Thursday, December 3, 2009
Dry Run Attack by Muslims
From: Petruna, Tedd J. (JSC-DX12)[RAYTHEON TECHNICAL SERVICES COMPANY]
To: undisclosed-recipients
Sent: Friday, November 27, 2009 11:32 AM
One week ago, I went to Ohio on business and to see my father. On Tuesday, November 17, I returned home. If you read the papers, you may have seen a blurb where an AirTran flight was cancelled from Atlanta to Houston due to a man who refused to get off of his cell phone before takeoff. It was on Fox.
That was NOT what happened!
I was in first class coming home. Eleven muslim men got on the plane in full attire. Two sat in first class and the rest peppered themselves throughout the plane all the way to the back. As the plane taxied to the runway, the stewardesses gave the safety spiel we are all so familiar with. At that time, one of the men got on his cell and called one of his companions in the back and proceeded to talk on the phone in Arabic very loudly and very aggressively. This took the first stewardess out of the picture for she repeatedly told the man that cell phones were not permitted at the time. He ignored her as if she wasn’t there. The second man who answered the phone did the same and this took out the second stewardess. In the back of the plane at this time, 2 younger muslims, one in the back aisle, and one in front of him, window, began to
show footage of a porno they had taped the night before, and were very loud about it. Now, they are only permitted to do this prior to Jihad. If a Muslim man goes into a strip club, he has to view the woman via mirror with his back to her (don’t ask me, I don’t make the rules, but I’ve studied).
The third stewardess informed them that they were not to have electronic devices on at this time. To which one of the men said, “shut up infidel dog!” She went to take the camcorder and he began to scream in her face in Arabic.
At that exact moment, all 11 of them got up and started to walk to the cabin. This is where I had had enough! I got up and started to the back where I heard a voice behind me from another Texan twice my size say, “I got your back.” I grabbed the man who had been on the phone by the arm and said, “you WILL go sit down or you Will be thrown from this plane!” As I led him around me to take his seat, the fellow Texan grabbed him by the back of his neck and his waist and headed out with him. I then grabbed the second man and said, “You WILL do the same!” He protested but adrenaline was flowing now and he was going to go. As I escorted him forward, the plane doors open and 3 TSA agents and 4 police officers entered. Me and my new Texan friend were told to cease and desist for they had this under control. I was happy to oblige actually. There was some commotion in the back, but within moments, all 11 were escorted off the plane. They then unloaded their luggage.
We talked about the occurrence and were in disbelief that it had happened, when suddenly, the door opened again and on walked all eleven!! Stone faced, eyes front and robotic (the only way I can describe it). The stewardess from the back had been in tears and when she saw this, she was having NONE of it! Being that I was up front, I heard and saw the whole ordeal. She told the TSA agent there was NO WAY she was staying on the plane with these men. The agent told her they had searched them and were going to go through their luggage with a fine tooth comb and that they were allowed to proceed to Houston. The captain and co-captain came out and told the agent, “we and our crew will not fly this plane!” After a word or two, the entire crew, luggage in tow, left the plane. Five minutes later, the cabin door opened again and a whole new crew walked on.
Again, this is where I had had enough!! I got up and asked, “What the hell is going on?” I was told to take my seat. They were sorry for the delay and I would be home shortly. I said, “I’m getting off this plane.” The
stewardess sternly told me that she could not allow me to get off. Now I’m mad! I said, “I am a grown man who bought this ticket, who’s time is mine with a family at home and I am going through that door, or I’m going through that door with you under my arm!! But I am going through that door!!” And I heard a voice behind me say, “So am I.” Then everyone behind us started to get up and say the same. Within 2 minutes, I was walking off that plane where I was met with more agents who asked me to write a statement. I had 5 hours to kill at this point so why the hell not. Due to the amount of people who got off that flight, it was cancelled. I was supposed to be in Houston at 6pm. I got here at 12:30am.
Look up the date. Flight 297, Atlanta to Houston. If this wasn’t a dry run, I don’t know what one is. They wanted to see how TSA would handle it, how the crew would handle it, and how the passengers would handle it.
I’m telling this to you because I want you to know. The threat is real. I saw it with my own eyes.
Tedd Petruna
TWILIGHT IMAGERY, INC.
James Morris, CEO, General Factotum, iap
Teresa Morris, V.P…In Charge
325 643 5909
325 643 5830 ( Fax )
Brownwood, TX.
San Juan, PR
“Age doesn’t always bring wisdom…sometimes it comes alone.”
Wednesday, December 2, 2009
Taxing Guns: IRS will know who has what. IRS to also enforce Obamacare provisions
H.R..45: Blair Holt's Firearm Licensing and Record of Sale Act of 2009 - U.S. Congress -OpenCongress http://www.opencongress.org/bill/111-h45/show http://www.opencongress.org/bill/111-h45/show http://www.opencongress.org/bill/111-h45/show&g t;
H.R. 45: Blair Holt's Firearm Licensing and Record of Sale Act of 2009 GovTrack.us) http://www.govtrack.us/congress/bill.xpd?bill=h111-45 http://www.govtrack.us/congress/bill.xpd?bill=h111-45 http://www.govtrack.us/congress/bill.xpd?bill=h111-45
Between Sept. 2008 and Oct. 2009 - Govt. pinged Sprint Nextel customer location data over 8 million times
Sprint: 50 million customers, 8 million law enforcement GPS requests in 1 year from Christopher Soghoian on Vimeo
Sprint Nextel provided law enforcement agencies with customer location data more than 8 million times between September 2008 and October 2009, according to a company manager who disclosed the statistic at a non-public interception and wiretapping conference in October.
The manager also revealed the existence of a previously undisclosed web portal that Sprint provides law enforcement to conduct automated “pings” to track users. Through the website, authorized agents can type in a mobile phone number and obtain global positioning system (GPS) coordinates of the phone.
The revelations, uncovered by blogger and privacy activist Christopher Soghoian, have spawned questions about the number of Sprint customers who have been under surveillance, as well as the legal process agents followed to obtain such data.
But a Sprint Nextel spokesman said that Soghoian, who recorded the Sprint manager’s statements at the closed conference, misunderstood what the figure represents. The number of customers whose GPS data was provided to local, state and federal law enforcement agencies was much less than 8 million, as was the total number of individual requests for data.
