Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Monday, July 30, 2007

"How's Your House," Ian Hunter on Hurricane Katrina


How's Your House by Ian Hunter (Song at NOMRF.org)

Add to My Profile | More Videos">


Description: Ian Hunter courtesy of YepRoc Records for the New Orleans Musicians Relief Fund. Video Produced by Grewvia. This song and 15 others by artists including Dr. John, Edwin McCain, James Andrews, Joe Topping and a new song by the Kaiser Chiefs are available at NOMRF.org. 100% of the proceeds will help the grass roots New Orleans Musicians Relief Fund.

Microsoft Struggles to Catch Google

In a story today on Computerworld Microsoft is attempting to catch up with Google and Yahoo in search capabilities. They have a long way to go. In June, Google sites captured 49.5% of the U.S. search market, while Yahoo sites ranked second with 25.1% of U.S. searches, followed by a distant Microsoft with only 13.2%, according to comScore Networks Inc.


Microsoft though began a new center, the Internet Services Research Center, as a part of Microsoft's research group. Interestingly enough though, the center will have teams in the U.S., but also some in Beijing.


Maybe Microsoft can go hard on those Chinese government types who are pushovers for Google.

Sunday, July 29, 2007

Ahead or Behind the Curve?

Today, 29 July 2007, the BBC reported that Prime Minister of Great Britain, Gordon Brown, stated that the world owes the US a debt.


On the cusp of his first visit with George Bush, Brown stated that the U.S. leadership in the war against international terrorism is a debt that the world owes America.


Some analysts had speculated that Brown would distance himself from George Bush.


So far Brown has not publicly stated he would.

Saturday, July 28, 2007

Newest Expansion Pack to Civilization IV: Beyond The Sword


One of the more intriguing developments in the gaming world, for an educator at least, is the accurate and realistic portrayal of history in the play. One of the best is Civilization IV. To the basic game is the newest expansion pack, Beyond the Sword, the second release after the Warlords edition.


The creator, Sid Meier, did not intend to write an educational game, precisely what makes it so fun probably, although an educator can do a great deal with the game to teach history. In a recent interview, Meier notes:



I read an interesting article recently about how some teachers actually use Civilization III in their classes as a teaching tool. Would you endorse or recommend the use of Civilization III as an educational product?


Sid: There's certainly nothing in the game that's just totally, flat-out wrong. I think Civilization is a good place to learn some basic ideas about history, and to be a part of it; to make the decisions. The great thing about a game is that you're the star of it. You're actually there making the decisions. Yes, it's been used in a lot of different educational situations, and if you can get a kid interested in history through a game, that's...We certainly lead them through the Civilopedia. We let them know that there's more out there if you want to explore it.


I've heard about a lot of people who played games as a kid and have gained a lot of useful knowledge that they were able to use later in life. So I certainly encourage people to use Civilization as a way to introduce them to history and make it exciting

Friday, July 27, 2007

Who Knows What Evil Lurks Inside a Cell Phone?

Ever wonder if something dangerous lurks in your cell phone? You should. In the tragedy that killed U.S. pets by ingesting tainted Chinese dog food, and to toothpaste that made people ill, a story in today's Computerworld alerted users to consider what's in your cell phone. In a widely publicized case, Zheng Xiaoyu, the former head of China's food and drug administration, was executed on corruption charges when it established that China did not have enough quality controls in place for the tainted goods leaving China.


And unlike toothpaste cell phones seem safe enough. However, cell phones can be lethal. A number of people in China have been killed because of problems with their cell phones. Indeed, a typical cell phone contains heavy, toxic metals such as lead and beryllium, poisonous flame retardants like bromide and enough cadmium to contaminate thousands of gallons of water. These ingredients expose the user to toxins.


The major cell phone manufacturing countries--the U.S., Finland, Sweden, Germany, South Korea, and Japan-- protect users with their rigorous safety procedures, and control and monitor the safety of cell phone manufacturing. National governments, consumer and industry groups, magazines and journals, and other actors monitor, test, and review cell phone safety.


If China is to be a successful major world economic player it needs to do everything it can to raise quality and review standards to ensure the safety of cell phone users.

Thursday, July 26, 2007

Would You Like to Know What the U.S. Military Is Thinking?

