesammelt.


In dieser Art der Bemühung, benötigen wir mehr erleuchtete Bewunderer wie Pearse wegen seines Dienstprogrammes. Es gibt eine Vielzahl der Unterabschnitte, die verschiedene Aspekte des Tertullian's Lebens beschäftigen, Schreiben und moderne Gelehrsamkeit. Der Autor hat auch bequem die akademischeren Seiten vom mehr Licht hearted Bereiche geordnet. Zusätzlich zu einer kurzen historischen umreiß auf Tertullian ist die reale Stärke dieser Kompilation die Fülle der Betriebsmittel und der Informationen über Tertullian?s Schreiben. Die Reihe der on-line-Schüsse der Tertullian's Seiten stellt eine folgende beste Erfahrung zum Abwischen weg von einem ursprünglichen Text von Tertullian zur Verfügung. Die Seiten laden schnell und leicht, die sogar für langsame Modem ausreichend sein sollten und ich fand die Navigation logisch geordnet.


Obgleich dieser Aufstellungsort in Richtung zum Suchen, erleuchteter Leser zu sein übersetzt wird, gibt es eine Anzahl von Eigenschaften, die vorgerücktere Leser und Fachleute nützlich sind. Das Alter von Wikipedia ist in der Tat dadurch konstruktiv, daß Fachleute nicht getan haben, was das Wikipedias so schnell und angenehm getan haben.

Thursday, May 17, 2007

While we slept . . .

One of the most frustrating aspects of understanding our tepid response to Islamism is how America was so slow to react. The distrust between the CIA and the FBI made both agencies less effective and in fact we've made little progress on the IT issues in the meantime. Years after the fact data collection and sharing is still problematic between law enforcement. The handling by law enforcement and political administrations in viewing the original 1993 attack on the World Trade Center as individual criminal issues, and not part of a concerted effort against Western infidels, was wrong-headed. While the American public was dazzled by the O.J. Simpson trial and the Jon Benet Ramsay murder investigation the West was under attack. The blind Sheik Rahman and his fellow terrorists were already conspiring to blow up N.Y. city landmarks and bridges. This nation slept during the Reagan years when we withdrew from Lebanon after the Marine barracks truck bombing right through the Clinton years when we pulled out of Somalia after the downing of a Blackhawk.


It is little wonder that America was viewed as a tepid power. Weakness emboldens the desperate to increase their efforts. The victims on 9/11 paid the price.

Monday, May 14, 2007

The Caliphate


The Times of London notes the increasing importance the al Qaeda-affiliated groups on Iraq are placing on establishing a militant Islamist state in the Sunni regions of Iraq.


In particular, al Qaeda's Islamic State of Iraq emphasizes an important theme, the conquest of specific territory in order to establish the beginnings of God's kingdom on earth.


The jihadists place a physical caliphate on earth. It is to be achieved in conjunction with the divinely-blessed spread of jihad across the globe.


The U.S. military faces insurgents with this conviction and the use of classic Al-Qaeda tactics.

DHS and Privacy vs. Real ID


I have to agree with a privacy committee of the DHS (Department of Homeland Security) assessment: oppose the Real ID bill, which proposes to create a national standard for state driver's licenses and other forms of state-issued identification.


This bill raises too many privacy, security, and logistical concerns.


The Real ID Act of 2005, in the wake of terrorism, sets minimum national standards that states must use when issuing driver's licenses and other identification. For example, this includes a photo ID, documentation of birth date and address, proof of citizenship or immigration status, and verification of Social Security numbers. As proposed, this law would go into effect in about a year.


Individuals would need Read ID-compliant cards for air travel, accessing federal buildings, or for receiving federal benefits. Moreover, all state driver's license databases would be linked.


The act is objectionable on the grounds that this is a de facto national ID system. Eventually, the U.S. government could spy on ordinary, law-abiding citizen.


Also troubling is that there is no plan for securing the stored identity data. The states are not accountable for the data.


"Failure to provide openness and transparency undermines accountability and trust," the DHS committee noted in its comments.


Concerns along these lines have been expressed by the National Governors Association, National Conference of State Legislatures, and the American Association of Motor Vehicle Administrators.


