Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Friday, August 17, 2007

Linux Still Not Working Like a Lion

A solid review which identified the major problem many of us still have with Linux, although I for one am ready to get on board ASAP, is the problem of "dealing with text in varied forms" as Sharon Machlisas notes in Computerworld. Her review of nine Linux text editors reveals that no single editor does the job. Like her, I need an application that handles plain ASCII text and rudimentary HTML. We also share an enthusiasm, not for me the Windows environment, but in an inexpensive and useful tool like NoteTab Pro. Neither is available on Linux. NoteTab has no plans to migrate to Linux.


Alas, Machlisas found no single killer text editor workable. I know some have the leisure of using several applications but this seems terribly inefficient to me.


She does report that an UltraEdit version for Linux is on the way and perhaps I would try again at that point, till then, I'm married to Windows unfortunately.

Thursday, August 16, 2007

Truth and Honesty on Wikipedia

A beginning graduate student at the California Institute of Technology, Virgil Griffith, invented Wikipedia Scanner, a tool that exposes the anonymous edits in Wikipedia. The tool can trace the IP address of those who make edits which does not exactly specify who did the edits but it obviously reveals the person at least had access to the respective IP addresses: close enough most of us would say to reveal who is responsible for the shenanigans.


While there are meticulous records of changes on Wikipedia, a person can make changes without identifying themselves, but the changes often create digital fingerprints that provide information about the user, such as the location of the computer used to make the edit.


Many of the changes are innocuous, but the scanner also traced entries to people at several large companies who appear to have altered potentially damaging content for concerns such as Wal-Mart Stores Inc., and Diebold Inc. Someone at the BBC poked fun at George Bush, Al-Jazeera's edits were fairly extensive, and someone at the CIA changed some wording as has the Vatican in one instance.


The Mormons changed a couple things, the Episcopals didn't like some of the word on them, and numerous Christian groups and colleges revised as they saw fit as well.


Wired collected an extensive list of the edits which is handy to see who wants what changed and we can figure out the embarrassing whys in most instances.


As an example, someone at the Vatican edited the Wikipedia entry on Gerry Adams.


Source: Wikipedia


Gerry Adams
From Wikipedia, the free encyclopedia
(Difference between revisions)
Jump to: navigation, search
Revision as of 12:54, 17 October 2006 (edit)
217.59.51.67 (Talk)
(→Moving into mainstream politics)
← Older edit Revision as of 12:55, 17 October 2006 (edit) (undo)
217.59.51.67 (Talk)
(→Fresh murder question raised)
Newer edit →
Line 92: Line 92:
==Fresh murder question raised== ==Fresh murder question raised==

- In October 2006, it was alleged that Adams's finger- and hand-prints were found on a car used during a double murder in 1971.[http://www.timesonline.co.uk/article/0,,2091-2383263,00.html Paisley, Brady in historic meeting] by Christopher Morgan and Liam Clarke, ''The Times'', 1 October 2006[http://www.unison.ie/irish_independent/stories.php3?ca=9&si=1698223&issue_id=14715 Adams Prints Murder Link] by Alan Murray, ''The Sunday Independent'', 1 October 2006 However, no link between Adams and the killings has been shown. + In October 2006, it was alleged that Adams's finger- and hand-prints were found on

==References== ==References==

NSA Scrutinized

The post-911 National Security Agency (NSA) spying program has been argued at a U.S. appeals court hearing. The Electronic Frontier Foundation (EFF) questioned AT&T's no-warrant monitoring of citizens' communications. The court agreed on Wednesday to weigh a government motion to dismiss a lawsuit alleging the NSA monitored phone lines and e-mails without a warrant. The EFF filed a class action lawsuit against AT&T Inc. claiming the company violated the privacy rights of its customers when it cooperated with an NSA program of monitoring AT&T customer phone calls and e-mail traffic without warrants.

Wednesday, August 15, 2007

Liberal Says War Can Be Won



"A War We Just Might Win"

That is what liberal commentators Michael O'Hanlon and Kenneth Pollack of the Brookings Institution stated in the New York Times following their recent visit to Iraq.



Here is the most important thing Americans need to understand: We are finally getting somewhere in Iraq, at least in military terms.***
After the furnace-like heat, the first thing you notice when you land in Baghdad is the morale of our troops. In previous trips to Iraq we often found American troops angry and frustrated — many sensed they had the wrong strategy, were using the wrong tactics and were risking their lives in pursuit of an approach that could not work.


Today, morale is high. The soldiers and marines told us they feel that they now have a superb commander in Gen. David Petraeus; they are confident in his strategy, they see real results, and they feel now they have the numbers needed to make a real difference.


Everywhere, Army and Marine units were focused on securing the Iraqi population, working with Iraqi security units, creating new political and economic arrangements at the local level and providing basic services — electricity, fuel, clean water and sanitation — to the people. Yet in each place, operations had been appropriately tailored to the specific needs of the community. As a result, civilian fatality rates are down roughly a third since the surge began — though they remain very high, underscoring how much more still needs to be done.

Open source Alternative to Project

Graphic source: Projity Inc.


Projity Inc. released its OpenProj software as an Open source project. This alternative to Microsoft may take market share away from their Project product. OpenProj is compatible with Microsoft Project though and seems to have most of the same features. OpenProj plays with Linux (in fact it is bundled with various Linux distributions) and Macs as well as Windows. The final version will be released in Q4.

Tuesday, August 14, 2007

Too Much Face (book)

The popular social networking site Facebook showed a bit too much face recently. The source code that drives the site was leaked to the Internet due to a misconfigured Web server. I guess there is such a thing as too much face.

Positive Middle East Trend

A report on Defensenews.com related how India seeks Israeli assistance to fill their need for an unmanned combat helicopter. The story outlined how the Indian Navy is exploring collaboration between local and Israeli defense companies. Admiral Sureesh Mehta, chief of the Indian Navy, and Vice Admiral David Ben Bashat discussed the possible joint development and other defense programs Bashat’s visit to India, the first official visit to India by an Israel Navy chief.


The Indian Navy projects 30 to 50 unmanned combat helicopters reflecting a greater cooperation between India and Israel since 1999. Israel is working on a the co-production of nuclear-capable cruise missiles, air defense systems and anti-ballistic missile systems. The country is the largest supplier of UAVs for the Indian Defence Forces.


In terms of great Middle Eastern security this is a positive development in that Israel is not isolated in the region by reaching across the Middle East to India, India is stepping up its greater regional role which as the world's largest democracy it should be doing. Two democratic regional powers flanking the Middle East is a good thing.

Life Almost as Real as the Gaming World


Screenshot Source: Morteza Nikoubazl, Reuters.


A screen shot from the Iranian-made computer game shows an Iranian commander (unseen) killing a U.S. soldier.


Designed by the Union of Islamic Students a game released in July, Rescue the Nuke Scientist, is sure to be jihadically correct. Once an American game company released Kuma\War's Assault on Iran, the students responded with a game of their own. Rescue's basic premise is that U.S. troops capture a husband-and-wife team of nuclear engineers during a pilgrimage to Karbala, a holy site for Shiite Muslims, in central Iraq. Game players take on the role of Iranian security forces carrying out a mission code-named "The Special Operation," which involves penetrating fortified locations to free the nuclear scientists, who are moved from Iraq to Israel. In this way both the U.S. and Israel can be attacked by Iranians.


All this from a country whose president has already denied the reality of the Holocaust.

College Hijinks?

Campus Technology today ran a story about Professors building an Open-Source educational gaming engine. Washington State University Vancouver professor Scott Wallace and University of Puget Sound computer science professor Andrew Nierman were awarded a grant from the National Science Foundation to build a gaming engine designed to make learning computer science more absorbing for students. If only this were available across the board to make all education more involving.

Monday, August 13, 2007

Turkish Trio Hacks UN

Photo source: Giorgio Maone screenshot from his blog.


Hackers formerly associated with Turkey defaced a UN site with anti-U.S. and anti-Israeli messages. The attack was chronicled by an Italian software developer Giorgio Maone on his blog and later reported by the BBC. The hacker trio, "Kerem125," "m0sted" and "gsy," claimed responsibility for the defacement which forced the UN site down and the site was still unavailable by Sunday evening. According to Maone the incident is a SQL injection exploit, which let the attackers add their own HTML code to the site. SQL injection attacks are a common tactic by defacers. Maone expressed surprise because "this is a very well known kind of vulnerability, fairly easy to avoid and very surprising to find in such a high-profile site."


