Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Thursday, August 9, 2007

Iran's Blood for Oil


What Tehran and Baghdad have in common is trading for oil. Tehran and Baghdad are expected to agree on a deal on a pipeline soon to transfer crude oil to refineries in Iran from oilfields in Iraq.


I take it Iran is willing to trade blood for oil.


Meanwhile, many Iranian young people, especially women strive for their freedom.

You Can Trust Al-Jazeera . . . To Be Al-Jazeera


"Kidnapped workers building U.S. embassy in Baghdad" screams the Al-Jazeera headline so let us have a look at this shocking story. The story by Ahmed Abdullah states:


"An American civilian contractor revealed shocking evidence about how Filipino construction workers were tricked last year into building the U.S. embassy in Baghdad, according to an article on The Times Online. The 51 men were originally told that they’d travel to Dubai to construct hotels there, but instead found themselves in a Baghdad-bound plane!"


The story is based on the statement of Rory Mayberry testifying before a congressional committee.


The Filipinos were reportedly upset at being deceived but their protests were quelled by: "a gun-toting air steward [not named, emphasis mine] ordered them to sit down. . . . [and a] security guy [not named, emphasis mine] working for First Kuwaiti waved an MP5 [sub-machinegun] in the air that people settled down."


On the other hand, the same story ran on the AP by Teresa Cerojano, Associated Press Writer. The gun-toting enforcers are not mentioned and a reasonable person would conclude that the guns are a complete fabrication.


The upshot of the story is that a Philippine special envoy is traveling to the Middle East to investigate allegations that a Kuwaiti contractor took Filipino workers to Iraq without their knowledge to build the U.S. Embassy. The meat of the story is that Filipinos, contracted by the First Kuwaiti General Trading & Contracting Co., thought they were going to work in Dubai and ended up in Baghdad instead.


The story really involves the Filipoino workers and a Kuwaiti company.


You don't get that impression from Al-Jazeera with the shock tactic of the U.S. kidnapping people.


People believe what they want to believe. In fact, jobs in Iraq have been a boon for many Filipino workers.

Wednesday, August 8, 2007

Chatting with Alexander the Great


If you could chat with Alexander the Great, what would you say? We need more protection for those auxiliary troops don't you think? What is it with this hoplite innovation?

That possibility was not possible of course but a newly launched site allows front-line soldiers to submit combat technology ideas. TroopIdeas.com allows anyone in the U.S. military to detail their need for combat tools.


The troop ideas are then evaluated by Gestalt, the technology consulting firm and government contractor that operates the site. Gestalt will either work to develop the tool itself or route the information to the best suited areas within the U.S. Department of Defense, stated William Loftus, Gestalt's president and CEO, in a story carried yesterday by Computerworld.

Tuesday, August 7, 2007

The Wisdom of "George" on War

George Kennan (1904-2005)


The roots of American involvement in the Middle East go back so much deeper than the current contentious debates about "George," actually, the American people should be talking about George, but George Kennan, not Bush. Kennan is a key figure in the development of U.S. Cold War policy as the "father of containment" in the newly founded CIA in 1948.


Kennan saw a new type of warfare for Americans in the Post-War period.



The Problem


The inauguration of organized political warfare.


Analysis


1. Political warfare is the logical application of Clausewitz's doctrine in time of peace. In broadest definition, political warfare is the employment of all the means at a nation's command, short of war, to achieve its national objectives. Such operations are both overt and covert. They range from such overt actions as political alliances, economic measures (as ERP--the Marshall Plan), and "white" propaganda to such covert operations as clandestine support of "friendly" foreign elements, "black" psychological warfare and even encouragement of underground resistance in hostile states.


2. The creation, success, and survival of the British Empire has been due in part to the British understanding and application of the principles of political warfare. Lenin so synthesized the teachings of Marx and Clausewitz that the Kremlin's conduct of political warfare has become the most refined and effective of any in history. We have been handicapped however by a popular attachment to the concept of a basic difference between peace and war, by a tendency to view war as a sort of sporting context outside of all political context, by a national tendency to seek for a political cure-all, and by a reluctance to recognize the realities of international relations--the perpetual rhythm of struggle, in and out of war.