Several members of Congress have also expressed their objection: Sens. Daniel Akaka (D-Hawaii) and John Sununu (R-N.H.), who proposed the Identification Security Enhancement Act of 2007. The bills co-sponsors include Sens. Patrick Leahy (D-Vt.) and John Lester (D-Mont.).


If the government had thinkers, they would enact a Real ID for criminals and skofflaws. The identification targets the wrong people, the compliant. Of course, people could voluntarily join the program, in fact, this would advantageous for frequent travelers and those who need consistent, easy transit.


As it stands, this is a bad law.


In an update on 6 July 2007, the Governor of New Hampshire signed a bill that rejects federal Real ID law

Sunday, May 13, 2007

On 11 May 2007 a Guilty Verdict was handed down in a U.S. - China Spy Case

This is a troublesome case in that it may be indicative of how difficult it may be to nab spies. After a six-week trial a federal jury convicted a Chinese-born engineer of conspiring to export U.S. defense technology to China, including information on an electronic propulsion system that would make submarines virtually undetectable.


Chi Mak exploited his low-key lifestyle and his good reputation to hide his real intent: conspiring to pass U.S. secrets to China for over two decades. Mak is a naturalized U.S. citizen who confessed to the crime and revealed that he lied to investigators.


This individual apparently had no warning signs that he was suspect until he finally was found out and revealed his real intent on his own.


How you combat a clever individual like this without infringing upon individual liberties is an open question.

The U.N. next door

America is filled with communities where it appears as though the U.N. lives next door. However, in the case of the recently charged six terrorists in Pennsylvania and New Jersey, were there any signs that perhaps something was amiss? The terrorists might stand out but it was not considered a major point to note their Muslim religious garb. It is common enough in many communities in the U.S., especially in urban areas, that characteristic Muslim garb is not out of the ordinary.


To wit, the six did have minor, but consistent run-ins with the law. The three arrested brothers regularly attended South Jersey Islamic Center in Palmyra, N.J., where, according to U.S. Attorney Christopher J. Christie, they recruited another alleged conspirator. In short, the accused were no strangers to the police. They were habitual offenders, stopped dozens of times a year for speeding, illegal passing, and driving without a license. One of the accused, Dritan Duka was issued four citations during one five-week period. The three had driving privileges suspended, meaning that they could not even apply for a license, 54 times in less than a decade. Moreover, in 2000, Dritan Duka pled guilty to possession of drug paraphernalia and Shain Duka to possession of marijuana.


One characteristic to look for where the U.N. will break down is the flagrant, habitual, and lawless approach of potential troublemakers. The six, despite their protests that their Muslim background attracted attention, is not true. The accused brought about attention upon themselves by their anti-social behavior. America is a great country, too great to allow those who violate community standards unfettered freedom.

Tuesday, May 8, 2007

Is this war?

Six men arrested as two attempted to buy guns Monday; and, I might add, this is close to home. Apparently, the men laughed as they watched videos of attacks on Americans, including one video where a marine's arm is blown off. The arrested are "Islamic radicals," according to the U.S. Attorney's office. The men were planning to shoot soldiers at Ft. Dix Army base according to the indictment.

The six include three brothers, all with the last name Duka, who were born in the former Yugoslavia and are illegally residing in the United States. The three are: Eljvir, 23, Shain, 26, and Dritan, 28, and said the three operate businesses known as Qadr Inc., Colonial Roofing and National Roofing.

The other three men charged are Mohamad Ibrahim Shnewer, 22, of Cherry Hill, New Jersey, a U.S. citizen born in Jordan who is employed as a taxicab driver in Philadelphia; Serdar Tatar, 23, of Philadelphia, born in Turkey, whose last known employment was at a 7-Eleven; and Agron Abdullahu, 24, of Buena Vista Township, born in the former Yugoslavia and employed at a Shop-Rite Supermarket.

One twist to the story is to see if there is any difference in the disposition of the case in that they are illegal, a U.S. citizen, or another classification.

Saturday, May 5, 2007

How Jews, Christians, and Muslims celebrate the Sabbath

The idea to survey this topic came about in preparing a review of: Ringwald, Christopher D. A day apart: how Jews, Christians, and Muslims find faith, freedom, and joy on the Sabbath. Oxford, 2007.