In the past, "Kerem125," "m0sted" and "gsy," are names that have been used by would-be hackers claiming to be from Turkey,

Secure Flight Not all that Safe

Today's IDG News Service ran a story about the Department of Homeland Security air passenger screening program which is changing procedures.


The DHS announced plans for an overhaul of its Secure Flight program, with the agency no longer no longer assigning risk scores to passengers or using predictive behavior technology, DHS Secretary Michael Chertoff stated. The Transportation Security Administration, part of DHS, will check domestic passenger lists against terrorist watch lists, instead of the airlines.


I appreciate an advance on privacy issues, but in contrast to Marc Rotenberg, executive director of privacy advocacy group the Electronic Privacy Information Center (EPIC), I don't think the DHS is correct in its focus on matching passenger names to terrorist watch lists instead of trying to predict behavior.


The terror in terrorism is that it is unpredictable. by focusing on previously drawn up lists, the terrorist in the making will slip through.


Rotenberg states: "Instead of open-ended profiling ... the revamped Secure Flight focuses on the problem at hand," which is precisely the problem. The problem of today surely will not catch the innovative would-be terrorist. Another effective screening process is needed, profile based I would imagine.


As difficult as the task is, I believe we precisely need to develop tools that predict behavior.


Notwithstanding the Secure Flight program suspension in February 2006 due to two government reports that outlined security and privacy problems the revised program does not address the security concerns of behavior profiling.

It's All Greek to Me

The new translation tools are being implemented with some sucess in business applications although I have previously expressed my skepticism with the effort. A Computerworld story online today illustrates how the new efforts are going. Most results to the present have been sketchy requiring human translators.


Ford Motor Co. has used “machine translation” software since 1998 and has translated 5 million automobile assembly instructions.


Ford uses Enterprise Global Server from Systran Software Inc. but this is just the beginning. English instructions are written by engineers and then parsed by a homegrown AI program into unambiguous detailed directions, such as, “Attach bracket No. 423 using six half-inch bolts.” Each instruction is then stored as a record in a translation database.


Systran’s tool uses a reliable translation technique called rules-based translation. Such systems use bilingual dictionaries combined with electronic style guides containing usage and grammar rules. The commercial translators are then supplemented with assembly line application-specific glossaries from Ford.


The glossaries are cumulative in that they are combined with “translation memories,” databases of previously translated text in the form of source and target sentence pairs. These memories are usually compiled over time by users. If the translation system (or a human) finds an exact match for the sentence it’s trying to translate, it just retrieves the corresponding sentence in the target language from the database. Near matches or “fuzzy,” matches are flagged for review by a human translator.


Statistical machine translation is a newer technique. It uses collections of documents and their translations to “train” software. Over time, these data-driven systems “learn” what makes a good translation and what doesn’t and then use probability and statistics to decide which of several possible translations of a given word or phrase is most likely correct based on context.


The systems as a result develop their own rules and fine-tune them over time.


Google Inc. uses Systran’s rules-based software but is also developing its own statistical-based systems to translate to and from the more difficult and non-Western Romance languages due to their significant differences from Western languages.


Sites may include a link to Google’s system at Google translation for free.


Other large companies are in need of translations and use them such as Microsoft Corp. which incorporates a rules-based natural-language parser in its Word software.


FedEx Corp. rolled out Trados GXT, a product of Maidenhead, England-based SDL International. It consists of translation memories integrated with an enterprise translation workflow system but has not obviated the need for human-based translation services.


A new development and increasingly sophisticated translation systems combine multiple methods. A statistical machine translation product from Language Weaver Inc. in Marina del Rey, Calif., can now be used with translation management software called WorldServer from Idiom Technologies Inc. Customers can tap into WorldServer to retrieve previously translated content in a translation memory or generate new translations — through Language Weaver’s algorithms — when no matches are found.


At SRI International in Menlo Park, Calif. researchers are working with the U.S. Department of Defense to automate the translation of Arabic and Mandarin Chinese — structured and unstructured text as well as real-time speech — into English.


It's all Greek to me; but, actually I do know Greek so if I can learn perhaps machines can as well.

Sunday, August 12, 2007

Democracy Is Not Built in a Day



Peter Kenney of Denver relates his experience of building local democracy in Baghdad.


Do you think freedom is free?

China Not "Red" Anymore

The adventure with the Chinese-made lamp looks like it has taken China out of the red and into the black. So far, the replacement lamp is doing fine. The low cost is the attraction and the website, Made in China, demonstrates the wide variety of goods available. Differences between manufacturing standards predominates, but the Food and Drug Administration is working with Chinese officials to address issues of quality. The consumer activist, Ralph Nader, weighs in with his opinion.

Saturday, August 11, 2007

The OLPC: Should Not a Controversy Be

On 23 July 2007 eWeek ran a story that has been controversial for too long. The story discussed the ongoing battle about the OLPC (One Laptop Per Child) project which is ambitious, has potential benefits for many computer users across the board, and is timely. The project should garnish a great deal of attention but this really should not be contentious. The project though gained attention not only for its humanitarian goals and the groundbreaking technologies it's introducing but also negativity is connected to it for the wrong reasons, a fixation on product pricing, and assumptions about capabilities.


The OLPC and its founder, MIT iconoclast Nicholas Negroponte was in a segment of "60 Minutes." The segment unduly focused on the OLPC's XO laptop (more commonly although not completely accurately known as the $100 laptop) and the organization's goal to provide inexpensive computing resources to children in the developing world.


First Intel and then Dell has taken potshots at the project. Intel has since gotten on board.


The XO system is close to its final release state and although on paper the posted specifications of the XO seem underpowered: a midrange AMD processor, 256MB of RAM, and a small, flash-based drive. The XO is actually a powerful system.


The display technology is innovative and is readable even in bright sunlight, and its environmentally conscious power management and provision capabilities to its wireless mesh capabilities allow an entire village of children to connect. The XO will have a huge impact on the lives of the children who use it. I know countless kids who could use it now.


The compact laptop technology is ahead of the curve which should usher in a competitive wave of more efficient and capable mobile systems.


The laptop is a helpful marriage of Linux-based Sugar software that runs on the XO laptop. The basic programs in Sugar are simplified versions of ordinary desktop tools such as word processors, including though a collaboration environment.


Graphic source: OLPC


This is a product that looks like a toy but it is not. In the hands of impoverished children, this can be an effective digital tool that helps to close the digital divide. Hopefully, Dell's objection is not only that OLPC is a competitor of theirs.


Graphic source: Wikipedia, showing the mesh mode in Sugar software which makes it possible to interact with other users and systems on the XO's wire mesh network.

Friday, August 10, 2007

Is Aunt Betty on MySpace These Days?

Spock.com is a new people-focused search engine that aims to compile profiles based on info from social networking sites. I'm looking for Aunt Betty but I don't think she's on MySpace.


CEO Jaideep Singh claims the search will include every person in the world within the next nine months. A search will provide biographical information including age, city of residence and job title as well as tagged descriptions and images aimed at providing a complete picture of a person. It ranks search results based on the amount and relevance of information.


Come to think of it, maybe that's how we can find Osama.

Is a USB Port Good for Anything Other Than a Massage?

Computerworld ran an interesting survey on USB ports and their accessories. A USB port is handy even if you don't need a massage or a beverage heater, or cooler. All three devices are available though if you would like.

Hello? Is this Johnny's Teacher?

Source: Center For the Digital Future


According to the Center For the Digital Future, teachers have embraced newer ways of communicating with constituents. More so than government officials and health care professionals, teachers in K-12 situations use electronic means of communication. Before the Internet, teachers rarely had telephones in their classrooms, and most communication between teachers and parents occurred through infrequent conferences or notes carried by the student.


Today over half (50.3%) of all Internet users have used email to communicate directly with teachers.


Reach out and a teacher will be there.

Another Blow to Microsoft and Digital Rights


Computerworld ran a story from the IDG News Service about a hacker who released a way to strip DRM (Digital Rights Management) from streaming Netflix Inc. movies. This is another blow to Microsoft's technology designed to prevent people from saving the content. Many hackers object to the design of DRM which limits how music and movies can be used. Netflix's Watch Now service allows people to watch movies and TV shows immediately on their computer. Users can watch a certain number of hours of streamed content per month depending on their subscription.


