(Banking Reform - Monetary Reform) - '..debt is our biggest security threat..' (no replies)        
'Now that he is president, Trump likes to tout the fact he’s listening to America’s generals. Perhaps he needs to talk to General Mike Millen, the former Chairman of the Joint Chiefs of Staff. Perhaps then he would see that the greatest threat America faces isn’t from China, Russia, or North Korea – it is from the national debt. Until Trump reverses course on military spending, and gets tough on entitlements, his "America First" budget will only make the US worse off.'

- Tho Bishop (Source, March 20, 2017)


'..a crippling national debt..'

'Under a Republican budget resolution, the national debt will explode by a third from an already staggering $19 billion to $29 trillion over the next ten years. Although counterintuitive, Democratic presidents, at least those after World War II, have reduced deficits as a portion of the value of the national economy (GDP) while Republican presidents have increased them — thus accumulating less public debt as a percentage of GDP. Yet neither political party has paid enough attention to this burgeoning national security problem.

National security problem? Yes. General Mike Mullen, while he was Chairman of the Joint Chiefs of Staff, the nation’s top military man, was enlightened enough about long-term health of American power to realize that it takes continuing infusions of money to acquire the weapons and equipment, personnel, training, maintenance and benefits to create a credible military to adequately defend the country. In addition, all other indices of national power — political, diplomatic and cultural — require money too.

To generate those resources, a strong economy is needed. The number one problem dragging down economic growth rates through the George W. Bush and Barack Obama presidencies was a crippling national debt..'

- Ivan Eland, National debt is our biggest security threat: Column, January 11, 2017


Context

'..World Debt Hits $152 Trillion.'

'Our nation and the world are paying a very heavy price for a failed experiment in Inflationism..' - Doug Noland

'..Global policies since the 2008 crisis have spurred the expansion of speculative finance to multiples of pre-crisis levels..'


'Germany Plans to Cut 2017 Debt Sales .. Balanced-Budget..'

'..monetary knowledge .. of currency reform under difficult conditions you have to go to Carl Menger.'

(Banking Reform - Monetary Reform) - '..The Theory of Money and Credit .. an invaluable guide for ending the business cycles of our own time.'


(Banking Reform - English/Dutch) '..a truly stable financial and monetary system for the twenty-first century..'

          'We have no experience in stopping a nuclear war.' - Sidney Drell (no replies)        
'..My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

'The harsh rhetoric on both sides increases the danger of miscalculations and mistakes, as do other factors. Close encounters between the military aircraft of the United States and Russia have become routine, creating the potential for an unintended conflict. Many of the nuclear-weapon systems on both sides are aging and obsolete. The personnel who operate those systems often suffer from poor morale and poor training. None of their senior officers has firsthand experience making decisions during an actual nuclear crisis. And today’s command-and-control systems must contend with threats that barely existed during the Cold War: malware, spyware, worms, bugs, viruses, corrupted firmware, logic bombs, Trojan horses, and all the other modern tools of cyber warfare. The greatest danger is posed not by any technological innovation but by a dilemma that has haunted nuclear strategy since the first detonation of an atomic bomb: How do you prevent a nuclear attack while preserving the ability to launch one?

..

..the Cuban Missile Crisis, when a series of misperceptions, miscalculations, and command-and-control problems almost started an accidental nuclear war—despite the determination of both John F. Kennedy and Nikita Khrushchev to avoid one. In perhaps the most dangerous incident, the captain of a Soviet submarine mistakenly believed that his vessel was under attack by U.S. warships and ordered the firing of a torpedo armed with a nuclear warhead. His order was blocked by a fellow officer. Had the torpedo been fired, the United States would have retaliated with nuclear weapons. At the height of the crisis, while leaving the White House on a beautiful fall evening, McNamara had a strong feeling of dread—and for good reason: “I feared I might never live to see another Saturday night.”

..

The personnel who command, operate, and maintain the Minuteman III have also become grounds for concern. In 2013, the two-star general in charge of the entire Minuteman force was removed from duty after going on a drunken bender during a visit to Russia, behaving inappropriately with young Russian women, asking repeatedly if he could sing with a Beatles cover band at a Mexican restaurant in Moscow, and insulting his military hosts. The following year, almost a hundred Minuteman launch officers were disciplined for cheating on their proficiency exams. In 2015, three launch officers at Malmstrom Air Force Base, in Montana, were dismissed for using illegal drugs, including ecstasy, cocaine, and amphetamines. That same year, a launch officer at Minot Air Force Base, in North Dakota, was sentenced to twenty-five years in prison for heading a violent street gang, distributing drugs, sexually assaulting a girl under the age of sixteen, and using psilocybin, a powerful hallucinogen. As the job title implies, launch officers are entrusted with the keys for launching intercontinental ballistic missiles.

..

..A recent memoir, “Uncommon Cause,” written by General George Lee Butler, reveals that the Pentagon was not telling the truth. Butler was the head of the U.S. Strategic Command, responsible for all of America’s nuclear weapons, during the Administration of President George H. W. Bush.

According to Butler and Franklin Miller, a former director of strategic-forces policy at the Pentagon, launch-on-warning was an essential part of the Single Integrated Operational Plan (siop), the nation’s nuclear-war plan. Land-based missiles like the Minuteman III were aimed at some of the most important targets in the Soviet Union, including its anti-aircraft sites. If the Minuteman missiles were destroyed before liftoff, the siop would go awry, and American bombers might be shot down before reaching their targets. In order to prevail in a nuclear war, the siop had become dependent on getting Minuteman missiles off the ground immediately. Butler’s immersion in the details of the nuclear command-and-control system left him dismayed. “With the possible exception of the Soviet nuclear war plan, [the siop] was the single most absurd and irresponsible document I had ever reviewed in my life,” Butler concluded. “We escaped the Cold War without a nuclear holocaust by some combination of skill, luck, and divine intervention, and I suspect the latter in greatest proportion.” The siop called for the destruction of twelve thousand targets within the Soviet Union. Moscow would be struck by four hundred nuclear weapons; Kiev, the capital of the Ukraine, by about forty.

After the end of the Cold War, a Russian surprise attack became extremely unlikely. Nevertheless, hundreds of Minuteman III missiles remained on alert. The Cold War strategy endured because, in theory, it deterred a Russian attack on the missiles. McNamara called the policy “insane,” arguing that “there’s no military requirement for it.” George W. Bush, while running for President in 2000, criticized launch-on-warning, citing the “unacceptable risks of accidental or unauthorized launch.” Barack Obama, while running for President in 2008, promised to take Minuteman missiles off alert, warning that policies like launch-on-warning “increase the risk of catastrophic accidents or miscalculation.” Twenty scientists who have won the Nobel Prize, as well as the Union of Concerned Scientists, have expressed strong opposition to retaining a launch-on-warning capability. It has also been opposed by former Secretary of State Henry Kissinger, former Secretary of State George Shultz, and former Senator Sam Nunn. And yet the Minuteman III missiles still sit in their silos today, armed with warheads, ready to go.

William J. Perry, who served as Secretary of Defense during the Clinton Administration, not only opposes keeping Minuteman III missiles on alert but advocates getting rid of them entirely. “These missiles are some of the most dangerous weapons in the world,” Perry wrote in the Times, this September. For many reasons, he thinks the risk of a nuclear catastrophe is greater today than it was during the Cold War. While serving as an Under-Secretary of Defense in 1980, Perry also received a late-night call about an impending Soviet attack, a false alarm that still haunts him. “A catastrophic nuclear war could have started by accident.”

Bruce Blair, a former Minuteman launch officer, heads the anti-nuclear group Global Zero, teaches at Princeton University, and campaigns against a launch-on-warning policy. Blair has described the stresses that the warning of a Russian attack would put on America’s command-and-control system. American early-warning satellites would detect Russian missiles within three minutes of their launch. Officers at norad would confer for an additional three minutes, checking sensors to decide if an attack was actually occurring. The Integrated Tactical Warning/Attack System collects data from at least two independent information sources, relying on different physical principles, such as ground-based radar and satellite-based infrared sensors. If the norad officials thought that the warning was legitimate, the President of the United States would be contacted. He or she would remove the Black Book from a briefcase carried by a military aide. The Black Book describes nuclear retaliatory options, presented in cartoon-like illustrations that can be quickly understood.

..

Although the Air Force publicly dismissed the threat of a cyberattack on the nuclear command-and-control system, the incident raised alarm within the Pentagon about the system’s vulnerability. A malfunction that occurred by accident might also be caused deliberately. Those concerns were reinforced by a Defense Science Board report in January, 2013. It found that the Pentagon’s computer networks had been “built on inherently insecure architectures that are composed of, and increasingly using, foreign parts.” Red teams employed by the board were able to disrupt Pentagon systems with “relative ease,” using tools available on the Internet. “The complexity of modern software and hardware makes it difficult, if not impossible, to develop components without flaws or to detect malicious insertions,” the report concluded.

In a recent paper for the Royal United Services Institute for Defence and Security Studies, Andrew Futter, an associate professor at the University of Leicester, suggested that a nuclear command-and-control system might be hacked to gather intelligence about the system, to shut down the system, to spoof it, mislead it, or cause it to take some sort of action—like launching a missile. And, he wrote, there are a variety of ways it might be done.

..

Strict precautions have been taken to thwart a cyberattack on the U.S. nuclear command-and-control system. Every line of nuclear code has been scrutinized for errors and bugs. The system is “air-gapped,” meaning that its networks are closed: someone can’t just go onto the Internet and tap into a computer at a Minuteman III control center. At least, that’s the theory. Russia, China, and North Korea have sophisticated cyber-warfare programs and techniques. General James Cartwright—the former head of the U.S. Strategic Command who recently pleaded guilty to leaking information about Stuxnet—thinks that it’s reasonable to believe the system has already been penetrated. “You’ve either been hacked, and you’re not admitting it, or you’re being hacked and don’t know it,” Cartwright said last year.

If communications between Minuteman control centers and their missiles are interrupted, the missiles can still be launched by ultra-high-frequency radio signals transmitted by special military aircraft. The ability to launch missiles by radio serves as a backup to the control centers—and also creates an entry point into the network that could be exploited in a cyberattack. The messages sent within the nuclear command-and-control system are highly encrypted. Launch codes are split in two, and no single person is allowed to know both parts. But the complete code is stored in computers—where it could be obtained or corrupted by an insider.

Some of America’s most secret secrets were recently hacked and stolen by a couple of private contractors working inside the N.S.A., Edward Snowden and Harold T. Martin III, both employees of Booz Allen Hamilton. The N.S.A. is responsible for generating and encrypting the nuclear launch codes. And the security of the nuclear command-and-control system is being assured not only by government officials but also by the employees of private firms, including software engineers who work for Boeing, Amazon, and Microsoft.

Lord Des Browne, a former U.K. Minister of Defense, is concerned that even ballistic-missile submarines may be compromised by malware. Browne is now the vice-chairman of the Nuclear Threat Initiative, a nonprofit seeking to reduce the danger posed by weapons of mass destruction, where he heads a task force examining the risk of cyberattacks on nuclear command-and-control systems. Browne thinks that the cyber threat is being cavalierly dismissed by many in power. The Royal Navy’s decision to save money by using Windows for Submarines, a version of Windows XP, as the operating system for its ballistic-missile subs seems especially shortsighted. Windows XP was discontinued six years ago, and Microsoft warned that any computer running it after April, 2014, “should not be considered protected as there will be no security updates.” Each of the U.K. subs has eight missiles carrying a total of forty nuclear weapons. “It is shocking to think that my home computer is probably running a newer version of Windows than the U.K.’s military submarines,” Brown said.In 2013, General C. Robert Kehler, the head of the U.S. Strategic Command, testified before the Senate Armed Services Committee about the risk of cyberattacks on the nuclear command-and-control system. He expressed confidence that the U.S. system was secure. When Senator Bill Nelson asked if somebody could hack into the Russian or Chinese systems and launch a ballistic missile carrying a nuclear warhead, Kehler replied, “Senator, I don’t know . . . I do not know.”

After the debacle of the Cuban Missile Crisis, the Soviet Union became much more reluctant to provoke a nuclear confrontation with the United States. Its politburo was a committee of conservative old men. Russia’s leadership is quite different today. The current mix of nationalism, xenophobia, and vehement anti-Americanism in Moscow is a far cry from the more staid and secular ideology guiding the Soviet Union in the nineteen-eighties. During the past few years, threats about the use of nuclear weapons have become commonplace in Moscow. Dmitry Kiselyov, a popular newscaster and the Kremlin’s leading propagandist, reminded viewers in 2014 that Russia is “the only country in the world capable of turning the U.S.A. into radioactive dust.” The Kremlin has acknowledged the development of a nuclear torpedo that can travel more than six thousand miles underwater before devastating a coastal city. It has also boasted about a fearsome new missile design. Nicknamed “Satan 2” and deployed with up to sixteen nuclear warheads, the missile will be “capable of wiping out parts of the earth the size of Texas or France,” an official news agency claimed.

..

Russia’s greatest strategic vulnerability is the lack of a sophisticated and effective early-warning system. The Soviet Union had almost a dozen satellites in orbit that could detect a large-scale American attack. The system began to deteriorate in 1996, when an early-warning satellite had to be retired. Others soon fell out of orbit, and Russia’s last functional early-warning satellite went out of service two years ago. Until a new network of satellites can be placed in orbit, the country must depend on ground-based radar units. Unlike the United States, Russia no longer has two separate means of validating an attack warning. At best, the radar units can spot warheads only minutes before they land. Pavel Podvig, a senior fellow at the U.N. Institute for Disarmament Research, believes that Russia does not have a launch-on-warning policy—because its early-warning system is so limited.

For the past nine years, I’ve been immersed in the minutiae of nuclear command and control, trying to understand the actual level of risk. Of all the people whom I’ve met in the nuclear realm, Sidney Drell was one of the most brilliant and impressive. Drell died this week, at the age of ninety. A theoretical physicist with expertise in quantum field theory and quantum chromodynamics, he was for many years the deputy director of the Stanford Linear Accelerator and received the National Medal of Science from Obama, in 2013. Drell was one of the founding members of jason—a group of civilian scientists that advises the government on important technological matters—and for fifty-six years possessed a Q clearance, granting him access to the highest level of classified information. Drell participated in top-secret discussions about nuclear strategy for decades, headed a panel that investigated nuclear-weapon safety for the U.S. Congress in 1990, and worked on technical issues for jason until the end of his life. A few months ago, when I asked for his opinion about launch-on-warning, Drell said, “It’s insane, the worst thing I can think of. You can’t have a worse idea.”

Drell was an undergraduate at Princeton University when Hiroshima and Nagasaki were destroyed. Given all the close calls and mistakes in the seventy-one years since then, he considered it a miracle that no other cities have been destroyed by a nuclear weapon—“it is so far beyond my normal optimism.” The prospect of a new cold war—and the return of military strategies that advocate using nuclear weapons on the battlefield—deeply unnerved him. Once the first nuclear weapon detonates, nothing might prevent the conflict from spiralling out of control. “We have no experience in stopping a nuclear war,” he said.

..

Donald Trump and Vladimir Putin confront a stark choice: begin another nuclear-arms race or reduce the threat of nuclear war. Trump now has a unique opportunity to pursue the latter, despite the bluster and posturing on both sides. His admiration for Putin, regardless of its merits, could provide the basis for meaningful discussions about how to minimize nuclear risks. Last year, General James Mattis, the former Marine chosen by Trump to serve as Secretary of Defense, called for a fundamental reappraisal of American nuclear strategy and questioned the need for land-based missiles. During Senate testimony, Mattis suggested that getting rid of such missiles would “reduce the false-alarm danger.” Contrary to expectations, Republican Presidents have proved much more successful than their Democratic counterparts at nuclear disarmament. President George H. W. Bush cut the size of the American arsenal in half, as did his son, President George W. Bush. And President Ronald Reagan came close to negotiating a treaty with the Soviet Union that would have completely abolished nuclear weapons.

Every technology embodies the values of the age in which it was created. When the atomic bomb was being developed in the mid-nineteen-forties, the destruction of cities and the deliberate targeting of civilians was just another military tactic. It was championed as a means to victory. The Geneva Conventions later classified those practices as war crimes—and yet nuclear weapons have no other real use. They threaten and endanger noncombatants for the sake of deterrence. Conventional weapons can now be employed to destroy every kind of military target, and twenty-first-century warfare puts an emphasis on precision strikes, cyberweapons, and minimizing civilian casualties. As a technology, nuclear weapons have become obsolete. What worries me most isn’t the possibility of a cyberattack, a technical glitch, or a misunderstanding starting a nuclear war sometime next week. My greatest concern is the lack of public awareness about this existential threat, the absence of a vigorous public debate about the nuclear-war plans of Russia and the United States, the silent consent to the roughly fifteen thousand nuclear weapons in the world. These machines have been carefully and ingeniously designed to kill us. Complacency increases the odds that, some day, they will. The “Titanic Effect” is a term used by software designers to explain how things can quietly go wrong in a complex technological system: the safer you assume the system to be, the more dangerous it is becoming.'

- Eric Schlosser, World War Three, By Mistake, December 23, 2016


Context

The International Day for the Total Elimination of Nuclear Weapons

          '..Russia .. cyberpower proved the perfect weapon .. political sabotage..' (no replies)        
' “We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends..

..

..The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..the hackings of the State Department, the White House and the Pentagon..

..

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '



'..the White House’s reluctance to respond forcefully meant the Russians have not paid a heavy price for their actions, a decision that could prove critical in deterring future cyberattacks.

..

..President Vladimir V. Putin of Russia moved beyond mere espionage to deliberately try to subvert American democracy and pick the winner of the presidential election.

..

..A low-cost, high-impact weapon that Russia had test-fired in elections from Ukraine to Europe was trained on the United States, with devastating effectiveness. For Russia, with an enfeebled economy and a nuclear arsenal it cannot use short of all-out war, cyberpower proved the perfect weapon: cheap, hard to see coming, hard to trace.

..

The United States had two decades of warning that Russia’s intelligence agencies were trying to break into America’s most sensitive computer networks. But the Russians have always managed to stay a step ahead.

Their first major attack was detected on Oct. 7, 1996, when a computer operator at the Colorado School of Mines discovered some nighttime computer activity he could not explain. The school had a major contract with the Navy, and the operator warned his contacts there. But as happened two decades later at the D.N.C., at first “everyone was unable to connect the dots,” said Thomas Rid, a scholar at King’s College in London who has studied the attack.

Investigators gave it a name — Moonlight Maze — and spent two years, often working day and night, tracing how it hopped from the Navy to the Department of Energy to the Air Force and NASA. In the end, they concluded that the total number of files stolen, if printed and stacked, would be taller than the Washington Monument.

Whole weapons designs were flowing out the door, and it was a first taste of what was to come: an escalating campaign of cyberattacks around the world.

..

The Russians were also quicker to turn their attacks to political purposes. A 2007 cyberattack on Estonia, a former Soviet republic that had joined NATO, sent a message that Russia could paralyze the country without invading it. The next year cyberattacks were used during Russia’s war with Georgia.

..

Mr. Obama was briefed regularly on all this, but he made a decision that many in the White House now regret: He did not name Russians publicly, or issue sanctions. There was always a reason: fear of escalating a cyberwar, and concern that the United States needed Russia’s cooperation in negotiations over Syria.

“We’d have all these circular meetings,” one senior State Department official said, “in which everyone agreed you had to push back at the Russians and push back hard. But it didn’t happen.”

..

Last year, the attacks became more aggressive. Russia hacked a major French television station, frying critical hardware. Around Christmas, it attacked part of the power grid in Ukraine, dropping a portion of the country into darkness, killing backup generators and taking control of generators. In retrospect, it was a warning shot.

..

..CrowdStrike’s nicknames for the two Russian hacking groups that the firm found at work inside the D.N.C. network. Cozy Bear — the group also known as the Dukes or A.P.T. 29, for “advanced persistent threat” — may or may not be associated with the F.S.B., the main successor to the Soviet-era K.G.B., but it is widely believed to be a Russian government operation. It made its first appearance in 2014, said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer.

..

Only in March 2016 did Fancy Bear show up — first penetrating the computers of the Democratic Congressional Campaign Committee, and then jumping to the D.N.C., investigators believe. Fancy Bear, sometimes called A.P.T. 28 and believed to be directed by the G.R.U., Russia’s military intelligence agency, is an older outfit, tracked by Western investigators for nearly a decade. It was Fancy Bear that got hold of Mr. Podesta’s email.

..

It was bad enough that Russian hackers had been spying inside the committee’s network for months. Now the public release of documents had turned a conventional espionage operation into something far more menacing: political sabotage, an unpredictable, uncontrollable menace for Democratic campaigns.

..

Julian Assange, the WikiLeaks founder and editor, has resisted the conclusion that his site became a pass-through for Russian hackers working for Mr. Putin’s government or that he was deliberately trying to undermine Mrs. Clinton’s candidacy. But the evidence on both counts appears compelling.

..

Mr. Putin, a student of martial arts, had turned two institutions at the core of American democracy — political campaigns and independent media — to his own ends. The media’s appetite for the hacked material, and its focus on the gossipy content instead of the Russian source, disturbed some of those whose personal emails were being reposted across the web.

..

In late 2014, hackers working for Kim Jong-un, the North’s young and unpredictable leader, had carried out a well-planned attack on Sony Pictures Entertainment intended to stop the Christmastime release of a comedy about a C.I.A. plot to kill Mr. Kim.

In that case, embarrassing emails had also been released. But the real damage was done to Sony’s own systems: More than 70 percent of its computers melted down when a particularly virulent form of malware was released. Within weeks, intelligence agencies traced the attack back to the North and its leadership. Mr. Obama called North Korea out in public, and issued some not-very-effective sanctions. The Chinese even cooperated, briefly cutting off the North’s internet connections.

As the first Situation Room meetings on the Russian hacking began in July, “it was clear that Russia was going to be a much more complicated case,” said one participant. The Russians clearly had a more sophisticated understanding of American politics, and they were masters of “kompromat,” their term for compromising information.

..

..code was put out in the open by the Russians as a warning: Retaliate for the D.N.C., and there are a lot more secrets, from the hackings of the State Department, the White House and the Pentagon, that might be spilled as well. One senior official compared it to the scene in “The Godfather” where the head of a favorite horse is left in a bed, as a warning.

..

As the year draws to a close, it now seems possible that there will be multiple investigations of the Russian hacking — the intelligence review Mr. Obama has ordered completed by Jan. 20, the day he leaves office, and one or more congressional inquiries. They will wrestle with, among other things, Mr. Putin’s motive.

..

Did he seek to mar the brand of American democracy, to forestall anti-Russian activism for both Russians and their neighbors? Or to weaken the next American president, since presumably Mr. Putin had no reason to doubt American forecasts that Mrs. Clinton would win easily? Or was it, as the C.I.A. concluded last month, a deliberate attempt to elect Mr. Trump?

In fact, the Russian hack-and-dox scheme accomplished all three goals.

What seems clear is that Russian hacking, given its success, is not going to stop. Two weeks ago, the German intelligence chief, Bruno Kahl, warned that Russia might target elections in Germany next year. “The perpetrators have an interest to delegitimize the democratic process as such,” Mr. Kahl said. Now, he added, “Europe is in the focus of these attempts of disturbance, and Germany to a particularly great extent.” '

- Eric Lipton, David E. Sanger and Scott Shane, The Perfect Weapon: How Russian Cyberpower Invaded the U.S., December 13, 2016


Context '[Russia] may become a threat to the world. That is the worst thing that could happen to Russia.' - Yegor Gaidar

'..Russian strategy of hybrid influence and destabilization .. German Council on Foreign Relations.'

'German intelligence says Russia is trying to destabilize German society..' - '..war that Moscow is waging against the West..'

'[Putin is doing] anything that can and will expand Russian influence to U.S.S.R.-era levels of power.'


'..Zero tolerance for Russian intrusions .. Estonia .. policy of publicly naming or prosecuting spies..'

'..the Soviet Union was cut off from Western financial markets and was effectively under permanent sanctions..'

          Sr. Software Development Engineer - Test - Skytap        
Seattle, WA - Engineering Seattle, Washington

Apply
Description
Skytap is looking for talented senior level Software Development Engineers in Test to join our engineering team. Cloud computing is one of today's hottest technologies, and Skytap is leading the way by providing self-service
          Benchmarking microSD cards and more        
It’s worth re-visiting this blog-post as I am going to do more benchmarks and add more results over time. Motivation If you ever tried using a flash drive (such a SD, microSD, USB drive or CF) for your root or home filesystem on a small computing device or smartphone, you probably have noticed that flash Read more »
          Healthcare Artificial Intelligence, Cognitive Tools Bring Big Investments        
August 10, 2017 - Artificial intelligence and cognitive computing systems may be attracting a lot of hype across the healthcare industry, but the ...
          Burn After Reading        

Who’s Who
What’s What

In the World of CIA Fronts, Partners, Proprietaries & Contractors




NEW BOOK:

The Almost Classified Guide to CIA Front Companies, Proprietaries & Contractors
By WAYNE MADSEN
ISBN: 978-1-365-11196-9


Cool Justice Editor's Note: Following are excerpts from author Madsen's introduction and the body of the work. Additional suggested reading: News story about Madsen's book via the Washington, D.C. based Justice Integrity Project [link at the bottom of this post].

EXCERPTS:

From the Introduction


One of the most pervasive uses of companies as intelligence partners was under the CIA’s Operation MOCKINGBIRD. During the Cold War, the CIA, often with the approval of corporate executives, infiltrated their agents to work as journalists in newspapers, radio and television networks, wire services, and magazines. The following pages in this book are rife with examples of this penetration of the Fourth Estate – all too many in the opinion of this journalist. The CIA admitted to at least 400 journalists on the agency’s payroll at the height of MOCKINGBIRD. The CIA traditionally understates its capabilities, especially when its covert activities become publicly known. Moreover, the end of the Cold War did not stop the practice of the CIA in infiltrating the media and slant news reports to its wishes.

*

An insightful look behind the veils of secrecy into the CIA’s use of fronts, proprietaries, and partners calls into question the purpose of the CIA. Created by President Harry S Truman to serve as a central collector and repository of intelligence, the CIA became much more than that. A few weeks after the United States witnessed the assassination of President Kennedy in the middle of downtown Dallas, Truman penned an op-ed piece that appeared in several newspapers around the country. In it, Truman shared his regret for having created the CIA in 1947:

“I think it has become necessary to take another look at the purpose and operations of our Central Intelligence Agency—CIA . . . For some time I have been disturbed by the way CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the Government. This has led to trouble and may have compounded our difficulties in several explosive areas.

"I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. Some of the complications and embarrassment I think we have experienced are in part attributable to the fact that this quiet intelligence arm of the President has been so removed from its intended role that it is being interpreted as a symbol of sinister and mysterious foreign intrigue.”

*

The 21st century’s CIA’s partners are more likely to be found among high-tech companies marketing the latest and greatest mobile applications and data mining programs than among banks, law offices, and advertising agencies. However, in the post-World War II era, the CIA’s top and middle echelons were normally found operating through cover as typewriter-pecking journalists, traveling Madison Avenue admen, corporate lawyers, and chain-smoking oilmen. In the 1970s and 80s, CIA contractors and partners began showing up in the high-tech field, with database, local area networking, and on-line information retrieval systems attracting the most interest by Langley.

*

As this book went to press, the smart phone game application Pokémon Go fad was sweeping the planet. Unbeknownst to many of the on-line game’s avid fan’s was the connection of the game’s developers to the CIA’s venture capital firm IN-Q-TEL. All users saw their geo-location and other smart phone data being swept up by a CIA partner firm.

SELECTED ENTRIES

Amazon, Inc. [CIA contractor]. Company provides cloud computing services for the CIA. Amazon’s CEO Jeff Bezos also owns The Washington Post.

American Historical Society. [CIA partner]. Many society officials were OSS/CIA officers.

American Press Institute. [CIA front]. Operating out of Columbia University, the institute’s director in the 1950s was a CIA officer.

AmeriCares. [CIA partner]. A non-profit organization that is often the “first in” at refugee situations. Founded by tycoon J. Peter Grace, a board chairman of the CIA front, the American Institute for Free Labor Development (AIFLD) and a trustee of another CIA front, the American Committee for Liberation from Bolshevism, AmeriCares was involved in funding the Nicaraguan contras. The group has also provided the CIA with recruiting opportunities at mass refugee sites, particularly in Latin America and Asia.