Computerworldtoday released a story about classified U.S. military information and corporate data which is available over P2P (peer-to-peer file sharing networks).


Experts testified before Congress by relating that data leakage is worse than thought previously.


Millions of documents are housed freely on file sharing networks after being inadvertently exposed by individuals downloading P2P software on systems that held the data.


For example, would you like the Pentagon's secret backbone network infrastructure diagram, complete with IP addresses and password change scripts? You can have that. Also there is contractor data on radio frequency manipulation to beat Improvised Explosive Devices (IED) in Iraq; physical terrorism threat assessments for three major U.S cities; and, information on five separate Department of Defense information security system audits.


The House Committee on Oversight and Government Reform chaired by Rep. Henry Waxman, (D-Calif.) heard this testimony.


Let's hope Henry gets good and sick of this breach and plugs the holes, the sooner the better.

Wednesday, July 25, 2007

Skeletons In Your Closet?

Reuters today reported on a Web site that traces convict ancestors in the Land Down Under.


The records of tens of thousands of British convicts sent to Australia starting in the 18th century are no online so if you had something to hide about your family past, its all out now. 160,000 convicts were forcibly removed from England and transported to Australia between 1788 and 1868. The crimes ranged from petty crimes to serious crimes like murder and assault.


The first cargo of 732 convicts landed in Sydney Cove in January 1788 on 11 ships from the British First Fleet.

Tuesday, July 24, 2007

Use A Computer, Go To Jail

Not exactly but Computerworld released a study today indicating MySpace is inhabited by 29,000 registered sex offenders, according to North Carolina Attorney General Roy Cooppdate. Following a subpoena, MySpace turned over the names of the convicted sex offenders.

Monday, July 23, 2007

Better Than Bombay?

The 23 July 2007 issue of Computerworld ran a story about how possibly Pakistan is a good site to outsource IT, to which "Anonymous"
posted:


Let's see, we have the Taliban massing on its western border with Afghanistan. Osama Bin Laden is reputed to be hiding out in its mountainous western border region with Afghanistan. Journalists have been beheaded there. The President of the country is routinely under threat of assasination [sic]. And, you want to outsource your software development there? Get real.


I've been doing my best and reading Tariq Ali to appreciate the difficulties of the West versus the Muslim world but really the way out of the morass of poverty is to get your house in order. Any investor willing to part with their money is truly providing an opportunity for Pakistanis, if there were only enough people willing to embrace the chance. There are so many more affordable but stable environments. Pakistan is not one of them.

Big Brother IS Watching

Today's Computerworld ran an article by David Strom. He lists what he describes as a "Paranoia Product List" of items in case you, and you rightfully should be, are concerned about leaving tracks on the Internet:


General-purpose packet-capture tools; Wildpackets OmniAnalysis Platform, Network General Sniffer InfiniStream, NetQoS Gigastor, ETelemetry Locate; IM auditing and monitoring tools, Symantec IM Manager, Akonix F7 Enterprise, Facetime IM Auditor; E-mail/IM encryption tools, PGP Desktop and a free version of PGP, Hushmail.com, X-IM.net, PSST; Anonymous proxies, Anonymizer.com's Anonymous Surfing and Total Net Shield; Free anonymous surfing and proxies, Protected desktop, and Mojopac.com.

Sunday, July 22, 2007

Whither Turkey?


Photo by Lynsey Addario for The New York Times


An article in the New York Times by Sabrina Tavernise (Sebnem Arsu contributed) today reported that the Turkish ruling party of Prime Minister Recep Tayyip Erdogan--the Justice and Development party (A.K.)--won a decisive victory in national parliamentary elections. The vote indicates the direction of Turkish democracy.


The vote sent a message to the secular state establishment, which opposed Erdogan's Islamic agenda. The secularists, the Republican People's Party, received only 20 percent of the vote. The Nationalist Action Party, an anti-Kurdish group, won 14 percent of the vote.


As the only non-European, Muslim NATO member and a strong American ally its stability is critical in light of chronic chaos in the Middle East. The powerful and secular military might react and it has deposed elected governments four times since the Turkish state was founded by Mustafa Kemal Ataturk in 1923.