However, hacker Dizzie wrote on the Rorta hacking forum against Netflix and words of his exploit made the rounds of various blogs and Web sites.


The exploit is not for the unitiated since it is a detailed 14-step process that uses FairUse4WM, a program created by another hacker, to remove Microsoft's DRM from the content. The involved process removing the DRM may take several attempts, and the process does not remove the time limit imposed by Netflix on viewing the content.


Microsoft revised its DRM technology twice before to block the threat of FairUse4WM but last month hackers on the Doom9.org forum announced they defeated Microsoft's DRM again.


The violation of rights is clearly wrong but a large deal of the problem is the murkiness and inapplicability of current copyright law. The various less proprietary and more open copyright options that have emerged, are a step in the direction.


The shakeout is far from clear. Universal Music Group, the world's largest music label, sells songs DRM-free.

Thursday, August 9, 2007

Challenge to FedEx and DHL, File Transmittal Services

It must be that setting up an FTP server on your home/work computers and providing your intended recipient with log-in information is really beyond the grasp of most computer users.


As a challenge then to the big mailing companies, FedEx or DHL, some companies have an online alternative for the really big, or digital files.


In contrast, file transmittal services all let users send files of up to 100MB for free, and many will go higher. Driveway, whose motto is "Size really does matter," lets users send files up to 500MB for free. Pando has a 1GB limit for nonsubscribers, while Civil Netizen is currently the most generous, with a 4GB limit.

Iran's Blood for Oil


What Tehran and Baghdad have in common is trading for oil. Tehran and Baghdad are expected to agree on a deal on a pipeline soon to transfer crude oil to refineries in Iran from oilfields in Iraq.


I take it Iran is willing to trade blood for oil.


Meanwhile, many Iranian young people, especially women strive for their freedom.

You Can Trust Al-Jazeera . . . To Be Al-Jazeera


"Kidnapped workers building U.S. embassy in Baghdad" screams the Al-Jazeera headline so let us have a look at this shocking story. The story by Ahmed Abdullah states:


"An American civilian contractor revealed shocking evidence about how Filipino construction workers were tricked last year into building the U.S. embassy in Baghdad, according to an article on The Times Online. The 51 men were originally told that they’d travel to Dubai to construct hotels there, but instead found themselves in a Baghdad-bound plane!"


The story is based on the statement of Rory Mayberry testifying before a congressional committee.


The Filipinos were reportedly upset at being deceived but their protests were quelled by: "a gun-toting air steward [not named, emphasis mine] ordered them to sit down. . . . [and a] security guy [not named, emphasis mine] working for First Kuwaiti waved an MP5 [sub-machinegun] in the air that people settled down."


On the other hand, the same story ran on the AP by Teresa Cerojano, Associated Press Writer. The gun-toting enforcers are not mentioned and a reasonable person would conclude that the guns are a complete fabrication.


The upshot of the story is that a Philippine special envoy is traveling to the Middle East to investigate allegations that a Kuwaiti contractor took Filipino workers to Iraq without their knowledge to build the U.S. Embassy. The meat of the story is that Filipinos, contracted by the First Kuwaiti General Trading & Contracting Co., thought they were going to work in Dubai and ended up in Baghdad instead.


The story really involves the Filipoino workers and a Kuwaiti company.


You don't get that impression from Al-Jazeera with the shock tactic of the U.S. kidnapping people.


People believe what they want to believe. In fact, jobs in Iraq have been a boon for many Filipino workers.

Wednesday, August 8, 2007

Chatting with Alexander the Great


If you could chat with Alexander the Great, what would you say? We need more protection for those auxiliary troops don't you think? What is it with this hoplite innovation?

That possibility was not possible of course but a newly launched site allows front-line soldiers to submit combat technology ideas. TroopIdeas.com allows anyone in the U.S. military to detail their need for combat tools.


The troop ideas are then evaluated by Gestalt, the technology consulting firm and government contractor that operates the site. Gestalt will either work to develop the tool itself or route the information to the best suited areas within the U.S. Department of Defense, stated William Loftus, Gestalt's president and CEO, in a story carried yesterday by Computerworld.

Tuesday, August 7, 2007

The Wisdom of "George" on War

George Kennan (1904-2005)


The roots of American involvement in the Middle East go back so much deeper than the current contentious debates about "George," actually, the American people should be talking about George, but George Kennan, not Bush. Kennan is a key figure in the development of U.S. Cold War policy as the "father of containment" in the newly founded CIA in 1948.


Kennan saw a new type of warfare for Americans in the Post-War period.



The Problem


The inauguration of organized political warfare.


Analysis


1. Political warfare is the logical application of Clausewitz's doctrine in time of peace. In broadest definition, political warfare is the employment of all the means at a nation's command, short of war, to achieve its national objectives. Such operations are both overt and covert. They range from such overt actions as political alliances, economic measures (as ERP--the Marshall Plan), and "white" propaganda to such covert operations as clandestine support of "friendly" foreign elements, "black" psychological warfare and even encouragement of underground resistance in hostile states.


2. The creation, success, and survival of the British Empire has been due in part to the British understanding and application of the principles of political warfare. Lenin so synthesized the teachings of Marx and Clausewitz that the Kremlin's conduct of political warfare has become the most refined and effective of any in history. We have been handicapped however by a popular attachment to the concept of a basic difference between peace and war, by a tendency to view war as a sort of sporting context outside of all political context, by a national tendency to seek for a political cure-all, and by a reluctance to recognize the realities of international relations--the perpetual rhythm of struggle, in and out of war.


3. This Government has, of course, in part consciously and in part unconsciously, been conducting political warfare. Aggressive Soviet political warfare has driven us overtly first to the Truman Doctrine, next to ERP, then to sponsorship of Western Union [1-1/2 lines of source text not declassified]. This was all political warfare and should be recognized as such.


4. Understanding the concept of political warfare, we should also recognize that there are two major types of political warfare--one overt and the other covert. Both, from their basic nature, should be directed and coordinated by the Department of State. Overt operations are, of course, the traditional policy activities of any foreign office enjoying positive leadership, whether or not they are recognized as political warfare. Covert operations are traditional in many European chancelleries but are relatively unfamiliar to this Government.


5. Having assumed greater international responsibilities than ever before in our history and having been engaged by the full might of the Kremlin's political warfare, we cannot afford to leave unmobilized our resources for covert political warfare. We cannot afford in the future, in perhaps more serious political crises, to scramble into impromptu covert operations [1 line of source text not declassified]. . . .


What is proposed here is an operation in the traditional American form: organized public support of resistance to tyranny in foreign countries. . . . Our proposal is that this tradition be revived specifically to further American national interests in the present crisis. . . .


d. Preventive Direct Action in Free Countries.


Purpose: Only in cases of critical necessity, to resort to direct action to prevent vital installations, other material, or personnel from being (1) sabotaged or liquidated or (2) captured intact by Kremlin agents or agencies.


Description: This covert operation involves, for example, (1) control over anti-sabotage activities in the Venezuelan oil fields, (2) American sabotage of Near Eastern oil installations on the verge of Soviet capture . . . .


Long before Bush, and years before the formulation of the overt Eisenhower Doctrine, the U.S. was in the Middle East in a new type of warfare in the Post-War period. Although the faces of the enemy may change, we are not facing the Soviets anymore, but the geographical area of contention, the Middle East, and the product, oil, is now a part of political warfare in American life. The troublesome aspect for Americans seems to lie in the fact that this warfare is overt, as opposed to George's covert operations in 1948. But the present George is following the broad outlines of American foreign policy that is decades old by this point.


Reference:
269. Policy Planning Staff Memorandum


Washington, May 4, 1948.


Source: National Archives and Records Administration, RG 273, Records of the National Security Council, NSC 10/2. Top Secret. No drafting information appears on the source text. An earlier, similar version, April 30, is ibid., RG 59, Records of the Department of State, Policy Planning Staff Files 1944-47: Lot 64 D 563, Box
11. The Policy Planning Staff minutes for May 3 state: "There was a discussion of the Planning Staff Memorandum of April 30, 1948 on the inauguration of organized political warfare. This paper was generally approved and Mr. Kennan will present it tomorrow for discussion at a meeting of NSC consultants." (Ibid., Box 32)

Upcoming Attraction! See it now! History Made Dumber! "War Made Easy"


History Made Dumber is not the name of War Made Easy--a film which "reaches into the Orwellian memory hole to expose a 50-year pattern of government deception and media spin that has dragged the United States into one war after another from Vietnam to Iraq"--but perhaps it should be.