The spokesman wouldn’t disclose how many of Sprint’s 48 million customers had their GPS data shared, or indicate the number of unique surveillance requests from law enforcement. But he said that a single surveillance order against a lone target could generate thousands of GPS “pings” to the cell phone, as the police track the subject’s movements over the course of days or weeks. That, Sprint claims, is the source of the 8 million figure: it’s the cumulative number of times Sprint cell phones covertly reported their location to law enforcement over the year.
The spokesman also said that law enforcement agents have to obtain a court order for the data, except in special emergency circumstances.
The information about the data requests and portal comes from Paul Taylor, manager of Sprint’s Electronic Surveillance Team. He made the revelations at the Intelligent Support Systems (ISS) conference, a surveillance industry gathering for law enforcement and intelligence agencies and the companies that provide them with the technologies and capabilities to conduct surveillance.
The conference is closed to press, but Soghoian, who is a graduate student at Indiana University, obtained entry and recorded a couple of panel sessions, which he posted on his blog (see below). In one of the recordings, Taylor is heard saying that the automated web system was rolled out a year ago and that in 13 months it had processed more than 8 million requests for GPS data from law enforcement.
“We turned it on the web interface for law enforcement about one year ago last month, and we just passed 8 million requests,” Taylor is heard saying. “So there is no way on earth my team could have handled 8 million requests from law enforcement, just for GPS alone. So the tool has just really caught on fire with law enforcement. They also love that it is extremely inexpensive to operate and easy.”
Soghoian concluded on his blog that the quote provided proof that “location requests easily outnumber wiretaps, and … likely outnumber all other forms of surveillance request too.”
He cites a telecom attorney named Al Gidari who claimed at a talk last year that each of the major wireless carriers received about 100 requests a week for customer-location data. At 100 requests a week for each of the top four wireless carriers, the total should be around 20,000 requests a year.
“I now have proof that he significantly underestimated the number of requests by several orders of magnitude,” Soghoian writes.
But Sprint spokesman John Taylor (who is not related to Paul Taylor) says Soghoian had “grossly misrepresented” the 8 million figure, which doesn’t refer to unique requests or to individual customers, but to the total number of “pings” made on every number for the duration of a law enforcement request.
“The figure represents the number of individual pings for specific location information, made to the Sprint network as part of a series of law enforcement investigations and public safety assistance requests during the past year,” said spokesman Taylor. “It’s critical to note that a single case or investigation may generate thousands of individual pings to the network as the law enforcement or public safety agency attempts to track or locate an individual.”
There are four circumstances under which law enforcement agents can use the Sprint website and obtain GPS data: 1) under the authority of a court order; 2) to track the location of a customer who has made a 911 call; 3) in an emergency situation, such as tracking someone lost in the wilderness or trying to locate an abducted child or hostage; 4) with a customer’s consent.
In the case of court orders, Taylor said agents are required to provide Sprint with the order, after which the company provisions the law enforcement account to allow an agency to track the targeted phone number. Court orders cover a 60-day period, and agents can do automated pings to obtain real-time GPS data every three minutes throughout that 60-day period. Taylor says this accounts for the 8 million figure.
“If you can access the info every three minutes over 60 days, that adds up pretty quickly,” he told Threat Level.
He added that the GPS data includes only latitude and longitude and the date and time of the ping.
The automated system was set up so that law enforcement agents wouldn’t have to contact Sprint’s electronic surveillance team each time they wanted to ping a phone number throughout the 60 days of a court order. Agents still have to obtain a subpoena to get historic call detail records, such as phone numbers called, the date, time and duration of calls and the cell site and sector from which the calls were made.
—
Image: The FBI won a court order to track this Sprint Nextel cell phone’s movements while hunting for a fugitive in Ohio last October. (Source: U.S. District Court Southern Distict of Ohio). Home page image of cell tower: Phil Strahl/Flickr
Tuesday, December 1, 2009
Rep. Maxine Waters (D-CA35) on Obama's Afghanistan speech and Comparison to Earlier Surge
Compare the surge statements on Iraq and Afghanistan:
Federal Gov't Shuts Off Water to Cali Farmers
In an interview, comedian Paul Rodriguez, whose mother owns a farm in the area, criticized the actions of the government and called for Obama to review the decision. “This used to be an almond orchard. Now all that is left is firewood.”
Laura King Moon, assistant general manager of the State Water Contractors, a nonprofit association of 27 public agencies from across California that purchase water from the government under contract, said “these cuts are crippling on our people and businesses — especially in the Central Valley where farmers are being forced to fallow their land and workers are being laid off. Rather than piecemeal restrictions, we need to balance the needs of the environment and the needs of people with a collective plan for the Delta.”
The National Marine Fisheries Service, an agency within the National Oceanic and Atmospheric Administration, states the water pumping inside central California threatens several species, including Chinook salmon, Central Valley steelhead, North American green sturgeon, and Southern Resident killer whales, which rely on Chinook salmon runs for food. In the Huron area, the delta smelt is specifically targeted.
In defense of the actions, Rod McInnis, the southwest regional director for NOAA’s Fisheries Service stated,
“What is at stake here is not just the survival of species but the health of entire ecosystems and the economies that depend on them. We are ready to work with our federal and state partners, farmers and residents to find solutions that benefit the economy, environment and Central Valley families.”
Open Door for Discovery in Carter Decision
The recent decision, from Judge Carter, failed to quoted the relevant passage from 3 U.S.C. § 15 which states:
Upon such reading of any such certificate or paper, the President of the Senate shall call for objections, if any. Every objection shall be made in writing, and shall state clearly and concisely, and without argument, the ground thereof.
The DOJ clipped the statute so as to leave out the part which places a burden on the Vice President, acting in his role as President of the Senate, to call for objections after the count of votes.
Monday, November 30, 2009
Phantom Votes and more Election Fraud: NY 23
CANTON, NY – The election results certified by the St. Lawrence County Board of Elections for New York’s 23rd Congressional District contain some numbers that are mathematically impossible. These numbers were requested in person and transmitted by e-mail just hours before certification on Tuesday, November 24th, 2009.