G. Mick Smith, review of Armstrong, Karen, The Great Transformation, Choice, February 2007.

G. Mick Smith, review of Armstrong, Karen, The Great Transformation, Choice, February 2007.

The following review appeared in the February 2007 issue of CHOICE.

44-3239 BL430 2005-47536 CIP
Armstrong, Karen. The great transformation: the beginning of our
religious traditions. Knopf, 2006. 469p bibl index ISBN 0375413170,
$30.00

In this current age of "the great transformation," independent scholar
Armstrong postulates how the sages of the foundational Axial Age would address unspeakable horror, violence, and desperation. The distinctive and historic Axial Age faiths announced the abandonment of selfishness and a spirituality of compassion. They stated that first must come personal responsibility and self-criticism, and that practical, effective action must follow. Herein lie the problematic aspects of Armstrong's work and the reasons why this book can be misleading. Its most serious flaw is its finding evidence for ethical behavior in almost all religious behavior and ritual. Armstrong seems to miss the insights of René Girard and Walter Burkert, who have demonstrated how violence and the sacred are inextricably linked. Another problem is that, oddly, she states that Hitler expressed a "militant exclusion of religion from public policy." In fact, Hitler divided German Christians by founding the Patriotic Church in contrast to the Confessing Church. One other interesting side note is that Armstrong's research is based on older published works (only 36 of 284 works cited in the bibliography were published in 2000 or later). Summing Up: Optional. Lower-/upper-level undergraduates; general readers.

Review: The Forgotten Revolution, Lucio Russo

25 Jan 2006
Computing Reviews

The Forgotten Revolution describes the explosion of science in the third
and second centuries BCE. In the age of Archimedes, Eratosthenes, and
Euclid science as we ordinarily recognize the field began as a category
of human knowledge. The forgotten in the title refers to the Alexandrian texts
that were lost and the notion that the breakthroughs of the Renaissance
were based on these texts. Unfortunately, these texts were lost in the
ancient period and subsequently during the Renaissance as well. The
author, Lucio Russo, notes that both scientific revolutions were also
accompanied by great changes and an invigorated awareness in related
fields, such as art and medicine.

The revolution in science is surveyed in ten chapters, an epilogue, and
a mathematical appendix. In chapters 1-7 there is detailed coverage of the
birth, rise, decline and fall of Hellenistic science and technology:
mathematics, mechanics of solids and fluids, topography and geodesy,
optics, astronomy; civil, mechanical, naval, and military engineering; anatomy,
physiology, biology, and medicine; economics and mass production
techniques; architecture and urban development; psychoanalysis and cognitive
sciences.

An interesting inquiry of Russo¹s is the methodological nature of
Hellenistic mathematics. More important than the discoveries of the
Greeks noted above is the method they introduced, that is, the axiomatic,
deductive manner of argumentation that typifies mathematics. In general, the
deductive method, allied to the experimental method also introduced by the
Hellenistic scientists, is a modern approach to exact sciences.

The brilliance of the Hellenistic scientific revolution was lost in that
scientific method was abandoned in antiquity and its renaissance was
incredibly lax and centuries in coming. As late as the age of Newton,
who was representative Renaissance thinker, scientists worked at a level
still far below the Hellenistic level of rigorous method. This in itself is a
worthwhile point to make. When Russo relies on the philological evidence
alone he makes a convincing argument.

Another key inquiry is the idea that the heliocentric theories of
planetary motions were discovered far before the Hellenistic era. Aristarchus of
Samos and a century later with Hipparchus of Nicea Russo convincingly
demonstrates evidence that some Hellenistic writers knew of heliocentric ideas. They
developed a dynamical theory of planetary motions based on the attractions
of the planets toward the Sun. The work of Hipparchus is unfortunately
no longer extant but in an obscure work of Plutarch, sprinkled throughout
the Natural History of Plinius, the Natural Questions of Seneca, and the
Architecture of Vitruvius, enough philological evidence suggests that
the cultural elites of the early Roman Imperial period knew heliocentric
theories.