Based on the book by Norman Solomon, you may look in vain for any mention or sound bite of Presidents Eisenhower, Kennedy, Carter, or Ford but you will not see them or hear any references to them in this film. If I'm not mistaken they were American Presidents of the past 50 years. Nonetheless, bad boys LBJ, Nixon, Reagan, and Clinton all have their cameos but the real targets are the Bushes, father and son.


As an attempt to review the past 50 years of American warmaking it fails miserably. It is tolerable if you like the sort of presentation that claims to be an expose of recent wars under the Bushes and to a lesser extent, Clinton. As a competitor to the Michael Moore style of film making it has the obligatory repetition of key quips, and quotes thought to be particularly germane and cutting.


One of the typical refrains is about the lack of WMDs as is to be expected. No reference is made to the other popular refrain at the time which was "No Blood for Oil," you don't hear that old canard much any more. And, the lack of expression is for good reason. Gas prices hit the highest level in American history. And, judging by the number of filmgoers who used cars, trucks, and SUVs to attend the same screening as I, the insatiable American thirst for oil is not abating.


If Americans were truly sincere about getting the U.S. out of Iraq, then they should sell their cars, and the next likely event to occur is that American politicians will stop the war drumbeats. In the meantime, as any president Republican or Democrat is bound by the Constitution, they will continue on the war course mapped out. Americans are tied to their inefficient internal combustion engines and American politicians are acting in the national interest, that is, keeping the flow of oil to the U.S.


In the film history is reviewed in the person of Senator Wayne Morse (D-Oregon) who is acclaimed as one of few American lawmakers who was brave enough to oppose the war in Vietnam. He makes a particularly embarrassing point about the President simply being "an administrator of the people's foreign policy."


God bless you Senator but not in my Constitution.


The film is on a bit better ground as an analysis of how the corporate media has echoed Washington's drumbeats during Persian Gulf I and II. The struggling print media, newspapers, are in dire straits and they are being eclipsed by digital communications, infotainment, the internet, and other new media. The new media is not directly as a result of government control but recent administrations have been savvy enough to adjust their message catered to the new media.


There are alternatives: turn off the TV, read bloggers, watch clips on YouTube, read foreign newspapers, catch Al-Jazeera, this works for me and I stay informed thusly.


The film is for the liberal choir exclusively so they can hum along to the old gospel song that gained some popularity during the Vietnam era, "Down by the Riverside," whose chorus echoes a heart-felt desire of people:


"I ain't gonna study war no more
I ain't gonna study war no more
Study war no more…"

C++ for Anyone from MIT

C++ is not exclusively for adult programmers but MIT has released programming for anyone through MIT's Media Lab. Researchers in the Lab's "Lifelong Kindergarten Group" created a program called Scratch, a graphical programming language geared to be programming learners, including children and teens.


A good introduction can be seen on how to create interactive stories, animations, games, music, and art with Scratch (http://scratch.mit.edu).

Google Educational Offerings

Campus Technology today released a story that Google is offering researchers a closer look at their search capabilities. Two new services are offered to the individauls in higher education--access to Web search and machine translations--as part of Google's University Research Programs effort. The program for investigation, "the University Research Program for Google Search," has merit if it can unleash the incredible data hidden via the web, and certainly Google is one company that has revealed the resources of the web more than any other entity.


The second service, Google Translate, seems less promising although I have not taken it for a spin just yet. I still have to get over my bad experience with DragonDictate, c. 1998, when I spent an inordinate amount of time teaching a recalcitrant program and computer how to talk like me. Come to think of it, that may have been the problem.

Monday, August 6, 2007

"I Wanna' Be Like Osama"

The 60th Edinburgh Festival Fringe is featuring "Osama the Musical" which is a:
"Sensational new musical comedy set to incite violent applause and a new cult following featuring insightful satirical sequences including "I Wanna' Be Like Osama. The West shall not be won (again) so long as we have a high-kicking chorus line!"

Those Irresistible Nerds

Graph source: Source: Robert Half Technology, May 2007


Mary Brandel published a story in the 6 August 2007 issue of Computerworld reviewing what technology skills are in short supply. The list of skills follow below: Machine learning, Mobile applications, Wireless networking, Project management, General networking, Network convergence, Open-source programming, Business intelligence, and Embedded security.

Nothing "GNU" (New) in China

Wikipedia representatives have stated that Baidu.com Inc., the largest search engine in China, may be their worst copyright violator. Baidu plagiarizes Wikipedia without attribution or honoring the GNU license.


The Wikimedia Foundation, Inc. has never sued a copyright violator and the Foundation has no plans to sue Baidu but this looks like an attempt to shame the company into compliance. All Wikipedia needs is the company to respect its copyright license by simply attributing Wikipedia entries on Baidu Baike, the company's Chinese-language Web encyclopedia.


"They do not respect the license at all," said Florence Nibart-Devouard, chairman of the board of trustees of the Wikimedia Foundation.

Pentagon Describes How to Combat IEDs

Speaking of worthwhile blogs to read, The Danger Room in fact carried a story about an excellent research paper--AN ASYMMETRIC THREAT INVOKES STRATEGIC LEADER INITIATIVE: THE JOINT IMPROVISED EXPLOSIVE DEVICE DEFEAT ORGANIZATION by WILLIAM G. ADAMSON, COL, USA, that is worthwhile reading.


The report has some good news and some bad news. The Pentagon is praised for its "resilience, learning and adapting to the IED threat." It credits JIEDDO's chief, retired General Montgommery Meigs, with "vision [and] leadership." And the paper notes that "casualty rates per IED attack are down, indicating that the cumulative effort of training, better protective equipment, and improved intelligence [have] had a positive effect."


On the other hand, what we hear in American journalism is true as well. The paper states that the American effort against improvised bombs has been an "unsatisfactory performance [with] an incomplete strategy." What's more, the JIEDDO-led struggle against the hand-made explosives has a "strategic flaw" that may keep the U.S. from ever gaining the upper hand on the bombers, Adamson notes: The lack of authority to knock bureaucratic heads. He recommends instead establishing a separate, Executive Branch agency with a "laser-like concentration on the hostile use of IEDs."


I'd like to be knocking some bureaucratic heads and it would be helpful if journalists would be carrying stories that reveal how insurgents can be effectively met, and defeated.

A List of the Second Best Blogs in the World

I know you are enthralled to stay here at Blog Smith but are there any other cool places to go? A 6 August story from Computerworld noted the top Geek Blog Sites. In no particular order the list is:


Hack a Day


Lifehacker


IT Toolbox Blogs


Danger Room


O’Reilly Radar


Techdirt


Feedster


Rough Type


The Unofficial Apple Weblog


Elliott Back’s blog


4sysops


Go ahead, check them out, I won't be offended if you read the second best blogs in the world.

Sunday, August 5, 2007

Black Muslim Bakery: A Bit of Upside-Down Cake?

The late Dr. Yusuf Bey created Your Black Muslim Bakery nearly 40 years ago, selling bean and carrot pies and hoping to inspire Oakland's poor to become "respectable and productive individuals."


This past Friday though, the bakery and its related businesses, a chain of bakeries, a security service, and a school among other businesses, was raided after the killing of 57-year-old Oakland Post editor Chauncey Bailey.


Seven people associated with the organization were arrested in connection with the killing and other violent crimes.


Bailey was working on an expose of the organization's finances when he was killed in a daring broad daylight murder by a masked gunman.


The gunman is believed to be Devaughndre Broussard, an employer of the group.


The Muslim group's headquarters at the original bakery and three Oakland houses tied to the group were raided.


Assistant Police Chief Howard Jordan said the raids were part of a yearlong investigation into a variety of violent crimes, including two homicides this year and a kidnapping and torture case.


Yusuf Bey elicited ire from the public in 1994 when he ran for mayor of Oakland. He received less than 5 percent of the vote after a campaign in which he said that women "belong back in the home" and that gays should not be allowed to teach school.