Bechtel Corporation. [CIA contractor]. Bechtel is a large construction company that has included former CIA director Richard Helms, CIA pseudonym “Fletcher M. Knight,” among its executive ranks. Bechtel was active in providing corporate cover for the OSS in the Middle East during World War II. Bechtel has been a consummate service company for various CIA operations, including support for the CIA-inspired coup against the Syrian government in 1949, the Iranian government of Prime Minister Mohamed Mossadeq in 1953, and President Sukarno of Indonesia in 1965. From the 1960s to the 1970s, Bechtel provided cover for CIA agents in Libya under both the regime of King Idris and his successor, Muammar Qaddafi. Sometimes called a “secret arm” of the CIA, Bechtel’s executives included those who would join President Reagan’s Cabinet, including Secretary of State George Schultz and Secretary of Defense Caspar Weinberger.

Before World War II, Steve Bechtel formed a military-industrial complex partnership with John McCone. McCone later became the chairman of the Atomic Energy Commission and later, director of the CIA. The CIA has used Bechtel to provide cover for non-official cover CIA operatives abroad.

Blackstone Investment Group. [CIA front]. With offices in Washington, DC and Moscow, arranged for the purchase of KGB documents following the collapse of the Soviet Union. Among the documents sought by the front company were any related to illegal CIA activities during the Cold War, including the 1963 assassination of President John F. Kennedy.

Bourbon and Beefsteak Bar and Restaurant. [CIA front]. Opened in 1967 in King’s Cross in Sydney, Australia. Served as a rendezvous point for CIA, Australian Security Intelligence Organization (ASIO), and organized crime figures. Its proprietor was Bernie Houghton, a CIA operative with links to Nugan Hand Bank, CIA weapons smuggler Edwin Wilson, and CIA clandestine services officers Theodore Shackley, Rafael Quintero, and Thomas Clines.

Center for Democracy. [CIA front]. Administered under the aegis of Boston University, the center maintained offices in Boston, Washington, DC, Guatemala City, and Strasbourg, France. Involved in CIA operations in eastern Europe, Central America, and Africa.

Colt Patent Firearms Company. [CIA partner]. Based in Hartford, Connecticut, provided corporate cover for CIA officers operating abroad.

Daddario & Burns. [CIA partner]. Headed by former OSS officer Emilio Daddario, a Democratic Representative from Connecticut, the Hartford-based law firm provided services to the CIA.

DC Comics. [CIA partner]. Worked with the International Military Information Group (IMIG), a joint CIA/Pentagon unit at the State Department, to disseminate propaganda comic books, featuring Superman, Batman, and Wonder Woman, in Serbo-Croatian and Albanian, to youth in the Balkans during the military conflicts in that region.

Disney Corporation. [CIA partner]. CIA agents who were adept at creating front companies and shell corporations in Florida, worked closely with Disney in preparation for the construction of Disney World near Orlando, Florida. OSS veteran “Wild Bill” Donovan and CIA shell company expert Paul Helliwell helped create two fake Florida cities, Bay Lake and Lake Buena Vista, as well as a number of shell corporations, to keep secret the plans for Disney World. This kept land prices low because real estate speculators were unaware of the prospective value of the land in a desolate area of central Florida.

Emory School of Medicine. [CIA partner]. Located in Atlanta, Georgia. Involved in the CIA’s MK-ULTRA behavioral modification project.

Enron Corporation [CIA partner]. Houston-based firm that was used by the CIA to provide commercial cover for its agents around the world. There were at least 20 CIA employees on Enron’s payroll. Andre Le Gallo, a former official of the CIA’s Operations Directorate, went to work as a corporate intelligence officer for Enron.

Fair Play for Cuba Committee (FPCC). [CIA front]. Officially established by American Trotskyists, the group was penetrated by CIA operatives. The FPCC New Orleans office was a CIA front that provided cover for the anti-Fidel Castro activities of Lee Harvey Oswald, Clay Shaw, and David Ferrie, among others. The New Orleans FPCC office was located at 544 Camp Street and shared the same building entrance with Guy Banister Associates, Inc., a private detective agency, the address for which was 531 Lafayette Street and around the corner from 544 Camp Street.

In December 1963, after the assassination of President John F. Kennedy, the FPCC ceased all U.S. operations.

General Electric Company. [CIA partner]. Based in Fairfield, Connecticut, provided corporate cover for CIA officers operating abroad.

General Foods Corporation. [CIA partner]. Advertising account at CIA’s Robert Mullen Company handled by an active CIA employee.

Google, Inc. [CIA partner]. Developed as a result of a research grant by the CIA and Pentagon to Stanford University’s Department of Computer Science. The CIA referred to the research as the “google project.”

Greenberg Traurig. [CIA partner]. Washington, DC “connected” law firm.

Guy Banister Associates, Inc. [CIA partner]. New Orleans private detective agency headed by former FBI agent Guy Banister. The detective agency coordinated the activities of various anti-Castro Cuban groups in New Orleans, including Banister’s own Anti-Communist League of the Caribbean, as well as the Cuban Revolutionary Council, the Cuban Democratic Revolutionary Front, Friends of Democratic Cuba, and the Crusade to Free Cuba Committee.

Banister and Associates shared office space with the CIA’s New Orleans front, the Fair Play for Cuba Committee, headed by Lee Harvey Oswald.

Hale and Dorr. [CIA partner]. Boston-based law firm that provided cover for CIA’s Independence and Brown Foundations.

Halliburton. [CIA contractor]. Based in Houston, it is the world’s largest oil service company. Recipient of a number of CIA sole-source contracts for services worldwide.

Harper and Row, Inc. [CIA partner]. Manuscripts submitted to the New York publisher that dealt with intelligence matters, particularly CIA operations, were turned over to the CIA for censoring edits before publication.

Hewlett Packard Corporation. [CIA partner]. Sold computers to Iraq for Saddam Hussein’s missile program with the knowledge and approval of the CIA.

Hill & Knowlton. [CIA partner]. Public relations firm that teamed with the CIA on a number of operations. Hill & Knowlton’s numerous offices abroad provided cover for CIA agents. One known Hill & Knowlton office that was a CIA front operation was in Kuala Lumpur.

Kerr-McGee. [CIA partner]. Provided corporate cover for CIA officers operating overseas.

Kissinger Associates, Inc. [CIA partner]. New York-based international consulting firm founded by former Secretary of State and National Security Adviser Henry Kissinger. Former National Security Adviser Brent Scowcroft is a co-owner. The firm provided support to the CIA-linked American Ditchley Foundation and the Bilderberg Group. Much of the 1982 seed money for Kissinger Associates was provided by Goldman Sachs.

Knight Foundation. [CIA partner]. Also known as the John S. and James L. Knight Foundation. Based in Miami, the foundation provides funding for various CIA-connected media operations in the United States and around the world.

Kroll Inc. [CIA partner]. Founded in 1972 by Jules Kroll, who had links to both U.S. and Israeli intelligence. Based in Manhattan. French domestic law enforcement believed Kroll’s Paris office was a CIA front. Kroll handled the security for the World Trade Center after the 1993 terrorist bombing and continued to be responsible for security up to, during, and after the September 11, 2001 terrorist attack. Kroll employed former FBI assistant director for counter-terrorism John O’Neill, who died in the collapse of the World Trade Center.

Lincoln Savings and Loan. [CIA partner]. Based in Irvine, California and headed by notorious swindler Charles Keating, Jr., involved in laundering funds for the Iran-contra scandal.

Lone Star Cement Corporation. [CIA partner]. Based in Stamford, Connecticut and linked to the Bush family, provided corporate cover for CIA officers operating abroad. Involved in the Iran-contra scandal.

Mary Carter Paint Company. [CIA front]. A money-laundering operation for the CIA. Involved in casinos in the Bahamas.

Monsanto. [CIA partner]. The firm contracted with former CIA official Cofer Black’s Total Intelligence Solutions (TIS), a subsidiary of the CIA-connected Blackwater USA, later Xe Services, to monitor animal rights groups, anti-genetically modified (GM) food activists, and other groups opposed to Monsanto’s agri-business operations worldwide.

National Enquirer. [CIA partner]. The tabloid’s founder, Generoso (Gene) Pope, Jr., worked for the CIA’s psychological warfare unit and the agency’s Italy branch in 1950. In 1952, Pope acquired The New York Enquirer broadsheet and transformed it into a tabloid, renaming it The National Enquirer. This transformation bore the imprimatur of the CIA’s Operation MOCKINGBIRD media influence program.

Newsweek. [CIA partner]. Magazine reporters and stringers fed information to the CIA. Newsweek’s stringers in southeastern Europe and the Far East were CIA agents. When Newsweek was bought by The Washington Post Company in 1961, cooperation between the magazine and the CIA increased. It was a participant in the CIA’s Operation MOCKINGBIRD media influence program. Much of the staff of Newsweek was absorbed into a new online publication, The Daily Beast, which continues to disseminate CIA-influenced articles. See Washington Post.

Nieman Foundation. [CIA partner]. Located at Harvard University, the foundation awarded Nieman Fellowships, some on behalf of the CIA, for foreign journalists to study at Harvard. The journalists were subjected to CIA recruitment efforts prior to their returning to their home countries.

Pamela Martin & Associates. [CIA partner], Escort firm run by Deborah Jeane Palfrey, the so-called “DC Madam.” During her 2008 trial for mail fraud, Palfrey attempted to invoke the Classified Information Procedures Act in order to discuss her relationship with the CIA. The U.S. Court refused Palfrey’s request and she was convicted and later said to have committed suicide before her sentencing hearing in Washington, DC. One of her clients was Randall Tobias, the head of the CIA-connected USAID. Another was Louisiana Republican senator David Vitter.

Paris Review. [CIA front]. Literary magazine edited by George Plimpton. Published works by Jack Kerouac and Samuel Beckett. The magazine’s co-founder, Peter Matthiessen, relied on his affiliation with the magazine as his CIA cover.

Quaker Oats Company. [CIA partner]. Worked with the CIA and Atomic Energy Commission to place trace amounts of radiation in breakfast cereal served to boys at the Fernald School for the mentally retarded in Waltham, Massachusetts.

Radio Corporation of America. [CIA partner]. Provided corporate cover for CIA officers operating abroad, particularly in Iran, Philippines, Japan, and West Germany. Provided technical assistance to CIA-financed clandestine and propaganda radio stations worldwide, including Radio Free Europe. RCA founder David Sarnoff was a major supporter of CIA operations, including propaganda dissemination around the world. RCA chairman and chief executive officer Thornton F. Bradshaw was active in the operations of the CIA-linked American Ditchley Foundation.

Reily Coffee Company. [CIA partner]. Also known as William B. Reily Coffee Company and based in New Orleans, this company employed Lee Harvey Oswald and a number of other U.S. government employees, many of whom were suspected CIA officers.

Robert M. Mullen Company. [CIA proprietary]. A Washington, DC public relations firm, it was used as a front for CIA activities. E. Howard Hunt, the CIA agent, worked for Robert Mullen when he was arrested in the break-in of the Democratic National Committee headquarters at the Watergate Hotel in Washington in 1972. The Senate Watergate Committee reported that “the Mullen and Company has maintained a relationship with the Central Intelligence Agency since its incorporation in 1959. It provided covers for agents in Europe (Stockholm), Latin America (Mexico City), and the Far East (Singapore) at the time of the Watergate break-in.”

Rockefeller Foundation. [CIA partner]. Used by the CIA to direct scholarships and grants to the Third World and Eastern Europe. Rockefeller Foundation money was funneled to the American Committee for a United Europe (ACUE), created in 1948. The chairman of ACUE was OSS chief William J. Donovan and the vice chairman was Allen Dulles. One of ACUE’s board members was Walter Bedell Smith, the first CIA director.

Summa Corporation. [CIA partner]. Owned by Howard Hughes, Summa is believed to have skimmed gambling profits from the Sands, Desert Inn, Frontier, Silver Slipper, Castaways, and Landmark casinos in Las Vegas and Harold’s Club in Reno for the CIA and the Mafia. Provided financial cover for the CIA’s Glomar Explorer project.

Teneo Intelligence. [CIA partner]. Branch of Teneo Holdings, which is headquartered in New York. Teneo Holdings’s intelligence branch includes former CIA officials. Teneo is closely linked to former President Bill Clinton and Hillary Clinton. Teneo Intelligence has offices in New York, London, Rome, Brussels, Dubai, Bogota, New Delhi, and Tokyo.

Texas Commerce Bank (TCB). [CIA partner]. Houston-based bank founded by the family of James Baker III. Texas Commerce Bank was used to provide commercial cover for CIA agents. After serving as vice president for Texas Commerce Bank in Caracas from 1977 to 1979, Jeb Bush joined his father’s presidential campaign in 1980. Serving with Bush on the campaign was Robert Gambino, the CIA deputy director of security who gave Bush his orientation brief at Langley in 1977.

Kenneth Lay, the chairman of Enron, which had its own links to the CIA, served on the board of Texas Commerce Bank. Texas Commerce Bank was acquired by Chemical Bank in 1987.

The bank provided major loans to Howard Hughes’s Summa Corporation. See Summa Corporation.

United Fruit Company [CIA partner]. Involved in 1954 CIA overthrow of Jacobo Arbenz government in Guatemala. Published the Latin America Report, a publication that was a CIA front used for clandestine activities. The CIA transferred weapons to United Fruit employees in Guatemala who were involved in undermining the Arbenz government. The joint CIA-United Fruit plan was code named OPERATION FORTUNE. Company provided an airfield in Guatemala for the CIA’s training of Cuban exiles for the Bay of Pigs invasion of Cuba.

U.S. Rubber Company. [CIA partner]. Headquartered in Naugatuck, Connecticut and later called Uniroyal, provided corporate cover to CIA officers operating abroad. Included those operating under the cover of the Dominion Rubber Company of Canada, a subsidiary of U.S. Rubber Company.

U.S. Youth Council (USYC). [CIA front]. Founded in 1945 and based in New York. Some 90 percent of its funds came from the CIA. USYC received funding from the Foundation for Youth and Student Affairs (FYSA), a CIA front. The USYC was composed of American Youth Hostels, Camp Fire Girls, 4-H, American Unitarian Youth, National Catholic Welfare Conference, National Students Assembly, YMCA and YWCA.

Wackenhut. [CIA contractor]. Wackenhut, a Palm Beach Gardens, Florida-based security firm, stood accused of providing the CIA with specialized services around the world, including Chile, Greece, and El Salvador. Its Venezuelan branch, Wackenhut Venezolana, C.A., was accused in 2002 of involvement in the CIA’s coup against President Hugo Chavez. William Casey served as Wackenhut’s outside counsel before becoming CIA director in 1981.

Wackenhut eventually merged into the global security firm G4S.

Washington Post. [CIA partner]. The Washington Post was part of the CIA’s Operation MOCKINGBIRD, the agency’s media influence project. Post publisher Phil Graham was a close friend and associate of MOCKINGBIRD chief Frank Wisner, Sr. and CIA director Allen Dulles. Wisner assisted Graham in acquiring The Washington Times-Herald and WTOP radio, creating a sizable CIA-influenced media operation in the nation’s capital.

W. R. Grace. [CIA partner]. Provided corporate cover to CIA officers operating abroad, particularly in Latin America. Provided donations to CIA front foundations.

  • News story about Madsen's book via The Justice Integrity Project



  •           Chrome OS: from Personal Computer to Personal Computing. A matter of trust.        
    Google is gradually shifting the user ownership from hardware computers to computing sessions hosted on it's infrastructure. Are you ready for the shift?
              LA GRAN "UTILIDAD" DE LA OEA...        
    Asamblea General 35 de la OEA.
    Decía en estos días el dictador venezolano Nicolás Maduro que a la OEA no la quiere nadie. ¿Cómo va a ser verdad una frase de tan despreciable personaje? ¡Tiene que estar "equivocado"! ¡La "verdad" únicamente la dice gente inteligente y agradable! Para refutar la frase de Maduro (aunque estaría "refutada" por quien la dice) vamos a mostrar la inmensa utilidad de la OEA.

    En los inicios de la juventud hay un idealismo que raya con la ingenuidad. Todos los recién egresados de colegio vibran por cambiar el mundo. Saben más de la profesión que piensan estudiar los que ya la estudiaron. Una época hermosa con unas ansias de cambiar el mundo más fuertes que las de Putin y las de Obama... Y es aquí donde viene la OEA. Con el ánimo de implantar "valores democráticos" se crean simulaciones de la OEA. Los jóvenes por un instante juegan a cambiar el mundo. Los hombres de corbata y las niñas de sastre. Una elegancia que eleva su "espíritu" a la categoría de aquellos representantes del continente... Sin la OEA ¿A qué jugarían nuestros jóvenes?


    Maduro diría que podrían jugan a un modelo de la "Asamblea Nacional". Más de uno elegiría ser Diosdado Cabello sin lugar a dudas. Pero la Asamblea Nacional Bolivariana es muy aburrida. La mayoría tendrían que gritar que están "rodilla en tierra" con el comandante eterno. La minoría básicamente tendría que gritar que "no existen garantías para la oposición". Lo único es que podría armarse un "bochinche" y liberar aquellas bajas pasiones... Tal vez esa sea una simulación un poco más auténtica del costoso circo de la política. Pero ¿Acaso eso eleva su noble y digno espíritu de nuestra juventud? 


    La diplomacia es el arte, que requiere enorme valentía, de sonreirle a quien en condiciones normales querrías pegarle un puño. No es hipocresía, para nada, por el contrario se requiere una gran valentía para sonreírle a alguien que detestas. Esto es incomprensible por algunas personas sobre todo en Antioquia y la Costa Colombiana.  Sin embargo, en su mayoría la gente en Colombia es "diplomática". En todo caso, más vale una sonrisa falsa que una guerra auténtica...


    Uno de los grandes beneficios conseguidos por la diplomacia es el de la "inmunidad diplomática". Más allá de entrar a analizar tan "valiosa" institución en sus debidas "excepciones" es claro que esto representa un beneficio. La inmunidad diplomática no solamente se presenta para "misiones diplomáticas" ante países, sino para aquellas ante instituciones como la OEA o la ONU.


    En un mundo donde priman principios como "la libertad de circulación" o la no-discriminación por razones de nacionalidad (leáse pasaporte) ¿Cómo se sacarían beneficios adicionales para personas "iguales ante la ley"? ¡Con la inmunidad diplomática! Se trata de una discriminación positiva en razón del pasaporte, de uno especial claro está. Siendo todos iguales ante la ley ¿cómo podríamos encontrar una forma para que a alguien le dijeran "Su Excelencia"? Eso sin contar que eso facilita el tránsito en aeropuertos demorado por medidas proteccionistas (que surgen "precisamente" como formas para facilitar la libertad de circulación y la no-discriminación) como las visas o las aduanas. Sin tantas instituciones internacionales ¿Cómo haría el político para incluir en la lista de su gigantesco número de "amigos" de los beneficios del poder? Ese carrusel de roscas, beneficios y adulación requiere privilegios especiales...


    Hay un tercer beneficio que presenta la OEA. Se trata de una Organización que no escatima en realizar toda serie de eventos, cocteles, tratos especiales, etc. Se trata de la socialización del más alto nivel. En estos eventos como "foro para la erradicación del hambre" se invita a "líderes comprometidos" a "discutirlo" en hoteles del más alto nivel. Se trata de eventos que sus asistentes no solamente no pasen hambre, sino que coman esquisitos manjares. Manjares que los motiven a una "reflexión profunda" para sacar una resolución, declaración, etc., donde se diga que se quiere acabar con el hambre. Â¿Cómo conseguiríamos aquellas "valiosísimas" declaraciones que se dan en eventos del más alto nivel?


    Eso sin contar con que, los organismos internacionales son buenos empleadores. ¿Qué pasaría con empleos como los del Secretario General, despachos, asistentes, adjuntos? No se puede negar que, en un mundo lleno de problemas económicos, se requiere resolver los problemas de empleo. Es "vital" para nuestra economía que haya personas encargadas de manejar varios tipos de sellos y la logística que ello implica. Más aún, por su directa relación con emitir otras de declaraciones acerca de la importancia de acabar con el hambre. Situación que llevará a otras declaraciones sobre tan importante problema... Eso sin contar que las facultades de relaciones internacionales perderían inmensas "ventajas" para el mercadeo de sus programas. ¿Dónde van a trabajar sus egresados? En esta economía global hay que "garantizarles" un empleo...


    Es así como Nicolás Maduro está equivocado. No solamente por ser él quien lo dice, sino por la importancia de la institución que se trata. Sin ella ¿Qué remedarían los jóvenes para cambiar el mundo? ¡Se perderían empleos, se desperdiciarían inmunidades diplomáticas (que podría darle a sus "amigos")! Sin la OEA y las instituciones internacionales ¿cómo podríamos tener un circo donde los payasos cumplan al pie de la letra el protocolo y la etiqueta? Sin ellos no tendríamos quien lograra darnos pan... bueno declaraciones que harán que este aparezca mágicamente...

              CARBON        
    Introducing Carbon, the first full length book showcasing my personal ideas around science fiction art and design. This is a project I'm very excited about, a chance to delve deep and develop the various worlds and concepts that are the result of a life long passion for nature, science, technology, and futuristic science fiction ideas.

    These images are explorations I have been working on to develop the design and art direction of the book. It's been a lot of fun to work with concepts springing from the Carbon name. Carbon is the workhorse element of nature, it forms the strongest bonds and is the basis for life as we know it in the universe. Carbon nanotubes and graphene take their hexagonal molecular structure and hold great promise for artificial muscle, advanced building materials, powerful motors, faster computing, and so much more.

    Carbon will contain a wealth of exclusive artwork, design, and descriptive text breakdowns, including in depth development of several personal projects that I wish to evolve into short film and video game concepts. In this sense Carbon forms the first step towards turning these dreams into reality.

    I'm looking forward to exploring the graphic design of the book, and want to create a bold and exciting product that will be much more than just a collection of art and ideas.

    I'm also looking forward to exploring ideas in environment design and story telling, realms I rarely get to delve into with my regular conceptual design work.

    I have a heap of artwork for Carbon already, but this is just the start and familiar to anyone who knows my work. The book will allow me the opportunity to really push myself and create fresh new work, to go crazy and expand on some of the more involved ideas I've been thinking about for years. I have a massive pile of sketches ready to be fleshed out, some real exciting stuff!

    The kick starter campaign will have to wait till I get back from a trip to the US for Comicon (more on that later), so keep an eye out, it should be something special! Cheers!
              DESTINASI WISATA TERBAIK 34 PROVINSI SE INDONESIA (BAGIAN 2)        

    DESTINASI WISATA TERBAIK 34 PROVINSI SE INDONESIA (BAGIAN 2)

      

    Pasar Apung Samarinda, Provinsi Kalimantan Timur.  Sumber : GNFI

    PULAU KARAMPUANG, PROVINSI SULAWESI BARAT


        Pulau Karampuang, Destinasi Wisata di Provinsi Sulawesi Barat.  Sumber : azwisata


    Pulau Karampuang merupakan lahan hutan kota Mamuju, sekaligus menjadi salah satu obyek wisata di wilayah Mamuju. Pulau Karampuang terletak di Kecamatan Simboro Kepulauan, Kabupaten Mamuju, Provinsi Sulawesi Barat.  Pulau dengan luas sekitar 6 km2 ini terkenal akan keindahan lautnya.

    Keindahan bawah laut Pulau Karampuang berupa terumbu karang, aneka ikan hias, dan biota laut lainnya, dapat kita nikmati dari atas dermaga kayu sepanjang 500 meter yang dibangun dari garis pantai dan menjorok ke laut.  Dermaga ini bisa kita temukan di bagian utara Pulau Karampuang.  Jika ingin melihat keindahan bawah laut lebih dekat, kita juga bisa menyelam.

    Di bagian selatan dari pulau Karampuang terdapat sumur tiga rasa yang memang memiliki air dengan tiga rasa yang berbeda yakni asin, tawar dan payau. Sumur unik ini juga dipercaya bisa mendatangkan jodoh, sehingga dikenal juga sebagai Sumur Jodoh.  banyak yang percaya, jika  seorang gadis atau perjaka meminum airnya, ia akan segera mendapatkan jodoh.


    TAMAN LAUT TUMBAK, PROVINSI SULAWESI UTARA


        Taman Laut Tumbak, Destinasi Wisata di Provinsi Sulawesi Utara.  Sumber : palingsukajalanjalan

    Taman Laut Tumbak terletak di Kabupaten Minahasa Utara, sejarak kurang lebih 3 jam perjalanan darat dari Kota Manado. Seperti hal nya Bunaken, pesona Taman Laut Tumbak terletak pada keindahan terumbu karang nya, yang menjadi hunian bermacam ikan hias dan binatang laut lain yang juga indah.

    Di Taman Tumbak, ada sekitar 20 spot diving dan snorkeling yang patut untuk dicoba,  diantaranya: Spot Pintu Samudera, spot Bohaga Mangrove, spot Bohaga Kecil, spot Taman Karang, spot Napo Kipas, dan spot MFT 1, serta MFT 2.


    LONG BAWAN, PROVINSI KALIMANTAN UTARA


        Long Bawan, Destinasi Wisata di Provinsi Kalimantan Utara.  Sumber : lihat

    Long Bawan adalah destinasi wisata di Provinsi kalimantan Utara yang bererbatasan langsung dengan wilayah Sabah, Malaysia.  Long Bawan  mempunyai keistimewaan berupa pesona budaya, sebab merupakan desa yang di tempati oleh suku Dayah Lundayeh.

    Banyak sekali upacara adat yang dilakukan di Long Bawan seperti Nyumpei Semarang Mei Ulang. Long Bawan terkenal sebagai penghasil garam alam dan  juga perternakan kerbau serta upacara adat dengan tarian-tarian uniknya.  Selain itu kondisi desa yang asri dan alami, menambah pesona tempat wisata Long Bawan.


    DESA BUDAYA PAMPANG, PROVINSI KALIMANTAN TIMUR


        Desa Budaya Pampang, Destinasi Wisata di Provinsi Kalimantan Timur.  Sumber : amabeltravel

    Desa Budaya Pampang merupakan  tempat wisata budaya populer di Samarinda, Kalimantan Timur.  Desa Budaya Pampang dihuni oleh suku Dayak Kenyah.

    Wisata Budaya Dayak Desa Pampang diminati oleh wisatawan yang tertarik melihat sekaligus mengenal dan mempelajari budaya Dayak.  Setiap akhir pekan, tempat wisata ini banyak dikunjungi oleh wisatawan luar kota maupun luar negeri.  Setiap hari Minggu, dari pukul 13:00 – 15:00 diadakan pertunjukan seni di lamin atau gedung pertemuan desa.

    Lamin Desa Pampang ini berupa rumah adat Dayak dengan ukiran khas suku Dayak.  Pada saat pertunjukan seni sedang berlangsung, seluruh warga desa akan mengenakan pakaian adatnya.


    BUKIT RIMPI PELAIHARI, PROVINSI KALIMANTAN SELATAN

        Bukit Rimpi Pelaihari, Destinasi Wisata di Provinsi Kalimantan Timur.  Sumber : amabeltravel


    Bukit Rimpi Pelaihari memiliki pesona alam yang sangat lengkap, rerumputan bukit yang masih hijau asri serta dipercantik sunrise yang mempesona.  Bukit Rimpi Pelaihari berada di Desa Tampang, Pelaihari, Kabupaten Tanah Laut, Kalimantan Selatan.

    Sepanjang mata memandang di Bukit Rimpi Pelaihari, rerumputan hijau menghampar.  Kontur alam perpaduan bukit dan lembah, serta deretan perbukitan di kejauhan, dipadu dengan putihnya awan berarak di langit, membuat panorama alam Bukit Rimpi Pelaihari semakin sempurna.


    TAMAN NASIONAL TANJUNG PUTIN, PROVINSI KALIMANTAN TENGAH

        Taman Nasional Tanjung Puting, Destinasi Wisata di Provinsi Kalimantan Tengah.  Sumber: amabeltravel


    Taman Nasional Tanjung Puting adalah salah satu cagar alam yang ditetapkan UNESCO sebagai cagar biosfir dan merupakan tempat rehabilitasi orang utang.  Di Taman Nasional Tanjung Puting pengunjung dapat menikmati alam dan melihat orang utan yang merupakan satwa endemik Indonesia, serta satwa liar lainnya.

    Taman Nasional Tanjung Puting merupakan taman nasional pertama di Indonesia dengan tujuan merehabilitasi orang utan. Taman ini adalah taman yang benar-benar menjaga populasi orang utan agar tidak punah.