Much later Newton, who had the complete works of Plutarch in his
library, apparently included the heliocentric idea but without a credit attached.
Although some may think this an unethical act, it was in fact commonly
done if an author works in an academic field and elsewhere clearly credits
one¹ssources, and Newton does.

One simple reason the tradition of heliocentric theory is lost is that
the commonly cited Principia only included this portion in a Scholia or an
annotation on the original manuscript not appearing in the commonly
printed version.

Russo should be appreciated not only in the detailed transmission of
specific ideas but within a major historical problem of antiquity. The
decline and fall of antique civilization was occurring as Hellenistic
ideaswere pushed to the background as Max Weber thoroughly discussed the
issue of decadence. As trade in antiquity declined, so did the accompanied
flowering of art, literature, and scientific inquiry. The key insights of
Hellenistic thought languished then until the Renaissance and their re-discovery by
modern scientific thought.

This volume would not be of interest for most computing professionals
because the only closely related topic are analog computational aids. It
would however be of note for a general educated audience with an
interest in history of science, mathematics, physics, engineering, astronomy,
medicine and classical civilizations.

Four works read in tandem with Russo¹s would be instructive: The
Mathematics of Plato's Academy, by David H. Fowler (Oxford, 1999), and
The Shaping of Deduction in Greek Mathematics, by Reviel Netz
(Cambridge, 1999), Otto Neugebauer, Exact Sciences in Antiquity, and Sir Thomas
Heath, A History of Greek Mathematics. In addition, these four works are often on
sounder ground than Russo¹s volume.

Review: Dis/integrating animals, Warkentin

Date: Mon 26-06-2006 11:14 AM

Computing Reviews:

"Dis/integrating animals: ethical dimensions of the genetic engineering of animals for human consumption" Warkentin T. AI & Society 20(1): 82-102, 2005

IT professionals should be reflecting on this piece to answer questions of identity. What we are as humans is more typically posed to technologists by thinkers such as George Dyson who argues that machines, specifically computers, will evolve beyond humans. On the other hand, Warkentin provocatively claims that we become less human by genetically altering animal bodies.

The question is: are we becoming something beyond human because of our machines or is genetic engineering robbing us of our humanity?

Warkentin ranges over feminism, biology, and philosophy to lament that genetic technologies engineer impure food and ending the suffering of animals through genetic modification diminishes both animals and humans.

Warkentin reveals a secular sensibility for long-standing religious issues of identity, purification, and suffering.

Religions generally maintain that food or anything that enters the body may pollute. Indeed, contamination by polluted food is a pervasive danger, typically involving intricate avoidance principles which Orthodox Judaism, particularly kosher rules, artfully articulates.

In the classic work Purity and Danger (1966) Mary Douglas focuses on pollution with a cogent analysis of food taboos. Religions outline an agenda for congregants to follow maintaining their sense of identity.

Warkentin maintains that human identity is diminished or defiled by eating genetically engineered food, what Douglas introduces as “dirt.”

But that ingesting a given food which has a spiritually polluting quality independent of our post-modern cultural context does not seem to be based on an objective fact. Warkentin ultimately does not demonstrate how genetically modified food pollutes us.

No response from democracynow.org

Date:
Tue 11-07-2006 04:16 PM

I object to McCarthyism

I happened to view your broadcasting today (democracynow.org) for the first time and I am
writing to express how appalled I am by your abysmal ethics. The anchor,
Ms. Goodman, sequed into a story with the line, "we go now from a story
of an American soldier raping and murdering Iraqi civilians to a story
of a soldier who went AWOL." I am horrified that a broadcaster would try
and convict an individual on live television a la' McCarthy. Correct me
if I'm wrong but does not this individual, as reprehensible as many
people would find him if he is in fact quilty, have the right to due
process and a jury of his peers to convict him? This has not happened.
Perhaps it will, perhaps it will not but this person has the right in a
democracy to his day in court and you have no right to convict anyone on
television. Ms. Goodman had the perfect opportunity to instruct the
Iraqi journalist--employed by the L.A. Times--in the rules of evidence
and how democracy works but she squandered the moment and uncritically
accepted the hearsay evidence presented by the journalist. I object to
McCarthyism and the fraud that is entitled "Democracy Now." Indeed,
democracy works and your broadcasting should attempt to live out the
ideals, ethics, and the objective journalist responsibility that it
entails.
Regards,
G. Mick Smith, PhD

Review: A Companion to Nietzsche, ed. Keith Ansell Pearson

The following review appeared in the July 2006 issue of CHOICE.