In 2002, Bey was accused of raping a girl but he died of colon cancer in 2003 while awaiting trial.


Bey tapped Waajid Aljawwaad Bey as his successor in his multimillion-dollar empire.


Five months later, Aljawwaad Bey's body was found buried in an unsolved homicide.


The group was plagued by additional violence. In 2005 the leader of the Bey security service, John Bey, was shot outside his Oakland home. He survived, and his attacker was never found. In 2005, Bey's 23-year-old son, Antar Bey, the organization's heir apparent, was killed in what police called a botched carjacking attempt at a gas station in North Oakland.


Shortly after Antar's murder, his brother, Yusuf Bey IV, took over the bakery empire.


Yusuf has pending charges stemming from a 2005 case in which he is accused of leading a Black Muslim group caught by surveillance cameras in November 2005 smashing up two Oakland corner stores. The men berated the stores' Muslim owners for selling alcohol to the black community even though alcohol is forbidden by Islam.


Your Black Muslim Bakery filed for bankruptcy last year.


After Friday's raid, county health inspectors shut down the bakery for health-code violations.


I often hear about how Muslims are targeted in the post 9/11 period but in any other circumstances, Your Black Muslim Bakery would be standard law enforcement activity.


The story reminds me how the Black Panthers, starting out with the best of intentions, dissipated to impotence by internal squabbles, violence, and police enforcement. The more things change, the more things stay the same.


I always liked Oakland, despite its grittiness, its an interesting mix of cultures, pleasant scenery, and working-class ethos. I stayed there this summer near Jack London Square while visiting San Francisco. I wish the city well.

Key Insurgent Killed


U.S. troops reportedly killed a key insurgent who was the planner of an important Shia shrine. This al-Qaeda leader who planned the attack on the shrine led to a major escalation in sectarian violence.


Haitham al-Badri plotted and carried out the 2006 and 2007 attacks on the al-Askari shrine in Samarra, which destroyed its golden dome and minarets.


Badri, allegedly the leader of al-Qaeda in Salahuddin Province, was eliminated on Thursday by US troops east of Samarra.


The attacks on the mosque horrified Shias which set off a wave of sectarian violence which claimed the lives of thousands of civilians.


While U.S. troops continue to do their job, the Iraqis are failing to create a viable and unified governmental structure.

Saturday, August 4, 2007

A New Philadaelphia Story: The Archdiocese at the Movies

The Roman Catholic Archdiocese of Philadelphia is now playing at the movies. Archdiocesen spokeswoman Donna Farrell announced an effort to advertise in a new medium, films, in the form of 30-second commercials running on 264 movie theater screens in the area. The advertisement will appear only on screens showing movies rated G, PG or PG-13, stated Farrell.


Enrollment decline has been precipitous: the archdiocese's Catholic elementary schools has dropped from 78,921 students to 62,559 over the past six years, while high school enrollment declined from 23,249 to 20,749 during the same period.

Friday, August 3, 2007

Note on Robert Dallek's book, An Unfinished Life: John F. Kennedy 1917-1963


One of the most important assertions, and a point of controversy for historians when this book first came out, is that Dallek did not think Kennedy's presidency was damaged by his risky sexual behavior and bad health.


Upon reading though, just the panoply alone of drugs and injections was enough to convince me that Kennedy at least suffered a great deal. The evidence that he was conclusively and negatively effected by the drugs is not clear, it may never be. But, I found it alarming that so many physicians ruthlessly medicated the man without offering genuine relief.


Kennedy may be likened rather to a well-trained athlete who is medicated and medically treated beyond the norm. People can still function, even out-perform those around them. Kennedy had an incredible will; I think he really rose to the situation, he really was a war hero on PT 109. His endurance and commitment to his men after his boat was split in two by a Japanese warship is impressive. On the other hand, I don't think sinking into hero worship is sound, he certainly had his share of mistakes such as the Bay of Pigs, he just seemed to be a high-performing individual, warts and all.


As to the sex, well, I certainly was not aware of it at the time but enough evidence came to light over the years. I guess he enjoyed himself.


Dallek obtained documents indicating Kennedy had an affair with a 19-year-old intern in the White House: shades of Bill Clinton. He discovered 17 blacked-out pages in an oral history by Barbara Gamarekian, who was an aide to Kennedy Press Secretary Pierre Salinger.


Gamarekian refused to give him the name of the former intern to protect the woman but the pages were from 40 years ago so authentic enough. In fact, the New York Daily News subsequently learned the woman's identity and published an interview with her.


Many Americans consider Kennedy to be among the greatest presidents, but Dallek says most historians would dispute that, he fell well short of great or even near great. He failed to win passage for civil rights legislation and other major legislative initiatives and he stumbled in foreign policy with the Bay of Pigs and an escalation of the Vietnam War, Dallek stated in interviews about the book.


The assassination colors our perception. Kennedy has tended to be idolized as a result. Since I finally got around to the book I believe it is well worth reading and certainly presents a human presidential figure.

Thursday, August 2, 2007

Copyright: Who Owns Creative Work?

What is the purpose of the "Copyright Clause?"


Article I, Section 8, Clause 8 of the United States Constitution, known as the Copyright Clause (the Copyright and Patent Clause, the Intellectual Property Clause, and the Progress Clause), empowers the United States Congress:


To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.

The clause actually confers two distinct powers: the power to secure for limited times to authors the exclusive right to their writings, and the power to secure for limited times to inventors the exclusive rights to their discoveries.


A number of United States Supreme Court cases interprets the text. The Court has determined that because the purpose of the clause is to stimulate development of the works it protects, its purpose is not to inhibit such progress.


After an author creates, they retain the rights, though not exclusively of course, fair use doctrine, while related, is primarily a First Amendment doctrine. It permits certain unauthorized uses of copyrighted material in the name of greater freedoms. In teaching for example, obtaining authorized use from every author would be ludicrous. No practical teaching could be done.


In instances of disagreement, who should prevail?


Here is one such example: "I understand that before I started volunteering with [insert academic JOURNAL here], there were some tensions between your editorial team and the [insert academic JOURNAL here] board."


So who owns the work? The guiding principle here seems to be the stimulation of works, not to prohibit "progress" however ill-defined and unwieldy. Especially in a democracy it seems one would want to err on the side of controversy and expression, unless one's intent was to inhibit such progress.


If the author of an unpublished work specifically objected to inclusion in an archive, I would argue that they retain that right.


However, the work of editors, redactors, and others have a creative aspect as well. That is their original contribution to the progress of the useful arts and sciences.


Therefore, I would strenuously object to the statement that "many of the items [archived materials] fall in to the category of [insert academic JOURNAL here] papers, as opposed to personal correspondence or work."


In this instance the editor did of course, "work," their creative contribution; in addition, the editor in question also has academic credentials, a Masters of Library Science, or their promotion of scientific endeavor. Thus, on two grounds I would argue that the editor is on sound constitutional ground.


The premise of the succeeding editor or board reveals the weakness of their position; they have to ask permission.



With the above in mind, we'd like to ask you to advise [insert University Archivist here] at the
[insert University's Library here] that items in the {insert original Editor's name here] Papers other than your personal correspondence be removed from the archive.


So who owns the work?


The original editor of course.

HP Unhealthy Print

A story on Computerworld yesterday released yesterday noted that Hewlett-Packard makes 90% of unhealthy laser printers tested by researchers. Of course, the researchers looked at a more HP printers than anyone else so this could bias the result. 83% of the total printers researched, were from HP.


Nearly all the laser printers fingered by researchers for spewing particulate matter into offices and homes are sold by HP.


The article in the American Chemical Society's Environmental Science & Technology (ES&T) journal, measured emissions of 58 laser printers, including models from Canon Inc., HP, Ricoh Co. and Toshiba Corp. Particle emissions, believed to be related to the ultrafine powdered toner, were measured and the printers ranked in several categories.


Of the "high emitters" at least for me, they do not effect me personally. I don't have any of the offending models: the Color LaserJet 4650dn; Color LaserJet 5550dtn; Color LaserJet 8550n; LaserJet 1320n; LaserJet 2420n; LaserJet 4200dtn; LaserJet 4250n; LaserJet 5; LaserJet 8000dn; and the LaserJet 8150n.


