Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.
World Muslim leaders condemned extremism and terrorism as incompatible with Islam and proposed a high-level international meeting to promote a "dialogue of civilizations" with Christians. My only question is what has taken them so long? After so much water under the bridge, the religion of peace is much less credible than if would have been it Muslim leaders would have unequivocally condemned leading Islamist terrorists or insurgents in Iraq.
I suppose this is better late then never but I think they lost their credibility with their delay.
Leaders of the 57-nation Organization of the Islamic Conference represents 1.5 billion Muslims across the Middle East, Africa, and Asia, they made their "Dakar Declaration" on Friday.
The Declaration states: "We continue to strongly condemn all forms of extremism and dogmatism which are incompatible with Islam, a religion of moderation and peaceful coexistence."
In simple statistics, Bush's Presidency has resulted in almost exactly half the military deaths as during Clinton's tenure for an equivalent eight-year period. The statistics are startling to consider but true.
I haven't commented in a while about the free Top Ten Network tools but Technitium MAC Address Changer v4.8 may be handy to protect your home wireless network against intruders. You will need to block anyone from connecting to your network except those who have network cards with specific MAC addresses. Sounds simple enough because you can set your router to block out intruders. The question is: how do you spoof a MAC address?
You can check it with this tool. You spoof a MAC address by providing one of your existing network cards a new address. This can be done with this software that lets you change your MAC address with a few simple clicks. You run the program, highlight the network card that you want to give a spoofed MAC address, click Random MAC Address, and then click the Change Now! button. Its pretty simple. It is then easy to restore your original MAC address, once you highlight it, and click "Original MAC."
Supplemental information is included about the details concerning your network cards, including the manufacturer name, MAC address, IP, Gateway, and DNS information associated with each of your network cards. It can also renew an IP address for a card, which can help fix broken network connections.
Recently, the 2nd Battalion, 4th Brigade, 2nd Iraqi Army Division stopped a car in the Al Bakir neighborhood in Mosul, Iraq. After searching the car, the Iraqi Army found six improvised explosive devices (IEDs or roadside bombs). A typical IED contains the bomb, a cell phone detonator, and rocks or pieces of iron enclosed to injure or kill as many people as possible. The bomb is triggered by a cell phone call. The bombs are hidden with scents intended to foil bomb-sniffing dogs, in this instance, the bomb smelled like cinnamon. The detonator is labeled, "For use against Coalition forces." The driver has been detained and the Iraqi Army is now looking for the bomb factory.
Researchers have recently raised eyebrows both within academe and in professional circles with their study noting the high incidence of engineers in jihad. One of the most well-known of course is key 9/11 plotter Ayman al-Zawahiri. The study builds on more than just one infamous example of course. In a work entitled, "Engineers of Jihad1," researchers Diego Gambetta, Nuffield College and Steffen Hertog, University of Durham, quote not only al-Zawahiri, “You have trivialized our movement by your mundane analysis. May God have mercy on you,” but their abstract details the research. In the words of their abstract:
We find that graduates from subjects such as science, engineering, and medicine are strongly overrepresented among Islamist movements in the Muslim world, though not among the extremist Islamic groups which have emerged in Western countries more recently. We also find that engineers alone are strongly over-represented among graduates in violent groups in both realms. This is all the more puzzling for engineers are virtually absent from left-wing violent extremists and only present rather than over-represented among right-wing extremists. We consider four hypotheses that could explain this pattern. Is the engineers’ prominence among violent Islamists an accident of history amplified through network links, or do their technical skills make them attractive recruits? Do engineers have a ‘mindset’ that makes them a particularly good match for Islamism, or is their vigorous radicalization explained by the social conditions they endured in Islamic countries? We argue that the interaction between the last two causes is the most plausible explanation of our findings, casting a new light on the sources of Islamic extremism and grounding macro theories of radicalization in a micro-level perspective.
At the very least, and despite the hubbub, I wanted to quote them accurately and discover what their research suggested.
Memri, an extremist monitoring site, has documented how the Hamas TV channel Al-aqsa has been broadcasting an "educational" programme for 7-13 year-olds called "Tomorrow's Pioneers." The show is replete with Hamas ideology and although the characters appear to be warm and fuzzy, they are anything but. The message is stridently anti-Zionist and anti-Western, lauding Muslims and conversion to Islam while encouraging holy war and martyrs. The show degenerates to a Mickey Mouse-like figure who fights a holy war.
By using an Oracle database with PowerBuilder from Sybase for the user interface a team at the Getty museum has allowed public access to their holdings. The team made heavy use of Perl and SQR (a reporting and database access language).
The tool the team built, known as the Vocabulary Coordination System (VCS), offered a single production system that allows Getty staff to collect, analyze, edit, merge and distribute terminology generated by Getty departments and contributors at other institutions.