      
    BUKIT PENJAMUR, PROVINSI KALIMANTAN BARAT

     Bukit Penjamur, Destinasi Wisata di Provinsi Kalimantan Barat.  Sumber: bobocantik


    Bukit Penjamur terletak di Kabupaten Bengkayang, tepatnya di Kelurahan Bumi Emas Jaku Malunu, Kalimantan Barat. Jarak Bukit Penjamur kurang lebih 6 km dari pusat kota Bengkayang. Letak lokasi ini memang sangat strategis dan sangat mudah diakses.

    Dari Bukit Penjamur ini kita dapat melihat indahnya lautan awan bak negeri dongeng, apalagi saat mentari pagi mulai menyembulkan sinarnya secara perlahan, barangkali apa yang kita lihat itu menjadi salah satu moment terbaik kita seumur hidup.



    DANAU SANO NGGOANG, PROVINSI NUSA TENGGARA TIMUR

        Danau Sano Nggoang, Destinasi Wisata di Provinsi Nusa Tenggara Timur.  Sumber: eloratour


    Danau Sano Nggoang yang memiliki luas sekitar 513 ha merupakan danau terbesar di Nusa Tenggara Timur.  Danau vulkanik yang terletak di sebelah tenggara kawasan Hutan Mbeliling dan blok Hutan Sesok, pada ketinggian 750 m dpl dan memiliki kedalaman sekira 600 m itu menjadi daya tarik karena memiliki kadar belerang yang cukup tinggi.  Bau belerang yang menyengat akan tercium saat berada di kawasan danau ini. 

    Kegiatan yang bisa kita lakukan di Danau Sano Nggoang adalah rekreasi dengan melakukan olahraga trekking, menungang kuda keliling danau, atau mandi air panas untuk kesehaadalah salah satu tujuan utama datang ke danau ini selain untuk refreshing, berkeliling danau dengan menunggangi kuda, bird watching, dan lain sebagainya.


    QUEEN WATERFALL, PROVINSI NUSA TENGGARA BARAT

        Queen Waterfall, Destinasi Wisata di Provinsi Nusa Tenggara Barat.  Sumber: eloratour


    Queen Waterfall merupakan salah satu destinasi wisata air terjun yang berlokasi di Pulau Moyo, Provinsi Nusa Tenggara Barat.  Satu lagi adalah Air Terjun Diwu Mbai.

    Air Terjun Queen Waterfall sebenarnya bernama lokal Air terjun Mata Jitu.  Dikenal dengan sebutan Queen Waterfall karena Lady Diana pernah berkunjung dan merasakan segarnya air terjun cantik di Pulau Moyo, Nusa Tenggara ini.  Air terjun dengan air yang jernih, membentuk panorama alam yang menawan.  Apalagi sekelilingnya tetumbuhan hijau masih terjaga keasriannya, menambah pesona air terjun Mata Jitu.   READ MORE



              Home computer repair - Home computer repair Tampa troubleshooting        
    The basic parts of a Home computer repair are monitor, motherboard, SMPS, processor, daughter board, network cards, RAM, CMOS battery, hard disk, buses (cables), keyboard, mouse, UPS and modem. So these components will face damage as they are electronic components.


     Long beep sound heard while starting custom pc repair tampa and OS is not loading. Your RAM is damaged. So buy a RAM either D RAM or SD RAM after checking the slot in your motherboard and install new RAM.


    Your Operating system OS may be damaged due to improper shutdown or due to missing of some files. Please re install your OS. Another problem can be your hard disk damage.


    Huge sound coming from CPU. Your cabinet cooling fan may be making that huge noise while working. Try to replace that bad cooling fan with a good one.


    Sometimes there will be problem in Home PC repair Tampa booting. So Home computer repair boot troubleshooting can be done by pressing delete button while restarting PC and providing appropriate settings in BIOS.


    If you are like most people who often use computer repairs Tampa at work or in your home, then you must also know how frustrating it can be when your Home computer repair crashes in the middle of an important task. Home computer repair errors such as crashes and file corruption are often a result of registry problems. To make sure your PC always performs efficiently, you have to invest in registry repair software.


    Do you use a free windows registry repair for your Laptop computer repair? There are a few guidelines that you need to keep in mind when purchasing software and these are:


    It is important to note however, that software that can find many errors aren’t necessarily the best kind. Some dubious repair programs list errors where there aren’t actually any so choose well.


    Unless you are a certified Home computer repair genius, it is best to choose user friendly software. Everyone needs free window registry repair programs.



     



    Some Home computer repairs actually come with a built-in registry repair program and while you may be tempted to fix the registry yourself, remember that you might inadvertently delete information that is critical to Home computer repair operations.


    About the author: Tampa pc pros inc takes pride in offering a wide range of computing solutions like: Pc Repair Tampa , Computer Repair Tampa , Custom Pc Repair Tampa , Computer Repair Service Tampa , Virus Removal Service Tampa.

    computer security help: data backup

    computer security help: data backup

    Article Source: www.articlesnatch.com


              How to Choose the Right Server Vendor        
    As discussed in my previous post, cloud computing can offer great benefits for title agencies. Still, choosing the right vendor can be overwhelming. A little research and preparation up front can help make the transition to the cloud smooth and manageable. How long has the company been around? Make sure you are well versed on …Read more
              Benefits of the Cloud        
    The title industry has changed considerably over the last three years. Budgets have been cut due to economic conditions. Most title agents are allowing their title and escrow officers to work remotely to enhance work-life balance. New regulations are on the horizon. Cloud computing makes a lot of sense in this new environment where flexibility …Read more
              What is Cloud Computing?        
    There’s a lot of talk about “The Cloud” these days. Your eyes may glaze over at terms like cloud computing, SaaS (software as a service), IaaS (infrastructure as a service) and STaaS (storage as a service). But they all mean roughly the same thing: not knowing where your company’s data is hosted. You’ve probably used …Read more
              Estuprado pelo Colega de Trabalho        

    Eram quase 7 da noite quando saí do trabalho, pronto para ir pra casa ver a minha mulher. Um dia quase normal. Quase, por que quando eu estava ligando o carro, chega o Jorge, todo folgado, e bate no meu vidro perguntando se eu ia passar pela Vila Mariana. Fiquei contrariado, afinal nunca tive muito assunto com o cara, mas concordei e ofereci a carona.
    Jorge deve ter uns 35 anos (11 a mais que eu), é divorciado e tem uma incorrigível pinta de folgado que sempre me irritou. No caminho, ambos puxamos uns poucos assuntos, e eu sempre sentindo aquele ar de garotão superior que me deixava puto. Tão puto que fiquei surpreso, ao deixá-lo em frente a seu prédio, quando me convidou pra subir.
    Não, Jorge, não precisa, estou com pressa - respondi. Entre. - ele insistiu - Sei que não é dia de visitinhas (era terça-feira), mas eu preciso de uma ajuda e queria aproveitar que você já está aqui. Fiquei mais puto ainda, mas fui. Eu sabia que tinha coisa aí. Na certa o computador dele estava com algum problema (ele era péssimo nisso, todo mundo sabia) e ele ia me encher o saco pra arrumar tudo.
    Foi só entrar na casa dele e veio a surpresa. Jorge trancou a porta e me puxou pelo braço. Que é isso, meu? Que é isso meu o cacete! - ele respondeu, enquanto me segurava pelos dois braços cara a cara com ele - Agora somos só nós dois, e eu vou te dar o que você está querendo há muito tempo. Não entendi nada, o cara ali me segurando, de frente pra ele, me falando aquilo. Eu não tinha o que fazer. 24 anos, 1,74m, 70kg, nada afim de brigar, e o cara com aquela pinta de molecão de praia, 35 anos, maior que eu, me segurando assim. Só fiquei quieto, olhando. Isso, viadinho. Fica quietinho que quem manda aqui sou eu - ele disse.
    Fiquei estático. Que papo era esse de viadinho? O cara vai me bater, vai me matar, sei lá. Jorge começou a tirar a minha camiseta, depois me empurrou pra longe, mandando: Vai. Tira a roupa, viadinho. Pra que isso, Jorge? O que você vai fazer? Me deixa ir embora. À esta altura, já estava implorando, mas a ordem dele era firme, e diante daquele olhar de macho raivoso não tive escolha. Quando olhei de novo pra ele, já peladinho, vi uma pica grande, grossa e dura pra fora, e só ouvi a voz: Chupa!
    Hesitei por quase uma eternidade, mas quando o ouvi repetir, com mais força - Chupa, viadinho! - tive que obedecer e, trêmulo, aproximei minha boca daquela vara. Nunca tinha feito aquilo. O cheiro da gala dele estava me dando nojo, mas não tinha jeito, então pus a boca e comecei a chupar.
    Chupa, putinha tesuda, chupa, era o que ouvia enquanto abocanhava aquele monstro e fazia o máximo possível para não mordê-lo, pois estava com medo e afim de que isso tudo terminasse o mais cedo possível. Não conseguia acreditar. Eu, o macho de casa ali, ajoelhado na frente de um folgadão, mais velho do que eu, chupando pica e ouvindo sacanagem. Era muita humilhação. Não sabia se chorava, se reagia, se fugia, se cedia. Só voltei à realidade quando, bombando forte e segurando a minha cabeça, Jorge gozou. Nessa hora, como que para me humilhar ainda mais, ele puxou a pica bem pra beirada do meu lábio e encheu a minha boca de porra. Vai, putinha gostosa, toma a porra de macho que que é disso que você gosta. - ele dizia, entre aqueles gemidos de macho gosando gostoso. O gozo, a porra, aquele gosto forte na boca, na hora, me deixaram chocado, mas algo em mim mudou. Fiquei estático, parecia até que eu tinha gostado, e quando ele tirou a pica, num reflexo, engoli toda aquela porra.
    Fiquei ali, olhando pro chão, de joelhos, pensando em tudo aquilo, enquanto ele foi tirando a própria roupa. Era um trintão, sem dúvida, mas tinha um corpo bem feito, masculino, sem excessos. Fiquei ali, olhando aquele peito, aquelas coxas grossas, aquele pau meia-bomba, quando ele abaixou, me puxou pelo braço e me virou de costas, já me encoxando.
    Vem cá, putinha - ele dizia. Não, Jorge, por favor. - eu suplicava - Não quero. Quer sim, putinha, você sabe que quer - dizia ele, bem no meu ouvido. Por favor... não - falando mais pra mim mesmo do que pra ele. Vai, putinha - mandou - enquanto me jogou no sofá, me deixando já de quatro. Agora você vai ver o que é bom.
    Meu medo triplicou, quando senti uma cuspida no cuzinho. Jorge colocou a camisinha rápido, na pica que já estava dura de novo, e foi colocando devagar. Eu gemia baixo - de dor - e isso parecia excitá-lo ainda mais. Só que aquela pica quente estava fazendo eu me sentir estranho. Muito estranho. Senti meu cu todo rasgado, quando ele terminou de meter, mas naquele tempinho em que ele ficou parado, dentro de mim, meu pau começou a subir, e eu fui ficando todo mole.
    Tá gostando, né viadinho? Não disse? Relaxa agora. Você já tá marcado. Depois de hoje, você não vai conseguir ficar sem pica, e vai lembrar pra sempre da minha pica, que inaugurou esse rabinho gostoso, e de mim, que te transformei no viadinho que você é agora. Na primeira mexida de Jorge, já não resisti, e soltei um aaaaaaaaaiiii tremendo de prazer, um prazer que nunca sentira antes. Aquele corpo, aquele homem, aquela pica, destruiram a minha masculinidade. Ele enfiava e tirava bem devagar, gemendo forte, e grave, um gemido de homem que me hipnotizava, como o gemido do gozo anterior, na minha boca.
    Eu gemia, também, mas estava mole, e meus gemidos saíam afetados, meio femininos, meio afeminados. Lembrava daquela vara na minha boca, do gosto de homem, do gosto de porra, e me excitava ainda mais. Agora estava ali, nu, de quatro, apoiado no sofá dando a bunda pra um cara. Dando a bunda! Não éramos amigos, não estávamos apaixonados, eu não era afetado, afeminado ou feminino de qualquer forma, mas aquele cara folgadão decidiu me comer e estava ali, me comendo, como comeria sem pudor qualquer das menininhas que pagavam pau pra ele. Agora eu entendia, finalmente, o que era um homem, que sabe o que quer, que toma o que quer, que faz o que quer. Ele queria minha boca, queria minha bunda, me queria viadinho pra ele, e me fez. Eu só sentia aquela vara deliciosa entrando, e saindo, e entraaando, e ouvia meus gemidinhos escaparem, e rebolava minha bunda, procurava aquela pica com minha bundinha, me deliciando com o barulho daquela foda que só um homem de verdade sabe dar. A pica ia, e vinha, e ia, e vinha de novo, rápido, e as mãos de Jorge me seguravam firme, pelos quadris, e eu apoiado, apoiada, sei lá, no sofá, delirando, gemendo, rebolando, sem gozar, mas num orgasmo que não tinha mais fim.
    Jorge metia, metia fundo, metia rápido. Quando largava meus quadris, me dava um tapa na bunda, estalado, que só me excitava mais ainda, ou então me puxava pelos cabelos (curtos), colava nossos corpos e me xingava, bem no meu ouvido, sem parar de me foder.
    Já nem sabia há quanto tempo estava ali, viado, nua, feminina, puta, sendo usada, abusada e estuprada por aquele macho lindo, tesudo e caralhudo, gemendo e me entregando, quando gozei. Foi um orgasmo forte, intenso. Nunca gozei tanto e com taaaanto prazer assim. Rebolava naquela vara feito uma louca. O cara era insaciável. Esfriei, parei de gemer, fiquei preocupado, com remorso, puto, mas ele continuava metendo, me dando tapas, me xingando, e meu frio pós-gozo não tinha espaço, perante à autoridade de macho do Jorge. Ele me puxou pelos cabelos, mais forte dessa fez, e me ordenou. Geme, sua puta! Obedeci e gemi. Eu era dele, não tinha jeito. Rebolei, gemi, e mesmo mole eu sentia que era aquilo que eu queria. Jorge acelerou os movimentos, gemeu mais forte, cravou aquela pica maaaravilhosa em mim e gozou, gozou feito um doido, e desabou sobre mim.
    Fiquei ali, de quatro, apoiado no sofá, com um puta macho atolado no meu cu, largado em cima de mim, cheio de remorso e de tesão. Aquilo era uma foda, que foda, a foda. Fui estuprado, dominado, transformado. Entrei naquele apartamento homem, e saí de lá um viadinho.

    ***

    Este conto é fictício, e é parte de uma fantasia minha, mas muitos dos trechos de foda são reais e parte de algumas fodas que eu já tive. Nunca tive uma foda dessas, sou casado e como a minha mulher sim. Tenho 24 anos, 1,70m, 70kg, moro em São Paulo e queria conhecer um cara que me comesse gostoso, como um viadinho gosta de ser comido. Se estiver interessado mande e-mail.

    Meu e-mail: oursecretbr@yahoo.com.br
              Delicias de um final de semana na praia        

    Olá! Meu nome é Simone e sempre me deliciei lendo contos eróticos. Esse é o primeiro conto que escrevo, uma experiência tão excitante que só de lembrar fico toda molhadinha. Mas antes de tudo deixa eu me apresentar não é? Tenho 37 anos, 1 metro e 75 de altura, seios médios e (ainda) durinhos, bundinha proporcional e empinadinha, cabelos lisos, semi longos e castanhos médio, um pouco queimados do sol e olhos cor negros e modéstia parte, lindos. Bem, tudo aconteceu nas férias de janeiro de 2006. Na época eu estava tendo um relacionamento sério com o meu grande amor até hoje, “S”, um gato, alto, moreno, queimado de sol e super inteligente com ótima formação escolar. A gente tava junto a mais de um ano, mas morando cada qual na sua própria casa e resolvemos tirar um fim de semana para acampar numa praia da periferia. Queríamos um fim de semana só nosso e com muuuito sexo! Tanto eu, como ele queríamos uma transa difrente, num clima diferente dos tradicionais em meu apê e motéis, sempre com muito amor e carinho e acima de tudo prazerosas. Eu estava super excitada e anciosa por este fim de semana, imaginando mil e uma loucuras diferentes que iríamos fazer naquela barraca e resolvi me preparar bem: depilei toda minha bucetinha, deixando ela bem lisinha e separei os meus biquínis mais inspiradores... Na sexta feira bem cedinho eu e meu amor seguimos então de carro rumo a praia, ao nosso recanto do fim de semana. Como já estava cheia de tesão e queria provocar meu gato, caprichei na roupa pra viagem: blusinha branca colada, saia jeans curtinha e um biquíni preto de bolinhas brancas de lacinho.. Foi tiro e queda. Quando me viu ele ficou todo animadinho: “Que delicia Sí. To doido pra chegar logo nessa praia e fazer um amor bem gostoso com você, o fim de semana inteiro”. E como não sou nada boba falei com cara de sapeca: “Porque esperar chegar lá?” e como ainda estávamos em meu apê, coloquei a mão dele na minha bucetinha já ensopada de tanto tesão. Ele ficou louco e sem perder tempo, começou a fuder minha bucetinha com dois dedos bem gostoso durante alguns minutos e parou. “Ôh Sí, não faz isso comigo não, minha delícia, assim eu ficou louco e não vou conseguir dirigir”. “Ta bom gato, por enquanto eu me viro sozinha, com um brinquedinho que depositarei nela até chegarmos lá... mas só se você me prometer que quando chegar na praia vai me fuder TODA, mesmo antes de armarmos a barraca”. “Prometo, minha delícia, vou te fazer gozar como uma putinha”. Nisso descemos, entramos no carro, abaixei um pouco o banco, apoiei a perna direita na lateral da porta e retirei minha calcinha e fiquei me tocando. Me masturbei a viagem toda, “S” foi a loucura, e sempre que dava me ajudava e enfiava os dedinhos com gosto e depois chupava sentindo o meu gosto. Gozei muito com aquela brincadeira na estrada. Chegamos na praia pegando fogo de desejo. Procuramos um lugar mais afastado e tranqüilo e antes de armarmos a barraca buscamos a sombra de uma árvore e estiquei uma canga enorme no chão. “S” tava tão louco que arrancou minha blusa ali mesmo na praia e começou a chupar meus peitinhos. Ele lambia e mordia gostoso, parecia uma criança faminta. Puxei ele e pedi pra se deitar, fiquei de quatro com a bundinha bem perto do rosto dele e fui tirando a saía devagarzinho enquanto rebolava. Ele me puxou com força pelo cabelo e falou sussurrando no meu ouvido. “Rebola essa buceta na minha cara, minha putinha, quero te chupar bem gostoso, te fazer gozar com minha língua, minha gostosa, vem cá, vem minha delícia”. Aquilo me deixou doida. Comecei a rebolar devagarzinho minha buceta no rosto dele e na primeira lambida que ele deu no meu grelhinho me arrepiei toda e gemi baixinho. ”S” me chupava deliciosamente, ora brincando com meu grelhinho, ora enfiando aquela língua quente e grossa no meu cuzinho apertadinho e na minha bucetinha que já pingava de tanto tesão. Eu gemia baixinho e me contorcia toda, enquanto ele dava uns tapinhas na minha bunda quando eu rebolava. Ai como gozei naquela boca, me arrepiava toda de tesão. Aquela chupada tava uma delícia mas também queria fuder o pau dele com minha boquinha. Sai devagarzinho de cima dele deixando-o com cara de cachorro pidão e todo melado do meu gozo “Ei ei.. vai pra onde minha putinha, volta aqui”. Ai peguei um dedo dele e comecei a lamber com cara de safada. “Calma gostoso. Deixa eu brincar um pouquinho também”. Ele logo sacou o que eu queria e foi abrindo a bermuda que tava quase estourando. O pau dele era e certamente continua sendo lindo. Tem 18 ou 19 cms, rzoavelmente grosso e com uma cabecinha rosada e perfeita, que dava água na boca so de olhar. Comecei a lamber aquela cabecinha com gosto, passava a língua devagar e batia a rola na minha boca. Ele gemia gostoso, puxava meu cabelo, e implorava pra eu não parar de chupar. Chupei aquela rola grossa toda que pulsava de tesão na minha boca. Fiquei um tempão chupando o pau dele com muito gosto, mas minha buceta pedia uma rola, precisava sentir o caralho dele bombando dentro de mim. Foi ai que me acocorei em cima dele e comecei a brincar com a cabecinha do pau dele na entrada da minha buceta encharcada. Ele se tremia de tesão e tentava socar o pau na minha buceta mas eu não deixava.. ficava so enfiando a cabecinha e tirando. Gemia gostoso e ele implorava pra eu fuder logo de uma vez. “Quer minha bucetinha quer, meu gato gostoso?”, “Quero essa bucetinha toda meu amor, me fode logo vai.. isso já é tortura, to estourando de tesão aqui”. Sentei de uma vez naquele pau gostoso.. fiquei um tempo rebolando devagarzinho com aquele pau todo dentro de mim e me levantei. “S” enlouqueceu na hora. Tentou me puxar de volta, mas ignorei. Arrumei meu biquíni e fui em direção a barraca. Ele veio atrás, meio artodoado ainda: “o que você ta fazendo minha gata? Volte aqui!”. “Quero tomar um banho de mar antes de armarmos a barraca. Ainda é cedo, vem comigo”. Ele ainda de pau na mão, levantou-se, deu um sorriso, levantou a sunga, segurou minha mão e a gente entrou no mar. A maré tava baixa e o mar tava calmo sem muitas ondas. Ele então me abraçou bem forte, apertando o meu corpo contra o dele e beijou meu pescoço e minha orelha me arrepiando toda. Daí comecei a sentir a mão dele tocando a minha perna e subindo até a minha bucetinha. Ele me tocou um pouco por cima do biquíni e depois foi desamarrou o lacinho. Fiquei louca com aquilo. Ele começou a me tocar e a brincar gostoso com meu grelinho, fazendo-me gemer baixinho no seu ouvido. Eu tava completamente entregue, sentindo um tesão que me queimava por dentro. Não tava agüentando mais, precisava sentir aquele pau me fudendo e falei baixinho no ouvido dele: “fode minha bucetinha, meu amor.. me fode todinha vai.. tou derrentendo de tanto tesão”. Ele carinhosamente me beijou deliciosamente, afastou sua sunga pro lado deixando o cacete livre, então eu abracei ele com as pernas e ele começou a meter devagarzinho.. Como aquilo era gostoso. Eu rebolava devagarzinho enquanto ele metia na minha bucetinha molhada e enfiava o dedo bem gostoso no meu cuzinho. Gozei como nunca. Me arrepiava toda a cada bombada que ele dava na minha bucetinha. “S” gemia gostoso no meu ouvido, puxava meu cabelo, lambia meu pescoço.. e gozou muito na minha bucetinha. Ficamos ali no mar, abraçados.. se tocando e sentindo o nosso tesão se misturando com a água do mar. E esse foi só o começo do nosso fim de semana, que foi recheado de aventuras e muito, mas muito sexo e prazer dentro da nossa barraca, minha boca, meinha buça e meu cuzinho que o diga.
    Sí – A. dos Reis - RJ
              Ninfeta estuprada pelo cão        

    Oi eu vou lhes contar algo que eu aconteceu comigo. Eu tinha uma vizinha muito sapeca seu nome era Andreza e tinha seus quase quinze anos. Ela era muito curiosa querendo saber de tudo principalmente sexo mas vivia muito presa por seus pais. Ela tinha um corpo muito bem feito, seios bem modelados, morena clara, cabelos cacheado, bonita mesmo, mas vamos ao que interesa, um belo dia eu estava sozinho em casa nao tinha nada para fazer e fui até os fundo do quintal pegar minha bicicleta para dar umas voltas e escuto ruidos estranhos e resolvo olhar no buraco que tinha no muro e vejo a cena mais exitante da minha vida minha vizinha estava sentada no chao de pernas abertas com o seu cao lambendo sua xaninha aquilo me enloqueceu mais eu fiquei firme observando sem fazer barulho , seus pais estavam no trabalho e ela nao havia ido para a escola era de manha ao seu lado tinha revistas provalvelmente de sacangem ela sempre comentava com minha irmã que as tinham, aproveitando que estava só resolveu solta a franga e que franguinha por que apesar da sua pouca idade e corpo bem torneado ainda era uma nifetinha com cara de menininha e quando tirou seu short e a calcinha ficando só com a blusa deu para ver que sua xaninha tinha poucos pelos. Ela era praticamete virgem ou virgem não sabia dizer na época, pois ao abrir as pernas sua xana nao arreganhou como das mulheres que tiveram muitas relações. Ela entao fazia carinho no pluto, esse era o nome do cachorro, um viralata mestiço de grande porte. Ela estava completamente alucinada nao se inportando com nada ao seu redor e em um momento de loucura ficou de quatro e chamou o pluto "vem pluto disse ela" ele entao lambeu mais um pouco sua bucetinha deliciosa. Eu estava louco de tesao só olhando quando o cão pulou em cima dela e começou a estocar o pau na sua bunda, mas como ele era mais alto e nao dava pé, ela entao sem pesar direito nas consequencias subiu de quetro num sofa que tinha ali por perto empinou bem a bunda e o chamou o pluto dinovo. Desta vez o cao subiu nela e acertou em cheio seu cuzinho. Na segunda estocada ele acertou em cheio sua racha toda melada e entro bem a metade do cacete porque ela deu um baita grito e tentou sair, mais ela estava acuada entre o sofa e o cao que era muito pesado. Ele foçava cada vez mais e ela gemia baixinho de dor e desespero, pois nao sabia o que fazer e ficou recebendo aquele pau enorme arrombando sua buceta que soube logo depois que ainda era virgem. O cão continuava metendo nela segurando-a pela cintura até que soutou um urro forte e parou. Tinha gozado e ficou agarrado nela. que chorava e gemia. Depois de algum tempo ele desceu e a porra dele começou a escorrer da bucetinha dela, misturado com sangue. Ela atonita e paralizada continou continuou de quatro no sofa chorando baixinho e sem saber o que fazer. Eu completamente esgotado de pois bati umas duas punhetas vendo aquela cena, resolvi me mostrar a ela, subi na cerca e disse que vi tudo. Ela começou a chorar e eu a tranqüilizei. Pulei pro lado da cerca dela e disse que se deixasse eu meter naquela racha não contaria nada a ninguém. Sem saída ela disse que tudo bem, mas me fez prometer guardar segredo. Eu disse que prometia, mas antes de meter nela, pedi quwe fosse até o banheiro e lavasse bem a buceta, pois estava com muita porra do cachorro e sangue do cabacinho dela que se foi. Ela convidou-me a entrar na casa e foi direta para o banheiro, onde tomou um demorado banho e voltou ao meu encontro enrolada apenas numa toalha. Eu estava sentado na poltrona ainda de cacete duro e quando ela tirou a toalha eu pude ver o mais belo corpo até então visto, agora de outros ângulos. Meu pau saltou pra fora da cueca e ela vendo meu estado, perguntou se antes podia me chupar, pois nunca havia chupado uma rola. Disse que sim, me livrei de uma vez do short e ela ajoelhou-se entre minhas pernas e meteu meu pau na boca, no inicio meio desajeitada, mas depois tomou gosto e chupou meu cacete com muita maestria, parecendo até as putinhas experientes que vez ou outra eu pagava pra me chupar e fuder. Depois de um tempo comecei a ter vontade gozar e pedi que ela ficasse de quatro tal como ficou com o pluto, ela então se ajeitou na poltrona e eu meti minha vara nela bem devagar como ela pedira, afinal tinha acabado de ser descabaçada, pelo cão e eu apenas estava concluindo o serviço. Logo a bucetinha dela ficou molhadinha e eu pude fode-la com vontade, aquela buceta apertadinha. Não tardei muito e sem me preocupar com risco de gravides, acabei inundando aquela racha com minha porra tal como o cão fez. Depois tirei-o e a fiz chupar até a última gota o que ela fez meio que com nojo mas fez. Daí nos vestimos e fomos lá pra poltrona do quintal, onde conversamos sobre tudo que aconteceu e eu mais uma vez prometi a ela que ficaria na minha, mas gostaria de poder vez ou outra quando ela tivesse sozinha, transar com ela. Sem saída ela disse que sim, que poderíamos continuar transando mas em segredo. Assim ficamos por alguns meses até que nos vimos apaixonados e hoje moramos juntos. Ah eu ia esquecendo o cuzinho dela também foi descabaçado, mas por mim na nossa terceira transa. Hoje ela adora levar cacete em todos os buracos, comigo enfiando meu dedo no cuzinho dela enquanto meto na buceta e vez ou outra o pluto faz a festa nela comigo só observando, mas ela já não senti mais a dor que sentia e até gosta de ser enrabada por ele enquanto me chupa.
    Gilherme – Porto Real - RJ
              Uma internauta especial numa bela siririca        