Anyone want to go back to carbons? Elementary kids got high from those.

Wednesday, August 1, 2007

Extraterritoriality, Extradition, and Hacking

According to a story yesterday on Computerworld U.K the United Kingdom will try a hacker's case against extradition to the United States.


In the old days of colonialism, a person who committed a crime in a colony was taken back to the home country, where presumably they would get a more sympathetic hearing. Today, this is a twist on the old legal principle.


In cyberspace, where is the crime?


Gary McKinnon is accused of causing $961,000 worth of damage to computers by hacking into the Pentagon, NASA, and U.S. military systems. McKinnon, an ex-systems administrator allegedly conducted the largest military hack of all time. He won the right to have his case against extradition to the U.S. heard by the U.K. House of Lords.


McKinnon maintains that the alleged offenses took place in the U.K. and that is where he should stand trial.

He could face a life sentence in jail with no chance of repatriation if he is extradited to the U.S.


The U.S. may be particularly adamant about prosecution since McKinnon hacked he systems shortly after the terrorist attacks of Sept. 11, 2001. The U.S. government may want to make an example of him as a warning to would be or potential terrorists.


That deterrent seems specious but I suppose he could be useful to analyze what he did to probe weaknesses in U.S. defense, goodness knows they are chronic.

I Give China a "Bath"

Being the forgiving sort, I've decided to give China another "Bath" and I exchanged the lamp for a new one: so far, so good, although its only been on a minute.


Let's see how the new one does.

Tuesday, July 31, 2007

Bed, Bath, and Beyond: Made in China

So I needed a lamp near my computer and I perused the aisles looking for one. I found a hip looking blue one which looked ideal. In and out in a flash, my idea of shopping since I'm on a meter. Less than a week later, kaput. Where from?


Bed, Bath, and Beyond: Made in China.


Good thing Fido was not hungry or I didn't need to brush my teeth.

Monday, July 30, 2007

"How's Your House," Ian Hunter on Hurricane Katrina


How's Your House by Ian Hunter (Song at NOMRF.org)

Add to My Profile | More Videos">


Description: Ian Hunter courtesy of YepRoc Records for the New Orleans Musicians Relief Fund. Video Produced by Grewvia. This song and 15 others by artists including Dr. John, Edwin McCain, James Andrews, Joe Topping and a new song by the Kaiser Chiefs are available at NOMRF.org. 100% of the proceeds will help the grass roots New Orleans Musicians Relief Fund.

Microsoft Struggles to Catch Google

In a story today on Computerworld Microsoft is attempting to catch up with Google and Yahoo in search capabilities. They have a long way to go. In June, Google sites captured 49.5% of the U.S. search market, while Yahoo sites ranked second with 25.1% of U.S. searches, followed by a distant Microsoft with only 13.2%, according to comScore Networks Inc.


Microsoft though began a new center, the Internet Services Research Center, as a part of Microsoft's research group. Interestingly enough though, the center will have teams in the U.S., but also some in Beijing.


Maybe Microsoft can go hard on those Chinese government types who are pushovers for Google.

Sunday, July 29, 2007

Ahead or Behind the Curve?

Today, 29 July 2007, the BBC reported that Prime Minister of Great Britain, Gordon Brown, stated that the world owes the US a debt.


On the cusp of his first visit with George Bush, Brown stated that the U.S. leadership in the war against international terrorism is a debt that the world owes America.


Some analysts had speculated that Brown would distance himself from George Bush.


So far Brown has not publicly stated he would.

Saturday, July 28, 2007

Newest Expansion Pack to Civilization IV: Beyond The Sword


One of the more intriguing developments in the gaming world, for an educator at least, is the accurate and realistic portrayal of history in the play. One of the best is Civilization IV. To the basic game is the newest expansion pack, Beyond the Sword, the second release after the Warlords edition.


The creator, Sid Meier, did not intend to write an educational game, precisely what makes it so fun probably, although an educator can do a great deal with the game to teach history. In a recent interview, Meier notes:



I read an interesting article recently about how some teachers actually use Civilization III in their classes as a teaching tool. Would you endorse or recommend the use of Civilization III as an educational product?


Sid: There's certainly nothing in the game that's just totally, flat-out wrong. I think Civilization is a good place to learn some basic ideas about history, and to be a part of it; to make the decisions. The great thing about a game is that you're the star of it. You're actually there making the decisions. Yes, it's been used in a lot of different educational situations, and if you can get a kid interested in history through a game, that's...We certainly lead them through the Civilopedia. We let them know that there's more out there if you want to explore it.


I've heard about a lot of people who played games as a kid and have gained a lot of useful knowledge that they were able to use later in life. So I certainly encourage people to use Civilization as a way to introduce them to history and make it exciting

Friday, July 27, 2007

Who Knows What Evil Lurks Inside a Cell Phone?

Ever wonder if something dangerous lurks in your cell phone? You should. In the tragedy that killed U.S. pets by ingesting tainted Chinese dog food, and to toothpaste that made people ill, a story in today's Computerworld alerted users to consider what's in your cell phone. In a widely publicized case, Zheng Xiaoyu, the former head of China's food and drug administration, was executed on corruption charges when it established that China did not have enough quality controls in place for the tainted goods leaving China.


And unlike toothpaste cell phones seem safe enough. However, cell phones can be lethal. A number of people in China have been killed because of problems with their cell phones. Indeed, a typical cell phone contains heavy, toxic metals such as lead and beryllium, poisonous flame retardants like bromide and enough cadmium to contaminate thousands of gallons of water. These ingredients expose the user to toxins.


The major cell phone manufacturing countries--the U.S., Finland, Sweden, Germany, South Korea, and Japan-- protect users with their rigorous safety procedures, and control and monitor the safety of cell phone manufacturing. National governments, consumer and industry groups, magazines and journals, and other actors monitor, test, and review cell phone safety.


If China is to be a successful major world economic player it needs to do everything it can to raise quality and review standards to ensure the safety of cell phone users.

Thursday, July 26, 2007

Would You Like to Know What the U.S. Military Is Thinking?

Computerworldtoday released a story about classified U.S. military information and corporate data which is available over P2P (peer-to-peer file sharing networks).


Experts testified before Congress by relating that data leakage is worse than thought previously.


Millions of documents are housed freely on file sharing networks after being inadvertently exposed by individuals downloading P2P software on systems that held the data.


For example, would you like the Pentagon's secret backbone network infrastructure diagram, complete with IP addresses and password change scripts? You can have that. Also there is contractor data on radio frequency manipulation to beat Improvised Explosive Devices (IED) in Iraq; physical terrorism threat assessments for three major U.S cities; and, information on five separate Department of Defense information security system audits.


The House Committee on Oversight and Government Reform chaired by Rep. Henry Waxman, (D-Calif.) heard this testimony.


Let's hope Henry gets good and sick of this breach and plugs the holes, the sooner the better.

Wednesday, July 25, 2007

Skeletons In Your Closet?

Reuters today reported on a Web site that traces convict ancestors in the Land Down Under.


The records of tens of thousands of British convicts sent to Australia starting in the 18th century are no online so if you had something to hide about your family past, its all out now. 160,000 convicts were forcibly removed from England and transported to Australia between 1788 and 1868. The crimes ranged from petty crimes to serious crimes like murder and assault.


The first cargo of 732 convicts landed in Sydney Cove in January 1788 on 11 ships from the British First Fleet.

Tuesday, July 24, 2007

Use A Computer, Go To Jail

Not exactly but Computerworld released a study today indicating MySpace is inhabited by 29,000 registered sex offenders, according to North Carolina Attorney General Roy Cooppdate. Following a subpoena, MySpace turned over the names of the convicted sex offenders.

Monday, July 23, 2007

Better Than Bombay?

The 23 July 2007 issue of Computerworld ran a story about how possibly Pakistan is a good site to outsource IT, to which "Anonymous"
posted:


Let's see, we have the Taliban massing on its western border with Afghanistan. Osama Bin Laden is reputed to be hiding out in its mountainous western border region with Afghanistan. Journalists have been beheaded there. The President of the country is routinely under threat of assasination [sic]. And, you want to outsource your software development there? Get real.