3. This Government has, of course, in part consciously and in part unconsciously, been conducting political warfare. Aggressive Soviet political warfare has driven us overtly first to the Truman Doctrine, next to ERP, then to sponsorship of Western Union [1-1/2 lines of source text not declassified]. This was all political warfare and should be recognized as such.


4. Understanding the concept of political warfare, we should also recognize that there are two major types of political warfare--one overt and the other covert. Both, from their basic nature, should be directed and coordinated by the Department of State. Overt operations are, of course, the traditional policy activities of any foreign office enjoying positive leadership, whether or not they are recognized as political warfare. Covert operations are traditional in many European chancelleries but are relatively unfamiliar to this Government.


5. Having assumed greater international responsibilities than ever before in our history and having been engaged by the full might of the Kremlin's political warfare, we cannot afford to leave unmobilized our resources for covert political warfare. We cannot afford in the future, in perhaps more serious political crises, to scramble into impromptu covert operations [1 line of source text not declassified]. . . .


What is proposed here is an operation in the traditional American form: organized public support of resistance to tyranny in foreign countries. . . . Our proposal is that this tradition be revived specifically to further American national interests in the present crisis. . . .


d. Preventive Direct Action in Free Countries.


Purpose: Only in cases of critical necessity, to resort to direct action to prevent vital installations, other material, or personnel from being (1) sabotaged or liquidated or (2) captured intact by Kremlin agents or agencies.


Description: This covert operation involves, for example, (1) control over anti-sabotage activities in the Venezuelan oil fields, (2) American sabotage of Near Eastern oil installations on the verge of Soviet capture . . . .


Long before Bush, and years before the formulation of the overt Eisenhower Doctrine, the U.S. was in the Middle East in a new type of warfare in the Post-War period. Although the faces of the enemy may change, we are not facing the Soviets anymore, but the geographical area of contention, the Middle East, and the product, oil, is now a part of political warfare in American life. The troublesome aspect for Americans seems to lie in the fact that this warfare is overt, as opposed to George's covert operations in 1948. But the present George is following the broad outlines of American foreign policy that is decades old by this point.


Reference:
269. Policy Planning Staff Memorandum


Washington, May 4, 1948.


Source: National Archives and Records Administration, RG 273, Records of the National Security Council, NSC 10/2. Top Secret. No drafting information appears on the source text. An earlier, similar version, April 30, is ibid., RG 59, Records of the Department of State, Policy Planning Staff Files 1944-47: Lot 64 D 563, Box
11. The Policy Planning Staff minutes for May 3 state: "There was a discussion of the Planning Staff Memorandum of April 30, 1948 on the inauguration of organized political warfare. This paper was generally approved and Mr. Kennan will present it tomorrow for discussion at a meeting of NSC consultants." (Ibid., Box 32)

Upcoming Attraction! See it now! History Made Dumber! "War Made Easy"


History Made Dumber is not the name of War Made Easy--a film which "reaches into the Orwellian memory hole to expose a 50-year pattern of government deception and media spin that has dragged the United States into one war after another from Vietnam to Iraq"--but perhaps it should be.


Based on the book by Norman Solomon, you may look in vain for any mention or sound bite of Presidents Eisenhower, Kennedy, Carter, or Ford but you will not see them or hear any references to them in this film. If I'm not mistaken they were American Presidents of the past 50 years. Nonetheless, bad boys LBJ, Nixon, Reagan, and Clinton all have their cameos but the real targets are the Bushes, father and son.


As an attempt to review the past 50 years of American warmaking it fails miserably. It is tolerable if you like the sort of presentation that claims to be an expose of recent wars under the Bushes and to a lesser extent, Clinton. As a competitor to the Michael Moore style of film making it has the obligatory repetition of key quips, and quotes thought to be particularly germane and cutting.


One of the typical refrains is about the lack of WMDs as is to be expected. No reference is made to the other popular refrain at the time which was "No Blood for Oil," you don't hear that old canard much any more. And, the lack of expression is for good reason. Gas prices hit the highest level in American history. And, judging by the number of filmgoers who used cars, trucks, and SUVs to attend the same screening as I, the insatiable American thirst for oil is not abating.