For six election districts in St. Lawrence County (the 2nd, 4th, 6th, and 7th districts in Canton, the 14th district in Massena, and the 2nd district in Oswegatchie) negative numbers appear in the column for “blank” ballots, known in other states as “undervotes.”
Blank vote counts are ballots in which the voter did not choose any candidate in a given election and are determined by subtracting the total number of votes cast for the candidates from the number of voters who completed ballots. The remaining number would be those voters who didn't cast a vote for that election.
In Canton's 7th district, the certified results show a total of 148 ballots cast. The results of those votes were counted as 88 votes for Owens, 11 votes for Scozzafava, and 80 votes for Hoffman. The problem is that these numbers add up to 179 votes counted for the candidates, and there were only 148 ballots cast; St. Lawrence County certified these numbers to the state as accurate with the number of 'blank' ballots reported as -31.
The Board of Elections stated repeatedly that their numbers add up, and strictly speaking, they do. But negative numbers should not be required to make this happen.
Election analysts refer to this phenomenon as “phantom voters,” because they are apparitions. They do not actually exist. There can never be more votes counted for any office than the number of actual voters who cast ballots. There could be one or two, if on occasion an actual voter forgot to sign the poll book, but never 31.
In addition to the 31 “phantom votes” certified in Canton's 7th district, there are 16 more in Canton's 2nd district, two in Canton's 4th district, 20 in the 7th, 22 in Massena 14th district, and 2 in Oswegatchie 2nd district.
These numbers are minimums. As 'blank' votes do often occur when a voter does not choose a candidate, the number of blank ballots are commonly a positive number. According to the certiified results there were 757 "blank" ballots countywide, or 3.0% of the total ballots cast. Thus, along with the -31 "phantom votes" in Canton's 2nd district, there were likely four or five people who actually cast a 'blank' ballot, meaning that the number of phantom votes is more like 35 or 36 for that district.
An audit of the poll books revealed that there were 537 actual voters at the polls in Canton's 7th and 8th district, which voted at the same polling place, and there were 25 absentee ballots, for a total of 562. According to the certified results, there were 179 votes counted for Congress in Canton's 7th and 375 in Canton's 8th, making 554 altogether, but only 529 voters cast ballots.
Similarly, there were 435 actual voters at the polls in Canton 2, 4 and 6, which voted at the same polling place, and there were 26 absentee ballots, for a total of 461. According to the certified results, there were 449 votes counted for Congress, but only 411 ballots cast.
In Massena's 14th district, a single-precinct polling place, there were 365 actual voters at the polls, and there were 14 absentee ballots, for a total of 379. According to the certified results, there were 363 votes counted for Congress, but only 341 ballots cast.
In Oswegatchie 2nd and 4th districts, which voted at the same polling place, there were 412 actual voters at the polls, and there were 35 absentee ballots, for a total of 447. According to the certified results, there were 436 votes counted for Congress, and 442 ballots cast.
Thus, in the cases cited above, there may have been enough actual voters at the polls to account for the vote totals for the candidates. But the numbers do not match up, they do not withstand an audit, and they should not be certified by the State.
Oswegatchie illustrates perfectly how 'blank ballots' and 'phantom votes' can cancel each other out. Officially, there were two 'phantom votes' in Oswegatchie 2nd district (or -2 blank ballots), and a total of 25 blank votes in Oswegatchie's 1st, 3rd, and 4th district. The town of Oswegatchie's total number of blank votes was therefore reported as 23. For every town except Canton, the town totals for blank votes are positive numbers. “Phantom votes” are rarely visible except when scrutinizing the results at the precinct level.
In the certified election results from the above districts, where the voting machines appeared to be working properly, the computer-generated vote counts cannot possibly be accurate as they are showing more votes counted than voters.
Fundamentally, the fault does not lie with the Board of Elections, although perhaps they should have noticed the negative numbers before certifying them. The fault lies with computerized vote counting and our willingness to trust it.
It has already been reported that zero votes were incorrectly reported in numerous precincts in Jefferson, Madison, and Oswego Counties for one of the Congressional candidates, and that voting machine failures occurred in dozens of polling places in at least three different counties.
In St. Lawrence County, ballots from eight polling places had to be hand counted due to voting machine failure. Machines in Louisville, Waddington, Clare, and Rossie "broke" early in the voting process on Election Day. Republican Commissioner Deborah Pahler said that the machines kept "freezing up... like Windows does all the time". Machines in Hermon, Lawrence, Colton's 2nd district, and Massena's 1st and 2nd districts failed to print the results. Frank Hoar, an attorney for the Democratic Party, initially ordered the impoundment of malfunctioning machines but released the order on November 5th so that Bill Owens could be sworn in to Congress in time to vote on the House health bill on November 7th.
Electronic vote counting is much too vulnerable to failure and/or manipulation. If a mechanical (lever-style) machine breaks down, the failure is visible, and only the one machine is affected. With electronic vote counting, one person can change the outcome of an election and not leave a trace. This has been shown over and over again in scientific studies, including those commissioned by the Secretaries of State in California and Ohio.
But more than that, how can we have a democracy if we cannot know if the vote count is accurate? If election officials cannot know, and if the candidates cannot know, and if the voters cannot know that the official results are true and correct, why even have an election? Why go through the motions?
In New York State, 232 years of election case law pursuant to the state constitution has strongly upheld the requirement that votes be counted visibly, in public view, and the results proclaimed, before the ballots or the lever machines leave the polling place. It has long been understood that vote counting concealed from the public is a crime waiting to happen. Because electronic vote counting is an invisible process, it flies in the face of tradition and case law.
Richard Hayes Phillips, Ph.D., is one of the leading election fraud investigators in the United States. His book on the 2004 Ohio election, Witness to a Crime: A Citizens’ Audit of an American Election, based on examination of some 30,000 photographs of actual ballots, poll books, and other election records, is available at http://www.witnesstoacrime.com
Sally Castleman, co-founder of Election Defense Alliance (EDA), a national organization committed to honest, secure and transparent elections, contributed to this article.
The author thanks the St. Lawrence County Board of Elections for providing unfettered access to election records.
Christo Garcia is the winner of Charlie Sheen’s 20 Minutes with the President video contest.