The Getty's technical staff supports the VCS, the Getty Vocabularies on the Web, Web-based forms for the automated contribution of single records, and programs to automatically load batches of contributed data in XML format. The team also supports programs to produce yearly exports in XML, relational tables, and the Marc (Machine-readable Cataloging) format for institutions and commercial entities that license data sets.
The vocabularies average more than 900,000 searches per quarter. The vocabularies are available to the accessible to the public for free at the Getty museum.
The Netherlands has shown some grit and committed the Dutch to greater development in Afghanistan. The Dutch defense minister, Eimert van Middelkoop, stated that a military solution alone will not work.
Middelkoop stated: "A greater commitment of the United Nations and other international organisations and NGOs (non-governmental organisations) is necessary to ensure that progress does not evaporate."
He continued: "Projects such as schools, health clinics, roads and power plants will not only help the economy, but also help the government to assert its authority throughout Afghanistan."
Finally, a bit of a reaction from the Coalition's European allies, and from minuscule Holland no less.
Australian and Dutch troops have been working together for 18 months in a NATO-led mission in the southern Afghan province of Uruzgan, a former Taliban stronghold.
I wish them well and it would be too much to ask that France and Germany chime in behind them but we can always hope.
In his fussy, The War of the World, Niall Ferguson presents a moral view of the twentieth century reviewing mostly secondary sources to declaim the savagery of the 20th century. Ferguson shows primarily how not only financial difficulties as well as economic progress, in short, economic volatility of any sort, along with decaying empires, psychopathic dictators, and social violence resulted in the wars, and the genocides of what he calls "History's Age of Hatred."
The book was widely acclaimed, Ferguson was interviewed and on podcasts,The New York Times Book Review named War of the World one the 100 Notable Books of the Year and acclaimed by many in 2006.
I am uncomfortable with his moralizing historical analysis which evaluates as much as it relates historical events. He seems to write a fuddy-duddy analysis of repellent dictators and economic troubles. One part of the subtitle, the Descent of the West, seems cloying or perhaps he means the phrase in an ironic nod to Darwin. I'm not sure.
The Islamic State of Iraq swears vengeance on those Yazidis who killed a woman, Dua Khalil Aswad, who converted to Islam. In a brutal killing a crowd stoned her to death all the while filming or recording the event on cell phone cameras. The tape, which circulated on the Internet, provided graphic details of the violence but when the woman's garments reveal too much, the editors tactfully covered it up. Apparently graphic violence is acceptable to the Islamic avengers but a woman's skin is censored.
Yazidis [also Yezidi, Azidi, Zedi, or Izdi] are a syncretistic religious group (or a set of several groups), with ancient origins and comprising Gnostic core belief structure with other elements of Zoroastrianism, Judaism, Christianity, Manicheism, and Islam. Yazidi do not intermarry with outsiders or accept converts. Many Yazidi now consider themselves to be Kurds, while others define themselves as both religiously and ethnically distinct from Muslim Kurds. Most of the 700,000 Yazidi reside in the North of the country. The group remains secretive even today and its teachings are obscure and may not even be fully known even to its own adherents.
Stanford University is beginning this terrific new program in which parents with incomes of less than $100,000 will no longer pay tuition. Parents with incomes of less than $60,000 will not be expected to pay tuition or contribute to the costs of room, board, and other expenses. Under the plan, students will still be expected to contribute their earnings from work during the summer and academic year. In order to access one of the best universities in the country simply contributing their spare time efforts is not a high price to pay. This would be an incredible deal for lower-income parents and a great boost for smart, but poorer students.
Police officers, one of them in a hazardous-materials suit, examined the military recruiting station in Times Square after an explosion damaged the front of the building early Thursday morning. Graphic source: Chip East/Reuters.
This may well be a dry run for a subsequent attack but video reveals a man riding on a bike who set off a small bomb at a recruiting office. The accounts are frustratingly vague on how similar the attack is to previous attacks on U.S. embassies. The bomb is also similar to attacks on recruiting centers elsewhere. On 3 May 2006 for example insurgents embarked on deadly attacks in Baghdad killing 16 people at a police recruitment center in Falluja, an American civilian contractor near Nasiriya and a police officer in Baquba; on 31 May 2007 a suicide bomber killed up to 25 people at a police recruiting center in Fallujah, though the estimated number of number of dead and injured have varied.