If Americans were truly sincere about getting the U.S. out of Iraq, then they should sell their cars, and the next likely event to occur is that American politicians will stop the war drumbeats. In the meantime, as any president Republican or Democrat is bound by the Constitution, they will continue on the war course mapped out. Americans are tied to their inefficient internal combustion engines and American politicians are acting in the national interest, that is, keeping the flow of oil to the U.S.


In the film history is reviewed in the person of Senator Wayne Morse (D-Oregon) who is acclaimed as one of few American lawmakers who was brave enough to oppose the war in Vietnam. He makes a particularly embarrassing point about the President simply being "an administrator of the people's foreign policy."


God bless you Senator but not in my Constitution.


The film is on a bit better ground as an analysis of how the corporate media has echoed Washington's drumbeats during Persian Gulf I and II. The struggling print media, newspapers, are in dire straits and they are being eclipsed by digital communications, infotainment, the internet, and other new media. The new media is not directly as a result of government control but recent administrations have been savvy enough to adjust their message catered to the new media.


There are alternatives: turn off the TV, read bloggers, watch clips on YouTube, read foreign newspapers, catch Al-Jazeera, this works for me and I stay informed thusly.


The film is for the liberal choir exclusively so they can hum along to the old gospel song that gained some popularity during the Vietnam era, "Down by the Riverside," whose chorus echoes a heart-felt desire of people:


"I ain't gonna study war no more
I ain't gonna study war no more
Study war no more…"

C++ for Anyone from MIT

C++ is not exclusively for adult programmers but MIT has released programming for anyone through MIT's Media Lab. Researchers in the Lab's "Lifelong Kindergarten Group" created a program called Scratch, a graphical programming language geared to be programming learners, including children and teens.


A good introduction can be seen on how to create interactive stories, animations, games, music, and art with Scratch (http://scratch.mit.edu).

Google Educational Offerings

Campus Technology today released a story that Google is offering researchers a closer look at their search capabilities. Two new services are offered to the individauls in higher education--access to Web search and machine translations--as part of Google's University Research Programs effort. The program for investigation, "the University Research Program for Google Search," has merit if it can unleash the incredible data hidden via the web, and certainly Google is one company that has revealed the resources of the web more than any other entity.


The second service, Google Translate, seems less promising although I have not taken it for a spin just yet. I still have to get over my bad experience with DragonDictate, c. 1998, when I spent an inordinate amount of time teaching a recalcitrant program and computer how to talk like me. Come to think of it, that may have been the problem.

Monday, August 6, 2007

"I Wanna' Be Like Osama"

The 60th Edinburgh Festival Fringe is featuring "Osama the Musical" which is a:
"Sensational new musical comedy set to incite violent applause and a new cult following featuring insightful satirical sequences including "I Wanna' Be Like Osama. The West shall not be won (again) so long as we have a high-kicking chorus line!"

Those Irresistible Nerds

Graph source: Source: Robert Half Technology, May 2007


Mary Brandel published a story in the 6 August 2007 issue of Computerworld reviewing what technology skills are in short supply. The list of skills follow below: Machine learning, Mobile applications, Wireless networking, Project management, General networking, Network convergence, Open-source programming, Business intelligence, and Embedded security.

Nothing "GNU" (New) in China

Wikipedia representatives have stated that Baidu.com Inc., the largest search engine in China, may be their worst copyright violator. Baidu plagiarizes Wikipedia without attribution or honoring the GNU license.


The Wikimedia Foundation, Inc. has never sued a copyright violator and the Foundation has no plans to sue Baidu but this looks like an attempt to shame the company into compliance. All Wikipedia needs is the company to respect its copyright license by simply attributing Wikipedia entries on Baidu Baike, the company's Chinese-language Web encyclopedia.


"They do not respect the license at all," said Florence Nibart-Devouard, chairman of the board of trustees of the Wikimedia Foundation.

Pentagon Describes How to Combat IEDs

Speaking of worthwhile blogs to read, The Danger Room in fact carried a story about an excellent research paper--AN ASYMMETRIC THREAT INVOKES STRATEGIC LEADER INITIATIVE: THE JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT ORGANIZATION by WILLIAM G. ADAMSON, COL, USA, that is worthwhile reading.