Christo Garcia is the winner of Charlie Sheen’s 20 Minutes with the President video contest.
Climategate
Professor Phil Jones, the head of the Climate Research Unit, and professor Michael E. Mann at Pennsylvania State University, who has been an important scientist in the climate debate, have come under particular scrutiny. Among his e-mails, Mr. Jones talked to Mr. Mann about the "trick of adding in the real temps to each series ... to hide the decline [in temperature]."
Mr. Jones told Mr. Mann: "If they ever hear there is a Freedom of Information Act now in the UK, I think I'll delete the file rather than send to anyone" and, "We also have a data protection act, which I will hide behind."
In another e-mail, Mr. Jones told Mr. Mann, professor Malcolm K. Hughes of the University of Arizona and professor Raymond S. Bradley of the University of Massachusetts at Amherst: "I'm getting hassled by a couple of people to release the CRU station temperature data. Don't any of you three tell anybody that the UK has a Freedom of Information Act!"
At one point, Mr. Jones complained to another academic, "I did get an email from the [Freedom of Information] person here early yesterday to tell me I shouldn't be deleting emails." He also offered up more dubious tricks of his trade, specifically that "IPCC is an international organization, so is above any national FOI. Even if UEA holds anything about IPCC, we are not obliged to pass it on." Another professor at the Climate Research Unit, Tim Osborn, discussed in e-mails how truncating a data series can hide a cooling trend that otherwise would be seen in the results. Mr. Mann sent Mr. Osborn an e-mail saying that the results he was sending shouldn't be shown to others because the data support critics of global warming.
Secrecy in science is a corrosive force
Climate change: this is the worst scientific scandal of our generation
Climategate: University of East Anglia U-turn in climate change row
No wonder then Obama's energy czar, Carol Browner, dismissed this as much ado about nothing. She was on the board of APX, one of the leading carbon offset trading companies and EPA Administrator for eight years under Clinton. While Administrator of the EPA, she violated a federal judge’s order to preserve documents by wiping computers clean and her discrimination toward employees resulted in many becoming whistle blowers. Appalled by the actions of Carol Browner, congress enacted the Whistle blower Protection Act of 1999.
Carol Browner is one of 14 leaders of a socialist group's Commission for a Sustainable World Society, which calls for "global governance" and says rich countries must shrink their economies to address climate change.
Al Gore was confronted with activists wanting to question him about Climategate.
30,000 scientists and the founder of the Weather Channel want to sue Al Gore.
Climategate: Follow the Money, Bret Stephens.
Australia's Parliament defeats global warming bill.
Gore does not like to answer questions.
Sunday, November 29, 2009
The World's Leading Banks, before and after the crisis
Orly Responding to Slams by News Media
So, for the news media, exactly in which hospital was Obama born?
Millions Go For Signs, Not For Jobs
Time to Investigate Michelle?
No Free Speech in Maryland
At a health care rally at the University of Maryland, a protester began heckling Obama. The man apparently yelled “Obama you’re a liar. Obama, your health care kills children. Abortion is murder.”
The man was promptly removed by police. The crowd is overjoyed and gleefully cheers as the man was carted off for having the temerity to challenge Obama publicly.
As the man mounts the stairs, one guy knocks his hat off, then a guy on the left spits on him but the cop sees it and carts him off too.
Phoenix Junior: Beacon for Warfare
The product referred to, the Phoenix JR, is manufactured in Florida.
The company's website describes the product:
Phoenix Junior
(NSN: 5855-01-438-4588)
featured
Phoenix Jr. (NSN: 5855-01-438-4588) is an extremely rugged and low cost Infrared marker beacon. The Phoenix Jr. was principally designed as an individual Combat Identification marker employed to minimize fratricide (the inadvertent destruction of battle field assets by friendly forces.) It has also been used as a vehicle ID marker, drop zone indicator and perimeter marker. Since its introduction in 1984, the Phoenix Jr. is the most widely used electronic Combat ID system in the world.
Phoenix Jr. and the war on terrorism. The Phoenix Jr. has been utilized by American and coalition forces for combat identification in theatres of operation such as Kosovo, Bosnia, Somalia, Afghanistan and Iraq. The Beacon has many uses in combat and other operations for marking personnel, vehicles, pathways or locations. It incorporates a flash rate that was specified to prevent confusion with small arms fire. Use the Phoenix Jr. to identify friendly force positions, demarcation lines or perimeters.
Phoenix Jr. is the world standard for covert signaling and identification of military, law enforcement, SWAT and homeland security assets.
SPECIFICATIONS
Weight: 28 Grams | 1 Ounce
Size: 38.09 x 15.87mm | 1.5" x .625"
Flash Repeat cycle: 1.3 Seconds (fixed)
Flash Duration: 20 Milliseconds (fixed)
Battery: Common 9 volt
Configuration: 3 Light Emitting Diodes (LED)
Coverage: 240 degrees x 360 degrees
Switching: Attach or remove battery
Operating Depth: The Poseidon — Phoenix / Pegasus Mounting Clip (902801) provides a water tight casing for the beacon and battery assembly. If immersed without the Poseidon case, the unit will continue to operate until the contacts fail due to water and electrolytic corrosion. Given these conditions the depth limitation is solely determined by the battery’s ability to withstand depth.
OPTIONS
Phoenix Jr. IR (902111IR)
Phoenix Jr. Red Training Model (902111R)
Phoenix Jr. NV Green Training Model (902111NV)
Intruder Trip Wire (902511)
Vehicle Auxiliary Power Supply (902611)
Poseidon — Phoenix / Pegasus Mounting Clip (902801)
Light Output Frequency :
Red - 640 nm
Infra Red - 880 nm
NV Green
Alternate frequencies available on request
Thursday, November 19, 2009
Tuesday, November 17, 2009
Saturday, November 14, 2009
Unsubscribe
How Low Will He Go?
“Main article: Bowing (social)
Bowing (o)jigi (お辞儀, おじぎ), (o-)rei (お礼), is probably the feature of Japanese etiquette that is best-known outside Japan. Bowing is considered extremely important in Japan, so much so that, although children normally begin learning how to bow from a very young age, companies commonly provide training to their employees in how to execute bows correctly.