    Eu tenho 55 anos, sou casado, mas gosto muito de teclar com as mulheres tanto das salas de bate papo como daquelas que costumam frequentar esse site de contos e que deixam o msn ou adicionam o meu msn.
    Ontem algumas adicionaram meu msn, tanto escritoras como leitoras e em especial Aninha, uma morena, 21 anos, e que gosta muito de ler os contos e se excitar. Aninha é de São Paulo e vive com a mãe e um irmão.
    Ela me contou que perdeu a virgindade com 17 anos e que não foi uma experiência muito legal e que gostaria de ser bem safadinha mas nunca teve a oportunidade de conhecer alguem que pudesse lhe ensinar tudo inclusive que não costuma se masturbar pois nao acha legal ficar se tocando.
    Conversamos durante várias horas, falamos sobre tantas coisas inclusive sexo e ela me falava que estava super excitada como nunca tinha fica ainda e que conforme eu ia falando ela ficava cada vez com a bucetinha mais molhadinha e toda arrepiada.
    Mostrei pela camera algumas vezes meu pau e ela adorava mas o ambiente estava meio escuro e ela não conseguia ver nitidamente e então falei que ia fazer ela gozar e ela disse que ia adorar.
    Pedia que ela mostrasse os seios na camera mas ela ficou meio timida no inicio e não quis mostrar mas com o tempo ela foi se soltando e pela primeira vez ela fez. Abaixou a blusa que ela usava.. me mostrou o seio com sutiã, pedi para ela mostrar o biquinho.. daí ela foi em frente.. mostrou.. apertou.. mexia com o biquinho do seio e fechava os olhos de tesão..
    Daí ela levou a mão na bucetinha.. e colocou o dedo na frente da camera para eu ver como estava a buceta dela.. nossa.. os dedos dela parecida que tinha cola... rsrsrs... de tanta baba que tava saindo da sua buceta.
    Continuamos a conversar e como ela ainda estava com um pouco de receio, falei para ela tocar a bucetinha dela por sobre a roupa mesmo.. ela disse que ia fazer.. mas ela enfiou a mao por dentro da calça e começou a se tocar e eu comecei a escrever coisas para ela mais ou menos assim:
    Vai aninha, vem ser minha putinha vem... vou chupar sua buceta.. enfiar milha lingua na sua buceta, lamber ela todinha, enfiar minha lingua no seu cu virgem.
    Vai aninha.. putinha safada.. goza pra mim vai....
    Delicia vc.. essa carinha.. que safadinha...
    Isssooo... gostoso.. sente meu cacete entrando e saindo da sua buceta...
    Vem ser minha putinha vem..
    Vou te fuder todinha...
    Assimmm.. isssso.. e por aí a fora.
    Ela cada vez mais mordia os lábios, fechava os olhinhos, ia mexendo na sua bucetinha e me falava que estava delicioso.
    Continuei a teclar e cada vez mais incentivando a Aninha a gozar gostoso pois ela me falou que nunca tinha tido um orgasmo e que nunca tinha sentido a buceta dela tão molhadinha e piscando como estava.
    Perguntou se podia enfiar o dedo nela e eu falei que podia enfiar não um mais dois ou tres quantos ela achasse gostoso e necessário.
    Aninha foi acelerando a sua siririca e eu via a carinha dela pela camera cada vez mais ofegante, os olhos se fechavam as vezes porque ela queria ler o que eu escrevia, passava a lingua nos lábios, mordia os lábios até que de repente ela fica quietinha, e goza... goza.. goza... segundo ela como nunca tinha gozado na vida, que adorou a maneira que eu conduzi ela e que ela ia querer sempre que estivesse se sentindo carente.. teclar comigo.
    Mulheres e meninas de todas idades que quiserem.. deixem o email ou msn.
    Franco – São Paulo - SP
              A primeira vez que mamei num caralho        

    Meu nome é Leticia, tenho 16 anos, sou morena , baixinha (1.55 cm de altura), olhos verdes, cabelos compridos e um corpo estilo violão, bem tesudinho. Eu moro no interior de SP, numa fazenda com meus pais. Desde pequena eu sempre fui muito inocente e não maldava as coisas que aconteciam ao meu redor, mas o tempo foi passando e eu comecei a perceber certos fatos... Eu sempre adorei beber um leitinho quente colhido da vaca, certa vez um peão da fazenda me disse que as vaquinhas estavam doentes e que não poderia recolher leite para mim, eu finjir chorar dizendo que queria o meu leitinho, daí o peão chamado Pedro, por sinal um gato, em tom de brincadeira já que somos amigos e eu dava esta liberdade a ele, perguntou se eu conhecia \" leite de tora\" e que se eu quisesse ele me dava leitinho e eu não tanto, mas fingindo inocencia, disse que não sabia o que era \"tora\" e que até então só tomara leite da minha vaquinha. Passei o dia pensando na insinuação do peão, e naquela noite eu dormi decidida a experimentar o tal leite. De manhã como sempre fazia, fui direto para o celeiro e falei com o Pedro que já não aguentava mais ficar sem meu leitinho quentinho e que queria experimentar o tal leite de tora. O Pedro me olhou e perguntou se eu tinha certeza disso. Disse-lhe que sim, que ia adorar provar. Ele então disse que meus pais iriam na capital buscar visitar a minha avó e que assim que eles fossem, eu o procurasse no celeiro que ele me daria o leite de tora e sorriu. Lá pelas 10:30 da manhã meus pais partiram para visitar a minha avó que estava internada, eles queriam me levar, mas eu disse que estava com uma dorzinha de cabeça enjoada e não queria pegar estrada, pois preferia ficar na fazenda, mas no fundo eu tava doida para experimentar o tal leitinho misterioso, que eu imaginava de onde ia sair, afinal eu era virgem e inexperiente, mas não tão inocente como Pedro achava que eu era, afinal já estava concluindo o segundo grau. Assim que meus pais seguiram viajem, fui no meu quarto e troquei de roupa, colocando uma sainha jeans e uma camisetinha sem soutien. Daí fui ao celeiro onde chamei o Pedro que apareceu de prontidão, me chamou para os fundos do celeiro e disse que já voltava. Eu me sentei na palha e fiquei esperando um tempinho imaginando o que ele estava preparando. Quando ele retornou, notei que estava com as calças abertas e falei para ele, que disse saber, pois tinha de estar assim para poder me dar o leitinho. Neste instante não tive mais dúvida de onde eu beberia o leitinho e deixei rolar. Ele então aproximou-se de onde eu estava e quando estava de pé na minha frente onde eu estava sentada, aproximou-se do meu rosto e colocou para fora das calças um enorme e duro cacete que pulsava de tanto tesão. Senti minha xota enxarcar na hora e fingi tentar me esquivar , mas ele segurou no meu braço e disse que eu já era muito grandinha para beber leitinho de vaca e que já era hora de experimentar leitinho de tora e por isso iria me ensinar me a mamar na tora dele. Então aproximou seu rosto do meu e começou a me beijar de mansinho. Eu que já estava excitada, comecei a sentir um arrepio subindo pelas pernas e sentia minha xana molhar cada vez mais. Ele passou a me beijar com vontade e eu cheia de tesão, correspondia, pois embora eu ainda fosse virgem, conversava muito sobre sexo com minhas amigas da escola, sem falar na quedinha que eu sentia pelo Pedro, um gatinho de 20 anos, filho de um casal que a anos trabalham na fazenda. Mesmo inexperiente, aos poucos fui me soltando, ele então tirou minha blusa e começou a acariciar meus peitinhos pequenos e durinhos de tesão, eu comecei a gemer baixinho igual uma gata no cio, ele parou de me beijar e começou a mamar meus peitinhos me chamando de vaquinha safada e tesuda. Eu já estava com as pernas moles e ele colou o corpo no meu, foi quando eu senti aquele caralho duro roçando nas minhas coxas, nisso a minha xoxotinha já estava ensopada de tesão e eu pude sentir molhar a minha calcinha. Percebendo a minha excitação, o Pedro me disse. – Você ainda quer beber leitinho? Como sabia a qual leitinho ele se referia, eu disse que adoraria experimentar. Ele então disse, vem, mama aqui na minha tora, vou te dar leite quentinho. Então me fez ajoelhar e botou aquele caralho imenso na minha boca ( fiquei sabendo depois, 23x6) e me falou para mamar. Mesmo inexperiente e sem jeito, afinal nunca tinha visto ao vivo e muito menos pego num cacete de verdade, segurei aquela tora e coloquei na boca, começando a chupá-la pela cabeçona vermelha que já estava toda melada, chupava devagar, meio que com medo de machucá-lo, mas como sou espertinha fui pegando o jeito e mamava sem parar, engolindo a cabeça daquele caralhão igual uma bola de sorvete. Quanto mais eu mamava, mais alto o Pedro gemia e com mais tesão eu ficava. Eu já estava ficando experiente e agora já mamava sem medo, engolindo aquela tora maravilhosa e lambendo tudo, cabeça, saco, pau, tudo, até que o Pedro disse para eu me preparar que ele iria gozar e me daria o leitinho que eu tanto queria. Ouvindo aquilo, mamei com mais vontade ainda, de repente senti o Pedro começar a tremer e meter todo aquele caralho maravilhoso na minha boca e gozar de forma fenomenal, eu mamei tudinho, cada gotinha daquele leitinho quente e gostoso que ele me dava. Quando ele acabou de gozar, eu já estava empanturrada de tanta porra que mamei. Daí ele me deu um beijo na boca e perguntou se eu havia gostado do leitinho de tora, e eu mais que satisfeita disse que sim, embora fosse um pouquinho amargo, então ele virou pra mim e disse que se eu permitisse, agora era ele quem queria mamar meu leitinho. Sabendo a pretensão dele, disse que sim e nisso ele já foi me deitando na palha, retirando minha calcinha e após arreganhar minhas pernas, caiu de boca na minha xoxotinha toda melada, chupando o meu grelinho, passando a lingua em volta e metendo um dedo na entradinha da minha grutinha, nessa hora eu já estava gemendo alto como uma verdadeira putinha safada e apenas pedi para que tomasse cuidado e não focasse a entrada, pois eu eravirgem e queria continuar assim. Ele mesmo respeitando meu pedido, enterrou a lingua na minha xoxota e sugava os lábios dela e meu grelinho, fazendo o meu tesão aumentar cada vez mais até que não agüentei mais e tive o meu primeiro orgasmo. Foi uma delícia a sensação, quando eu gozei foi demais e o Pedro mamou todo o meu melzinho...depois de algum tempo nos vestimos, mas antes de eu ir para casa, o fiz prometer que me daria "leitinho de tora" novamente, sempre que eu quisesse. Ele disse que era só chamá-lo. Foi assim que eu comecei a gostar de mamar num caralho e desse dia em diante continuo tomando leite de vaca, mas adoro mesmo beber é o leitinho de tora, que é mais saudável, hoje não só o do Pedro, pois já experimentei o de alguns amiguinhos da escola. Ah querem saber se ainda sou virgem, sou sim na minha xota pois o selinho do meu cuzinho, o Pedro já mandou pro espaço. Depois eu conto como foi. Esse é o primeiro relato que eu mando, espero que vocês tenham gostado. Quem quiser uma deliciosa mamada ou trocar experiencias deixe comentário com o email ou telefone.
    Beijinhos para todos
    Letícia – São Paulo - SP
              Sobremesa deliciosa no rabo de uma amiga        


    Acho que esse relato ficou extenso demais, mas a transa foi boa! Depois de uma noite de farra junto a um casal de amigos, ao chegarmos em nossa casa, eu e minha esposa fomos para a sala. Minha esposa, Leila, sentou-se ao meu lado no sofá e acreditando que minha prima que passava uns dias conosco, estivesse dormindo, começou a acariciar meu pau sorrindo maliciosamente para mim. Ainda me masturbando, lambeu meu rosto. Depois, perto do meu ouvido, disse:
    - Amor estou cheia de tesão ainda. O macarrão de ainda pouco no motel estava delicioso, mas estou ansiosa esperando pela sobremesa, você vai me dar?. Antes que ela pudesse falar mais alguma coisa, puxei-a e dei-lhe um forte beijo e comecei a acariciá-la nos seios, coxas e buceta. O clima esquentava cada vez mais e nem percebemos a presença de outra pessoa na sala, que nos observava. De repente ouvimos um pigarrear. Era Sabrina, com uma lata de chantilly (aquelas spray para confeitar bolo), um pires e uma colher, além, é óbvio, do seu belíssimo corpo, envolto com uma camisolinha transperante que deixava seus lindos seios e uma minúscula calcinha a mostra. Eu já ia tirando a mão da xota da minha esposa, quando ela perguntou porque eu iria parar se nós estávamos tão excitados e antes que eu pudesse responder qualquer coisa, ela disse que adoraria participar e já se aproximou de nós. Então sentou-se no colo de minha esposa e a beijou na boca. Depois sorriu para mim e me beijou na boca também. Eu e minha esposa estávamos sentados lado-a-lado e ficamos boquiabertos com a atitude da menina mulher no auge dos seus dezessete aninhos, que estava passando as férias conosco. Sabrina estava sentada no colo da Leila e com as pernas sobre o meu colo. Ela com grande desenvoltura, dobrou uma perna e espalhou chantilly sobre seus dedinhos, depois passou o pé em meu rosto. Entendendo o que ela queria, eu segurei seu pezinho delicado e comecei a chupar seus dedinhos, que estavam bezuntados pelo creme. Eu chupava cada um de seus dedinhos, passava a língua entre eles, lambia a sola delicada de seus pés, colocava mais chantilly e voltava a lamber. Enquanto eu brincava com seu pezinho, Sabrina chupava os seios da Leila, dizendo que estava com fome e precisava mamar. Minha mulher se divertia com isso e esfregava o peito no rostinho de nossa putinha. Sua mão masturbava a xaninha ninfeta de Sabrina por cima da calcinha que já dava sinais que iria gozar...o que não demorou para acontecer, encharcando a minúscula calcinha. Ficamos nessa brincadeira por um tempinho, até que Sabrina se levantou, livrou-se das roupas, ficando nuazinha em pelo com aquele corpinho maravilhoso a mostra, dizendo para mim e minha esposa fazermos o mesmo. Vendo-nos despidos também, ela me perguntou:
    - Gostou do meu pezinho com chantilly? Então vamos fazer direitinho! Deite-se no chão!
    A vadiazinha ainda se achava no direito de mandar....mas sem pestanejar, obedeci. Minha esposa apenas observava. Ela encheu o pires de chantilly e disse para a Leila se sentar ao seu lado no sofá. As duas pisaram no pires deixando os pés completamente labuzados e começaram a esfregá-los no meu rosto e no meu peito. Ora espalhavam o creme em meu corpo com os pés, ora pisavam no meu rosto me fazendo comer a cobertura, e assim fomos brincando.
    Meu pau pulsava de tão duro e tesão e quando eu levei minha mão para ele, na tentativa de começar uma deliciosa punheta, Sabrina percebeu e me impediu. Então falou para a Leila deitar-se sobre mim, lambendo meu rosto e descendo pelo meu pescoço, peito, barriga, até chegar no meu pau, onde começou a chupá-lo já estava duro e vermelho de tesão! Sabrina continua brincando com o chantilly em seus pés, passando no meu rosto. Nisso, Leila enche sua boca de creme volta a chupar meu pau, ele fica todo lambuzado com a \"sobremesa\" e ela passa a cuspir sobre a cabeça dele, fazendo com que aquela mistura de saliva e chantilly escorra pelo meu pau, pelo meu saco e se espalhe pelo piso da sala.
    Sabrina diz que quer incrementar a brincadeira, então ela, de pé, apoia as mãos no sofá, deixando assim seu rabinho exposto para nós. Ela enfia o bico da lata no seu cuzinho e aperta, depois olha para mim e, com cara de tarada, diz: \"não quer experimentar o docinho? Vem chupar meu cu!\"
    Na hora me levanto e começo a chupar aquele anelzinho rosado e sem pelos, passo a língua em volta, e como todo o chantilly. Ela põe mais, eu abro sua bundinha e enfio minha lígua naquele rabinho gostoso!
    Enquanto isso, minha esposa se masturbava e chupava meu pau. Depois de alguns minutos, não aguentei mais e disse que já iria gozar!
    A Sabrina se levantou e mandou que eu gozasse no pires, que estava cheio de chantilly. Eu nunca a vi tão faminta assim por porra! E assim eu fiz.
    Ela embora novinha, sabia o que estava fazendo, o que pretendia, então lambeu um pouco, como se fosse uma cadelinha e o restante ofereceu para a Leila, que com cara de safada, enfiou o rosto no pires espalhando toda a \"cobertura\" e ficando com a cara toda lambuzada. Eu já estava cansado, quando a Sabrina enfiou toda a ponta do tubo no rabinho e apertou o gatilho e se encheu de creme. Depois, quando já estava visivelmente cheinha, pôs-se de cócoras sobre meu rosto e começou a soltar seu estoque anal.
    Ela olhou para baixo, sorrindo maliciosamente para mim e falou: \"vai gatão, come meu cocozinho doce! é a sua sobremesa!\"
    Comi tudinho e depois limpei seu cu com a língua. Ah! Que tesão...Depois disso, coloquei minha esposa de quatro e passei fode-la na frente de Sabrina, que se masturbava enquanto nos observava. Passado algum tempo, posicionei-me noutra posição e as duas passaram a revesar a chupada no meu cacete que estava prestes a explodir num gozo só. As duas chuparam alternadamente até que não resisti e gozei na boca de ambas. Como estávamos cansados, naquela noite foi só e resolvemos ir dormir. Nem preciso contar que dormimos todos no mesmo quarto e quando despertamos na manha seguinte (um domingo), aconteceu de tudo, foi um tal de mete aqui, mete ali, goza aqui, goza ali, enfim, passamos o dia todo transando de todas as formas possíveis e gozando inúmera vezes, mas isto conto outra hora.
    Sandro – Rio de Janeiro - RJ
              Dando feito putas na Boite        

    No último conto, contei como comecei a me transformar numa putinha, graças a minha amiga Paula. Bom o que passo a contar agora, é mais uma aventura que vivi por causa da minha amiga. Comentei com a Paula que tinha ouvido uns amigos nossos da escola comentarem que foram numa boite erótica, onde as meninas dançavam nuas ou semi nuas. Para minha surpesa a Paula disse que também conhecia uma boite assim, onde as meninas depois de certa hora faziam de tudo lá mesmo com os clientes. Perguntei como ela sabia disso e ela me respondeu que já tinha ido lá algumas vezes. Já tinha me esquecido como a Paula era vadia. Mas aquilo me excitou e disse a ela que tinhas vontade de um dia ir também. Ela me deu umas dicas, do tipo, só fazer algo lá dentro mesmo, para não sair dali com clientes pois a casa não se responsabiizava. Marcamos uma quinta feira, onde eu disse que dormiria na casa dela e ela na minha, assim nossos pais não nos chateariam. Com ajuda da Paula, escolhi uma mini saia preta com mini blusa sem sutiã e por baixo uma calcinha branca fio dental. A Paula foi de vestidinho vermelho, bem sexy, sem soutien e com uma calcinha fio dental vermelha.
    Eu tremia quando entramos. Muitas garotas já desfilavam de lingerie e eram alisadas pelos homens. Passamos por um corredor cheio de garotos bonitos e fui muito alisada, a Paula mais safada ria e passava a mão nos paus deles. O lugar tava bem cheio e perdi a Paula de vista. Fui para um canto e fiquei meio sem saber o que fazer. No meu lado estava um cara sentado, com a cabeça virada para trás com cara de muito prazer. Olhei para baixo da mesa e entendi, havia uma garota so de calcinha chupando o cara. Assim quieta num canto percebi o clima do lugar, pois várias garotas chupavam os caras e poucas como eu, ainda estavam de roupa, algumas sentavam-se no colo deles e eram penetradas. Fui me excitando cada vez mais. Logo após vejo a Paula só de calcinha vinda na minha direção com um cara atrás segurando seus seios e outro do lado alisando sua xota. Ela vira e diz: Aninha me ajuda aqui que o terceiro ta vindo., Eis que surge outro tambem alisando ela. A Paula tira minha mini blusa e minha saia me deixando de só de calcinha também. Eu estava super excitada e sentia minha xana molhadinha. Um deles me vendo semi nua, veio para cima de mim e já caiu de boca nos meus seios fazendo-me sentar no banco, deixando-me com minha boca na altura da cintura dele, que de imediato abaixou o zíper da calça colocando um monumental cacete para fora , oferecendo-me parachupá-lo. Como eu não reagi, ele disse que já havia combinado o preço e acertado com a minha amiga (lembre-se que não estávamos ali pelo dinheiro, até por que somos patricinhas e não precisamos, mas tinhamos que disfarçar). Sem perder mais tempo e com o tesão que eu estava, cai de boca naquele cacetão e chupei ele todo. Olhei para olado e vi que a Paula ja tinha sua calcinha puxada para o lado e cavalgava um dos caras, enquanto chupava o outro. Vendo a cena meu tesão aumentou ainda mais e comecei a chupar o que estava comigo com mais tesão ainda. Percebendo o meu estado, o cara que eu tava chupando resolveu sentar e pediu para eu cavalga-lo também, o que fiz logo que ele colocou uma camisinha. Nisso um outro garoto com cara de bem novo veio pro meu lado e me ofereceu o cacete para mim chup-alo, o que fiz, mas ele devia ser bem inexperiente, pois logo gozou, enchendo minha boca de gozo. O que me penetrava vendo a cena, também gozou. Assim como os dois que estavam com a Paula gozaram também. Terminada a foda, eu e Paula fomos até o banheiro, onde haviam outras mulheres se limpando e comentando sobre a transa que acabaram e de ter. Nos limpamos, retocamos a maquiagem e somente de calcinha, retornamos para o salão, onde conhecemos novos caras e transamos mais algumas vezes. Lá pelas tantas da madruga eu e Paula, após muitos gozos resolvemos ir embora. Eu ainda preservava a minha calcinha, mas a Paula perdeu a dela. Fomos até o banheiro, nos limpamos, vestimos nossas roupas e saímos em direção a um hotelzinho que tinha nas proximidades, já que não podíamos voltar para a nossa casa, senão nossa mentirinha seria descoberta. Já no hotel, ao contarmos o dinheiro que ganhamos, até nos surpreendemos pelo alto valor e passamos a entender o porque que muitas amigas nossas, tornaram-se garotas de programas, pois em três horas que ficamos na boate, eu e Paula arrecadamos mais de quinhentos reais, mas como disse, não precisávamos e nem precisamos vender nossos corpos, pois fomos ali por uma nova experiência e nos satisfazermos. Eu disse a Paula que aquela tinha sido minha maior loucura, mas que deixou-me bastante satisfeita, embora eu não tenha conseguido gozar. Paula disse que estava cheia de tesão também, pois também não gozara e caso eu topasse poderíamos experimentar algo novo e nos aliviar mutuamente. Entendi a insinuação e disse que por mim tudo bem e passei para a cama dela, onde passamos a nos tocar e nos chupar até que ela me fez gozar e eu a ela. Satisfeitas e saciadas nesta nossa primeira experiência bi, relaxamos e dormimos abraçadinhas, despertando por volta das oito da manha. Então levantamos e fomos juntinhas tomar um banho, onde nos tocamos, nos beijamos e gozamos novamente. Surgia ali uma dupla implacável e insaciável na matéria sexo e daí pra frente tivemos muitras experiências novas, com outras mulheres, casais, travestis e homens, muitos homens, mas sempre fechando as relações, comigo e ela transando para o deleite de nossos fikantes.
    Ana Carolina – Itaguaí - RJ
              GOZOU ENQUANTO EU FINGIA DORMIR        

    Num certo final de semana, eu e meu marido, junto a alguns cais de amigos, fomos para o nosso sítio tomar um banho de cachoeira, queimar uma carne e saborear algumas cervejinhas bem geladas. Neste dia, para a minha surpresa, além dos casais que convidamos, meu marido convidou um amigo dele de trabalho, chamado Henrique, para ir também. Logo que chegamos no sítio, como estava um dia ensolarado e muito quente, enquanto os homens aprontavam a churrasqueira e colocavam as cervejas na geladeira, eu e minhas amigas nos livramos das roupas, ficando só de biquínis e fomos direto para a cachoeira que cortava o nosso sítio. Já banhávamo-nos algum tempo, quando os homens chegaram trazendo-nos algumas cervejas. Tive uma grata surpresa ao ver o Henrique só de sunga, pois além dele ser um gato, bem mais novo que o meu marido, era portador de um belo volume entre as pernas. Fiquei cheia de tesão na hora e passei a imaginar aquele cacetão que ali se escondia, adentrar meus buraquinhos. Em certos momentos minhas amigas falavam comigo e eu estava fora de órbita, mas não deixei-as perceberem o porque da minha distração. Virava e mexia, olhava para aquele gato e depois de um certo tempo, percebi que ele também não tirava o olho de mim, pois também eu me insinuara o tempo todo para ele, provocando-o. Ficamos ali na água por quase duas horas, até que a fome começou a bater e resolvemos ir para a casa, onde acendemos a churrasqueira para começarmos a fazer o churrasco. Enquanto assava a carne, minhas amigas e eu fomos pra cozinha preparar o restante dos complementos, tipo arroz, farofa, maionese, etc. Henrique de vez enquanto vinha na cozinha buscar mais cerveja para a turma e eu vendo-o ali, meu tesão aumentava ainda mais, então resolvi dar o tiro de misericórdia nele, deixando-o doidinho por mim. Observando que onde ele estava sentado, via o banheiro do meu quarto, deixei minhas amigas na cozinha com a desculpa que estava muito calor e que ia jogar uma água no corpo e fui pro quarto, entrando no banheiro e deixando a porta propositalmente aberta para que ele me visse. Retirei meu biquíni, entrei embaixo do chuveiro e comecei a me ensaboar e tocar minha xana, masturbando-a lentamente. Meu plano havia dado certo, olhei na direção dele e lá estava ele olhando-me fixamente. Como achei que fosse acontecer. Provoquei-o por alguns minutos e depois ainda saí peladinha mostrando-me por completa para ele. Encostei então a porta do quarto, coloquei um minúsculo shortinho e uma blusinha sem meu soutien e voltei para encontrar a turma. Henrique não tirava o olho de mim. Depois que comemos, colocamos uns forrozinhos para rolar e começamos todos a dançar. Era a oportunidade que eu queria para ralar minhas coxas naquele gato e sentir o volume do seu cacete, mas lógico que isso depois de eu dançar com o meu marido e com os maridos das minhas amigas. Finalmente chegou a vez dele que já havia dançado com duas das minhas amigas. Mal começamos a dançar, senti seu cacete pulsar,encostado nas minhas pernas. Maliciosamente, disse-lhe baixinho, desvie o pensamento senão vai acabar a música e você vai ficar em má situação com este cacetão duro. Ele nada falou e continuou a dançar. Aos poucos percebi seu mastro se aquietando. Terminada a música, fui dançar novamente com o meu marido e ele com uma das minhas amigas. Foi um domingo maravilhoso aquele, mas ficamos só naquilo. Já era noite quando voltamos para as nossas casas. Confesso que não me esqueci daquele gato um dia sequer e para minha surpresa, na quarta feira seguinte, Alfredo, meu marido chegou em casa e foi na cozinha onde eu me encontrava preparando o jantar, dizer-me que tínhamos visita para o jantar, pois iriam assistir o jogo do Fluminense que iria passar na tevê. Terminei de colocar o arroz no fogo e quando fui na sala ver quem era a tal visita, era ele, o gato dos meus sonhos, o Henrique, em carne e osso ali na minha frente. Ele educadamente levantou-se, veio até mim e cumprimento-me com dois beijinhos no rosto, confesso que quase gozei na hora, senti minha calcinha encharcar, mas me segurei e disse-lhe para sentir-se a vontade e que o jantar não demoraria sair. Pedi licença a ele e retornei para cozinha, e fiquei imaginando ele me fudendo, pois depois daquele dia em que assistiu eu me masturbando lá no sítio, certamente ficou ainda mais tarado por mim. Pouco antes do jogo começar, servi o jantar. Henrique não tirava o olho de mim quando tinha oportunidade. Terminamos, eu fui lavar as louças e eles se acomodaram na poltrona, não sei se estrategicamente ou coincidentemente, o gato dos meus sonhos sentou-se na poltrona que dava visão para o meu quarto, mas precisamente para a cama. Como eu estava cansada, tinha feito uma faxina geral na casa e não sou muito chegada a futebol, pedir-lhe desculpas e disse ao meu marido que iria dormir. Entrei no quarto me preparando para dormir, propositalmente deixei a porta entre aberta e percebi que quando meu marido foi na cozinha buscar mais umas cervejas para eles, Henrique não tirava os olhos da minha cama. Cheia de tesão, resolvi deixar o Evandro doidinho! Coloquei uma camisolinha fininha, deixei o abajur ligado, apaguei a luz principal e me deitei de um jeito em que a camisolinha levantasse até a altura da cintura deixando a minha bundinha distraidamente à mostra, para a exata visão de onde Henrique estava, já que a porta do quarto ficava de frente para a sala de tv e o sofá de frente para porta do quarto, o que de onde o Evandro estava dava pra me ver deitada na cama. Eu fingia dormir e já estava molhadinha só de pensar que ele estava me tarando com os olhos de ver minha bundinha de fora. Então pra provocar mais ainda dobrei a perna levando o joelho até a minha barriga de forma que a minha bucetinha ficasse aberta para ele. Sentia o meu tesão escorrendo no meio das minhas pernas, encharcando minha calcinha. Estava super excitada com aquele joguinho, o que embora o meu cansaço, impedia-me de dormir. Quando estava para terminar o primeiro tempo, vi meu marido falando pra ele ficar a vontade, pois nom intervalo iria tomar um banho enquanto não iniciava o segundo tempo. Foi o juiz dar o apito final pro intervalo, meu marido foi para o banheiro, tomar banho. Como eu sei que o Alfredo demora muito tempo no banheiro quando entra pra tomar banho pensei: Oba, pelo menos quinze minutos terei para provocar este gatinho e deixá-lo louco de tesão por mim. Como eu o provocava, fingindo dormir, de repente senti uma respiração ofegante bem perto da cama. Fiquei imóvel, me segurando para não gemer, afinal eu fingia dormir. Não demorou muito eu senti algo quente espirrando em minha bunda e em minhas pernas. Não é que o taradinho havia tocado uma punheta e gozado em cima de mim. Percebendo o que acontecera tive um orgasmo duplo, mas não pude me manifestar senão ele perceberia que eu ainda estava acordada. Na mesma hora o barulho do chuveiro ligado parou. O Alfredo já havia terminado o banho. O gatão então saiu rapidamente do quarto e eu na mesma hora gozei gostoso novamente, gemendo baixinho. Passou alguns minutos ouvi o Alfredo de volta na sala comentando sobre o primeiro tempo com ele. Iniciou o segundo tempo e saiu gol do Fluminense, os dois vibraram bastante e eu aproveitei para fingir ter acordado com o barulho, para me limpar. Levantei-me, fui no banheiro e depois coloquei meu roupão de banho por cima e fui até a cozinha beber água. Na volta perguntei quanto estava o jogo e fui deitar-me novamente. Acabei adormecendo e só despertei pela manhã na hora do meu marido sair para o trabalho. Mal ele virou as costas e saiu no carro, sentei-me na poltrona onde o Henrique estava na noite anterior, e lembrando do que acontecera e da gozada dele nas minhas coxas e bunda, comecei a me masturbar gostoso, até que gozei fartamente, pensando no quanto seria bom ter o cacete daquele gato, na minha boca,na minha xota e no meu cuzinho. Dias se passaram e num certo sábado fui ao mercado fazer umas compras e para minha surpresa, encontrei o meu gato de consumo Henrique. Nos cumprimentamos beijando-nos no rosto e propositalmente no cantinho da boca e ele me passou o número do telefone, dizendo que queria muito transar comigo e sabia que eu também queria transar com ele, pois eu disfarçava muito mal estar dormindo, portanto se eu resolvesse marcar era só ligar para ele que não pensaria duas vezes em enfiar seu cacete nas minhas entranhas. Ele sorriu, deu-me um outro beijo, desta vez selinho e foi embora. Querem saber se aconteceu algo entre nós? Acabou acontecendo, mas conto outra hora.
    Putinha baby – Nova Iguaçu - RJ
              TIRANDO O CABAÇO DA MINHA CUNHADA        