The report has some good news and some bad news. The Pentagon is praised for its "resilience, learning and adapting to the IED threat." It credits JIEDDO's chief, retired General Montgommery Meigs, with "vision [and] leadership." And the paper notes that "casualty rates per IED attack are down, indicating that the cumulative effort of training, better protective equipment, and improved intelligence [have] had a positive effect."


On the other hand, what we hear in American journalism is true as well. The paper states that the American effort against improvised bombs has been an "unsatisfactory performance [with] an incomplete strategy." What's more, the JIEDDO-led struggle against the hand-made explosives has a "strategic flaw" that may keep the U.S. from ever gaining the upper hand on the bombers, Adamson notes: The lack of authority to knock bureaucratic heads. He recommends instead establishing a separate, Executive Branch agency with a "laser-like concentration on the hostile use of IEDs."


I'd like to be knocking some bureaucratic heads and it would be helpful if journalists would be carrying stories that reveal how insurgents can be effectively met, and defeated.

A List of the Second Best Blogs in the World

I know you are enthralled to stay here at Blog Smith but are there any other cool places to go? A 6 August story from Computerworld noted the top Geek Blog Sites. In no particular order the list is:


Hack a Day


Lifehacker


IT Toolbox Blogs


Danger Room


O’Reilly Radar


Techdirt


Feedster


Rough Type


The Unofficial Apple Weblog


Elliott Back’s blog


4sysops


Go ahead, check them out, I won't be offended if you read the second best blogs in the world.

Sunday, August 5, 2007

Black Muslim Bakery: A Bit of Upside-Down Cake?

The late Dr. Yusuf Bey created Your Black Muslim Bakery nearly 40 years ago, selling bean and carrot pies and hoping to inspire Oakland's poor to become "respectable and productive individuals."


This past Friday though, the bakery and its related businesses, a chain of bakeries, a security service, and a school among other businesses, was raided after the killing of 57-year-old Oakland Post editor Chauncey Bailey.


Seven people associated with the organization were arrested in connection with the killing and other violent crimes.


Bailey was working on an expose of the organization's finances when he was killed in a daring broad daylight murder by a masked gunman.


The gunman is believed to be Devaughndre Broussard, an employer of the group.


The Muslim group's headquarters at the original bakery and three Oakland houses tied to the group were raided.


Assistant Police Chief Howard Jordan said the raids were part of a yearlong investigation into a variety of violent crimes, including two homicides this year and a kidnapping and torture case.


Yusuf Bey elicited ire from the public in 1994 when he ran for mayor of Oakland. He received less than 5 percent of the vote after a campaign in which he said that women "belong back in the home" and that gays should not be allowed to teach school.


In 2002, Bey was accused of raping a girl but he died of colon cancer in 2003 while awaiting trial.


Bey tapped Waajid Aljawwaad Bey as his successor in his multimillion-dollar empire.


Five months later, Aljawwaad Bey's body was found buried in an unsolved homicide.


The group was plagued by additional violence. In 2005 the leader of the Bey security service, John Bey, was shot outside his Oakland home. He survived, and his attacker was never found. In 2005, Bey's 23-year-old son, Antar Bey, the organization's heir apparent, was killed in what police called a botched carjacking attempt at a gas station in North Oakland.


Shortly after Antar's murder, his brother, Yusuf Bey IV, took over the bakery empire.


Yusuf has pending charges stemming from a 2005 case in which he is accused of leading a Black Muslim group caught by surveillance cameras in November 2005 smashing up two Oakland corner stores. The men berated the stores' Muslim owners for selling alcohol to the black community even though alcohol is forbidden by Islam.


Your Black Muslim Bakery filed for bankruptcy last year.


After Friday's raid, county health inspectors shut down the bakery for health-code violations.


I often hear about how Muslims are targeted in the post 9/11 period but in any other circumstances, Your Black Muslim Bakery would be standard law enforcement activity.


The story reminds me how the Black Panthers, starting out with the best of intentions, dissipated to impotence by internal squabbles, violence, and police enforcement. The more things change, the more things stay the same.