Basic bows are performed with the back straight and the hands at the sides (boys and men) or clasped in the lap (girls and women), and with the eyes down. Bows originate at the waist. Generally, the longer and deeper the bow, the stronger the emotion and the respect expressed.
Bows can be generally divided into three main types: informal, formal, and very formal. Informal bows are made at about a fifteen degree angle or just tilt over one’s head to the front, and more formal bows at about thirty degrees. Very formal bows are deeper.
The etiquette surrounding bowing, including the length and depth of bow, and the appropriate response, is exceedingly complex. For example, if the other person maintains his or her bow for longer than expected (generally about two or three seconds), it is polite to bow again, upon which one may receive another bow in return. This often leads to a long exchange of progressively lighter bows.
Generally speaking, an inferior bows longer, more deeply and more frequently than a superior. A superior addressing an inferior will generally only nod the head slightly, while some superiors may not bow at all and an inferior will bend forward slightly from the waist.
Bows of apology tend to be deeper and last longer than other types of bow. They tend to occur with frequency during the apology, generally at about 45 degrees with the head lowered and lasting for at least the count of three, sometimes longer…. The depth, frequency and duration of the bow increases with the sincerity of the apology and the severity of the offence….”
Friday, November 13, 2009
Thursday, November 12, 2009
Paratrooper's Mom Begs Obama: 'End It' - Boston News Story - WCVB Boston
As family and friends mourn a fallen U.S. paratrooper, his mother made an emotional plea to Obama that it's time to either bring home the troops or end the war in Afghanistan.
The body of Benjamin Sherman, 21, was recovered in Afghanistan Tuesday.
"It's time we do something. This has gone on too long. They either need to come home or we need to end it," a tearful Denise Sherman said.
Sherman was on his second tour of duty when he disappeared in Afghanistan last week during a mission to resupply troops in the western part of the country. He was a paratrooper with the 4th Brigade Combat Team, 82nd Airborne Division, based in Fort Bragg, N.C.
His family said Sherman jumped into a river to try to help another soldier when both were swept away. He was missing for about a week. "My brother is the type of man whose main values are honor, respect and standing up for what you believe in."
- Meredith Sherman, sister
Dozens of troops searched frantically for Sherman and his comrade and found the pair after about a week.
Tuesday, November 10, 2009
Friday, November 6, 2009
Co-Worker: Ft. Hood Suspect Made ‘Outlandish’ Comments Condemning US Foreign Policy
Dr. Walid Phares, Director, Foundation for Defense of Democracie's Future of Terrorism Project, is interviewed about Ft. Hood. He referred to the "Ft. Dix Six," a reference to the five of six Muslim immigrants who were convicted of plotting to massacre U.S. soldiers at Fort Dix, New Jersey; and, he noted that one private was killed--Private Long--and another soldier was wounded by a Muslim terrorist, Abdulhakim Mujahid Muhammad, at a Little Rock, Arkansas, Army recruitment center (in which a Muslim protester later appeared to proclaim "Islam is the religion of peace"). The American military has been a terrorist target according to Dr. Phares.
The shooting attack at Ft. Hood by a Muslim soldier, the Ft. Dix convictions, and the Little Rock shooting are anything but isolated incidents. Leaving out the numerous attacks on American soldiers overseas, by soldiers in uniform or in fake uniforms, attacks have continued in the U.S.
1) On 23 March 2003 there was a grenade attack by Muslim Sgt. Hasan Karim Akbar that killed Army Captain Christopher Seifert and Air Force Major Gregory Stone and wounded 14 others. He was convicted of two counts of premeditated murder and three counts of attempted premeditated murder on April 21, 2005. Notably, during his trial Akbar smuggled scissors out of a conference room, then asked the Military Police Officer guarding him to remove his hand cuffs so he could use the restroom. When the officer removed Akbar’s restraints, he stabbed the officer in the neck and shoulder before being wrestled to the ground by another officer.
2) While serving as a naval signalman on board the USS Benfoldin the months following the attack on the USS Cole, Hassan Abujihaad (a/k/a Paul R. Hall) actively provided Islamic terrorists with sensitive information about the location of Navy ships and their weaknesses. He also discussed sniper attacks on military personnel and attacks on U.S. military recruitment sites with Muslim terrorists as well. For his crimes, Abujihaad is currently serving a ten-(10) year sentence. On 5 March, 2008 Abujihaad was convicted by a jury and was sentenced to 10 years in prison.
3) There is also the case of U.S. Army captain James “Yousef” Lee, the former Muslim chaplain charged with espionage while serving at Guantanamo Bay, Cuba. Lee was arrested at a U.S. airport on charges of espionage after he was caught in possession of detailed maps of the detention facility along with other classified materials.
4) In addition to Lee, two other Islamic Arabic translators stationed at Guantanamo were convicted of unauthorized possession of classified documents.
Ultimately, the U.S. Army opted not to proceed with the espionage charges against Lee due to national security concerns arising from the evidence that would be made available to the public at the trial.
Saturday, October 31, 2009
Friday, October 30, 2009
Unsubscribe
Wednesday, October 28, 2009
Wednesday, October 21, 2009
Niall Ferguson: The Dollar Is Finished And The Chinese Are Dumping It
There are no subscriptions to his blog; no one should receive a post from this blog.
Niall Ferguson: The Dollar Is Finished And The Chinese Are Dumping It
Posted using ShareThis
Niall Ferguson has written The War of the World: Twentieth-Century Conflict and the Descent of the West and Empire: The Rise and Demise of the British World Order and the Lessons for Global Power, among other important works of economic history.
Sunday, October 18, 2009
Gov't Caused Housing Crisis
Friday, October 16, 2009
Stephen Colbert: Desert Cross Case Before the Supreme Court
The Colbert Report | Mon - Thurs 11:30pm / 10:30c | |||
The Word - Symbol-Minded | ||||
www.colbertnation.com | ||||
|
A desert cross case is before the Supreme Court since the Justices are deciding the appropriateness of a cross erected on the Mojave National Preserve to honor World War I dead. In his “The Word” segment, Stephen Colbert makes some strong arguments of his own regarding the true meaning of the cross–including a near-complete recitation of the Nicene Creed.