    Voltando das férias onde tirei o cabacinho da minha cunhada a vida voltou a rotina do começo de ano, mas nunca mais foi a mesma. Uma semana depois da volta da praia tive a oportunidade de ficar a sós com minha cunhada. Minha noiva voltou ao serviço e teve que viajar para São Paulo e ficar uma semana fazendo treinamento, foi quando minha cunhada teve que ir refazer matricula da faculdade e fui levá-la. Nayara estudava em uma cidade vizinha e quando pegamos estrada ela já veio me deixando louco. Disse que ficou uma semana na praia, perdeu a virgindade comigo e que estava louca pra transar novamente, pois seu namorado não havia feito nada em Camburiu. Assim que passamos pelo pedágio ela começou a passar a mão no meu pau e disse que queria fazer uma loucura e perguntou se eu permitia. Lógico que já sabendo das pretensões dela concordei e ela abriu o zíper da minha calça e desabotoou o botão. Começou a chupar meu pau como se tivesse chupando um sorvete. Aquela língua e o olhar pra cima de provocação me desconcentravam. Não agüentei e parei o carro. Na estrada mesmo ela continuou a chupar meu pau com mais intensidade foi logo que gozei na sua boca. Dessa vez nem precisei pedir e Nayara engoliu toda minha porra quente. Ela me deixava louco. Nos recompomos e seguimos viagem até a faculdade. Lá ela entrou para fazer rematricula e logo percebi de longe que ela falava algo com a colega e apontava para meu lado. Ela estava de calça jeans bem justa e uma blusinha preta bem decotada de alça e sua amiga de mini saia jeans e blusinha branca. As duas eram lindas, mas fiquei de longe só espiando. Assim q ela terminou veio em minha direção acompanhada da amiga Juliana que fiquei sabendo o nome depois. Nos apresentou e disse que eu era o professor de matemática mais bonito da cidade. A amiga bem safada disse que era um pecado ter um cunhado assim. Dei risada e chamei a cunhada para voltarmos. Minha intenção era voltar o mais rápido para pegar uma rodovia onde tinha um motel e minha cunhada sabia disso e se despediu da colega, mas não chegamos nem sair da faculdade. Ela estava terrível aquele dia, disse que ia me apresentar a faculdade e levou para o segundo andar onde ficava sua sala. Sabia que ela estava aprontando foi quando antes de chegar na sua sala ela me arrastou para o banheiro da faculdade. Sabia que seria ali que íamos transar e fomos logo nos fechando em um Box. Ela estava totalmente alucinada e foi tirando minha roupa. Sem camiseta e com as calças abaixadas sentei no vaso e foi ai que ela começou a tirar sua blusinha como se tivesse fazendo um strip e dançando. Meu pau já estava totalmente duro a ponte de explodir e ela se virou e foi tirando a calça com a bundinha virada pra mim. Ela sabia provocar como ninguém. De calcinha sentou no meu colo e disse: Faz essa sua cunhadinha putinha gozar como da outra vez professor bem dotado e me beijou. Aquilo me arrepiava e não sentia nem medo de transar ali. Tirei o sutiã e comecei a chupar seus seios ela começou a gemer feito uma cadelinha. Pegou meu pau e começou a bater uma punheta e sem tirar a calcinha e sim puxar para o lado encaixou meu pau na sua bucetinha. E começou a rebolar. Aos poucos o pau foi entrando e dessa vez parecia que estava mais apertadinha a bucetinha dela. Após entrar quase tudo levantei e encostei ela na parede e comecei a bombar. Ela gemia muito e não conseguia se controlar. Suas pernas já estavam cruzadas na minha cintura e meu pau totalmente penetrado nela. enfiei tudo dessa vez. Ela estava super molhada e facilitava a penetração. Estávamos completamente excitados como nunca nenhuma mulher tinha me deixado antes. Estávamos pela primeira vez a ponto de gozarmos juntos e isso não demorou a acontecer. Novamente gozei dentro daquela bucetinha linda. Os dois totalmente suados sem fôlego. Lembrando do motel na praia quis logo pegar ela de quatro ali mesmo e comer seu cuzinho. Dessa vez ela não falou nada. Virou tentou ficar de quatro mas o espaço era muito pequeno. Mandei encostar-se à parede e tentei enfiar no seu cuzinho. Ela começou a gritar de dor e a cabeça do pau nem tinha entrado. Escutamos alguns passos no corredor e ficamos em silencio quando resolvemos sair de lá e terminar isso no motel. Saindo da faculdade entramos no carro e perguntei onde era a farmácia mais próxima pra comprar algum lubrificante. Pegamos a estrada e em menos de 15 minutos estávamos no motel. Entramos, era um quarto bem simples e sem hidro dessa vez. Deitamos na cama e começamos a despir. Ela continuava cheirosa mesmo com todo o suor do banheiro da faculdade. Totalmente pelado peguei o lubrificante se já fui colocando ela de 4 na cama. Ela olhou pra mim e pediu pra enfiar com carinho. Não via a hora de comer aquele cuzinho apertadinho. Meu pau latejava de tesão. Lubrifiquei bem o meu pau e quando estava passando no cuzinho dela aproveitei e enfiei o dedo indicador. Ela virou e olhou pra trás. Sabia que era só o começo. Comecei a enfiar a cabeça do meu pau. Como foi difícil. Não entrava de jeito nenhum...Muito grande e grosso. Depois de uns 5 minutos de batalha e dor consegui enfiar a cabeça Ela gritava de dor e prazer ao mesmo tempo. Comecei bem devagar a bombar o pau naquele cuzinho. No que tirava e colocava já via sangue no pau. Ela estava sendo totalmente arrombada aos poucos. Comecei a forçar e consegui enfiar uns 15 cm e ela começou a pedir para parar. Apenas parei de bombar e deixei o pênis penetrado. Após passar os gritos comecei novamente mexer devagar e com a mão direita comecei a bater uma siririca para ela. Ela estava totalmente lambuzada. Ela começou a gemer com a siririca e até esqueceu da dor do cuzinho. Comecei a aproveitar da situação e fui intensificando as socadas de pau no cuzinho dela. Estava tão intenso que por pouco não consegui enfiar tudo naquela bundinha empinada. Depois de uns 20 minutos não agüentei segurar mais e comecei a gozar dentro dela. Ela sentiu aquilo quente por dentro e começou a gemer mais ainda dizendo que queria gozar novamente também. A virei e deitei-a rapidamente na cama e enfiei meu cacete, lambuzando-a com minha porra que ainda escorria sem parar. Meu pau estava totalmente roxo e doendo muito, mas mesmo assim comecei a comer a bucetinha dela. Levantei a pernas dela e deixei na posição de frango assado e enfiei todo o pau. Penetrou completamente. Ela gritava de tesão até que em pouco tempo gozou. Tomamos um banho e voltamos para nossa cidade e planejando quando seria a próxima loucura. Passou uma semana ela terminou com o namorado e me deixou numa fria. Mas isso vocês irão ler no próximo conto.
    M.C – Rio de Janeiro - RJ
              Violência Contra Mulher        

     

    Falar sobre a violência contra mulher, parece um assunto batido. Não é a toa que este assunto tem sido tão abordado. Os números continuam afirmando que a violência existe e muito forte em nossa sociedade. "Segundo a ONU, 7 em cada 10 mulheres no mundo já foram ou serão violentadas em algum momento da vida." Este número deveria assustar a maioria das pessoas, mas não é o que acontece. Somente uma reeducação social seria capaz de transformar este cenário. Em muitas sociedades os homens, ainda são vistos como seres humanos de qualidade superior, possuem direitos e liberdades não concedidos às mulheres.

    Isso nos parece distante, falando do Brasil. Um país jovem e aparentemente tão livre. Nossa realidade não está longe desses números. O machismo está enraizado de tal forma que as mães e mulheres contribuem para essa cultura e nem percebem.


    A situação fica clara quando observamos a criação dos filhos, as meninas são responsáveis pelos assuntos domésticos, diferente dos meninos que não são cobrados neste sentido. Na adolescência fica ainda mais evidente. Os homens são incentivados à prática do sexo, já o sexo feminino é sempre reprimido.


    Quando o assunto é violência sexual, o cenário é ainda pior. A sociedade julga as mulheres por se vestir de forma sensual, como se fossem culpadas pelo crime. Precisamos entender, que independente do acontecimento, o ser humano precisa respeitar o NÃO quando ele é dito, mesmo que seja na última hora. Nós seres humanos, somos RACIONAIS. O que nos diferencia dos animais é exatamente essa capacidade de raciocinar e não agir por impulso ou instinto.


    Ainda temos um longo caminho a percorrer. É fundamental reconstruir uma cultura de respeito aos direitos humanos das mulheres e repensar nos papéis estabelecidos dos gêneros.

    Atualização em 13/02/2017 

     

    No mês de fevereiro de 2017. Vladimir Putin, então presidente da Rússia sancionou a lei que assegura aos maridos russos o direito de bater em suas mulheres uma vez por ano, com penas atenuadas. As penas graves que eram aplicadas a toda agressão doméstica, agora só servirão para quem provocar fraturas em ossos. Um verdadeiro retrocesso para nossa sociedade global. 

     


              Al TBIZ tutte le tecnologie ICT a vantaggio delle aziende        
    Tecnologia VoIP, Unified Communication, Cloud computing, storage, database e tanto altro ancora. Al Technolgybiz 2017, il 13 e 14 settembre a Napoli, si parlerà e toccheranno con mano tutti i servizi ICT a vantaggio dell’azienda. Workshop e focus specifici per comprendere come poter risparmiare ed ottimizzare i propri servizi aziendali. Lo staff di VoipVoice presenterà […]

              1st of May Celebration        

    We have an official day off on the 1st of May. 

    Going out of town with family and friends is usually the thing that we do, but it seems this year the weather is not so great, staying home is a must.Still there are some great news. Shopping for summer outfits could be relieve the pain, and Romwe has some super offers.
    Have a look!


    Azi , dupa cum stiti, avem liber(mai mult sau mai putin). Cum iesit din oras, undeva la iarba verde iese din discutie, ca s-au anuntat ploi, ramanem in casa. Asta e.Dar avem si vesti bune, putem sta in casa la un mic shopping online pentru ca Romwe are promotii. Gata valiza pentru concediu?


    The lowest price ever! $9.99! Free shipping! 3 days only! GO!

    Click the following link to buy!

    http://www.romwe.com/flashsale/activeleft/4ek?active_id=464



              Three prom outfits for under 80$        



     Low budget? no problem!

    I know special events and proms are just around the corner so I did a little search and found for you girls some cheap and classy ideas for as low as 70$ dress + bag. It sounds great, right?
    If you save that much on the dress and bag you could invest more in shoes. It's time to get your favorite pair from Jimmy Choo or Manolo Blahnik that will WOW your appearance.
    Or just spend your money on a nice vacation.
    So what do you think? Which is your favorite? I love the red dress!


    Stiu ca banchetele au inceput, invitatiile la nunti curg in posta , asa ca m-am gandit sa va vin in ajutor. Am gasit cateva tinute, rochie si geanta, la preturi foarte bune , chiar sub 300 lei , transport gratuit sau express prin DHL cu 15$.(putin zic eu). 
    Daca economisiti atat cu rochia si geanta, acum e momentul sa va aruncati la pereche favorita de la Jimmy Choo sau Manolo Blahnik. Sau va puteti cheltuii restul de bani intr-o excursie draguta. 
    Deci ce ziceti? Care e rochia preferata?
    Mie cea rosie imi place mult!


    1. Dress- Clutch     2. Dress- Clutch    3. Dress-Clutch

     Dress-clutch
     Dress-Clutch
    Dress-Clutch



              When words fail, MUSIC speaks        



     When words fail, music speaks



    Haven't been listening to music on headphones for a while now, but as I have been riding the bike, running and going to gym pretty often, this is a must have. First of all because I don't want to listen to Amy Winehouse while I workout at gym. I tend to fall asleep:))) , I like her music, but not at gym!
    So here is a casual outfit, perfect even for riding the bike, with my new Zara sneakers of course!


     Nu am mai ascultat de mult timp muzica la casti, pentru ca imi puneam curu in masina si dadeam drumul la player. Nu e o treaba grozava, si am decis sa imi schimb putin stilul de viata, cat imi permite timpul. Merg mai des cu bicicleta, respectiv la sala ca e destul de aproape cat sa nici nu pierd timp pe drum, ba chiar ajung mai repede asa decat cu masina. Asa ca muzica in casti imi da un plus de energie, stare de bine, si  e vital cand la sala se aude in boxe Amy Winehouse ca azi de exemplu. Imi place muzica ei, dar nu la sala ca ma ia somnu....
    Revenind la tinuta mea, foarte casual , cu noii mei tenisi de la Zara, cu care as pleca pe bicicleta  imediat, daca nu ar fi noapte si frig.


     


    Don't forget about the Giveaway!

    One of my favorite gym tracks

    Nickelback-Burn it to the ground
     




     Top: Here
    Shorts: no name
    Sneakers: Zara
    Necklace: Here
    Sunnies: Ray-Ban






    Photos by Veres Krisztian


              The new Coco Rocha-first shooting        

     The new Coco Rocha-Mihaela


     This was Mihaela's first shooting and she did a great job! I love her natural copper hair and the freshness young girls these days virtually lack. 
    I also think she looks like Coco Rocha a bit, don't you?

    Prima sedinta foto a Mihaelei, putin timida , dar s-a descurcat de minune .Eu zic ca daca isi doreste sa lucreze in domeniu, are mari sanse sa ajunga departe. Imi place nuanta de cupru a parului ei ,trasaturile fine, feminine, si naturalete ceea ce multe fete din ziua de azi nu mai au.
    Mie mi se pare ca seamana putin cu Coco Rocha, voi ce ziceti?

    Photo: Bilootza Photgraphy
    Model: Mihaela Foltrauer
    Make-up: Kiaari Andreea
    Hair: Antonela Cocean
    Styling: B.A.D. style


     Great news from Romwe too, check the details below










    Happy Easter day
    http://www.romwe.com/f5--Happy-Easter-c-500.html

    Up to 75%off. Hurry up!

    More than 1000 styles. There is always a suitable one for you!
    Start from Apr 15th, end on Apr 22nd.

    Shipping within 24 hours.

    By the way, the white lace blouse in 3D embroidery will be $11.99 on April 17th, save 64%.

    http://www.romwe.com/o4--romwe-hollowout-lace-crochet-white-blouse-p-66056.html

              Colierul Statement- Cum transformi o rochie         
    http://www.borealy.ro/bijuterii/coliere/coliere-statement/colier-statement-emerald-passion.html


     Banchete, nunti, petreceri exclusiviste,  toate cer tinute impecabile ceea ce inseamna o gaura in buget.
    As putea sa iti dau un pont. O rochie simpla  intr-o culoare neutra sau nu neaparat, depinde ce iti place. Maneca treisfert, lunga pana in pamant, simpla.
    Apoi faci shopping online. Accesorii, mai exact coliere statement de la Borealy, superbe la preturi foarte bune. Iti cumperi 1-2-3, depinde de buget si le porti pe rand la aceeasi rochie.
    Ai spune ca nu shcimba foarte mult, si nu o poti purta la fiecare eveniment.
    Dar , iti mai dau niste idei. La urmatorul eveniment, e si mai cald, ii tai manechile, si ii faci un decolteu in spate. La urmatorul, o scurtezi, sau ii poti face o crapatura pe picior.
    Deci ai 3-4 variante pentru o singura rochie.
    Bijuteriile schimba o tinuta, iti trebuie doar putina imaginatie si o sesiune de smart shopping.
    Ce ziceti? va place ideea mea?


     Bleumarin

     Crystal Bead

     Christine Turquoise
    Pandantiv Rainbow


    Emerald Pearl


              INSTAGRAM week!        



     Short story  this week on my instagram account.


    Busy, busy, running from one place to another, with healthy snacks along. Almonds, bannana shake and water(trying to drink more). Had a treat too, white chocolate, that I shared, didn't eat it all on my own.
    Now for three days I am trying not to eat any kind of bread, nothing with flour, no sugar( just one Tspoon in my coffee), no salt, no dairy, just fruits and vegetables mostly smoothies and a salad per day. Cleansing a bit before Easter. 
    I've also been working on a little present for my godson, I hope he will like his new plimsolls.
    Other than that, working on orders and trying to be up to date with everything.



    Un rezumat al saptamanii mele pe instagram.
    Treaba peste treaba, alergat prin oras, a se citi condus, pentru ca nu o sa alerg la propriu  cand am ceva de rezolvat ca as fi varza:))) toata transpirata sa ma intalnesc cu clienti, ar fugii lumea de mine.
    Incerc sa imi iau la mine gustari sanatoase, migdale, shakeul meu de banane , si apa, pentru ca trebuie sa ma obisnuiesc sa beau mai multa. Ati vazut si ciocolata, alba, pe care am impartit-o, nu am mancat o tabla singura, cu toate ca puteam:)).
    Pentru trei zile , acum  incerc sa nu mananc paine deloc, nici fainoase, fara zahar(doar o lingurita in cafea), fara sare sau produse lactate. Doar legume si fructe, nuci, alune ne prajite, facute shake , si o salata pe zi. sa vedem daca ma tin de cura asta inainte de Paste, poate o tin mai mult, dar cu cate aniversari am de sarbatorit saptamana asta , nu stiu cum voi reusii. (tort!) 
    Am lucrat putin si la cadou pentru finutul meu, sper sa ii placa noii lui tenisi:P
    Inafara de asta, comenzile clientelor mele dragi.
    Ati fi curioase sa va arata cateva din ele?















              White dress and Cherry blossoms        




    The city is filled with these beautiful trees and everyone is taking pictures of them. How could I resist?
     
    A simple black and white look with nude shoes and colorful details. The burgundy bag, colorful necklace and orange heels make the look stand out without being too much.
    This could be a cute wedding outfit, maybe with another jacket, or a company party. If you get a simple suit coat and simple heels you might just go to the office like this.
    I think the white dress is really versatile being so simple , it makes it easier to mix and match.
    The great thing about it? it's only 24.99 free shipping~!More great news from Romwe below!



    Orasul e plin de copaci infloriti si toata lumea ii pozeaza, eu cum puteam sa rezist?
    O tinuta simpla, alb negru cu accente colorate. Geanta visinie, colierul multicolor, ci tocul portocaliu sunt detaliile care scot tinuta din anonimat fara sa fi exagerata.
    Aceasta poate fi o tinuta potrivita pentru o nunta sau o petrecere in cadrul companiei, poate cu alta geaca. Cu un sacou simplu si alti pantofi poti ajunge si la birou.
    Rochia alba este extrem de versatila, si fiind simpla, se poate asorta la nesfarsit.
    Vestea buna abia acum apare, e doar 24.99 $ si transport gratuit.Mai multe vesti bune de la Romwe putin mai jos.



     Dress: Here only 24.99$
    Jacket: Mango
    Necklace: Rosewholesale
    Shoes: Here
    Bag: Here





     Three super cool bags
    In fashion you need the right weapons to stand out
    pick yours

    Grenade    Gun     Handcuffs





    "Geek" Print Grey T-shirt you have never seen before!

    Sold at the price of $9.99, original price is $26.99,up to 63%off.
    Only 300 units are in stock . Hurry up!
    140 pieces for size S,
    80 pieces for size M,
    80 pieces for size L,
    Only at 1:00am GMT April 10th, only 24 hours!
    Worldwide free shipping, shipped in 24 hours.

              VERDE pentru BICICLETE-cum a fost        

    Dupa cum va spuneam , duminica am fost si eu printre multi altii (peste 5000 ) la pedalarea de primavara, un super eveniment VERDE pentru Biciclete organizat de Romina Faur


    Adunarea s-a facut la ora 10, noi am ajuns pe la 10 45 ( ca saptamana a fost lunga si trezirea de duminica grea), cand deja era foarte multa lume adunata. 
    Muzica, baloane colorate, oameni de toate varstele, chiar si animale de companie plimbate pe langa biciclete, in cosuri sau remorci speciale. Un spectacol de culoare si voie buna.
    Mi-a placut mult energia de acolo. Cred ca niciodata nu am mai vazut atata lume fericita, zambareata la un loc. 
    Pe traseul de aproximativ 14 km am intalinit si peripetii. Se mai pica, se mai opreau pe drum, altii s-au pierdut de grup. Cei mai putin politicosi  au fost soferii carora nu prea le-a placut miscarea asta fiind blocati in trafic din cauza noastra. Injurii si amenintari aiurea care nu isi aveau locul, unde sa mai punem ca unii voluntari erau cat pe ce sa fie calcati de soferii care nu tineau cont de indicatii .
    Una peste alta , evenimentul a fost unul de succes si eu abia il astept pe urmatorul.
    La final, inainte de premiere,  unul dintre biciclistii participanti si-a cerut iubita in casatorie intr-un mod foarte original ,ea evident a spus DA! Le urez si eu casa de piatra!































    Foto: Flavius Neamciuc si Christoph Bucher

              How to mix textures        



     As I  told you before, I am not a print fan, but I love mixing textures.

    I designed this chiffon skirt with a color  snake print thinking of mixing it with a simple top and comfy shoes, a casual,edgy outfit. I got the sequin top a while ago from The Front Row shop but I had my sleeves cut and shorthend in lenght  becasue it was too long .
     A few tips for mixing textures:
    Don't go wild in colors too.
     Get a printed item, and the other texture should pe plain in one of the print's colors, preferably a neutral one. Don't mix too many textures because it will look weird.
     Experiment , take pictures and see what looks nice, we all make mistakes, but we learn from them.



    Dupa cum v-am mai spus, nu ma dau in vant dupa imprimeuri, dar imi place mixul de texturi.
    Cand am creat fusta asta idn  voal cu imprimeu de sapre gri cu violet ma gandeam sa o asortez cu un top simplu, larg, pentru o tinuta de zi, casual ,dar totusi interesanta. Bluza din paiete albe o am de ceva timp , dar recent am modificat-o putin, adica am taiat din maneci si lungime ca pe mine arata ciudat, fiind mica de inaltime imi era aproape rochie. 
    Cateva idei pentru asocierea texturilor
    Nu va aventurati cu prea multe culori.
    O piesa cu imprimeu, iar textura alaturata sa fie de intr-una din culorile imprimeului, preferabil o nuanta neutra.
    Nu amestecati prea multe texturi, poate arata ciudat mai ales daca nu stapaniti tehnica.
    Nu ezitati sa incercati variante diferite, faceti-va poze ca astfel puteti vedea mai bine greselile.




     Top:Here
    Skirt: B.A.D. style
    Boots: Here
    Bag: Here
    ring: HM

     Photos by Veres Krisztian


              BADass Attitude        
     be BOLD...... be BAD..........be BEAUTIFUL!



    Really busy days, but I got these pictures from Bilootza Photography and I really want to share them with you . I'm in love with the result!  Alina, our model, has a super attitude, she moves and acts natural, it;s in her blood! I styled the new lace, leather bra and harness that you've seen on my instagram.
    So what do you say? Love it?
    Great news fomr ROMWE, check the details below


    Zile pline si putin timp, dar azi am primit fotografiile astea de la Bilootza, si vroiam neaparat sa vi le arat cat mai repede! Sunt super incantata de ce a iesit si imi doream de mult sa realizam asa un concept. Am facut stylingul cu multa piele, noual ham si sutien la care lucram acum cateva zile, pe care probabil le-ati si vazut pe instagram. ALina, modelul nostru, a fost atat de naturala in miscari, atitudine, are talentul in sange, e superba!
    Mie imi place maxim! Voua?
    Am vesti bune si de la ROMWe putin mai jos!

































    White And Black Fluid Striped Shirt
    1am 3rd April GMT, lasts only 24 hours!
    400 pieces for $9.99! Don’t miss out.
    It’ll help you save 75% in total


              ZARA online shop- 2 Aprilie        

     Chiar daca e 1 Aprilie, ce va spun eu acum nu e o gluma!



    ZARA in sfarsit online si in Romania, si aici vorbim de magazinul online. Pe mine una ma bucura nespus! Pot sa imi comand produsele favorite online, fara sa ma agit cu cozile de la cabina de proba, casa de marcat si nebunia din trafic. Plus ca eu imi pierd rabdarea repede si nu am nervi sa tot scotocesc prin magazin. Asa, online pot sa ma uit si la 12 noaptea cand imi termin treaba si nu sunt conditionata de  orarul unui magazin. Imi fac lista si cand m-am hotarat platesc cu cardul-foarte simplu. Cred ca 90% din hainele mele sunt cumparate online, 5% facute de mine(ca pentru mine nu am timp) si 5% cumparate din magazin fizic. Deci ZARA online o sa fie unul din favoritele mele cu siguranta.
     Ce imi place e ca iti poti lua produsele direct din magazin, astfle nu platesti taxa de livrare, iar schimbarea acestora se face tot asa. 
    Mi se pare ca au facilitat toate serviciile pentru ca clientul sa fie imbiat sa cumpere, ceea ce mi se pare perfect!
    Un client multumit, care a beneficiat de facilitati multiple pentru a-i usura felul in care isi face cumparaturile, sigur va reveni cu prima ocazie.
    Deci sa dam startul la cumparaturi!
    Eu deja mi-am instalat si aplicatia pe telefon, in trafic, putin shopping ma calmeaza:))
    pe voi nu?