I always liked Oakland, despite its grittiness, its an interesting mix of cultures, pleasant scenery, and working-class ethos. I stayed there this summer near Jack London Square while visiting San Francisco. I wish the city well.

Key Insurgent Killed


U.S. troops reportedly killed a key insurgent who was the planner of an important Shia shrine. This al-Qaeda leader who planned the attack on the shrine led to a major escalation in sectarian violence.


Haitham al-Badri plotted and carried out the 2006 and 2007 attacks on the al-Askari shrine in Samarra, which destroyed its golden dome and minarets.


Badri, allegedly the leader of al-Qaeda in Salahuddin Province, was eliminated on Thursday by US troops east of Samarra.


The attacks on the mosque horrified Shias which set off a wave of sectarian violence which claimed the lives of thousands of civilians.


While U.S. troops continue to do their job, the Iraqis are failing to create a viable and unified governmental structure.

Saturday, August 4, 2007

A New Philadaelphia Story: The Archdiocese at the Movies

The Roman Catholic Archdiocese of Philadelphia is now playing at the movies. Archdiocesen spokeswoman Donna Farrell announced an effort to advertise in a new medium, films, in the form of 30-second commercials running on 264 movie theater screens in the area. The advertisement will appear only on screens showing movies rated G, PG or PG-13, stated Farrell.


Enrollment decline has been precipitous: the archdiocese's Catholic elementary schools has dropped from 78,921 students to 62,559 over the past six years, while high school enrollment declined from 23,249 to 20,749 during the same period.

Friday, August 3, 2007

Note on Robert Dallek's book, An Unfinished Life: John F. Kennedy 1917-1963


One of the most important assertions, and a point of controversy for historians when this book first came out, is that Dallek did not think Kennedy's presidency was damaged by his risky sexual behavior and bad health.


Upon reading though, just the panoply alone of drugs and injections was enough to convince me that Kennedy at least suffered a great deal. The evidence that he was conclusively and negatively effected by the drugs is not clear, it may never be. But, I found it alarming that so many physicians ruthlessly medicated the man without offering genuine relief.


Kennedy may be likened rather to a well-trained athlete who is medicated and medically treated beyond the norm. People can still function, even out-perform those around them. Kennedy had an incredible will; I think he really rose to the situation, he really was a war hero on PT 109. His endurance and commitment to his men after his boat was split in two by a Japanese warship is impressive. On the other hand, I don't think sinking into hero worship is sound, he certainly had his share of mistakes such as the Bay of Pigs, he just seemed to be a high-performing individual, warts and all.


As to the sex, well, I certainly was not aware of it at the time but enough evidence came to light over the years. I guess he enjoyed himself.


Dallek obtained documents indicating Kennedy had an affair with a 19-year-old intern in the White House: shades of Bill Clinton. He discovered 17 blacked-out pages in an oral history by Barbara Gamarekian, who was an aide to Kennedy Press Secretary Pierre Salinger.


Gamarekian refused to give him the name of the former intern to protect the woman but the pages were from 40 years ago so authentic enough. In fact, the New York Daily News subsequently learned the woman's identity and published an interview with her.


Many Americans consider Kennedy to be among the greatest presidents, but Dallek says most historians would dispute that, he fell well short of great or even near great. He failed to win passage for civil rights legislation and other major legislative initiatives and he stumbled in foreign policy with the Bay of Pigs and an escalation of the Vietnam War, Dallek stated in interviews about the book.


The assassination colors our perception. Kennedy has tended to be idolized as a result. Since I finally got around to the book I believe it is well worth reading and certainly presents a human presidential figure.

Thursday, August 2, 2007

Copyright: Who Owns Creative Work?

What is the purpose of the "Copyright Clause?"


Article I, Section 8, Clause 8 of the United States Constitution, known as the Copyright Clause (the Copyright and Patent Clause, the Intellectual Property Clause, and the Progress Clause), empowers the United States Congress:


To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.

The clause actually confers two distinct powers: the power to secure for limited times to authors the exclusive right to their writings, and the power to secure for limited times to inventors the exclusive rights to their discoveries.


A number of United States Supreme Court cases interprets the text. The Court has determined that because the purpose of the clause is to stimulate development of the works it protects, its purpose is not to inhibit such progress.