The A.K. arises from a religious, merchant class in rural Turkey. It advocates membership for Turkey in the European Union. It has strengthened economic ties with Israel, along with a non-vindictive policy towards the Kurdish minority.


Erdogan began as an Islamist, and for many leaders of the party, whose wives wear headscarves, comparisons were drawn to struggling administrations in Syria, Lebanon and Jordan, or countries with wives whose heads were uncovered.


One ploy of Turkey’s secular state elite, backed by its military, used a legal maneuver to block Mr. Erdogan’s candidate from becoming president. And why? The wife of the candidate, Foreign Minister Abdullah Gul, wears a Muslim headscarf.


It is refreshing to see a Middle Eastern Muslim political scene with a mixed crowd of headscarf and non-headscarf wearers.


The best policy is to take a `wait and see' attitude until Erdogan either steers the country in a more religious and anti-Western direction or if his victory is more simply modifying Turkey's secularity in a moderately religious direction. Not every Muslim is an Islamist and Erdogan should be given a chance to show his true colors.


In fact, if I were even more optimistic, although I frankly confess usually I am not, Erdogan's victory could be a sign that religiosity is more robust, charismatic, fervent, but mature and still soundly democratic at the same time. The best case scenario is that Turkey is Muslim, democratic, and secular all in one which would be a terrific political model to emulate in the region. The icing on the cake is that Israel is not demonized and Turkey and Israel cooperate in the region.


Is that too much to hope for?

Saturday, July 21, 2007

Obama Hard Ball

The MySpace and Web 2.0 phenomenon is hitting the political sphere. When Senator Barack Obama tried to own his own MySpace address, he ran smack into an admirer, Joe Anthony, who had beat him to the punch for the page. Anthony had racked up 160,000 Obamans (friends) for Barack already. Negotiations began for Obama to get his name and MySpace address. Anthony requested 39K for his work on the Obama page. It got ugly but Obama seized the account in any case and his MySpace page only had 75,000 friends. It looks like he lost some buddies in the MySpace takeover.

7,000 Iraq Refugees to Enter U.S.

Only 800 Iraqis refugees were allowed into the U.S. since 2003, but 7,000 will enter the U.S. this year. I wonder why so many Iraqis want to emigrate if America is perceived so negatively in Iraq?

Friday, July 20, 2007

More Google Cookie Crumbling

Computerworld ran a story on 19 July 2007 about the fall-out from Google's recent decision to revise its cookie policy. The new and improved cookies will last only two years.


However, in the recent development critics charge that "No users will experience any gains in privacy at all due to Google's change in policy," stated Randy Abrams, director of technical education at ESET, a vendor of antivirus products.


Ever wonder how long Google's cookies last on your computer? Currently, the cookies set by the company are designed to expire in 2038.


That is longer than any cookie I know.

Follow the Campaign Money for the Next President


Federal Computer Week released a story, 16 July 2007 about the Federal Election Commission. The first day that the FEC offered its first interactive campaign finance application, the Web site garnished 90,000. This figure is an increase over its usual 7,000 visitors monthly.


The site cost about $12,000 to build and took about six months to develop.


The Federal Election Commission (FEC) is an independent regulatory agency created in 1975 by Congress to administer and enforce campaign finance legislation in the United States. It was created in a provision of the 1974 amendment to the Federal Election Campaign Act. It describes its duties as "to disclose campaign finance information, to enforce the provisions of the law such as the limits and prohibitions on contributions, and to oversee the public funding of Presidential elections."

Thursday, July 19, 2007

Would You Like $968 Million to Prepare?

Computerworld released a story announcing that the U.S. is offering $968 million for disaster technology. According to the Reuters news agency the money is in the form of grants to help state and local public safety agencies buy sophisticated radios and technology for communications during disasters, according to a Commerce Department spokesperson.

Wednesday, July 18, 2007

Who Said the Germans Don't Have a Heart?

An article today in Computerworld reported that German police understood how an angry computer user was so frustrated with his computer that he tossed it out the window. Apparently in the middle of the night a man was so frustrated that in an outburst his startled neighbors heard the commotion. The Hanover police responding to the melee sympathized with his technical frustrations. They decided not to press charges but they did make him clean up the mess.