I've been doing my best and reading Tariq Ali to appreciate the difficulties of the West versus the Muslim world but really the way out of the morass of poverty is to get your house in order. Any investor willing to part with their money is truly providing an opportunity for Pakistanis, if there were only enough people willing to embrace the chance. There are so many more affordable but stable environments. Pakistan is not one of them.

Big Brother IS Watching

Today's Computerworld ran an article by David Strom. He lists what he describes as a "Paranoia Product List" of items in case you, and you rightfully should be, are concerned about leaving tracks on the Internet:


General-purpose packet-capture tools; Wildpackets OmniAnalysis Platform, Network General Sniffer InfiniStream, NetQoS Gigastor, ETelemetry Locate; IM auditing and monitoring tools, Symantec IM Manager, Akonix F7 Enterprise, Facetime IM Auditor; E-mail/IM encryption tools, PGP Desktop and a free version of PGP, Hushmail.com, X-IM.net, PSST; Anonymous proxies, Anonymizer.com's Anonymous Surfing and Total Net Shield; Free anonymous surfing and proxies, Protected desktop, and Mojopac.com.

Sunday, July 22, 2007

Whither Turkey?


Photo by Lynsey Addario for The New York Times


An article in the New York Times by Sabrina Tavernise (Sebnem Arsu contributed) today reported that the Turkish ruling party of Prime Minister Recep Tayyip Erdogan--the Justice and Development party (A.K.)--won a decisive victory in national parliamentary elections. The vote indicates the direction of Turkish democracy.


The vote sent a message to the secular state establishment, which opposed Erdogan's Islamic agenda. The secularists, the Republican People's Party, received only 20 percent of the vote. The Nationalist Action Party, an anti-Kurdish group, won 14 percent of the vote.


As the only non-European, Muslim NATO member and a strong American ally its stability is critical in light of chronic chaos in the Middle East. The powerful and secular military might react and it has deposed elected governments four times since the Turkish state was founded by Mustafa Kemal Ataturk in 1923.


The A.K. arises from a religious, merchant class in rural Turkey. It advocates membership for Turkey in the European Union. It has strengthened economic ties with Israel, along with a non-vindictive policy towards the Kurdish minority.


Erdogan began as an Islamist, and for many leaders of the party, whose wives wear headscarves, comparisons were drawn to struggling administrations in Syria, Lebanon and Jordan, or countries with wives whose heads were uncovered.


One ploy of Turkey’s secular state elite, backed by its military, used a legal maneuver to block Mr. Erdogan’s candidate from becoming president. And why? The wife of the candidate, Foreign Minister Abdullah Gul, wears a Muslim headscarf.


It is refreshing to see a Middle Eastern Muslim political scene with a mixed crowd of headscarf and non-headscarf wearers.


The best policy is to take a `wait and see' attitude until Erdogan either steers the country in a more religious and anti-Western direction or if his victory is more simply modifying Turkey's secularity in a moderately religious direction. Not every Muslim is an Islamist and Erdogan should be given a chance to show his true colors.


In fact, if I were even more optimistic, although I frankly confess usually I am not, Erdogan's victory could be a sign that religiosity is more robust, charismatic, fervent, but mature and still soundly democratic at the same time. The best case scenario is that Turkey is Muslim, democratic, and secular all in one which would be a terrific political model to emulate in the region. The icing on the cake is that Israel is not demonized and Turkey and Israel cooperate in the region.


Is that too much to hope for?

Saturday, July 21, 2007

Obama Hard Ball

The MySpace and Web 2.0 phenomenon is hitting the political sphere. When Senator Barack Obama tried to own his own MySpace address, he ran smack into an admirer, Joe Anthony, who had beat him to the punch for the page. Anthony had racked up 160,000 Obamans (friends) for Barack already. Negotiations began for Obama to get his name and MySpace address. Anthony requested 39K for his work on the Obama page. It got ugly but Obama seized the account in any case and his MySpace page only had 75,000 friends. It looks like he lost some buddies in the MySpace takeover.

7,000 Iraq Refugees to Enter U.S.

Only 800 Iraqis refugees were allowed into the U.S. since 2003, but 7,000 will enter the U.S. this year. I wonder why so many Iraqis want to emigrate if America is perceived so negatively in Iraq?

Friday, July 20, 2007

More Google Cookie Crumbling

Computerworld ran a story on 19 July 2007 about the fall-out from Google's recent decision to revise its cookie policy. The new and improved cookies will last only two years.


However, in the recent development critics charge that "No users will experience any gains in privacy at all due to Google's change in policy," stated Randy Abrams, director of technical education at ESET, a vendor of antivirus products.


Ever wonder how long Google's cookies last on your computer? Currently, the cookies set by the company are designed to expire in 2038.


That is longer than any cookie I know.

Follow the Campaign Money for the Next President


Federal Computer Week released a story, 16 July 2007 about the Federal Election Commission. The first day that the FEC offered its first interactive campaign finance application, the Web site garnished 90,000. This figure is an increase over its usual 7,000 visitors monthly.


The site cost about $12,000 to build and took about six months to develop.


The Federal Election Commission (FEC) is an independent regulatory agency created in 1975 by Congress to administer and enforce campaign finance legislation in the United States. It was created in a provision of the 1974 amendment to the Federal Election Campaign Act. It describes its duties as "to disclose campaign finance information, to enforce the provisions of the law such as the limits and prohibitions on contributions, and to oversee the public funding of Presidential elections."

Thursday, July 19, 2007

Would You Like $968 Million to Prepare?

Computerworld released a story announcing that the U.S. is offering $968 million for disaster technology. According to the Reuters news agency the money is in the form of grants to help state and local public safety agencies buy sophisticated radios and technology for communications during disasters, according to a Commerce Department spokesperson.

Wednesday, July 18, 2007

Who Said the Germans Don't Have a Heart?

An article today in Computerworld reported that German police understood how an angry computer user was so frustrated with his computer that he tossed it out the window. Apparently in the middle of the night a man was so frustrated that in an outburst his startled neighbors heard the commotion. The Hanover police responding to the melee sympathized with his technical frustrations. They decided not to press charges but they did make him clean up the mess.


"Asked what had driven him to the night-time outburst, the 51-year-old man said he had simply got annoyed with his computer. `Who hasn't felt like doing that?' said a police spokesman. I think we can all relate to computer users everywhere who have felt, and some have done, the same thing.

Political Globalized Islam



Two worthwhile books with flawed logic from a French theorist: The Failure of Political Islam & Globalized Islam: The Search for a New Ummah by Olivier Roy.


Will fundamentalist Muslims manage to take power, or will the mostly nonfundamentalist autocrats now in power stay there?


The fundamentalists could well take over several governments in a short period: Algeria, the Islamic Salvation Front (FIS) has launched a virtual civil war; in Egypt, radical fundamentalists control parts of the cities and countryside; fundamentalist parties are gaining in nearly all the Muslim countries with electoral politics (Turkey, Lebanon, Jordan, Kuwait, Pakistan, Malaysia). The fundamentalist challenge to the established order is real.


So how is political Islam a failure?


The failure Roy refers to is one that distinguishes between Islamism and neofundamentalism. For Roy, the former means the drive for political power, and the latter means focusing on the family and the mosque. Think Iran for Islamism; think Saudi Arabia for neofundamentalism.


Islamism has failed and the weaker cause of neofundamentalism has flourished accoring to Roy.


True enough, Roy points out that fundamentalist Islam is a form of modernization. Contrary to the usual assumption, it is not medieval in spirit at all but an acutely modern form of protest. In Roy's elegant formulation, it "is the sharia [Islamic sacred law] plus electricity."


Though fundamentalist Islam cannot work, what Roy misses is that the realization that fundamentalism does not work could be years or decades off. We have no idea whatsoever from knowing the full import of fundamentalism. For example, as the Marxist-Leninist precedent shows, regimes kill and repress their opponents and also export their ideology abroad. The mullahs in Iran relish in power as most people appear to enjoy it. The salient point: "Power corrupts and absolute power corrupts, absolutely," Lord Acton, is not discussed by Roy.


In 1933, sixteen years after the Bolshevik revolution, communism had a strong life after the revolution; sixteen years after the Iranian Revolution fundamentalism is alive and well, despite Roy's objection.