After an author creates, they retain the rights, though not exclusively of course, fair use doctrine, while related, is primarily a First Amendment doctrine. It permits certain unauthorized uses of copyrighted material in the name of greater freedoms. In teaching for example, obtaining authorized use from every author would be ludicrous. No practical teaching could be done.


In instances of disagreement, who should prevail?


Here is one such example: "I understand that before I started volunteering with [insert academic JOURNAL here], there were some tensions between your editorial team and the [insert academic JOURNAL here] board."


So who owns the work? The guiding principle here seems to be the stimulation of works, not to prohibit "progress" however ill-defined and unwieldy. Especially in a democracy it seems one would want to err on the side of controversy and expression, unless one's intent was to inhibit such progress.


If the author of an unpublished work specifically objected to inclusion in an archive, I would argue that they retain that right.


However, the work of editors, redactors, and others have a creative aspect as well. That is their original contribution to the progress of the useful arts and sciences.


Therefore, I would strenuously object to the statement that "many of the items [archived materials] fall in to the category of [insert academic JOURNAL here] papers, as opposed to personal correspondence or work."


In this instance the editor did of course, "work," their creative contribution; in addition, the editor in question also has academic credentials, a Masters of Library Science, or their promotion of scientific endeavor. Thus, on two grounds I would argue that the editor is on sound constitutional ground.


The premise of the succeeding editor or board reveals the weakness of their position; they have to ask permission.



With the above in mind, we'd like to ask you to advise [insert University Archivist here] at the
[insert University's Library here] that items in the {insert original Editor's name here] Papers other than your personal correspondence be removed from the archive.


So who owns the work?


The original editor of course.

HP Unhealthy Print

A story on Computerworld yesterday released yesterday noted that Hewlett-Packard makes 90% of unhealthy laser printers tested by researchers. Of course, the researchers looked at a more HP printers than anyone else so this could bias the result. 83% of the total printers researched, were from HP.


Nearly all the laser printers fingered by researchers for spewing particulate matter into offices and homes are sold by HP.


The article in the American Chemical Society's Environmental Science & Technology (ES&T) journal, measured emissions of 58 laser printers, including models from Canon Inc., HP, Ricoh Co. and Toshiba Corp. Particle emissions, believed to be related to the ultrafine powdered toner, were measured and the printers ranked in several categories.


Of the "high emitters" at least for me, they do not effect me personally. I don't have any of the offending models: the Color LaserJet 4650dn; Color LaserJet 5550dtn; Color LaserJet 8550n; LaserJet 1320n; LaserJet 2420n; LaserJet 4200dtn; LaserJet 4250n; LaserJet 5; LaserJet 8000dn; and the LaserJet 8150n.


Anyone want to go back to carbons? Elementary kids got high from those.

Wednesday, August 1, 2007

Extraterritoriality, Extradition, and Hacking

According to a story yesterday on Computerworld U.K the United Kingdom will try a hacker's case against extradition to the United States.


In the old days of colonialism, a person who committed a crime in a colony was taken back to the home country, where presumably they would get a more sympathetic hearing. Today, this is a twist on the old legal principle.


In cyberspace, where is the crime?


Gary McKinnon is accused of causing $961,000 worth of damage to computers by hacking into the Pentagon, NASA, and U.S. military systems. McKinnon, an ex-systems administrator allegedly conducted the largest military hack of all time. He won the right to have his case against extradition to the U.S. heard by the U.K. House of Lords.


McKinnon maintains that the alleged offenses took place in the U.K. and that is where he should stand trial.

He could face a life sentence in jail with no chance of repatriation if he is extradited to the U.S.


The U.S. may be particularly adamant about prosecution since McKinnon hacked he systems shortly after the terrorist attacks of Sept. 11, 2001. The U.S. government may want to make an example of him as a warning to would be or potential terrorists.


That deterrent seems specious but I suppose he could be useful to analyze what he did to probe weaknesses in U.S. defense, goodness knows they are chronic.

I Give China a "Bath"

Being the forgiving sort, I've decided to give China another "Bath" and I exchanged the lamp for a new one: so far, so good, although its only been on a minute.


Let's see how the new one does.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.