Wednesday, October 14, 2009
Health Care Rationing Bill is Not Online Nor Read by Representatives
There are no subscriptions to this blog. No one should receive a post from this site.
The actual language of a bill passed by Congress is not read and members state they can not even understand the actual wording of the bills they pass so they do not read the bills.
Sunday, October 11, 2009
Al Gore Getting Testy About His Environmental Errors
The director, John K. MacIver, of "Not Evil, Just Wrong," a documentary challenging Al Gore's "An Inconvenient Truth," dares to ask a question at the Society of Environmental Journalists annual conference. Apparently Mr. Gore only allows the 'right kind' of questions to be asked of him.
MacIver was asking about: The Nine Lies Of Al Gore.
Wednesday, September 23, 2009
"No world order that elevates one nation or group of people over another will succeed."
The world and its dictators applaud: Castro for example, and Obama was meeting with Russian President Dmitry Medvedev, whose country elevated their nation over others since Obama's decision to scrap a defense plan that Russia strongly opposed.
Our staunchest allies are distancing themselves away from us as well. Obama met with the new Japanese prime minister, Yukio Hatoyama, who has said he wants to shift Japan's diplomatic stance from one that is less centered on Washington's lead.
Thursday, September 17, 2009
Wednesday, September 16, 2009
Sheriff's Department Equipped Now with Weapon of War Against Civilians
Tuesday, September 15, 2009
7 Senators Still Support ACORN
Activists posing as a prostitute and her pimp released hidden-camera videos in which ACORN employees in Baltimore, Brooklyn, and Washington, D.C. offered insights on how to import children from Latin America to work as prostitutes and the undercover pair were offered suggestions on how to commit tax fraud.
ACORN has received $53 million in taxpayer funds since 1994 and the group was eligible for a wider set of funding in the pending legislation, which funds housing and transportation programs.
Just last week, the Census Bureau severed its ties with ACORN, saying it does not want the group’s help in outreach efforts on the decennial count.
Yet, seven senators were still willing to stand by them:
• Sheldon Whitehouse, D-R.I.
• Roland Burris, D-Ill.
• Dick Durbin, D-Ill.
• Bernie Sanders, D-Vt.
• Patrick Leahy, D-Vt.
• Bob Casey, D-Pa.
• Kirsten Gillibrand, D-N.Y.
Religious Group Investigated and On to ACORN Early On
White Student Beaten Repeatedly While Black Kids Cheer Attacker On
A second tape, slightly shorter, was released by the police Department.
Students attacked another while on a bus ride to school at Belleville West High School.
The underage victim's face has been blurred to protect his identity. Video source: Belleville Police Department
Free Speech of Congress Limited: Obama and the Double Standard
Offensive language is reserved for only a few, favored persons. Representative Pete Starke called Bush a "liar" twice; the rebuke was not official, the Chair simply reminded Starke not to engage in remarks directed against Bush as a person.
Listen to Representative Wilson yourself:
Monday, September 14, 2009
Obama Losing Black Support
ACORN Tapes Continue to Roll
Sunday, September 13, 2009
ACORN Trying to Provoke Crowd at Anti-Obama Rally
Tim Jones, TimJones@usadba.com, caught ACORN selling Gadsen, popularly known as the "Don't Tread on Me" flags, at the anti-Obama protest on Saturday.
Inhofe Must Believe Obama is Not Eligible
Senator Inhofe suggests that it is not worth suing Obama for his birth certificate because it would take ten years, too long to wait. What I find interesting though is that he says "you're right" to a "birther." He does not dispute that Obama is disqualified from office since he is not a natural born citizen. Inhofe must believe that Obama is not a natural born citizen and is violating the Constitution.
Saturday, September 12, 2009
Total Pageviews
Popular Posts
-
The original article, which has generated an incredible amount of hits, has mysteriously disappeared: 24 November 2014. http://www.wnd.com...
-
Assessment
-
SherAli Tareen, Assistant Professor of Religious Studies at Franklin and Marshall College, was awarded an American Academy of Religion’s 201...
-
This inaugural episode in series 1 (Paul and his communities) uses incidental autobiographical references in Paul’s letters as an avenue int...
-
Londoner
-
Rockefeller, Prager University Rockefeller
-
Why is Modern Art so Bad? 5:49 For two millennia, great artists set the standard for beauty. Now those standards are gone. Modern ar...
FEEDJIT Live Traffic Feed/Site Meter
FEEDJIT Live Traffic Map
Search This Blog
Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions
- Abbot, Edwin A., Flatland;
- Accelerate: Technology Driving Business Performance;
- ACM Queue: Architecting Tomorrow's Computing;
- Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
- Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
- Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
- Allawi, Ali A., The Crisis of Islamic Civilization;
- Alperovitz, Gar, The Decision To Use the Atomic Bomb;
- American School & University: Shaping Facilities & Business Decisions;
- Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
- Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
- Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
- Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
- Armstrong, Karen, A History of God;
- Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
- Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
- Auletta, Ken, Googled: The End of the World As We Know It;
- Austen, Jane, Pride and Prejudice;
- Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
- Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
- Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
- Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
- Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
- Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
- Baseline: Where Leadership Meets Technology;
- Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
- Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
- Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
- Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
- Berman, Paul, Terror and Liberalism;
- Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
- Better Software: The Print Companion to StickyMinds.com;
- Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
- Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
- Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
- Bradley, James, with Ron Powers, Flags of Our Fathers;
- Bronte, Charlotte, Jane Eyre;
- Bronte, Emily, Wuthering Heights;
- Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
- Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
- Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
- Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
- Bush, George W., Decision Points;
- Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
- Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
- Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
- Campus Technology: Empowering the World of Higher Education;
- Certification: Tools and Techniques for the IT Professional;
- Channel Advisor: Business Insights for Solution Providers;
- Chariton, Callirhoe (Loeb Classical Library);
- Chief Learning Officer: Solutions for Enterprise Productivity;
- Christ, Karl, The Romans: An Introduction to Their History and Civilization;
- Cicero, De Senectute;
- Cicero, The Republic, The Laws;
- Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
- Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
- CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
- CIO Insight: Best Practices for IT Business Leaders;
- CIO: Business Technology Leadership;
- Clay, Lucius Du Bignon, Decision in Germany;
- Cohen, William S., Dragon Fire;
- Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
- Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
- Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
- Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
- Compliance & Technology;
- Computerworld: The Voice of IT Management;
- Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
- Conti, Greg, Googling Security: How Much Does Google Know About You?;
- Converge: Strategy and Leadership for Technology in Education;
- Cowan, Ross, Roman Legionary 58 BC - AD 69;
- Cowell, F. R., Life in Ancient Rome;
- Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
- Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
- CSO: The Resource for Security Executives:
- Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
- D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
- Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
- Daly, Dennis, Sophocles' Ajax;
- Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
- Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
- Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
- Dawkins, Richard, The Blind Watchmaker;
- Dawkins, Richard, The God Delusion;
- Dawkins, Richard, The Selfish Gene;
- de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
- Defense Systems: Information Technology and Net-Centric Warfare;
- Defense Systems: Strategic Intelligence for Info Centric Operations;
- Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
- Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
- Dennett, Daniel C., Consciousness Explained;
- Dennett, Daniel C., Darwin's Dangerous Idea;
- Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
- Dickens, Charles, Great Expectations;
- Digital Communities: Building Twenty-First Century Communities;
- Doctorow, E.L., Homer & Langley;
- Dodds, E. R., The Greeks and the Irrational;
- Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
- Dostoevsky, Fyodor, The Idiot;
- Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
- Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
- Dr. Dobb's Journal: The World of Software Development;
- Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
- DT: Defense Technology International;
- Dunbar, Richard, Alcatraz;
- Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
- Edwards, Aton, Preparedness Now!;
- EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
- Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
- Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
- Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
- Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
- Ellis, Joseph J., His Excellency: George Washington;
- Emergency Management: Strategy & Leadership in Critical Times;
- Emerson, Steven, American Jihad: The Terrorists Living Among Us;
- Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
- ESD: Embedded Systems Design;
- Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
- Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
- eWeek: The Enterprise Newsweekly;
- Federal Computer Week: Powering the Business of Government;
- Ferguson, Niall, Civilization: The West and the Rest;
- Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
- Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
- Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
- Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
- Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
- Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
- Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
- Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
- Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
- Forstchen, William R., One Second After;
- Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
- Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
- Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
- Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
- Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
- Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
- Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
- Fuller Focus: Fuller Theological Seminary;
- Fuller, Graham E., A World Without Islam;
- Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
- Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
- Gibson, William, Neuromancer;
- Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
- Global Services: Strategies for Sourcing People, Processes, and Technologies;
- Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
- Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
- Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
- Goldsworthy, Adrian, Caesar: Life of a Colossus;
- Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
- Goodman, Lenn E., Creation and Evolution;
- Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
- Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
- Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
- Government Health IT: The Magazine of Public/private Health Care Convergence;
- Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
- Government Technology: Solutions for State and Local Government in the Information Age;
- Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
- Grant, Michael, The Classical Greeks;
- Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
- Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
- Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
- Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
- Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
- Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
- Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
- Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
- Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
- Hanson, Victor Davis, The End of Sparta: A Novel;
- Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
- Hanson, Victor Davis, Wars of the Ancient Greeks;
- Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
- Harris, Alex, Reputation At Risk: Reputation Report;
- Harris, Sam, Letter to a Christian Nation;
- Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
- Hayek, F. A., The Road to Serfdom;
- Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
- Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
- Hinnells, John R., A Handbook of Ancient Religions;
- Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
- Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
- Hugo, Victor, The Hunchback of Notre Dame;
- Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
- Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
- Info World: Information Technology News, Computer Networking & Security;
- Information Week: Business Innovation Powered by Technology:
- Infostor: The Leading Source for Enterprise Storage Professionals;
- Infrastructure Insite: Bringing IT Together;
- Insurance Technology: Business Innovation Powered by Technology;
- Integrated Solutions: For Enterprise Content Management;
- Intel Premier IT: Sharing Best Practices with the Information Technology Community;
- Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
- Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
- Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
- Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
- Journal, The: Transforming Education Through Technology;
- Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
- Kagan, Donald, The Peloponnesian War;
- Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
- Karsh, Efraim, Islamic Imperialism: A History;
- Kasser, Rodolphe, The Gospel of Judas;
- Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
- Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
- Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
- Kepel, Gilles, Jihad: The Trail of Political Islam;
- Kiplinger's: Personal Finance;
- Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
- KM World: Content, Document, and Knowledge Management;
- Koestler, Arthur, Darkness at Noon: A Novel;
- Kostova, Elizabeth, The Historian;
- Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
- Lake, Kirsopp, The Text of the New Testament, Sony Reader;
- Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
- Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
- Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
- Lenin, V. I., Imperialism the Highest Stage of Capitalism;
- Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
- Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
- Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
- Lifton, Robert J., Greg Mitchell, Hiroshima in America;
- Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
- Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
- Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
- Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
- Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
- Mackay, Christopher S., Ancient Rome: A Military and Political History;
- Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
- Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
- Marshall-Cornwall, James, Napoleon as Military Commander;
- Maughm, W. Somerset, Of Human Bondage;
- McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
- McCullough, David, 1776;
- McCullough, David, John Adams;
- McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
- McLynn, Frank, Marcus Aurelius: A Life;
- McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
- McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
- McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
- McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
- McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
- Meacham, Jon, American Lion: Andrew Jackson in the White House;
- Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
- Meier, Christian, Caesar: A Biography;
- Menzies, Gaven, 1421: The Year China Discovered America;
- Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
- Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
- Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
- Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
- Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
- Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
- Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
- Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
- Murray, Williamson, War in the Air 1914-45;
- Müller, F. Max, Chips From A German Workshop;
- Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
- Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
- Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
- Nature: The International Weekly Journal of Science;
- Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
- Network Computing: For IT by IT:
- Network World: The Leader in Network Knowledge;
- Network-centric Security: Where Physical Security & IT Worlds Converge;