A Companion to Nietzsche, ed. by Keith Ansell Pearson. Blackwell
Publishing, 2006. 600p bibl index (Blackwell companions to philosophy,
33) ISBN 1405116226, $149.95

This worthwhile collection portrays many of the most preeminent
Nietzschean scholars in Europe and the US. The volume adds to an
excellent series in philosophy by Blackwell. It offers a moving array
of Nietzsche scholars who represent a plethora of approaches. Following
the two practical introductions to Nietzsche's life, philosophy, and
style, the varied essays address the most familiar Nietzschean themes,
as well as important but more neglected ones such as Nietzsche's notion
of science. The major sections include "Art, Nature, and
Individuation," "Nietzsche's Philosophy of the Future," "Philosophy of
Mind," "Philosophy and Genealogy," "Ethics," "Politics," "Aesthetics,"
and "Evolution and Life." Moreover, contributors offer innovative
treatments of Nietzsche's core and enigmatic ideas such as eternal
recurrence, the will to power, and the "overhuman." Interestingly woven
together are Nietzsche's published and unpublished Nachlass. Among the
contributors are a stimulating selection of scholars and new writers on
Nietzschean themes. They include Jill Marsden, Babette E. Babich,
Volker Gerhardt, Kathleen Marie Higgins, Laurence Lampert, Richard
Schacht, Andreas Urs Sommer, and Paul van Tongeren. Summing Up:
Recommended. Graduate students and above.

Review: Evolutionary Scheduling

"Evolutionary Scheduling: A Review," Hart, E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220.

Date: Wed 13-09-2006 08:33 AM

ComputingReviews.com

Review Number: 54703

Evolutionary Scheduling

“Evolutionary Scheduling: A Review” Hart E., Ross P., Corne D. Genetic Programming and Evolvable Machines 6(2): 191-220.

This review article is of substantial value for those who need an update on research material that applies evolutionary computing methods to scheduling problems. The last major survey has not been performed since 1999, when a major statement emerged from the European Network of Excellence on Evolutionary Computing (EVONET). The three co-authors here have done an admirable overview and report on “current trends, achievements, and suggesting the way forward” (191) in this regard. In particular, this article is of wide interest since the ideas can be applied to many common scheduling issues such as job-shop scheduling problems, an area much discussed in academic literature. The authors point out that algorithms today are capable of tackling enormous and difficult real-world problems, a major advance over earlier surveys such as the EVONET report.

Review: Hempel, Sandra, The Strange Case of the Broad Street Pump

The following review appeared in the July 2007 issue of CHOICE.

CHOICE: 000000561309

Hempel, Sandra. The Strange Case of the Broad Street Pump: John Snow and the Mystery of Cholera, University of California Press, Berkeley: 2007.

Reviewed: 03/20/2007

In this well-written medical history the author, Sandra Hempel,
fascinatingly portrays the mysterious transmission of cholera in 1831
London. Although written at the level of sound academic standards,
Hempel relates a ripping yarn by demonstrating how the monk-like
physician John Snow alone methodically, but insightfully, investigated
how cholera proliferated through drinking water. Snow disregarded
conventional medical wisdom while scientifically identifying the origin, conveyance, and contagious nature of the cholera pandemic. Still this work is not for the faint of heart. In excruciating detail Hempel recounts how the most vulnerable, in one poor unfortunate case, three-year old William Somerville, underwent an alleged cure that was far more barbaric than the cholera itself which may have cleared up on its own. However, the pandemic necessitated a scientific cure as cholera bafflingly seized millions from the squalor of Soho to the elite confines of the Royal Medical College and the Privy Council. In her masterful hands, Hempel is to be commended for writing an intriguing account of an historic plague, sprinkled with a vibrant cast of actors offering instructive and timely insights for current challenges of infectious diseases: malaria, yellow fever, and cholera.