    Castigatoarea bluze de dantela de la ROMWE este Anamaria Gîrbaci
    And the ROMWE giveaway winner is : Anamaria Gîrbaci





              Bijuterii dantelate -Eleganta eterna        



     De fiecare data cand avem un eveniment special ne batem capul in primul rand cu tinuta, iar apoi cu accesoriile.

     Ajungand sa alegem gablonturi dragute, dar care in timp isi pierd stralucirea. 
    Noua colectie Borealy,  Dantelle este exact ce avem nevoie. Piese elegante, dantelate, de o eleganta eterna in care merita investit. Detalii fine din argint si aur si pietre sintetice impecabil fatetate de o stralucire aparte.
     E timpul sa mai renuntam la colierele masive, statement, care ne-au dominat pana acum, sa le schimbam pentru  bijuteriile fine, feminine.
     O rochie simpla, eleganta are nevoie doar de putina stralucire, restul e atitudinea.
    Eu am pus ochii pe cateva piese..
    Voi?
    Pentru a va stimula imaginatia, va las un clip, sa vedeti ce frumos arata bijuteriile pe piele.
    https://www.youtube.com/watch?v=SytKGWuReQg&feature=youtu.be



     Bratara

     colier
     Set

    Pendant

              The travesty that is Australia's asylum seeker offshore detention policy -"If they had arrived by airplane and with a tourist visa then they would be here."         

    It seems the truth will out.

    After the United States completes its vetting of asylum seekers held in overseas detention by the Australian Government it is not obliged to take even one of those individuals U.S. immigration officials have examined.

    In May 2017 the Department of Immigration and Border Protection confirmed 268 people had completed their second-stage security interview with US officials: 220 in Nauru and 48 on Manus Island.

    U.S. immigration officials halted screening interviews and departed Nauru on 14 July 2017, two weeks short of their scheduled timetable and a day after Washington said the US had reached its annual refugee intake cap.

    However, under the original agreement once that vetting is completed Australia becomes obliged to resettle between 20 and 50 people under a U.S. "Protection Transfer Arrangement" in Costa Rica set up to resettle refugees from El Salvador, Honduras and Guatemala.

    Prime Minister Turnbull verbally changed that undertaking to an open-ended number of people the Trump Administration might be “very keen on getting out of the United States”.

    There is no indication that the U.S. Government intends to complete its vetting of those detained on Nauru and Manus islands.

    The Washington Post, 3 August 2017:

    The Washington Post has obtained transcripts of two conversations President Trump had with foreign leaders: one with Mexican President Enrique Peña Nieto and another with Australian Prime Minister Malcolm Turnbull.
    The transcripts were prepared by the White House but have not been released. The Post is publishing reproductions rather than original documents in order to protect sources. The reproductions below also include minor spelling and grammatical mistakes that appeared in the documents………………


    JANUARY 28, 2017 FROM 5:05 TO 5:29 P.M. EST.

    TURNBULL
    Good evening.

    TRUMP
    Mr. Prime Minister, how are you?

    TURNBULL
    I am doing very well.

    TRUMP
    And I guess our friend Greg Norman, he is doing very well?

    TURNBULL
    He is a great mutual friend yes.

    TRUMP
    Well you say hello to him. He is a very good friend. By the way thank you very much for taking the call. I really appreciate it. It is really nice.

    TURNBULL
    Thank you very much. Everything is going very well. I want to congratulate you and Mike Pence on being sworn in now. I have spoken to you both now as you know. I know we are both looking to make our relationship which is very strong and intimate, stronger than ever – which I believe we can do.

    TRUMP
    Good.

    TURNBULL
    I believe you and I have similar backgrounds, unusual for politicians, more businessman but I look forward to working together.

    TRUMP
    That is exactly right. We do have similar backgrounds and it seems to be working in this climate – it is a crazy climate. Let me tell you this, it is an evil time but it is a complex time because we do not have uniforms standing in front of us. Instead, we have people in disguise. It is brutal. This ISIS thing â€“ it is something we are going to devote a lot of energy to it. I think we are going to be very successful.

    TURNBULL
    Absolutely. We have, as you know, taken a very strong line on national security and border protection here and when I was speaking with Jared Kushner just the other day and one of your immigration advisors in the White House we reflected on how our policies have helped to inform your approach. We are very much of the same mind. It is very interesting to know how you prioritize the minorities in your Executive Order. This is exactly what we have done with the program to bring in 12,000 Syrian refugees, 90% of which will be Christians. It will be quite deliberate and the position I have taken – I have been very open about it – is that it is a tragic fact of life that when the situation in the Middle East settles down – the people that are going to be most unlikely to have a continuing home are those Christian minorities. We have seen that in Iraq and so from our point of view, as a final destination for refugees, that is why we prioritize. It is not a sectarian thing. It is recognition of the practical political realities. We have a similar perspective in that respect.

    TRUMP
    Do you know four years ago Malcom, I was with a man who does this for a living. He was telling me, before the migration, that if you were a Christian from Syria, you had no chance of coming to the United States. Zero. They were the ones being persecuted. When I say persecuted, I mean their heads were being chopped off. If you were a Muslim we have nothing against Muslims, but if you were a Muslim you were not persecuted at least to the extent – but if you were a Muslim from Syria that was the number one place to get into the United States from. That was the easiest thing. But if you were a Christian from Syria you have no chance of getting into the United States. I just thought it was an incredible statistic. Totally true – and you have seen the same thing. It is incredible.

    TURNBULL
    Well, yes. Mr. President, can I return to the issue of the resettlement agreement that we had with the Obama administration with respect to some people on Nauru and Manus Island. I have written to you about this and Mike Pence and General Flynn spoke with Julie Bishop and my National Security Advisor yesterday. This is a very big issue for us, particularly domestically, and I do understand you are inclined to a different point of view than the Vice President.

    TRUMP
    Well, actually I just called for a total ban on Syria and from many different countries from where there is terror, and extreme vetting for everyone else – and somebody told me yesterday that close to 2,000 people are coming who are really probably troublesome. And I am saying, boy that will make us look awfully bad. Here I am calling for a ban where I am not letting anybody in and we take 2,000 people. Really it looks like 2,000 people that Australia does not want and I do not blame you by the way, but the United States has become like a dumping ground. You know Malcom, anybody that has a problem – you remember the Mariel boat lift, where Castro let everyone out of prison and Jimmy Carter accepted them with open arms. These were brutal people. Nobody said Castro was stupid, but now what are we talking about is 2,000 people that are actually imprisoned and that would actually come into the United States. I heard about this – I have to say I love Australia; I love the people of Australia. I have so many friends from Australia, but I said – geez that is a big ask, especially in light of the fact that we are so heavily in favor, not in favor, but we have no choice but to stop things. We have to stop. We have allowed so many people into our country that should not be here. We have our San Bernardino’s, we have had the World Trade Center come down because of people that should not have been in our country, and now we are supposed to take 2,000. It sends such a bad signal. You have no idea. It is such a bad thing.

    TURNBULL
    Can you hear me out Mr. President?

    TRUMP
    Yeah, go ahead.

    TURNBULL
    Yes, the agreement, which the Vice President just called the Foreign Minister about less than 24 hours ago and said your Administration would be continuing, does not require you to take 2,000 people. It does not require you to take any. It requires, in return, for us to do a number of things for the United States – this is a big deal, I think we should respect deals.

    TRUMP
    Who made the deal? Obama?

    TURNBULL
    Yes, but let me describe what it is. I think it is quite consistent. I think you can comply with it. It is absolutely consistent with your Executive Order so please just hear me out. The obligation is for the United States to look and examine and take up to and only if they so choose – 1,250 to 2,000. Every individual is subject to your vetting. You can decide to take them or to not take them after vetting. You can decide to take 1,000 or 100. It is entirely up to you. The obligation is to only go through the process. So that is the first thing. Secondly, the people — none of these people are from the conflict zone. They are basically economic refugees from Iran, Pakistan, and Afghanistan. That is the vast bulk of them. They have been under our supervision for over three years now and we know exactly everything about them.

    TRUMP
    Why haven’t you let them out? Why have you not let them into your society?

    TURNBULL
    Okay, I will explain why. It is not because they are bad people. It is because in order to stop people smugglers, we had to deprive them of the product. So we said if you try to come to Australia by boat, even if we think you are the best person in the world, even if you are a Noble [sic] Prize winning genius, we will not let you in. Because the problem with the people —

    TRUMP
    That is a good idea. We should do that too. You are worse than I am.

    TURNBULL
    This is our experience.

    TRUMP
    Because you do not want to destroy your country. Look at what has happened in Germany. Look at what is happening in these countries. These people are crazy to let this happen. I spoke to Merkel today, and believe me, she wishes she did not do it. Germany is a mess because of what happened.

    TURNBULL
    I agree with you, letting one million Syrians walk into their country. It was one of the big factors in the Brexit vote, frankly.

    TRUMP
    Well, there could be two million people coming in Germany. Two million people. Can you believe it? It will never be the same.

    TURNBULL
    stood up at the UN in September and set up what our immigration policy was. I said that you cannot maintain popular support for immigration policy, multiculturalism, unless you can control your borders. The bottom line is that we got here. I am asking you as a very good friend. This is a big deal. It is really, really important to us that we maintain it. It does not oblige you to take one person that you do not want. As I have said, your homeland officials have visited and they have already interviewed these people. You can decide. It is at your discretion. So you have the wording in the Executive Order that enables the Secretary of Homeland Security and the Secretary of State to admit people on a case by case basis in order to conform with an existing agreement. I do believe that you will never find a better friend to the United States than Australia. I say this to you sincerely that it is in the mutual interest of the United States to say, “yes, we can conform with that deal – we are not obliged to take anybody we do not want, we will go through extreme vetting” and that way you are seen to show the respect that a trusted ally wants and deserves. We will then hold up our end of the bargain by taking in our country 31 [inaudible] that you need to move on from.

    TRUMP
    Malcom [sic], why is this so important? I do not understand. This is going to kill me. I am the world’s greatest person that does not want to let people into the country. And now I am agreeing to take 2,000 people and I agree I can vet them, but that puts me in a bad position. It makes me look so bad and I have only been here a week.

    TURNBULL
    With great respect, that is not right – It is not 2,000.

    TRUMP
    Well, it is close. I have also heard like 5,000 as well.

    TURNBULL
    The given number in the agreement is 1,250 and it is entirely a matter of your vetting. I think that what you could say is that the Australian government is consistent with the principles set out in the Executive Order.

    TRUMP
    No, I do not want say that. I will just have to say that unfortunately I will have to live with what was said by Obama. I will say I hate it. Look, I spoke to Putin, Merkel, Abe of Japan, to France today, and this was my most unpleasant call because I will be honest with you. I hate taking these people. I guarantee you they are bad. That is why they are in prison right now. They are not going to be wonderful people who go on to work for the local milk people.

    TURNBULL
    I would not be so sure about that. They are basically —

    TRUMP
    Well, maybe you should let them out of prison. I am doing this because Obama made a bad deal. I am not doing this because it fits into my Executive Order. I am taking 2,000 people from Australia who are in prison and the day before I signed an Executive Order saying that we are not taking anybody in. We are not taking anybody in, those days are over.

    TURNBULL
    But can I say to you, there is nothing more important in business or politics than a deal is a deal. Look, you and I have a lot of mutual friends.
    Look, I do not know how you got them to sign a deal like this, but that is how they lost the election. They said I had no way to 270 and I got 306. That is why they lost the election, because of stupid deals like this. You have brokered many a stupid deal in business and I respect you, but I guarantee that you broke many a stupid deal. This is a stupid deal. This deal will make me look terrible.

    TURNBULL
    Mr. President, I think this will make you look like a man who stands by the commitments of the United States. It shows that you are a committed —

    TRUMP
    Okay, this shows me to be a dope. I am not like this but, if I have to do it, I will do it but I do not like this at all. I will be honest with you. Not even a little bit. I think it is ridiculous and Obama should have never signed it. The only reason I will take them is because I have to honor a deal signed by my predecessor and it was a rotten deal. I say that it was a stupid deal like all the other deals that this country signed. You have to see what I am doing. I am unlocking deals that were made by people, these people were incompetent. I am not going to say that it fits within the realm of my Executive Order. We are going to allow 2,000 prisoners to come into our country and it is within the realm of my Executive Order? If that is the case my Executive Order does not mean anything Malcom [sic]. I look like a dope. The only way that I can do this is to say that my predecessor made a deal and I have no option then to honor the deal. I hate having to do it, but I am still going to vet them very closely. Suppose I vet them closely and I do not take any?

    TURNBULL
    That is the point I have been trying to make.

    TRUMP
    How does that help you?

    TURNBULL
    Well, we assume that we will act in good faith.

    TRUMP
    Does anybody know who these people are? Who are they? Where do they come from? Are they going to become the Boston bomber in five years? Or two years? Who are these people?

    TURNBULL
    Let me explain. We know exactly who they are. They have been on Nauru or Manus for over three years and the only reason we cannot let them into Australia is because of our commitment to not allow people to come by boat. Otherwise we would have let them in. If they had arrived by airplane and with a tourist visa then they would be here.

    TRUMP
    Malcom [sic], but they are arrived on a boat?

    TURNBULL
    Correct, we have stopped the boats.

    TRUMP
    Give them to the United States. We are like a dumping ground for the rest of the world. I have been here for a period of time, I just want this to stop. I look so foolish doing this. It [sic] know it is good for you but it is bad for me. It is horrible for me. This is what I am trying to stop. I do not want to have more San Bernardino’s or World Trade Centers. I could name 30 others, but I do not have enough time.

    TURNBULL
    These guys are not in that league. They are economic refugees.

    TRUMP
    Okay, good. Can Australia give me a guarantee that if we have any problems – you know that is what they said about the Boston bombers. They said they were wonderful young men.

    TURNBULL
    They were Russians. They were not from any of these countries.

    TRUMP
    They were from wherever they were.

    TURNBULL
    Please, if we can agree to stick to the deal, you have complete discretion in terms of a security assessment. The numbers are not 2,000 but 1,250 to start. Basically, we are taking people from the previous administration that they were very keen on getting out of the United States. We will take more. We will take anyone that you want us to take. The only people that we do not take are people who come by boat. So we would rather take a not very attractive guy that help you out then to take a Noble [sic] Peace Prize winner that comes by boat. That is the point.

    TRUMP
    What is the thing with boats? Why do you discriminate against boats? No, I know, they come from certain regions. I get it.

    TURNBULL
    No, let me explain why. The problem with the boats it that you are basically outsourcing your immigration program to people smugglers and also you get thousands of people drowning at sea. So what we say is, we will decide which people get to come to Australia who are refugees, economic migrants, businessmen, whatever. We decide. That is our decision. We are a generous multicultural immigration nation like the United States but the government decides, the people’s representatives decides. So that is the point. I am a highly transactional businessman like you and I know the deal has to work for both sides. Now Obama thought this deal worked for him and he drove a hard bargain with us – that it was agreed with Obama more than a year ago in the Oval Office, long before the election. The principles of the deal were agreed to.

    TRUMP
    I do not know what he got out of it. We never get anything out of it – START Treaty, the Iran deal. I do not know where they find these people to make these stupid deals. I am going to get killed on this thing.

    TURNBULL
    You will not.

    TRUMP
    Yes, I will be seen as a weak and ineffective leader in my first week by these people. This is a killer.

    TURNBULL
    You can certainly say that it was not a deal that you would have done, but you are going to stick with it.

    TRUMP
    I have no choice to say that about it. Malcom [sic], I am going to say that I have no choice but to honor my predecessor’s deal. I think it is a horrible deal, a disgusting deal that I would have never made. It is an embarrassment to the United States of America and you can say it just the way I said it. I will say it just that way. As far as I am concerned that is enough Malcom [sic]I have had it. I have been making these calls all day and this is the most unpleasant call all day. Putin was a pleasant call. This is ridiculous.

    TURNBULL
    Do you want to talk about Syria and DPRK?

    TRUMP
    [inaudible] this is crazy.

    TURNBULL
    Thank you for your commitment. It is very important to us.

    TRUMP
    It is important to you and it is embarrassing to me. It is an embarrassment to me, but at least I got you off the hook. So you put me back on the hook.

    TURNBULL
    You can count on me. I will be there again and again.

    TRUMP
    I hope so. Okay, thank you Malcolm.

    TURNBULL
    Okay, thank you.
    END OF CALL

    * My yellow highlighting.

              Facebook Inc still pursuing dream of spying on users through their webcams and via their touch screens or mobile phones        

    The Daily Dot, 8 June 2017:

    Your worst internet nightmare could be on its way to becoming a reality.
    newly discovered patent application shows Facebook has come up with plans to potentially spy on its users through their phone or laptop cameras—even when they’re not turned on. This could allow it to send tailored advertisements to its nearly two billion members. The application, filed in 2014, says Facebook has thought of using â€œimaging components,” like a camera, to read the emotions of its users and send them catered content, like videos, photos, and ads.

    “Computing devices such as laptops, mobile phones, and tablets increasingly include at least one, and often more than one, imaging component, such as a digital camera. Some devices may include a front-facing camera that is positioned on the same side of the device as a display. Thus, during normal operation, a user may be looking towards the imaging component. However, current content delivery systems typically do not utilize passive imaging information. Thus, a need exists for a content delivery solution that takes advantage of available passive imaging data to provide content to a user with improved relevancy.”

    This is the US patent application to which the article is referring.

    United States Patent Application 20150242679
    Kind Code:
    A1
    Techniques for emotion detection and content delivery are described. In one embodiment, for example, an emotion detection component may identify at least one type of emotion associated with at least one detected emotion characteristic. A storage component may store the identified emotion type. An application programming interface (API) component may receive a request from one or more applications for emotion type and, in response to the request, return the identified emotion type. The one or more applications may identify content for display based upon the identified emotion type. The identification of content for display by the one or more applications based upon the identified emotion type may include searching among a plurality of content items, each content item being associated with one or more emotion type. Other embodiments are described and claimed.

    Publication number
    US20150242679 A1
    Publication type
    Application
    Application number
    US 14/189,467
    Publication date
    Aug 27, 2015
    Filing date
    Feb 25, 2014
    Priority date
    Feb 25, 2014
    Also published as
    Inventors
    Original Assignee
    Export Citation
    External Links: USPTOUSPTO AssignmentEspacenet

    Facebook Inc appears to have been granted this related patent, Techniques for emotion detection and content delivery (US 9681166 B2- Publication date 13 June 2017):

    ABSTRACT
    Techniques for emotion detection and content delivery are described. In one embodiment, for example, an emotion detection component may identify at least one type of emotion associated with at least one detected emotion characteristic. A storage component may store the identified emotion type. An application programming interface (API) component may receive a request from one or more applications for emotion type and, in response to the request, return the identified emotion type. The one or more applications may identify content for display based upon the identified emotion type. The identification of content for display by the one or more applications based upon the identified emotion type may include searching among a plurality of content items, each content item being associated with one or more emotion type. Other embodiments are described and claimed.

    BACKGROUND
    Users of computing devices spend increasing amounts of time browsing streams of posts on social networks, news articles, video, audio, or other digital content. The amount of information available to users is also increasing. Thus, a need exists for delivering content a user that may be of current interest to them. For example, a user's interests may be determined based upon their current emotional state. Computing devices such as laptops, mobile phones, and tablets increasingly include at least one, and often more than one, imaging component, such as a digital camera. Some devices may include a front-facing camera that is positioned on the same side of the device as a display. Thus, during normal operation, a user may be looking towards the imaging component. However, current content delivery systems typically do not utilize passive imaging information. Thus, a need exists for a content delivery solution that takes advantage of available passive imaging data to provide content to a user with improved relevancy.

    Facebook also appears to have been granted a US patent in May this year for Augmenting Text Messages With Emotion Information (US 20170147202 A1).

    According to CBINSIGHTS this patent would; automatically add emotional information to text messages, predicting the user’s emotion based on methods of keyboard input. The visual format of the text message would adapt in real time based on the user’s predicted emotion. As the patent notes (and as many people have likely experienced), it can be hard to convey mood and intended meaning in a text-only message; this system would aim to reduce misunderstandings.
    The system could pick up data from the keyboard, mouse, touch pad, touch screen, or other input devices, and the patent mentions predicting emotion based on relative typing speed, how hard the keys are pressed, movement (using the phone’s accelerometer), location, and other factors.


              Deep Freeze Enterprise 7.70 + keygen        
    Deep Freeze Enterprise 7
    Deep Freeze Enterprise 7.70 + keygen | 35.02 MB

    The function of the program to those who heard him the first time: the program and his job are keeping the device as it is after you install the program
    In other words, when you run this software, you can install programs as you like and delete what you want and change whatever you want, but after you restart the device will return the device as it was, and will delete what you added and retrieval what ..
    So it is important for owners of cafes and computer teachers to protect their devices, as well as matter owners Alajhazh to the their children are using their devices

    Deep Freeze instantly protects and preserves baseline computer configurations. No matter what changes a user makes to a workstation, simply restart to eradicate all changes and reset the computer to its original state - right down to the last byte. Expensive computer assets are kept running at 100% capacity and technical support time is reduced or eliminated completely. The result is consistent trouble-free computing on a truly protected and parallel network, completely free of harmful viruses and unwanted programs. While Deep Freeze provides bulletproof protection, its non-restrictive approach also improves user productivity and satisfaction. Placing no restrictions on a user's ability to access all system resources, users avoid the frustration of downtime due to software conflicts, operating system corruption, virus attacks, and many other problems. Users are always assured of computers that are consistently operable and available

    Explain the work of Enable and Disable the program:
    1 - press the Shift and DoubleClick the program Econh.
    2 - Write responded basses if you've chosen before (if you do not press the Inter and salvation)
    3 - to work Disable press Boot Thawed
    4 - Enable press work Boot Frozen
    5 - Restart the device.

    NOTE Please Disable Your Anti Virus For 10-20 Minutes And Use The KeyGen For Activation.
    1) Install the Application
    2) Run Keygen follow instrunction.
    3) Done.

    Download Link
              Support the ECPA Modernization Act, S. 1657        

    On behalf of our activist community, I urge you to contact your senators and urge them to support the ECPA Modernization Act, S. 1657, introduced by Sen. Mike Lee (R-Utah) and Sen. Patrick Leahy (D-Vt.). The bill would greatly increase individual privacy by adding warrant requirements to email collection by legal authorities and add other legal protections to defend citizens’ rights.

    The Electronic Communications Privacy Act (ECPA) was originally written in 1986, more than 30 years ago, well before the widespread use of email. Under existing statute, law enforcement to access emails and online data that are older than 180 days without a warrant.

    Email and cloud computing have transformed the way we use electronic data, and ECPA is sorely in need of an upgrade. Sen. Lee has noted, “Americans don’t believe the federal government should have warrantless access to their emails just because they are 180 days old.”

    The ECPA Modernization Act is the answer to that exact problem. The bill would add warrant requirements for authorities to get content from emails, regardless of how old they are. This would include both historical and real-time information for the location of an individual. Also, any individual whose information has been accessed must be notified within ten days of what content has been acquired.

    It also adds significant burden of proof requirements in order to get a warrant. Case in point, a gag order can only be required by the presentation of “specific and articulable facts.” The same is true for a pen register/trap and trace. This will greatly defend the rights of the individuals and their content.

    The importance of the Fourth Amendment is without question and our laws must be updated to ensure that we also enjoy fourth amendment protections in the digital world. This bill would greatly expand due process to the Internet and bring federal legislation into the 21st Century. For these reasons, I urge you to contact your senators and urge them to support the ECPA Modernization Act, S. 1657.

    Sincerely,

    Adam Brandon, President, FreedomWorks


              Lee and Leahy Move to Protect Email with Due Process        

    FreedomWorks supports the ECPA Modernization Act of 2017 by Senators Mike Lee and Patrick Leahy to protect the Fourth Amendment rights of every American by amending the Electronic Communications Privacy Act of 1986. This outdated law was written before most people even knew what the word internet meant, and well before the world of cloud-computing and online data storage. This legislation is in dire need of an upgrade, and Sens. Lee and Leahy should be applauded for taking the lead on this important issue.

    Under the Electronic Communications Privacy Act of 1986, federal agencies do not need a warrant to search emails and other digital communications that are over 180 days old. But under the Fourth and Fifth Amendments to the Constitution, Americans are explicitly protected from having their physical property compromised without due process. These same protections should apply in the digital world as well. Additionally, the Fourth Amendment clearly protects Americans against unreasonable search and seizure and requires probable cause prior to issuing a warrant. ECPA’s outdated standards for warrantless searches do not comport with the Fourth Amendment’s protection against warrantless searches.

    FreedomWorks President Adam Brandon issued the following statement:

    “In the digital world, Americans deserve the same privacy protections that we have for our papers and personal information in the physical world. Senator Lee’s efforts to reform ECPA’s outdated standards will restore the protections that our founder’s enshrined in the Constitution. I’m glad to see Sens. Lee and Leahy's continued leadership on this important issue.”


              il mio voto...        
    ovvero: perché il .

    Premessa: mi piace Mussi; non mi piace Bertinotti (men che meno Diliberto); Grillo mi ha rotto le palle; Veltroni mi puzza un poco...

    E allora perché voto ?

    Ci son vari motivi, li elenco in ordine sparso:
    • altrimenti vince ; so bene che votare sotto questo ricatto non è bello, ma visto che non ci posso far nulla, almeno evito che l'Italia diventi come lui vorrebbe:
      • politica estera filostatunitense;
      • sanità, istruzione e sistema previdenziale privati;
      • sistema giudiziario fuori uso;
      • ampio appoggio da parte della mafia e delle varie organizzazioni criminali;
      • antieuropeismo;
      • appoggio di Putin;
      • gestione casalinga della politica;
      • diminuzione delle tasse a scapito del bilancio dello Stato;
      • riduzione della spesa pubblica tramite tagli al welfare e riduzioni del bilancio tout-court in ogni settore statale, senza ridurre le spese reali ma solo i finanziamenti
      serve altro? non ci basta?

    • non è vero che il programma di Veltroni è uguale a quello di Berlusconi; l'ha ampiamente dimostrato Berlusconi in questi giorni con le sue uscite.
      E Berlusconi non è uno di quelli che fa una promessa pensando davvero di mantenerla, quindi il problema non si porrebbe proprio.

    • in quanto ad utopie e irrealismi il programma di Veltroni non è più astratto di quello della ; e la Sinistra Arcobaleno non rappresenta una forza credibile, capace di assumersi responsabilità di governo.
      Mi spiace per , che è una persona che mi piace molto, ma una forza nella quale uno dei leader () è pronto a dire "ritiriamoli tutti subito!" appena giunge la notizia del rapimento di due soldati italiani in Afghanistan non è una forza in grado di assumersi responsabilità. O dite che Diliberto ci sta per sbaglio.

    • l'astensione non rappresenta una alternativa; astenersi significa lasciare che Berlusconi vinca, significa garantirgli un nuovo mandato.
      Significa dire: "scusate, ma a me non piace nessuno, fate pure voi"; ed il "fate pure voi" è un invito a nozze. I politici, anche ammettendo che sian tutti delle merde, non son tutti uguali. C'è differenza tra il governo Prodi ed il governo Berlusconi. Se non l'avete vista mi chiedo dove stavate.


    Ieri sera son andato in piazza Maggiore a guardarmi Prodi che passava il testimone a Veltroni, e Veltroni che cercava di convincermi ad aver fiducia in lui. Ci è riuscito?
    Abbastanza, la diffidenza resta, ma lui è sempre meglio degli altri.
    Giorni fa invece mi ero visto (via internet) il comizio di a Bari (credo Bari...).
    Speravo mi desse una speranza, mi ha dato senso di asfittico.
    Ho voglia di vedere Veltroni ed il PD alla prova del fuoco al governo, voglio vedere come concretizzeranno il messaggio di unità ed innovazione.
    La SA non mi ha dato alcuna voglia di metterli alla prova.
    Gli altri invece mi fan proprio paura, ho l'impressione che questa volta l'Italia si stia giocando le chiappe...
              Smooth world from block data        

    Ephenation is a voxel based world. Everything (almost) are blocks that have a given address. Graphics based on square blocks doesn't look very good. There are ways to make it look good, e.g. the Marching Cubes algorithm.
    However, this algorithm has some drawbacks. Every created triangle has a texture, and it is not trivial to decide what texture to use for triangles that span from one block type to another. Another problem is that some cubes in the world shall still be shown as cubes. This leads to difficulties in the transition between smooth terrain and cubistic blocks.