US and Iraqi security forces have killed or captured 26 senior leaders of al Qaeda in Iraq's terror network over the past several weeks. Eight of those killed were emirs, or leaders responsible for "a geographic or functional area," five were cell leaders, and 13 were facilitators "involved in supporting the network of foreign terrorists, organizing the movement and security of senior leaders of the terrorist cells, or the making and use of improvised explosives and suicide vests." Those identified highlights how al Qaeda's operations have shifted from Anbar and Baghdad provinces to the northern provinces of Diyala, Salahadin, and Ninewa. Of those al Qaeda leaders identified, five operated in Mosul, two in Tikrit, one in Sharqat, and one in Baqubah, all in the north. Only two of those identified as killed or captured came from Baghdad.
The point of contrast between today's Presidential candidates and the past could not be clearer.
For example, John F. Kennedy was interviewed on 3 January 1960 for the "Meet The Press" show once he announced he was running for President on the Democratic ticket. The interviewers are serious, sober, and ask numerous substantive questions. Kennedy is articulate, has a grasp of history, bases his thinking on sound reasons, he discusses and supports a foundation of thought on constitutional issues, and finally, he does not mince words on even the tough questions posed to him. The questions are directed at the candidate and they get out of the way. The overwhelming numbers of words come from Kennedy.
On the other hand, in a recent disagreement Obama and McCain spout off sound bites vapidly. Yet, the commentators, who dominate the issue, blather on blissfully about how the candidates have finally reached a point of policy and they seem thrilled that the disagreement is dealing with one issue, at least, seriously. Its just pathetic. They are gleefully mugging for the camera and note how exciting and interesting the debate is. They spew out an abundance of words, and no one seems to note that both Obama and McCain seem ignorant of the issue they are discussing. The commentators only seek to heighten the conflict.
Isn't it just by coincidence that the Meet the Press clip are all male interviewers, although it should be noted that the show included females as well, and the contemporary clip is all women?
And now a word from our sponsor.
In short, this is the focus, not any sort of issue or choice that a voter could consider. Its teletainment.
The U.S. airstrike was in fact targetting Al Qaeda leader Saleh in the southern Somalia action. Saleh Ali Saleh Nabhan, a senior operative for al Qaeda's network in eastern Africa, was "found, targeted, and killed" along with an unspecified number of al Qaeda operatives in the town of Dhobley along the southern border with Kenya.
Nonetheless, although news reports have run the story, the U.S. military has not confirmed Saleh's death with DNA and other forensic evidence to confirm the identity of those killed in the attack.
Nabhan is also wanted for involvement in the 1998 suicide attacks against US embassies in Kenya and Tanzania. The attack in Nairobi, Kenya resulted in 212 killed and more than 4,000 wounded. The attack in Dar es Salaam, Tanzania resulted 11 killed and 85 wounded. Fazul Abdullah Mohammed, al Qaeda's operations chief in East Africa, and Abu Taha al Sudani, the leader of al Qaeda's network in East Africa were also behind the attacks.
At the risk of sounding overly technical, I tried to understand how Pakistan could shut down the Internet as the government objected to what it considered disparaging to the Prophet Mohammed. Pakistan used a Border Gateway Protocol (BGP) injection. In lay terms, Pakistan changed its Internet routing information for YouTube so that requests would go to Pakistani servers, not YouTube's. But the changed information was also sent to Pakistan's own Internet provider, Hong Kong's PCCW, which accepted it and passed it along to the rest of the world. And the result was that almost instantaneously, YouTube disappeared, for you and I.
The nefarious Pakistani deed took about two hours to correct.
BGP injections won't be fixed nor will they likely be. At times it is by accident, other times spammers or hijackers are sabotaging an address. More ominously, governments keep attempting to censor Web sites, and in the climate we are in, that kind of sabotage is likely to happen more and more.
The basic issue is that for the big network providers, relations between them still runs on trust. And as long as one of them sends out routing information to the others, we presume it to be true.
Computerworld surveyed 7 secure USB drives and concluded that based on features, price, security, and similar concerns, the IronKey Secure was the best of the lot. The item tested, a 4GB version, also available in 1GB and 2GB sizes, is listed at $149.99 with 128-bit AES encryption.
Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
Info World: Information Technology News, Computer Networking & Security;
Information Week: Business Innovation Powered by Technology:
Infostor: The Leading Source for Enterprise Storage Professionals;
Infrastructure Insite: Bringing IT Together;
Insurance Technology: Business Innovation Powered by Technology;
Integrated Solutions: For Enterprise Content Management;
Intel Premier IT: Sharing Best Practices with the Information Technology Community;
Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
Journal, The: Transforming Education Through Technology;
Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
Kagan, Donald, The Peloponnesian War;
Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
Karsh, Efraim, Islamic Imperialism: A History;
Kasser, Rodolphe, The Gospel of Judas;
Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
Kepel, Gilles, Jihad: The Trail of Political Islam;
Kiplinger's: Personal Finance;
Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
KM World: Content, Document, and Knowledge Management;
Koestler, Arthur, Darkness at Noon: A Novel;
Kostova, Elizabeth, The Historian;
Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
Lake, Kirsopp, The Text of the New Testament, Sony Reader;
Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
Lenin, V. I., Imperialism the Highest Stage of Capitalism;
Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
Lifton, Robert J., Greg Mitchell, Hiroshima in America;
Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
Mackay, Christopher S., Ancient Rome: A Military and Political History;
Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
Marshall-Cornwall, James, Napoleon as Military Commander;
Maughm, W. Somerset, Of Human Bondage;
McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
McCullough, David, 1776;
McCullough, David, John Adams;
McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
McLynn, Frank, Marcus Aurelius: A Life;
McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
Meacham, Jon, American Lion: Andrew Jackson in the White House;
Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
Meier, Christian, Caesar: A Biography;
Menzies, Gaven, 1421: The Year China Discovered America;
Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
Peters, Ralph, New Glory: Expanding America's Global Supremacy;
Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
Pimlott, John, The Elite: The Special Forces of the World Volume 1;
Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
Pouesi, Daniel, Akua;
Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
Profit: The Executive's Guide to Oracle Applications;
Public CIO: Technology Leadership in the Public Sector;
Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
Quintus of Smyrna, The Fall of Troy;
Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
Red Herring: The Business of Technology;
Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
Redmond Magazine: The Independent Voice of the Microsoft IT Community;
Renan, Ernest, The life of Jesus (Sony eReader);
Richler, Mordecai (editor), Writers on World War II: An Anthology;
Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
Rocca, Samuel, The Army of Herod the Great;
Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
Rodoreda, Merce, Death in Spring: A Novel;
Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
SC Magazine: For IT Security Professionals;
Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
Scheuer, Michael, Osama Bin Laden;
Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
Scholastic Instructor
Scholastic Parent & Child: The Joy of Family Living and Learning;
Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
Schug-Wille, Art of the Byzantine World;
Schulze, Hagen, Germany: A New History;
Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
Scott, Sir Walter, Ivanhoe;
Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
Seibel, Peter, Coders at Work;
Sekunda N., & S. Northwood, Early Roman Armies;
Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
Simkins, Michael, The Roman Army from Caesar to Trajan;
Sinchak, Steve, Hacking Windows Vista;
Smith, RJ, The One: The Life and Music of James Brown;
Software Development Times: The Industry Newspaper for Software Development Managers;
Software Test Performance;
Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
Sophocles, The Three Theban Plays, tr. Robert Fagles;
Sound & Vision: The Consumer Electronics Authority;
Southern, Pat, The Roman Army: A Social and Institutional History;
Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
Steyn, Mark, America Alone: The End of the World As We Know It;
Strassler, Robert B., The Landmark Herodotus: The Histories;
Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
Strassler, Robert B., The Landmark Xenophon's Hellenika;
Strategy + Business;
Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
Sumner, Graham, Roman Military Clothing (2) AD 200-400;
Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
Swanston, Malcolm, Mapping History Battles and Campaigns;
Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
Swift, Jonathan, Gulliver's Travels;
Syme, Ronald, The Roman Revolution;
Talley, Colin L., A History of Multiple Sclerosis;
Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
Tech Briefs: Engineering Solutions for Design & Manufacturing;
Tech Net: The Microsoft Journal for IT Professionals;
Tech Partner: Gain a Competitive Edge Through Solutions Providers;
Technology & Learning: Ideas and Tools for Ed Tech Leaders;
Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
Thackeray, W. M., Vanity Fair;
Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
Tolstoy, Leo, Anna Karenina;
Trento, Joseph J., The Secret History of the CIA;
Twain, Mark, The Gilded Age: a Tale of Today;
Ungar, Craig, House of Bush House of Saud;
Unterberger, Richie, The Unreleased Beatles Music & Film;
VAR Business: Strategic Insight for Technology Integrators:
Virgil, The Aeneid
Virtualization Review: Powering the New IT Generation;
Visual Studio: Enterprise Solutions for .Net Development;
VON Magazine: Voice, Video & Vision;
Wall Street Technology: Business Innovation Powered by Technology;
Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
Ward-Perkins, The Fall of Rome and the End of Civilization;
Warren, Robert Penn, All the King's Men;
Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
Weber, Karl, Editor, Lincoln: A President for the Ages;
Website Magazine: The Magazine for Website Success;
Weiner, Tim, Enemies: A History of the FBI;
Weiner, Tim, Legacy of Ashes: The History of the CIA;
West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
Wharton, Edith, The Age of Innocence;
Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
Wissner-Gross, What High Schools Don't Tell You;
Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
Woodward, Bob, Plan of Attack;
Woodward, Bob, The Agenda: Inside the Clinton White House;
Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
Wright-Porto, Heather, Beginning Google Blogger;
Xenophon, The Anabasis of Cyrus;
Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;
Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you.
A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.