Hempel, Sandra. The strange case of the Broad Street pump: John Snow
and the mystery of cholera. California, 2007. 321p bibl index afp
ISBN 0520250494, $24.95

Wednesday, May 2, 2007

Review: Dickheiser, M. Game Programming Gems 6, Charles River Media, Boston: Massachusetts, 2006.

This is the sixth volume of the popular and practical Game Programming Gems series. The series from the 1st volume has addressed timely issues as they have emerged; currently, teams are growing larger and developers are increasingly specialists. The Gems series addresses this need by providing state-of-art, readily available material for the specialist and handy resources that may be outside your bailiwick. Also timely is that current machines and player expectations are requiring higher-fidelity models and animations, fancier physics and graphics effects, and more intelligent AI. With these rising expectations on the work of programmers and the greater level of sophistication required, these demands entail flexible teams and longer production schedules, especially in light of scripting and data-driven systems (p. 319). Of course, the biggest issue is cost (p. xi). Helpfully, the over 50 articles in the volume address these demands and expectations.

An important fact is the collaborative reach of the game technology experts in that they arise from sundry backgrounds and over twenty countries. The experts are not only gaming experts but some are from outside the industry. Moreover, collaboration is truly global: from every part of the world, encompassing such diverse places as Eastern Europe, Latin America, North America, Singapore, and Japan.

This volume is not recommended for a faint of heart newer game programmer since this does not really function as a primer although it is very readable nonetheless. More likely is that the specialist will pick and choose their topics of interest and the dedicated programmer will learn a great deal of interest by reading more thoroughly. The series is aptly named Gems and there are nuggets galore.

A pragmatic way to find the needed gems is to peruse the seven parts for something of interest: Section 1 General Programming; Section 2 Mathematics and Physics; Section 3 Artificial Intelligence; Section 4 Scripting and Data-Driven Systems; Section 5 Graphics; Section 6 Audio; and Section 7 Network and Multiplayer. Most programmers would benefit by finding their particular areas of interest and then look for handy tools in other sections.

General Programming is not for the novice, as the name may imply but rather involves multiprocessor techniques, unit testing, and security fingerprinting. Mathematics and Physics is a constant and involves all things FPU, CPU, and GPU. Artificial Intelligence is always popular, and in this volume demonstrates current work in cognitive science and machine intelligence, with a strong representation from academia. AI techniques shown here can be applied in “other systems in the engine” (p. xvii). The inaugural appearance of Scripting and Data-Driven Systems is a worthwhile addition to the Gems series. The most popular and emerging languages (with the main core C++: Python, Lua, GameMonkey, and AngelScript) provide a starting point for your engine with a flexible backbone. Graphics combines old and new technologies with numerous sharp techniques. Audio includes insightful ideas for advanced uses of the audio system. Finally, Network and Multiplayer is another emerging area as global players, Massively Multiplayer Online Prototype (MMOP), plug in to play. As the gaming content has increased so too has the multiplicity of players and now, across networks.

The Editor notes that gaming is not just for game developers anymore. Game-based Learning, Edutainment, commercial and military training simulations, academics, and other "serious games" have all made their mark (p. xv). The upshot of this new found attention is that the "noobs" (p. xvi, a slang insult for newbies) are starting to feed back their input into gaming. At this point, the implications of this feed back is not at all clear but what is obvious is that gaming will be transforming into new and potentially very excitingly complex areas.

The focus in this volume accounts for gaming complexity focusing as it does on providing cutting-edge development that is of interest to those outside the gaming industry. Another sign of gaming maturity is the rise of growth and complexity issues related to the size and intricacy of games. The section on Scripting and Data-Driven Systems, along with Network and Multiplayer, converge in the two emerging areas of interest to those outside gaming. Some of the most exciting topics are these two, especially when converged. A related area of convergence is how AI is of interest to those inside gaming and outside it as well. If well coded, AI can provide the behavior of characters that are seemingly more intelligent, more human-like, hence yielding a more involving game.

This volume, although replete with complex topics, is readable, current, and just about the best in its field. The enclosed CD has source code illustrating points in the articles. The Index is really handy as well, including as it does information on all six volumes in the series. The illustrations are well done and add desirable visual examples.