Roy was wrong on Algeria. The Muslim FIS in Algeria is superceded by the Armed Islamic Group (GIA): they specialize in murdering the children of police officers, women without veils, unsympathetic journalists, and non-Muslim foreigners. They kill their victims in particularly horrifying ways, slitting throats and cutting off heads. Educated and/or Western-oriented, French speakers, or those wearing a business are attractive as potential victims.


Leading American specialists on the subject, such as John Entelis, John Esposito, and John Voll, argue that we should look beyond fundamentalism's rough edges and bristling rhetoric and relax.


However, you can only engage in dialogue those who are willing to accept its consequence: democracy, freedom, free choice.


We need to learn from history and to hope with the Who, "We don't get fooled again."

Tuesday, July 17, 2007

The Declaration of Independence

Are Google Cookies Crummy?


Today Computerworld released a story about Google which states their new policy: user cookies will expire after two years. However, for the two-year cookie policy to work: users must not return to the search site. The solution then is pretty simple, no? Users should just stop searching on Google. I would think that it is clear by now that many ordinary computer users do not understand what cookies are or how they work.


What are cookies? Cookies are small bits of code stored on a computer; cookies are handy for users though because their user preferences are stored on the computer. Another common aspect of cookies that users often overlook is that they are able to control their cookies at any time via their browsers. Users can shut off or modify how cookies are downloaded to their computers.


A user might view the cookie issue as convenience, Google is looking out for me, or more sinisterly, Google is deciding something for me that I'd rather do myself.


Privacy advocates think Google can do better. According to the Computerworld article:

"Google's paying attention to the issue of cookie expiration, but as a practical matter, I think this change will have little impact on online privacy. . . . Users still know too little about how Google collects information, what information is collected and what it's used for. And, of course, [for] anyone who returns to the Google site within two years, the cookie will be renewed. I think two days rather than two years is probably a better period for a search cookie,"
stated Marc Rotenberg, executive director of the Washington-based Electronic Privacy Information Center.

How Does Search Really Work? Or, Can I Trust Google?

Computing Reviews released an interesting topic: “Adversarial
Information Retrieval: The Manipulation of Web Content:” by Dennis Fetterly of Microsoft Research. To summarize, Fetterly demonstrates: how search engine results can be manipulated by content providers. By using methods such as adding unrelated content to meta tags, duplicating information, and cloaking content so it is indexed
differently, Web pages can improve their result rankings. While the economic incentive for achieving high rankings is significant, manipulated results undermine the trust of millions of users. Fetterly suggests research into link-based spam detection and the identification of spam blogs, and advocates the development of a clear set of rules
for search engines. This is a worthwhile read.

Monday, July 16, 2007

Follow the money


The EE Times reported today that global venture capital firms are targeting China and India: and, the U.S.


However, the import of the report may be that capital investment overseas is lower than has been widely assumed, with only a 1 percent increase over last year in the number of U.S. companies planning to expand offshore investments over the next five years. Highly regarded firms such as Deloitte & Touche and the National Venture Capital Association concluded that U.S. VC firms are still only "dabbling" in places like China and India.


In the case of China, perhaps the nation is too questionable for many investors to consider, and India has chronic problems as well.

Update on Pandemic

Update:


I've noted some concern about a pandemic, but, perhaps not enough given today's Computerworld story:


"Some IT managers say they see no choice but for organizations to prepare their tech operations for a possible avian flu epidemic. But there are concerns that attention to the issue may be waning in the U.S."


"It's not a question of if, but when. So the sooner that companies and families and communities and states are prepared, the better.


James Seligman, the Center for Disease Control's CIO, on the likelihood of a pandemic striking the U.S.


Does Your Crystal Ball Need a Brushup?


Paul Saffo published an interesting article in the current issue of the Harvard Business Review in which he describes:


Six Rules for Effective Forecasting:


1. Define a cone of uncertainty; 2. Look for the S curve; 3. Embrace the things that don't fit; 4. Hold strong opinions weakly; 5. Look back twice as far as you look forward; 6. Know when not to make a forecast.

Sunday, July 15, 2007

Only Human (2004, Spanish, Seres queridos)


Only Human (2004, Spanish, Seres queridos) attempts to imitate a Rabelaisian plot: wacky, and clever, but this film most often falls flat. This Spanish film is in the mold of Meet the Parents but without the laughs. The improbable plot lines should sustain interest but frankly, I fell asleep. I tried again the next day and slogged through it. The universal appeal of bringing home that special someone is undercut by its own cleverness. We should enjoy our protagonists' Leni's family buffoons: blind Dadu, the grandfather, the unwed nymphomaniac sister living at home with a 5-year-old daughter, the zealous brother with his fanatical attachment to Judaism, the pre-menopausal crisis of the mother, and the wayward father. When Leni brings her Palestinian fiancé, Rafi, to meet the family, we are set up for conflict galore but global issues pale in comparison with the chaos that reigns in Leni's family. It begins promisingly enough; unwittingly, Rafi may have accidentally killed Leni's father, but the anarchy that ensues teases but never delivers.

Ft. Dix Accused Write

Ft. Dix housed a village of refugees from the fighting in Kosovar before those people could re-settle.



As reported earlier, six men were arrested as suspects in a terroristic plot against Ft. Dix. The 14 July 2007 issue of the Philadelphia Inquirer released a story about the Ft. Dix suspected terrorists writing to the judge in their case. Dritan Duka stated that the charges of an armed attack on New Jersey's Fort Dix "lies and accusations." The defendants also bemoaned conditions in jail while two of them, Mohammad Shnewer and Duka, who also wrote on behalf of his brothers and codefendants, Shain and Eljvir, while proclaiming their innocence in those letters. The prosecution would like the trial to begin on 9 October but the defense is seeking more time.


Five of the six defendants--Shnewer, 22; Serdar Tatar, 23; and brothers Dritan Duka, 28; Shain Duka, 26, and Eljvir Duka, 23--were charged with plotting a Fort Dix attack that was "inspired by . . . al-Qaeda." They could face a life sentence if convicted.


The sixth defendant, Abdullahu, was charged with supplying some of his codefendants with guns. He faces a 10-year sentence.


Two FBI informants penetrated the group and secretly recorded more than 100 conversations.

All six are foreign-born Muslims who came to live in South Jersey. Shnewer is the lone naturalized U.S. citizen in the group." The Duka brothers, ethnic Albanians from the former Yugoslavia, are in the United States illegally.

Shnewer stated that he twice had "gotten a write up for praying." He included a Bureau of Prisons incident report that said he was chanting loudly in an Arabic dialect at this cell door.

Saturday, July 14, 2007

The Pennsylvania Al-Qaeda

A federal jury convicted a Pennsylvania man, Michael Curtis Reynolds, 49, after deliberating for an hour. Reynolds was convicted of working with al Qaeda in a plot to blow up the Alaska pipeline, another pipeline in Pennsylvania and a refinery in New Jersey. Acting on a tip from Shannen Rossmiller--a judge from Conrad, Montana who in 2004 helped snare a Washington state national guardsman who was considering defecting to al Qaeda-–was what originally led the FBI to Reynolds.

Friday, July 13, 2007

Gettin' Zombie with J. Edgar Hoover?

Campus Technology reports today that the FBI and Carnegie Mellon University's Computer Emergency Response Team (CERT) identified 1 MM BotNet Nodes. The paring identified the IP addresses of more than 1 million zombie computers throughout the United States as a part of security sweep nicknamed "Operation Bot Roast." Zombies are computers that are unwitting hosts for the activities of bots, pieces of malicious software that are often used to facilitate crimes. Many of those effected by this sweep are unaware that their computers have been compromised, hence the moniker, zombie. I know what you are thinking but no, J. Edgar Hoover has not returned.

Buckets Before Blues

According to an article by Campus Technology (11 July 2007), Linda L. Briggs reported that Temple University solved their content management issue. Temple retains roughly half a million pages of content on more than 500 active Web sites which is an enormous content management challenge.


In addition, Temple has around 34,000 students across 17 campuses around the world. With Adobe's product, Contribute, thousands of users--literally anyone at the university with the proper permission--can post and update website content. The decentralized system is saving the university significantly by allowing university departments, rather than the IT department, to create, edit, publish, and control their own Web content.

Thursday, July 12, 2007

Every Iraqi Wants the U.S. To Withdraw Immediately, Right?




Or, do they in Kurdistan (Iraq) also?



In the U.S., we don't hear much about Kurdistan.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.