- Newman, Paul B., Travel and Trade in the Middle Ages;
- Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
- Nixon, Ed, The Nixons: A Family Portrait;
- O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
- O'Donnell, James J., Augustine: A New Biography;
- OH & S: Occupational Health & Safety
- Okakura, Kakuzo, The Book of Tea;
- Optimize: Business Strategy & Execution for CIOs;
- Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
- Parry, Jay A., The Real George Washington (American Classic Series);
- Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
- Pausanius, Guide to Greece 1: Central Greece;
- Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
- Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
- Peters, Ralph, New Glory: Expanding America's Global Supremacy;
- Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
- Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
- Pimlott, John, The Elite: The Special Forces of the World Volume 1;
- Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
- Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
- Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
- Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
- Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
- Pouesi, Daniel, Akua;
- Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
- Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
- Profit: The Executive's Guide to Oracle Applications;
- Public CIO: Technology Leadership in the Public Sector;
- Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
- Quintus of Smyrna, The Fall of Troy;
- Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
- Red Herring: The Business of Technology;
- Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
- Redmond Magazine: The Independent Voice of the Microsoft IT Community;
- Renan, Ernest, The life of Jesus (Sony eReader);
- Richler, Mordecai (editor), Writers on World War II: An Anthology;
- Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
- Rocca, Samuel, The Army of Herod the Great;
- Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
- Rodoreda, Merce, Death in Spring: A Novel;
- Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
- Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
- Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
- SC Magazine: For IT Security Professionals;
- Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
- Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
- Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
- Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
- Scheuer, Michael, Osama Bin Laden;
- Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
- Scholastic Instructor
- Scholastic Parent & Child: The Joy of Family Living and Learning;
- Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
- Schug-Wille, Art of the Byzantine World;
- Schulze, Hagen, Germany: A New History;
- Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
- Scott, Sir Walter, Ivanhoe;
- Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
- Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
- Seibel, Peter, Coders at Work;
- Sekunda N., & S. Northwood, Early Roman Armies;
- Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
- Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
- Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
- Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
- Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
- Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
- Simkins, Michael, The Roman Army from Caesar to Trajan;
- Sinchak, Steve, Hacking Windows Vista;
- Smith, RJ, The One: The Life and Music of James Brown;
- Software Development Times: The Industry Newspaper for Software Development Managers;
- Software Test Performance;
- Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
- Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
- Sophocles, The Three Theban Plays, tr. Robert Fagles;
- Sound & Vision: The Consumer Electronics Authority;
- Southern, Pat, The Roman Army: A Social and Institutional History;
- Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
- Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
- Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
- Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
- Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
- Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
- Steyn, Mark, America Alone: The End of the World As We Know It;
- Strassler, Robert B., The Landmark Herodotus: The Histories;
- Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
- Strassler, Robert B., The Landmark Xenophon's Hellenika;
- Strategy + Business;
- Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
- Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
- Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
- Sumner, Graham, Roman Military Clothing (2) AD 200-400;
- Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
- Swanston, Malcolm, Mapping History Battles and Campaigns;
- Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
- Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
- Swift, Jonathan, Gulliver's Travels;
- Syme, Ronald, The Roman Revolution;
- Talley, Colin L., A History of Multiple Sclerosis;
- Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
- Tech Briefs: Engineering Solutions for Design & Manufacturing;
- Tech Net: The Microsoft Journal for IT Professionals;
- Tech Partner: Gain a Competitive Edge Through Solutions Providers;
- Technology & Learning: Ideas and Tools for Ed Tech Leaders;
- Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
- Thackeray, W. M., Vanity Fair;
- Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
- Tolstoy, Leo, Anna Karenina;
- Trento, Joseph J., The Secret History of the CIA;
- Twain, Mark, The Gilded Age: a Tale of Today;
- Ungar, Craig, House of Bush House of Saud;
- Unterberger, Richie, The Unreleased Beatles Music & Film;
- VAR Business: Strategic Insight for Technology Integrators:
- Virgil, The Aeneid
- Virtualization Review: Powering the New IT Generation;
- Visual Studio: Enterprise Solutions for .Net Development;
- VON Magazine: Voice, Video & Vision;
- Wall Street Technology: Business Innovation Powered by Technology;
- Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
- Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
- Ward-Perkins, The Fall of Rome and the End of Civilization;
- Warren, Robert Penn, All the King's Men;
- Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
- Weber, Karl, Editor, Lincoln: A President for the Ages;
- Website Magazine: The Magazine for Website Success;
- Weiner, Tim, Enemies: A History of the FBI;
- Weiner, Tim, Legacy of Ashes: The History of the CIA;
- West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
- Wharton, Edith, The Age of Innocence;
- Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
- Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
- Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
- Wissner-Gross, What High Schools Don't Tell You;
- Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
- Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
- Woodward, Bob, Plan of Attack;
- Woodward, Bob, The Agenda: Inside the Clinton White House;
- Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
- Wright-Porto, Heather, Beginning Google Blogger;
- Xenophon, The Anabasis of Cyrus;
- Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;
Computing Reviews
Handy Tools, Links, etc.
Share |
CIO and Strategy & Business magazines
Nature: International Weekly Journal of Science
SD Times: Software Development News
SC Magazine for Security Professionals
Missile Defense
33 Minutes
Government Technology: Solutions for State and Local Government in the Information Age
What's Running is a great tool so that you can see what is running on your desktop.
Process Lasso lets you view your processor and its responsiveness.
Online Armor lets you view your firewall status.
Avast is a terrific scrubber of all virus miscreants.
ClamWin is an effective deterrent for the little nasty things that can crop into your machine.
Ad-Aware is a sound anti-virus tool.
For all your electronic appliance needs research products on this terrific site.
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.
Recent Comments
Blog Smith Headline Animator
Library Thing: Chicks Dig Readers
Blog Archive
-
▼
2024
(202)
-
▼
July
(19)
- Burning America: In the Best Interest of the Compa...
- Burning America: In the Best Interest of the Compa...
- Burning America: In the Best Interest of the Compa...
- Burning America: In the Best Interest of the Compa...
- Family
- How'd Ya Like to Meet Henry, Defiance Part 2: Fiction
- Needle Park, Defiance Part 2: Fiction
- Normal Service Will Be Resumed As Soon As Possible...
- Hope, Defiance Part 2: Fiction
- Everybody's Crazy But Me, Defiance Part 2: Fiction
- What Would I Do Without You, Defiance Part 2: Fiction
- Kettle of Fish, Defiance Part 2: Fiction
- Weed, Defiance Part 2: Fiction
- Precious, Defiance Part 2: Fiction
- This Ain't Rock And Roll, Defiance Part 2: Fiction
- The 3rd Rail, Defiance Part 2: Fiction
- Fiction, Defiance Part 2: Fiction
- People, Defiance Part 2: Fiction
- Videos for Educational Technology c. 2014
-
▼
July
(19)
National Debt Clock
"Congress: I'm Watching"
A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.