"Asked what had driven him to the night-time outburst, the 51-year-old man said he had simply got annoyed with his computer. `Who hasn't felt like doing that?' said a police spokesman. I think we can all relate to computer users everywhere who have felt, and some have done, the same thing.

Political Globalized Islam



Two worthwhile books with flawed logic from a French theorist: The Failure of Political Islam & Globalized Islam: The Search for a New Ummah by Olivier Roy.


Will fundamentalist Muslims manage to take power, or will the mostly nonfundamentalist autocrats now in power stay there?


The fundamentalists could well take over several governments in a short period: Algeria, the Islamic Salvation Front (FIS) has launched a virtual civil war; in Egypt, radical fundamentalists control parts of the cities and countryside; fundamentalist parties are gaining in nearly all the Muslim countries with electoral politics (Turkey, Lebanon, Jordan, Kuwait, Pakistan, Malaysia). The fundamentalist challenge to the established order is real.


So how is political Islam a failure?


The failure Roy refers to is one that distinguishes between Islamism and neofundamentalism. For Roy, the former means the drive for political power, and the latter means focusing on the family and the mosque. Think Iran for Islamism; think Saudi Arabia for neofundamentalism.


Islamism has failed and the weaker cause of neofundamentalism has flourished accoring to Roy.


True enough, Roy points out that fundamentalist Islam is a form of modernization. Contrary to the usual assumption, it is not medieval in spirit at all but an acutely modern form of protest. In Roy's elegant formulation, it "is the sharia [Islamic sacred law] plus electricity."


Though fundamentalist Islam cannot work, what Roy misses is that the realization that fundamentalism does not work could be years or decades off. We have no idea whatsoever from knowing the full import of fundamentalism. For example, as the Marxist-Leninist precedent shows, regimes kill and repress their opponents and also export their ideology abroad. The mullahs in Iran relish in power as most people appear to enjoy it. The salient point: "Power corrupts and absolute power corrupts, absolutely," Lord Acton, is not discussed by Roy.


In 1933, sixteen years after the Bolshevik revolution, communism had a strong life after the revolution; sixteen years after the Iranian Revolution fundamentalism is alive and well, despite Roy's objection.


Roy was wrong on Algeria. The Muslim FIS in Algeria is superceded by the Armed Islamic Group (GIA): they specialize in murdering the children of police officers, women without veils, unsympathetic journalists, and non-Muslim foreigners. They kill their victims in particularly horrifying ways, slitting throats and cutting off heads. Educated and/or Western-oriented, French speakers, or those wearing a business are attractive as potential victims.


Leading American specialists on the subject, such as John Entelis, John Esposito, and John Voll, argue that we should look beyond fundamentalism's rough edges and bristling rhetoric and relax.


However, you can only engage in dialogue those who are willing to accept its consequence: democracy, freedom, free choice.


We need to learn from history and to hope with the Who, "We don't get fooled again."

Tuesday, July 17, 2007

The Declaration of Independence

Are Google Cookies Crummy?


Today Computerworld released a story about Google which states their new policy: user cookies will expire after two years. However, for the two-year cookie policy to work: users must not return to the search site. The solution then is pretty simple, no? Users should just stop searching on Google. I would think that it is clear by now that many ordinary computer users do not understand what cookies are or how they work.


What are cookies? Cookies are small bits of code stored on a computer; cookies are handy for users though because their user preferences are stored on the computer. Another common aspect of cookies that users often overlook is that they are able to control their cookies at any time via their browsers. Users can shut off or modify how cookies are downloaded to their computers.


A user might view the cookie issue as convenience, Google is looking out for me, or more sinisterly, Google is deciding something for me that I'd rather do myself.


Privacy advocates think Google can do better. According to the Computerworld article:

"Google's paying attention to the issue of cookie expiration, but as a practical matter, I think this change will have little impact on online privacy. . . . Users still know too little about how Google collects information, what information is collected and what it's used for. And, of course, [for] anyone who returns to the Google site within two years, the cookie will be renewed. I think two days rather than two years is probably a better period for a search cookie,"
stated Marc Rotenberg, executive director of the Washington-based Electronic Privacy Information Center.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.