    Use of a filter

    In Ephenation, it was decided to use another algorithm, with similarities to a low pass filter. The basic idea is to take every coordinate and add a specific delta to each of the three dimensions. The magnitude of the delta is determined as a function of neighbor blocks. A two dimensional example of this could be:
    Delta in X dimension
    Next, if the same delta is applied in 'y', we get:
    Delta in Y dimension
    The principle is simple; the delta is computed in every dimension and can be applied independently.

    Three dimensions

    When computing the delta for 3 dimensions, neighbor vertices has to be take into account from 3 dimensions.

    In the figure, there are 8 cubes. They are initially uniformly distributed. The content of these 8 cubes are used to determine the delta of the point P, in the middle, for each of the X, Y and Z dimensions. Only one filter is defined for one dimension, and then the transformation is rotated in three different directions. The algorithm uses a small matrix, of the size 2x2x2, that is initialized with the content of the 8 cubes. The delta computation uses that matrix to determine the delta in one dimension. And then this small matrix is filled with the same content, but rotated for the other dimensions, and the test is repeated.

    Merging normals

    After applying the delta, it is possible to change the appearance without changing the geometry. If the normals for all triangles that meet at the same vertex is replaced by an average, then it will further increase the smoothness look of the world. To speed up this process, the vertex data is sorted on vertex position. A std::multiset is used, with pointers to the vertex data. This set of pointers is then sorted. A question is whether normals from different materials shall also be averaged. This is not done currently.

    There are some special cases that need to be taken care of. For example, it may be that the sum of the normals is a null vector. When that happens, the normals are simply left unchanged.
    Non modified normals
    And with normals merged, the same geometry will be:
    Merged normals

    Calibration

    The amount of the delta has to be calibrated. See below a video clip where the delta goes from 0 to 0.17.



    THE ART OF THE (TRUMP AND PUTIN) DEAL

    Say you’re Vladimir Putin, and you did a deal with Trump last year. Whether there was such a deal is being investigated. But if you are Putin and you did do a deal, what might Trump have agreed to do for you? 

    1. Repudiate NATO. NATO is the biggest thorn in your side – the alliance that both humiliates you and stymies your ambitions. Trump seemed intent to deliver on this during his recent European trip by bullying members about payments and seemingly not reaffirming Article 5 of the pact, which states that any attack on one NATO ally is an attack on all. (He’s backtracked on this since then, under pressure from Congress.)

    2. Antagonize Europe, especially Angela Merkel. She’s the strongest leader in the West other than Trump, and you’d love to drive a wedge between the United States and Germany. Your larger goal is for Europe to no longer depend on the United States, so you can increase your influence in Europe. Trump has almost delivered on this, too. Merkel is already saying Europe can no longer depend on America.

    3. Take the United States out of the Paris accord on the environment. This will anger America’s other allies around the world and produce a wave of anti-Americanism – all to your advantage. You’d also love for the whole Paris accord to unravel because you want the world to remain dependent on fossil fuels. Russia is the world’s second-largest exporter of oil after Saudi Arabia, and biggest exporter of natural gas. And the oil and gas industry contributes about half the revenues to your domestic budget. And, hey, there’s also all those Arctic ports that are opening up now that the earth is warming. Trump has delivered on this. 

    4. Embark on a new era of protectionism. Or at least anti-trade rhetoric. This will threaten the West’s economic interdependence and loosen America’s economic grip on the rest of the world. Trump is on the way to delivering on this one.

    5. End the economic sanctions on Russia, imposed by the United States in 2014. Oil production on land is falling so you want to tap the vast petroleum and gas reserves offshore in the Arctic. In 2011, you and ExxonMobil’s Rex Tillerson, signed a $500 billion deal to do this. But the sanctions stopped it cold. Trump has promised to lift them, but he hasn’t delivered on this yet, because he has got to cope with all the suspicions in America about his deal with you. Once it dies down, he’ll end the sanctions. In the meantime, he’ll give you back the two compounds that were seized by the Obama administration when the U.S. intelligence discovered you’d interfered in the election.

    And what might you have agreed to do for Trump in return? 

    Two things: First, you’d help him win the presidency, by hacking into Democratic Party servers, leaking the results, sending millions of fake news stories about Hillary to targeted voters, and tapping into voter lists. 

    Second, after he was elected, you’d shut up about your help so Trump wouldn’t be impeached and convicted of treason.

    In other words, if you did a deal, you both still have every incentive to fulfill your side of it. That’s the art of the deal.


              Oracle Licensing and Support on Nutanix Virtual Computing Platform        


    I’ve written quite a bit about Oracle virtualization in the past, as you can find on my Oracle Page. Now that I’m working with Nutanix I thought it was time to write about the topic of Oracle Licensing and Support on the Nutanix Virtual Computing Platform. This article will take you through the highlights that […]


              ç¶šGo言語に入門する        

    前回はこちら。書いてて楽しいので、地味に活動が続いている。

    OSS活動

    mackerel-client-go && mkr

    mackerel関連のgoのライブラリとツールです。グラフアノテーション機能がリリースされたので、それをmkrで操作できるようにしました。mackerelなので仕事に関連しているのですが、週末に趣味時間でやっていました(Goの練習をしたかったのじゃ!)。

    基本的にやることはWebAPIのラッパーなので難しいことはないんですが

    • goでのエラーハンドリング
    • コマンドライン引数周りの雰囲気
    • JSONの取り扱い
      • structを定義してjson decoderに投げればよい

    が分かってよかったです。

    自然言語処理

    もう少し複雑だったりメモリやCPUを使う処理もgoで書いて感覚を掴みたいなと思ったので、次のステップとして係り受け解析器をgoで書いてみることにしました。絶賛WIPです。

    Webアプリ

    goでのwebアプリも書きたいという気持ちはあるけど、こちらはまだ未着手。既存のものを見たり、どのライブラリがよさそうか見たりしている。

    みんなのGo言語【現場で使える実践テクニック】

    みんなのGo言語【現場で使える実践テクニック】

    プログラミング言語Go (ADDISON-WESLEY PROFESSIONAL COMPUTING SERIES)

    プログラミング言語Go (ADDISON-WESLEY PROFESSIONAL COMPUTING SERIES)


              TAP Cat – un joc pentru timpul tau liber        
    TAP Cat este un joc simplu, gratuit si distractiv. Este tipul de joc pe care il poti juca cand ai putin timp liber, sa te relaxezi si sa vezi daca […]
              About Jackie Robinson        

    Who was Jackie Robinson?

     

    Jack Roosevelt "Jackie" Robinson (January 31, 1919 – October 24, 1972) was the first black Major League Baseball. Robinson broke the baseball color barrier when he signed with the Brooklyn Dodgers in 1947. As the first black man to play in the major leagues, (aside from the 1880s, before the MLB was organized) he is most known for bringing social justice to baseball, which had seperate leagues for blacks (the Negro leagues) and whites for six decades. His character and skills are what helped him challenge the traditional basis of segregation, which was prevalent in all areas of American Life, and was a catalyst to the Civil Rights Movement. Robinson was not just any other baseball player, he strived for success and achieved it, as he helped the Dodgers get to six World Series' and win it all in 1955. He was Rookie of the Year in 1947, MVP in 1949 and a six time All-Star from 1949-1954. He was then inducted to the Baseball Hall of Fame in Cooperstown in 1962 followed by all of MLB retiring the Jackie Robinson Jersey: number 42, in 1997, an honor reserved solely to Robinson. 

    Pre Baseball Life

    Jackie was born on January 31, 1919, in Cairo, Georgia, to a family of farmers during a Spanish flu and smallpox epidemic. He was the youngest of five children, after his brothers Edgar, Frank, Matthew, and Willa Mae. He was named "Roosevelt" as a middle name, in honor of former President Theodore Roosevelt, who died earier that month. The Robinson's moved to 121 Pepper Street in Pasadena, California after their father left them in 1920. Their mother worked various jobs to support them as they grew up in relative poverty even though Pasadena was considered an affluent place. They attended Washington Junior High School followed by Muir Tech High School. The Robinsons were superb athletes. Matthew was a silver medalist in the 1936 Olympics and he and Frank inspired Jackie to seriously pursue a career in sports. Jackie played on the Muir Tech football team as quarterback, basketball team as a guard, track team as a jumper, tennis team and baseball team as both a catcher and shortstop. In 1936, he won a Tennis Tournament and played in the Pomona baseball tournament all star team with fellow future Hall of Famers Ted Williams and Bob Lemon. 

    After High School, Jackie went on to Pasadena Junior College where he continued his involvement in sports. He also was elected to the Lancers, a local organization responsible for helping patrol school activities. In 1938, Jackie joined the All-Southland Junior College baseball team and was selected as that years MVP. He also received honors for his outstanding community service, even though he sometimes acted against those around him who seemed racist. While playing football for PJC, Jackie broke his ankle. A few days before Jackie's 19th birthday he was arrested for vocally disputing the arrest of a black friend of his. He quickly earned a reputation for being one who won't shy away from beligerrance in the face of racism.

    After graduating from PJC, Jackie's brother, Frank, was killed in a motorcycle accident which helped Jackie make a decision to move to L.A. where he could console Frank's family. Jackie decided to attend UCLA where he met is future wife, Rachel Isum, and won varsity letters in all the major sports. He won the 1940 NCAA Mens Outdoor Track and Field Championship in the Long Jump,jumping a whopping 24 Feet 10.5 Inches. Ironically, in that year, robinson batted .097 for the UCLA baseball squad. In 1941, he took a job with the NYA as an assistant athletic director, as it would have been impossible for him to get a job as a proffesional athlete due to the color barrier. Later that year he traveled to Hawaii where he had an opportunity to play for the racially mixed semi-pro Honolulu Bears' football team. After that season he would move back to L.A. to play for a local football team, not realizing that the US involvement in World War 2 would sidetrack him for a little while and end his short football career.

    Robinson was drafted to the Army in 1942 and was stationed in Fort Riley, Kansas. Throughout his 3 plus years in the Army, he was always treated as a subordinate by the White controlled military. He still managed to become a second lieutenant in 1943, and joined the Black Panthers Tank Battallion, the first Black tank unit to see combat in WWII. However, jackie was never in combat. After getting engaged to his College sweetheart, Rachel, he was sidelined after injuring the same ankle he hurt back in high school. He would finish his army service as a coach for army athletes until 1944 when he was discharged. While in the Army, Robinson made close ties with boxer, Joe Louis, as they helped each other struggle in the white dominated Army.

    In early 1945, after working some part time coaching jobs, Jackie received an offer from the Kansas City Monarchs to Play professional Baseball in the Negro Leagues. He signed a contract worth $400 a month as he played for the Monarchs for 1 Season. He played 47 games at shortstop batting .387. The Negro leagues were'nt for Jackie as he didn't like their unorganized style. Luckily he received a secret offer from the GM of the Brooklyn Dodgers, Branch Rickey, to come to NY and play for their Minor League team. They offered him $600 a month on the condition that he would be able to take abuse from other players for being the only black, but contain himself from fighting back. Jackie accepted, and immediately left the Monarchs for NYC where he would marry Rachel Isum, who was in NY studying to be a Nurse. Jackie would start with the Dodgers' AAA club in Daytona Beach, FL that next season.

    Baseball Career

    In 1946, Robinson arrived at Daytona Beach, Florida, for spring training with the Montreal Royals of the Class AAA International League (the designation of "AAA" for the highest level of minor league baseball was first used in the 1946 season). Robinson's presence was controversial in racially charged Florida. As he was not allowed to stay with his teammates at the team hotel, he lodged instead at the home of a local black politician. Since the Dodgers organization did not own a spring training facility (the Dodger-controlled spring training compound in Vero Beach known as "Dodgertown" did not open until spring 1948), scheduling was subject to the whim of area localities, several of which turned down any event involving Robinson or Johnny Wright, another black player whom Rickey had signed to the Dodgers' organization in January. In Sanford, Florida, the police chief threatened to cancel games if Robinson and Wright did not cease training activities there; as a result, Robinson was sent back to Daytona Beach. In Jacksonville, the stadium was padlocked shut without warning on game day, by order of the city's Parks and Public Property director. In DeLand, a scheduled day game was called off, ostensibly because of faulty electrical lighting.

    After much lobbying of local officials by Rickey himself, the Royals were allowed to host a game involving Robinson in Daytona Beach. Robinson made his Royals debut at Daytona Beach's City Island Ballpark on March 17, 1946, in an exhibition game against the team's parent club, the Dodgers. Robinson thus simultaneously became the first black player to openly play for a minor league team and against a major league team since the de facto baseball color line had been implemented in the 1880s. Later in spring training, after some less-than-stellar performances, Robinson was shifted from shortstop to second base, allowing him to make shorter throws to first base. Robinson's performance soon rebounded. On April 18, 1946, Roosevelt Stadium hosted the Jersey City Giants' season opener against the Montreal Royals, marking the professional debut of the Royals' Jackie Robinson. In his five trips to the plate, Robinson had four hits, including a three-run home run. He also scored four runs, drove in three, and stole two bases in the Royals' 14–1 victory. Robinson proceeded to lead the International League that season with a .349 batting average and .985 fielding percentage, and he was named the league's Most Valuable Player. Although he often faced hostility while on road trips (the Royals were forced to cancel a Southern exhibition tour, for example), the Montreal fan base enthusiastically supported Robinson. Whether fans supported or opposed it, Robinson's presence on the field was a boon to attendance; more than one million people went to games involving Robinson in 1946, an amazing figure by International League standards. In the fall of 1946, following the baseball season, Robinson returned home to California and briefly played professional basketball for the short-lived Los Angeles Red Devils.

    The following year, six days before the start of the 1947 season, the Dodgers called Robinson up to the major leagues. With Eddie Stanky entrenched at second base for the Dodgers, Robinson played his initial major league season as a first baseman. On April 15, 1947, Robinson made his major league debut at Ebbets Field before a crowd of 26,623 spectators, including more than 14,000 black patrons. Although he failed to get a base hit, the Dodgers won 5–3. Robinson became the first player since 1880 to openly break the major league baseball color line. Black fans began flocking to see the Dodgers when they came to town, abandoning their Negro league teams.

    Robinson's promotion met a generally positive, although mixed, reception among newspapers and white major league players. However, racial tension existed in the Dodger clubhouse. Some Dodger players insinuated they would sit out rather than play alongside Robinson. The brewing mutiny ended when Dodgers management took a stand for Robinson. Manager Leo Durocher informed the team, "I do not care if the guy is yellow or black, or if he has stripes like a fuckin' zebra. I'm the manager of this team, and I say he plays. What's more, I say he can make us all rich. And if any of you cannot use the money, I will see that you are all traded."

    Robinson was also derided by opposing teams. Some, notably the St. Louis Cardinals, threatened to strike if Robinson played. After the threat, National League President Ford Frick and Baseball Commissioner Happy Chandler let it be known that any striking players would be suspended. Robinson nonetheless became the target of rough physical play by opponents (particularly the Cardinals). At one time, he received a seven-inch gash in his leg. On April 22, 1947, during a game between the Dodgers and the Philadelphia Phillies, Phillies players called Robinson a "nigger" from their dugout and yelled that he should "go back to the cotton fields". Rickey later recalled that Phillies manager Ben Chapman "did more than anybody to unite the Dodgers. When he poured out that string of unconscionable abuse, he solidified and united thirty men."

    Robinson received significant encouragement from several major league players. Dodgers teammate Pee Wee Reese once came to Robinson's defense with the famous line, "You can hate a man for many reasons. Color is not one of them." In 1948, Reese put his arm around Robinson in response to fans who shouted racial slurs at Robinson before a game in Cincinnati. A statue by sculptor William Behrends, unveiled at KeySpan Park on November 1, 2005, commemorates this event by representing Reese with his arm around Robinson. Jewish baseball star Hank Greenberg, who had to deal with racial epithets during his career, also encouraged Robinson. After colliding with Robinson at first base on one occasion, Greenberg whispered a few words into Robinson's ear, which Robinson later characterized as "words of encouragement." Greenberg had advised him that the best way to combat the slurs from the opposing players was to beat them on the field.

    Robinson finished the season having played in 151 games for the Dodgers, with a batting average of .297, an on-base percentage of .383, and a .427 slugging percentage. He had 175 hits (scoring 125 runs) including 31 doubles, 5 triples, 12 home runs, driving in 48 runs for the year. Robinson led the league in sacrifice hits, with 28, and in stolen bases, with 29. His cumulative performance earned him the inaugural Major League Baseball Rookie of the Year Award (separate National and American League Rookie of the Year honors were not awarded until 1949).

    Following Stanky's trade to the Boston Braves in March 1948, Robinson took over second base, where he logged a .980 fielding percentage that year (second in the National League at the position, fractionally behind Stanky). Robinson had a batting average of .296 and 22 stolen bases for the season. In a 12–7 win against the St. Louis Cardinals on August 29, 1948, he hit for the cycle—a home run, a triple, a double, and a single in the same game. The Dodgers briefly moved into first place in the National League in late August 1948, but they ultimately finished third as the Braves went on to win the league title and lose to the Cleveland Indians in the World Series.

    Racial pressure on Robinson eased in 1948 as a number of other black players entered the major leagues. Larry Doby (who broke the color barrier in the American League on July 5, 1947) and Satchel Paige played for the Cleveland Indians, and the Dodgers had three other black players besides Robinson. In February 1948, he signed a $12,500 contract (equal to $120,914 today) with the Dodgers; while a significant amount, this was less than Robinson made in the off-season from a vaudeville tour, where he answered pre-set baseball questions, and a speaking tour of the South. Between the tours, he underwent surgery on his right ankle. Because of his off-season activities, Robinson reported to training camp 30 pounds (14 kg) overweight. He lost the weight during training camp, but dieting left him weak at the plate.

    In the spring of 1949, Robinson turned to Hall of Famer George Sisler, working as an advisor to the Dodgers, for batting help. At Sisler's suggestion, Robinson spent hours at a batting tee, learning to hit the ball to right field. Sisler taught Robinson to anticipate a fastball, on the theory that it is easier to subsequently adjust to a slower curveball. Robinson also noted that "Sisler showed me how to stop lunging, how to check my swing until the last fraction of a second". The tutelage helped Robinson raise his batting average from .296 in 1948 to .342 in 1949. In addition to his improved batting average, Robinson stole 37 bases that season, was second place in the league for both doubles and triples, and registered 124 runs batted in with 122 runs scored. For the performance Robinson earned the Most Valuable Player award for the National League. Baseball fans also voted Robinson as the starting second baseman for the 1949 All-Star Game—the first All-Star Game to include black players.

    That year, a song about Robinson by Buddy Johnson, "Did You See Jackie Robinson Hit That Ball?", reached number 13 on the charts; Count Basie recorded a famous version. Ultimately, the Dodgers won the National League pennant, but lost in five games to the New York Yankees in the 1949 World Series.

    Summer 1949 brought an unwanted distraction for Robinson. In July, he was called to testify before the United States House of Representatives' Committee on Un-American Activities (HUAC) concerning statements made that April by black athlete and actor Paul Robeson. Robinson was reluctant to testify, but he eventually agreed to do so, fearing it might negatively affect his career if he declined.

    In 1950, Robinson led the National League in double plays made by a second baseman with 133. His salary that year was the highest any Dodger had been paid to that point: $35,000 ($338,091 in 2012 dollars). He finished the year with 99 runs scored, a .328 batting average, and 12 stolen bases. The year saw the release of a film biography of Robinson's life, The Jackie Robinson Story, in which Robinson played himself, and actress Ruby Dee played Rachael "Rae" (Isum) Robinson. The project had been previously delayed when the film's producers refused to accede to demands of two Hollywood studios that the movie include scenes of Robinson being tutored in baseball by a white man. The New York Times wrote that Robinson, "doing that rare thing of playing himself in the picture's leading role, displays a calm assurance and composure that might be envied by many a Hollywood star."

    Robinson's Hollywood exploits, however, did not sit well with Dodgers co-owner Walter O'Malley, who referred to Robinson as "Rickey's prima donna". In late 1950, Rickey's contract as the Dodgers' team President expired. Weary of constant disagreements with O'Malley, and with no hope of being re-appointed as President of the Dodgers, Rickey cashed out his one-quarter financial interest in the team, leaving O'Malley in full control of the franchise. Rickey shortly thereafter became general manager of the Pittsburgh Pirates. Robinson was disappointed at the turn of events and wrote a sympathetic letter to Rickey, whom he considered a father figure, stating, "Regardless of what happens to me in the future, it all can be placed on what you have done and, believe me, I appreciate it."

    Before the 1951 season, O'Malley reportedly offered Robinson the job of manager of the Montreal Royals, effective at the end of Robinson's playing career. O'Malley was quoted in the Montreal Standard as saying, "Jackie told me that he would be both delighted and honored to tackle this managerial post"—although reports differed as to whether a position was ever formally offered.

    During the 1951 season, Robinson led the National League in double plays made by a second baseman for the second year in a row, with 137. He also kept the Dodgers in contention for the 1951 pennant. During the last game of the season, in the 13th inning, he had a hit to tie the game, and then won the game with a home run in the 14th. This forced a playoff against the New York Giants, which the Dodgers lost.

    Despite Robinson's regular-season heroics, the Dodgers lost the pennant on Bobby Thomson's famous home run, known as the Shot Heard 'Round the World, on October 3, 1951. Overcoming his dejection, Robinson dutifully observed Thomson's feet to ensure he touched all the bases. Dodgers sportscaster Vin Scully later noted that the incident showed "how much of a competitor Robinson was." He finished the season with 106 runs scored, a batting average of .335, and 25 stolen bases.

    Robinson had what was an average year for him in 1952. He finished the year with 104 runs, a .308 batting average, and 24 stolen bases. He did, however, record a career-high on-base percentage of .436. The Dodgers improved on their performance from the year before, winning the National League pennant before losing the 1952 World Series to the New York Yankees in seven games. That year, on the television show Youth Wants to Know, Robinson challenged the Yankees' general manager, George Weiss, on the racial record of his team, which had yet to sign a black player. Sportswriter Dick Young, whom Robinson had described as a "bigot", said, "If there was one flaw in Jackie, it was the common one. He believed that everything unpleasant that happened to him happened because of his blackness." The 1952 season was the last year Robinson was an everyday starter at second base. Afterward, Robinson played variously at first, second, and third bases, shortstop, and in the outfield, with Jim Gilliam, another black player, taking over everyday second base duties. Robinson's interests began to shift toward the prospect of managing a major league team. He had hoped to gain experience by managing in the Puerto Rican Winter League, but according to the New York Post, Commissioner Happy Chandler denied the request.

    In 1953, Robinson had 109 runs, a .329 batting average, and 17 steals, leading the Dodgers to another National League pennant (and another World Series loss to the Yankees, this time in six games). Robinson's continued success spawned a string of death threats. He was not dissuaded, however, from addressing racial issues publicly. That year, he served as editor for Our Sports magazine, a periodical focusing on Negro sports issues; contributions to the magazine included an article on golf course segregation by Robinson's old friend Joe Louis. Robinson also openly criticized segregated hotels and restaurants that served the Dodger organization; a number of these establishments integrated as a result, including the five-star Chase Park Hotel in St. Louis.

    In 1954, Robinson had 62 runs, a .311 batting average, and 7 steals. His best day at the plate was on June 17, when he hit two home runs and two doubles. The following autumn, Robinson won his only championship when the Dodgers beat the New York Yankees in the 1955 World Series. Although the team enjoyed ultimate success, 1955 was the worst year of Robinson's individual career. He hit .256 and stole only 12 bases. The Dodgers tried Robinson in the outfield and as a third baseman, both because of his diminishing abilities and because Gilliam was established at second base. Robinson, then 37 years old, missed 49 games and did not play in Game 7 of the World Series. Robinson missed the game because manager Walter Alston decided to play Gilliam at second and Don Hoak at third base. That season, the Dodgers' Don Newcombe became the first black major league pitcher to win twenty games in a year.

    In 1956, Robinson had 61 runs, a .275 batting average, and 12 steals. By then, he had begun to exhibit the effects of diabetes, and to lose interest in the prospect of playing or managing professional baseball. After the season, Robinson was traded by the Dodgers to the arch-rival New York Giants for Dick Littlefield and $35,000 cash (equal to $299,192 today). The trade, however, was never completed; unbeknownst to the Dodgers, Robinson had already agreed with the president of Chock full o'Nuts to quit baseball and become an executive with the company. Since Robinson had sold exclusive rights to any retirement story to Look magazine two years previously,[165&91; his retirement decision was revealed through the magazine, instead of through the Dodgers organization.

    Legacy

    Robinson's major league debut brought an end to approximately sixty years of segregation in professional baseball, known as the baseball color line. After World War II, several other forces were also leading the country toward increased equality for blacks, including their accelerated migration of to the North, where their political clout grew, and President Harry Truman's desegregation of the military in 1948. Robinson's breaking of the baseball color line and his professional success symbolized these broader changes and demonstrated that the fight for equality was more than simply a political matter. Martin Luther King, Jr. said that he was "a legend and a symbol in his own time", and that he "challenged the dark skies of intolerance and frustration." According to historian Doris Kearns Goodwin, Robinson's "efforts were a monumental step in the civil-rights revolution in America ... [His&91; accomplishments allowed black and white Americans to be more respectful and open to one another and more appreciative of everyone's abilities."

    Beginning his major league career at the relatively advanced age of twenty-eight, he played only ten seasons, all of them for the Brooklyn Dodgers. During his career, the Dodgers played in six World Series, and Robinson himself played in six All-Star Games. In 1999, he was posthumously named to the Major League Baseball All-Century Team.

    Robinson's career is generally considered to mark the beginning of the post–"long ball" era in baseball, in which a reliance on raw power-hitting gave way to balanced offensive strategies that used footspeed to create runs through aggressive baserunning. Robinson exhibited the combination of hitting ability and speed which exemplified the new era. He scored more than 100 runs in six of his ten seasons (averaging more than 110 runs from 1947 to 1953), had a .311 career batting average, a .409 career on-base percentage, a .474 slugging percentage, and substantially more walks than strikeouts (740 to 291). Robinson was one of only two players during the span of 1947–56 to accumulate at least 125 steals while registering a slugging percentage over .425 (Minnie Miñoso was the other). He accumulated 197 stolen bases in total, including 19 steals of home. None of the latter were double steals (in which a player stealing home is assisted by a player stealing another base at the same time). Robinson has been referred to by author David Falkner as "the father of modern base-stealing."

    "I'm not concerned with your liking or disliking me ... all I ask is that you respect me as a human being." —Robinson, on his legacy

     

    Historical statistical analysis indicates Robinson was an outstanding fielder throughout his ten years in the major leagues and at virtually every position he played. After playing his rookie season at first base, Robinson spent most of his career as a second baseman. He led the league in fielding among second basemen in 1950 and 1951. Toward the end of his career, he played about 2,000 innings at third base and about 1,175 innings in the outfield, excelling at both.

    Assessing himself, Robinson said, "I'm not concerned with your liking or disliking me ... all I ask is that you respect me as a human being." Regarding Robinson's qualities on the field, Leo Durocher said, "Ya want a guy that comes to play. This guy didn't just come to play. He come to beat ya. He come to stuff the goddamn bat right up your ass."

    Post-baseball life

    Robinson as ABC sports announcer in 1965

    Robinson retired from baseball on January 5, 1957. Later that year, after he complained of numerous physical ailments, his doctors diagnosed Robinson with diabetes, a disease that also affected his brothers. Although Robinson adopted an insulin injection regimen, the state of medicine at the time could not prevent continued deterioration of Robinson's physical condition from the disease.

    In his first year of eligibility for the Baseball Hall of Fame in 1962, Robinson encouraged voters to consider only his on-field qualifications, rather than his cultural impact on the game. He was elected on the first ballot, becoming the first black player inducted into the Cooperstown museum.

    In 1965, Robinson served as an analyst for ABC's Major League Baseball Game of the Week telecasts, the first black person to do so. In 1966, Robinson was hired as general manager for the short-lived Brooklyn Dodgers of the Continental Football League. In 1972, he served as a part-time commentator on Montreal Expos telecasts.

    On June 4, 1972, the Dodgers retired his uniform number, 42, alongside those of Roy Campanella (39) and Sandy Koufax (32). From 1957 to 1964, Robinson was the vice president for personnel at Chock full o'Nuts; he was the first black person to serve as vice president of a major American corporation. Robinson always considered his business career as advancing the cause of black people in commerce and industry. Robinson also chaired the National Association for the Advancement of Colored People's (NAACP) million-dollar Freedom Fund Drive in 1957, and served on the organization's board until 1967. In 1964, he helped found, with Harlem businessman Dunbar McLaurin, Freedom National Bank—a black-owned and operated commercial bank based in Harlem. He also served as the bank's first Chairman of the Board. In 1970, Robinson established the Jackie Robinson Construction Company to build housing for low-income families.

    Robinson was active in politics throughout his post-baseball life. He identified himself as a political independent although he held conservative opinions on several issues, including the Vietnam War (he once wrote Martin Luther King, Jr. to defend the Johnson Administration's military policy). After supporting Richard Nixon in his 1960 presidential race against John F. Kennedy, Robinson later praised Kennedy effusively for his stance on civil rights. Robinson was angered by conservative Republican opposition to the Civil Rights Act of 1964. He became one of six national directors for Nelson Rockefeller's unsuccessful campaign to be nominated as the Republican candidate for the 1964 presidential election. After the party nominated Senator Barry Goldwater of Arizona instead, Robinson left the party's convention commenting that he now had "a better understanding of how it must have felt to be a Jew in Hitler's Germany". He later became special assistant for community affairs when Rockefeller was re-elected governor of New York in 1966. Switching his allegiance to the Democrats, he subsequently supported Hubert Humphrey against Nixon in 1968.

    Protesting the major leagues' ongoing lack of minority managers and central office personnel, Robinson turned down an invitation to appear in an old-timers' game at Yankee Stadium in 1969. He made his final public appearance on October 15, 1972, throwing the ceremonial first pitch before Game 2 of the World Series. He gratefully accepted a plaque honoring the twenty-fifth anniversary of his MLB debut, but also commented, "I'm going to be tremendously more pleased and more proud when I look at that third base coaching line one day and see a black face managing in baseball." This wish was fulfilled only after Robinson's death: following the 1974 season, the Cleveland Indians gave their managerial post to Frank Robinson (no relation), a Hall of Fame-bound player who would go on to manage three other teams. Despite the success of these two Robinsons and other black players, the number of African-American players in Major League Baseball has declined since the 1970s.

    Family life and death

    After Robinson's retirement from baseball, his wife, Rachel Robinson, pursued a career in academic nursing—she became an assistant professor at the Yale School of Nursing and director of nursing at the Connecticut Mental Health Center. She also served on the board of the Freedom National Bank until it closed in 1990. She and Jackie had three children: Jackie Robinson Jr. (born November 18, 1946), Sharon Robinson (born January 13, 1950), and David Robinson (born May 14, 1952).

    Robinson's eldest son, Jackie Robinson Jr., had emotional trouble during his childhood and entered special education at an early age. He enrolled in the Army in search of a disciplined environment, served in the Vietnam War, and was wounded in action on November 19, 1965. After his discharge, he struggled with drug problems. Robinson Jr. eventually completed the treatment program at Daytop Village in Seymour, Connecticut, and became a counselor at the institution. On June 17, 1971, at the age of 24, he was killed in an automobile accident. The experience with his son's drug addiction turned Robinson, Sr. into an avid anti-drug crusader toward the end of his life.

    Robinson did not long outlive his son. Complications of heart disease and diabetes weakened Robinson and made him almost blind by middle age. On October 24, 1972, he died of a heart attack at home in Stamford, Connecticut, aged fifty-three. Robinson's funeral service on October 27, 1972, at New York City's Riverside Church attracted 2,500 admirers. Many of his former teammates and other famous black baseball players served as pallbearers, and the Rev. Jesse Jackson gave the eulogy. Tens of thousands of people lined the subsequent procession route to Robinson's interment site at Cypress Hills Cemetery in Brooklyn, New York, where he is buried next to his son Jackie and mother-in-law Zellee Isum. Jackie Robinson Parkway also runs through the cemetery.

    After Robinson's death, his widow founded the Jackie Robinson Foundation, of which she remains an officer as of 2009. On April 15, 2008, she announced that in 2010 the foundation will be opening a museum devoted to Jackie in Lower Manhattan. Robinson's daughter, Sharon, became a midwife, educator, director of educational programming for MLB, and the author of two books about her father. His youngest son, David, who has ten children, is a coffee grower and social activist in Tanzania.

    Awards and recognition

    According to a poll conducted in 1947, Robinson was the second most popular man in the country, behind Bing Crosby. In 1999, he was named by Time on its list of the 100 most influential people of the 20th century. Also in 1999, he ranked number 44 on the Sporting News list of Baseball's 100 Greatest Players and was elected to the Major League Baseball All-Century Team as the top vote-getter among second basemen. Baseball writer Bill James, in The New Bill James Historical Baseball Abstract, ranked Robinson as the 32nd greatest player of all time strictly on the basis of his performance on the field, noting that he was one of the top players in the league throughout his career. Robinson was among the 25 charter members of UCLA’s Athletics Hall of Fame in 1984. In 2002, Molefi Kete Asante included Robinson on his list of 100 Greatest African Americans. Robinson has also been honored by the United States Postal Service on three separate postage stamps, in 1982, 1999, and 2000.

    The City of Pasadena has recognized Robinson in several ways. Brookside Park, situated next to the Rose Bowl, features a baseball diamond and stadium named Jackie Robinson Field. The city's Human Services Department operates the Jackie Robinson Center, a community outreach center that provides early diabetes detection and other services. In 1997, a $325,000 bronze sculpture (equal to $470,522 today) by artists Ralph Helmick, Stu Schecter, and John Outterbridge depicting oversized nine-foot busts of Robinson and his brother Mack was erected at Garfield Avenue, across from the main entrance of Pasadena City Hall; a granite footprint lists multiple donors to the commission project, which was organized by the Robinson Memorial Foundation and supported by members of the Robinson family.

    Major League Baseball has honored Robinson many times since his death. In 1987, both the National and American League Rookie of the Year Awards were renamed the "Jackie Robinson Award" in honor of the first recipient (Robinson's Major League Rookie of the Year Award in 1947 encompassed both leagues). On April 15, 1997, Robinson's jersey number, 42, was retired throughout Major League Baseball, the first time any jersey number had been retired throughout one of the four major American sports leagues.

    As an exception to the retired-number policy, MLB has recently begun honoring Robinson by allowing players to wear number 42 on April 15, Jackie Robinson Day. For the 60th anniversary of Robinson's major league debut, MLB invited players to wear the number 42 on Jackie Robinson Day in 2007. The gesture was originally the idea of outfielder Ken Griffey, Jr., who sought Rachel Robinson's permission to wear the number. After receiving her permission, Commissioner Bud Selig not only allowed Griffey to wear the number, but also extended an invitation to all major league teams to do the same. Ultimately, more than 200 players wore number 42, including the entire rosters of the Los Angeles Dodgers, New York Mets, Houston Astros, Philadelphia Phillies, St. Louis Cardinals, Milwaukee Brewers, and Pittsburgh Pirates. The tribute was continued in 2008, when, during games on April 15, all members of the Mets, Cardinals, Washington Nationals, and Tampa Bay Rays wore Robinson's number 42. On June 25, 2008, MLB installed a new plaque for Robinson at the Baseball Hall of Fame commemorating his off-the-field impact on the game as well as his playing statistics. In 2009, all uniformed personnel (players, managers, coaches, and umpires) wore number 42 on April 15.

    At the November 2006 groundbreaking for a new ballpark for the New York Mets, Citi Field, it was announced that the main entrance, modeled on the one in Brooklyn's old Ebbets Field, would be called the Jackie Robinson Rotunda. The rotunda was dedicated at the opening of Citi Field on April 16, 2009. It honors Robinson with large quotations spanning the inner curve of the facade and features a large freestanding statue of his number, 42, which has become an attraction in itself. Mets owner Fred Wilpon announced that, in conjunction with Citigroup and the Jackie Robinson Foundation, the Mets will create a Jackie Robinson Museum and Learning Center, located at the headquarters of the Jackie Robinson Foundation at One Hudson Square in lower Manhattan. The main purpose of the museum will be to fund scholarships for "young people who live by and embody Jackie's ideals."

    Since 2004, the Aflac National High School Baseball Player of the Year has been presented the "Jackie Robinson Award".

    Robinson has also been recognized outside of baseball. In December 1956, the NAACP recognized him with the Spingarn Medal, which it awards annually for the highest achievement by an African-American. President Ronald Reagan posthumously awarded Robinson the Presidential Medal of Freedom on March 26, 1984, and on March 2, 2005, President George W. Bush gave Robinson's widow the Congressional Gold Medal, the highest civilian award bestowed by Congress; Robinson was only the second baseball player to receive the award, after Roberto Clemente. On August 20, 2007, California Governor Arnold Schwarzenegger and his wife, Maria Shriver, announced that Robinson was inducted into the California Hall of Fame, located at The California Museum for History, Women and the Arts in Sacramento.

    A number of buildings have been named in Robinson's honor. The UCLA Bruins baseball team plays in Jackie Robinson Stadium, which, because of the efforts of Jackie's brother Mack, features a memorial statue of Robinson by sculptor Richard H. Ellis. City Island Ballpark in Daytona Beach, Florida—the baseball field that became the Dodgers' de facto spring training site in 1947—was renamed Jackie Robinson Ballpark in 1989. A number of facilities at Pasadena City College (successor to PJC) are named in Robinson's honor, including Robinson Field, a football/soccer/track facility named jointly for Robinson and his brother Mack. The New York Public School system has named a middle school after Robinson, and Dorsey High School plays at a Los Angeles football stadium named after him. In 1976, his home in Brooklyn, the Jackie Robinson House, was declared a National Historic Landmark. Robinson also has an asteroid named after him, 4319 Jackierobinson. In 1997, the United States Mint issued a Jackie Robinson commemorative silver dollar, and five dollar gold coin. That same year, New York City renamed the Interboro Parkway in his honor.

    In 2011, the U.S. placed a plaque at Robinson's Montreal home to honor the ending of segregation in baseball. The home is located at 8232 avenue de Gaspe south of rue de Guizot Est and near Jarry Park and close to Delorimier Stadium, where Robinson played for the Montreal Royals during 1946. In a letter read during the ceremony, Rachel Robinson, Jackie's widow, wrote: "I remember Montreal and that house very well and have always had warm feeling for that great city. Before Jack and I moved to Montreal, we had just been through some very rough treatment in the racially biased South during spring training in Florida. In the end, Montreal was the perfect place for him to get his start. We never had a threatening or unpleasant experience there. The people were so welcoming and saw Jack as a player and as a man."

    Career statistics

    YearTeamGABRH2B3BHRRBISBCSBBSOAVGOBPSLGTBSHSFIBBHBPGDPE
    1945 Kansas City 47 163 36 63 14 4 5 23 13       .387                  
    1946 Montreal 124 444 113 155 25 8 3 66 40   92 27 .349                 10
    1947 Brooklyn 151 590 125 175 31 5 12 48 29   74 36 .297 .383 .427 252 28     9 5 16
    1948 Brooklyn 147 574 108 170 38 8 12 85 22   57 37 .296 .367 .453 260 8     7 7 15
    1949 Brooklyn 156 593 122 203 38 12 16 124 37   86 27 .342 .432 .528 313 17     8 22 16
    1950 Brooklyn 144 518 99 170 39 4 14 81 12   80 24 .328 .423 .500 259 10     5 11 11
    1951 Brooklyn 153 548 106 185 33 7 19 88 25 8 79 27 .338 .429 .527 289 6     9 10 7
    1952 Brooklyn 149 510 104 157 17 3 19 75 24 7 106 40 .308 .440 .465 237 6     14 16 20
    1953 Brooklyn 136 484 109 159 34 7 12 95 17 4 74 30 .329 .425 .502 243 9     7 12 6
    1954 Brooklyn 124 386 62 120 22 4 15 59 7 3 63 20 .311 .413 .505 195 5 4a   7 13 7
    1955 Brooklyn 105 317 51 81 6 2 8 36 12 3 61 18 .256 .378 .363 115 6 3 5b 3 8 10
    1956 Brooklyn 117 357 61 98 15 2 10 43 12 5 60 32 .275 .382 .412 147 9 2 2 3 9 9
    TotalsBrooklyn13824877947151827354137734197 740291.311.409.47423101049772113107
     Career155354941096173634267161867248   .316    97   

    a The sacrifice fly (SF) as a unique statistical category did not exist in Major League Baseball from 1940 through 1953. Any pre-1954 sacrifice flies by Robinson would be reflected in the sacrifice hit (SH) category.

    b Likewise, the intentional walk (IBB) category only became a unique statistic beginning in 1955. Any intentional walks issued to Robinson before that year would be reflected in the walk (BB) category.

     


              The clones were bad in that they were late        
    A lot of things didn't happen quickly enough at Apple because Steve Jobs wasn't there any longer. Yes, he's a bad manager, pressing people for excellence, and far too quickly and far too vocally. We can see however, in his absence, that things became a bit too relaxed and almost killed Apple. Had Apple entertained the idea of clones after the first successful year of Macintosh, they'd be ahead of the game now. Instead, they chose to file lawsuits against Digital Research and Atari over GEM. Had they brought Digital Research into the fold, they could have accelerated their GUI grip on the computing world. Atari were selling computers for about a third of the price of the equivalent Macintosh. Had Apple struck a deal instead of a lawsuit, all three companies could have profited and ended up as leaders before the Windows 3.x monster took over. It was almost 10 years later that the clone business finally got into gear and Power Computing was the first licensee, as I recall. They were people from APS Technologies, a Macintosh peripherals supplier, and from Dell, for the most part. They had a handle on the market, had different goals, and outsold Apple in many respects, including some deal involving 5000 machines going to NASA, I believe. Power Computing was a build-to-order business so they could change more quickly. The first few clones were barely more than Apple motherboards in typical PC metal wrapped with nicer beige plastic. Later, they enhanced the motherboards for faster bus speed, taking Apple's 40 MHz bus to 60 MHz. They pushed PowerPC for all it was worth and pushed Apple in the process. Apple slumped in response. Apple and Steve Jobs won in the end by buying back the license for $100 million but it was the consumers who truly won because we got more for less. It's just too bad Apple didn't do clones earlier. Of course, the majority of people might be complaining about Apple now, instead of Microsoft.
              Power Computing...        
    No, licensing to Power Computing wasn't a mistake. Yanking all the cloners licenses was. And not having a provision in the License giving Apple a free or low cost license in return for any hardware innovations the Licensees came up with. Apple could have simply licensed back PCC and Motorola's better logic board designs and sold the same units as Apple Branded. Instead Apple killed a growing Mac Market that approaching 10% of all PC's sold at it's height, and went back to about 4% or so until recent times. I *LOVE* my PcwerCenter 132, and if it would run MacOS X, I'd still be using it today. The PowerCenter 132 is based on the 7200 Logic board, so will never run MacOS X.
              RE[3]: Hate'em or love'em...        
    CoreImage, CoreGraphics, CoreVideo, CoreData, Applescript (no, AS is far more than an automation that sends keystrokes and mouse clicks), Firewire and MPEG4 (uses QT container) are just a few examples how Apple has helped to drive innovation in the computing industry. While I highly doubt that Apple came up with many of those ideas itself (maybe some of them), they recognized the value of the ideas and made them accessible to developers and consumers. Also, the user experience is more than the look of the product. Apple did not just design something that worked. They designed something that's convenient to use by packing useful programs, designing GUIs that require less clicking and navigation, adding the ability to automate programs and transfer data between one and another (Applescript), making the OS unobtrusive, providing dictionary popup tips etc. While anyone of these changes would be insignificant, hundreds of such changes will add up and create a positive user experience.
              RE[4]: Hate'em or love'em...        
    you said: "CoreImage, CoreGraphics, CoreVideo, CoreData, Applescript (no, AS is far more than an automation that sends keystrokes and mouse clicks), Firewire and MPEG4 (uses QT container) are just a few examples how Apple has helped to drive innovation in the computing industry. While I highly doubt that Apple came up with many of those ideas itself (maybe some of them), they recognized the value of the ideas and made them accessible to developers and consumers." Actually, all of them were created at Apple, except the MPEG-4 codecs (and the file format is Apple, as you correctly noted). Throw in Automator (and anyone who thinks for a second that VIsual Basic is anything like it hasn't looked at Automator) and iTunes while you're at it.Edited 2006-10-04 16:29
              Plesu despre Antonescu: Un profesoras surescitat care nu stie sa-si faca lectiile        
    Andrei Plesu a raspuns azi acuzatiilor lui Crin Antonescu, potrivit caruia nu ar fi avut curajul sa protesteze fata de "mitocaniile" presedintelui. Plesu spune ca liderul PNL este intr-o grava eroare si a reusit performanta de a citi mai putin decat seful statului. Altfel, ar fi fost la curent cu cr...
              Andreea Paul Vass: Este Romania pregatita sa aiba o doamna presedinte, prim-ministru sau ministru?        
    Andreea Paul Vass, consilierul premierului Emil Boc, a declarat sambata ca, inclusiv presedintele Traian Basescu are nevoie sa se deschida putin asupra a ceea ce inseamna perspectiva privind viitorul politicii romanesti, aratand ca nu mai poate fi o clasa politica in care decid 90% barbatii si 10% f...
              R. Haas: "Cred ca neacceptarea Turciei in Uniune este un lucru rau pentru Europa si Turcia"        
    Presedintele Council of Foreign Relations, sustine acceptarea Turciei in Uniunea Europeana. Faptul ca America este o tara multiculturala, este in opinia lui Haas unul dintre ingredientele succesului SUA, iar modul in care Uniunea Europeana trateaza problema Turciei este cel putin nepotrivita. "Cr...
              Udrea: M-am saturat sa iasa fiecare sa dea lectii PDL. Problemele din interiorul partidului le rezolvam singuri        
    Vicepresedintele PDL Elena Udrea spune ca s-a "saturat sa iasa fiecare sa dea lectii" partidului, "cu atat mai putin cei care au venit si au castigat de pe urma partidului", informeaza Mediafax. Ministrul Turismului a adaugat ca sunt probleme si in interiorul PDL, dar pe acestea le pot rezolva singu...
              Cel putin trei manifestanti au fost arestati in timpul unor confruntari pe Wall Street        
    Cel putin trei manifestanti din cadrul miscarii impotriva Wall Street au fost arestati vineri dimineata de Politia din New York, in timpul unor confruntari in cartierul financiar, informeaza AFP. Politia a incercuit un grup de manifestanti care se indrepta spre sediul bursei americane mergand...
              Cel putin 37 de morti din cauza intemperiilor din America Centrala        
    Ploile torentiale inregistrate in zona Americii Centrale de la inceputul saptamanii au provocat moartea a 37 de persoane, alte 70.000 fiind sinistrate. In Guatemala, cel mai grav afectata de intemperii, au fost inregistrate 22 de decese, in Nicaragua - sapte, in Salvador - sase, iar in Honduras -...
              Jerry Seinfeld vrea ca urmasii lui sa fie si ei "ciudati"        
    "Este amuzant sa fii caraghios! Si e si mai bine sa fii ciudat!”. Cel putin aceasta e parerea lui Jerry Seinfeld (57 de ani), vedeta sitcom-ului cu acelasi nume, difuzat la PRO Cinema (luni-joi, ora 21.00). Invitati in cadrul unei emisiuni tv, Jerry si sotia sa, Jessica, au vorbit ...
              Playtime with Phaser        

    For the past few days, I’ve been playing around with Phaser, a game engine written in JavaScript. I decided that I’d like to experiment with game development for the next month. It has been a career path I’ve considered on and off throughout my life, but I need to put the idea to the test: do I actually want to make games, or do I just find the thought of doing it appealing? Let’s find out!

    Struggle of Inaction

    A lot of new game developers (including myself) seem to fall into a trap. Do you want to make a game, or do you want to learn how to program games through engines? My problem was that I was obsessed with the idea that I had to start out learning how it all worked from the lowest level. “If I use an engine,” I would think to myself, “and it limited my grand ambitious game, whatever would I do?!” I would then attempt to learn OpenGL, get frustrated trying to tie everything together into something that resembles a game and give up.

    The fear of using an engine without fully understanding how games work was a huge concern, although I don’t know why. I don’t understand how my car works but that doesn’t stop me from using it. I think I was partially making excuses to justify the Not Invented Here Syndrome I was experiencing. If I really want to make games, an engine is probably the best place to start. When I run into issues due to gaps in my knowledge, I’ll just fill those gaps in as I need to.

    Select your Engines

    With a renewed sense of resolve, I now had to choose a language and engine to work in. I decided that my first project would be a simple platforming-style game so heavy engines like Unreal or CryEngine seemed a bit over-the-top. Unity is another very popular engine with indie and hobbyist developers, and has the ability to export your game to a variety of platforms. In the end, I felt forced into using their GUI app to get stuff done. I’m just not a big fan of using mice!

    It had been a few years since I last looked at JavaScript game engines. Back then, audio on the web wasn’t well-supported. The Web Audio API is now here but still doesn’t have full browser support (looking at you, IE). Regardless, I feel like JavaScript speed increases, audio API improvements and the growth of the JS game development community has made this a good time to try out writing a game in JavaScript.

    There are quite a few mature JS game engines around, such as MelonJS, ImpactJS, and Phaser. I ended up choosing Phaser for a few reasons:

    1. The Website looked good (Hey, what can I say, this actually matters to me)
    2. Excellent examples site and documentation. These two were fairly important in my final decision. The examples site contains many (you guessed it) examples of different ways to implement everything from animation via spritesheets, using the camera, music and more. I’m a learn-by-example kind of person, so this was perfect for me. The documentation is pretty great, and the source code itself is well commented and easy to understand.
    3. Price & license. ImpactJS costs $99USD for a license. While you receive the source code with your download, you can’t contribute upstream from what I understand. Both MelonJS and Phaser are open source under the MIT license. I’d prefer to use an open source engine if I could, as I’d like to contribute any bug fixes I may come across with the engine itself.
    4. Built-in support for levels created with Tiled, a tile-based map editor. This wasn’t a huge deal but it is nice to have.

    Both Phaser and MelonJS seemed equally capable. I found more questions asked on StackOverflow on Phaser (287 vs MelonJS’s 47 as of this post). While questions on StackOverflow isn’t the greatest metric to judge an engine on, I just wanted to make a quick choice and this shallow justification did the job.

    Initial thoughts & issues

    Now that I had my engine chosen, it was time to get started. This is where I encountered my first roadblock: I had no art. I needed some tilesets and character sprites to start off with. Luckily, there are plenty of freely licensed artwork packs available for those of us who are not artistically inclined. One such pack, Platformer Art Complete is a huge pack of tiles, items, character sprites and more made by an awesome dude named Kenney.

    After creating a small simple level with a few platforms, I loaded it into the engine and noticed that some platform tiles were not the ones I selected to use in Tiled. The initial spritesheet included in the pack that I was using had some excess art on the right margin. Spritesheets work by providing the size of each frame in the sheet, and the amount of rows and columns of frames. So if Tile N is on row 3, column 3 of the sheet, and each frame is 50 pixels square, then by grabbing the subsection of the image at x 100, y 100 should get us the desired frame. However, while Tiled was smart enough to remove the excess tiles from the spritesheet, there is no way Phaser could possibly know that; it just knows how big each frame is and the amount of frames per row and column. I found a version of Kenney’s platformer base pack that was made to work with Tiled. After using this, my problems went away. When I attempt to create my own art, I’ll be able to specify how the spritesheet is layed out. Until then, be mindful of your art!

    After ensuring the level was being rendering correctly, I added a simple character with basic move left/right controls. So far, so good. I decided to test out the camera functions by creating a level larger than the canvas/game viewport of 1280x720. For some reason, this caused my player sprite to get caught on some invisible walls. I did some research and found this thread with some else describing a similar issue. Luckily enough, a Phaser developer chimmed in stating that he found the cause and that it had been fixed in the dev branch. Thankfully, using the dev version of Phaser seemed to fix it.

    So far, I’m pretty happy with Phaser. Just getting things happening on a screen and reacting to input is pretty awesome. Hopefully I’ll have something to show off in my next post!


              Doctor Who and the iPad        


    For those of you that missed it, last week saw the launch of the Apple iPad - a nifty piece of technology designed to fill the void inbetween mobile phones and laptops.

    Steve Jobs of Apple (no, it wasn't really David Tennant, that was done in Photoshop) launched the iPad to much hype and fanfare and to certain mixed reviews from the media. I'm going to reserve judgement on it; for all that I like the iphone it is not without its drawbacks - the supposedly fully functioning Safari browser on the iPhone still won't upload media and has trouble playing certain sound and video files and it appears from what I've read so far that the iPad suffers the same issues.

    But that aside, I would be amazed if the iPad didn't make a dent in the market and point the way to how "computing on the move" is going to look over the next few years. Which has big implications for training and mobile learning. Will companies be willing to send people away to a hotel room for a couple of days when their people can receive training at their own convenience via their iPads, or whatever device we'll all be clutching in five years time ?

    What's that got to do with Doctor Who ? When I was a young kid, the whole family used to sit in the living room and we would watch telly all together. The next day at school, we would all talk in the playground about what we'd watched the night before. Nowadays, with hundreds of channels, and kids having their own TVs and computers in their bedrooms, watching TV is something which we rarely do together as a family any more and that sense of "shared experience" is lost.

    When Russell T Davis brought Doctor Who back to our screens, he publicly stated that one of his aims behind the programme was to bring back the "shared experience" to television; something the family would watch together and the children would talk about at school and in the playground whilst running around shouting "Exterminate" at each other. And in our family's case, I would say he has certainly succeeded.

    Maybe this is the area where formal training can still deliver and prosper - the sense of a coming together and a "shared experience" amongst employees. At least, perhaps, until virtual reality becomes technologically possible.


              Caching Awareness Day: Part 1        

    There are probably zillions of posts, tutorials etc around on how to do caching in ASP.NET. However a zillion+1 will not hurt. This post is more for sel-reference more than anything. I admit that sometimes I need to go over features I haven't used in a while (or ever?) to refresh my mind, this is one of those days.

    In my current job we have an application that was suffering from a performance hangover when retrieving some records from WebServices and the db. I thought for a while how caching can improve the user experience of some of guilty pages.

    After a few months in the thinking room waiting for the go ahead from the bosses, we got right into it. The idea was simple: when a particular record was requested from the services it was first stored in the Cache object and any subsequent request for that data will first check in the Application Cache to see if it's there, if there retrieve it, else go to the WebServices, get it, store it in the Cache etc etc. Needless to say the results where fantastic, the users are happy and they love their 'new' app. We are happy, but I kicked myself in the guts why didn't I do it in the first place!

    Anyway, enough yarns. I plan to post a series on Caching and the different techniques that can be used to put some Caching love into your apps.

    What is Caching?

    Caching is all about storing data, objects, pages, part of pages etc in memory immediately after is requested from the original source. These objects are usually stored for example on the Web server, proxy servers or even the client browser. Think of the benefits, much faster to retrieve data from a proxy server 'nearby'  for example, where this data has been previously requested and stored,  than retrieving the data from probably a data source thousands of miles away and likely to be some data that was computationally expensive to generate and retrieve.

    ASP.NET provides two types of caching:

    1. Output Caching, where you can store page and controls responses from the original server to the requesting browser.
    2. Data Caching, where you can programmatically store objects to the server's memory so that the application can fetch them from there rather than recreating them.

    Caching ASP.NET Pages: Output Caching

    Page output caching allows for subsequent requests for a given page to be provided from the cache so that the code that initially created the page does not execute. This is good for pages that are static and that you are confident are very frequently accessed pages. However if you have content on your page that is generated dynamically or has some dependency on a parameter or even a random image, then the same item will be displayed for the duration of the caching! beware! :-)

    To enable OutputCaching, you add a <%@ OutputCache directive to a page. For example, in the page below I have cached this page for 10 seconds.

    <%@ OutputCache VaryByParam="none" Duration="10" %>

    The contents of your page will not be regenerated each time a user requests the page, also the class behind the page will not be executed during that time. This is the most basic kind of OutputCaching you can set up for a page, although very limited and only useful for very static pages.

    Moving on, let's see all the properties that can be set for the OutputCache directive.

    ouputIntellisense

    Note that there is a property called 'VaryByParam". This one is very useful. For example, typical Master/Detail scenario, say you have a page where you show all Categories of Products in the Northwind database.

    categories

    ..and then you wanted to display the Products for each category in  a different page, passing the CategoryID in the query string.

    Capture2

    Capture3 

    Now if you did the above setup for your details page, then all your users will see whatever was cached first.

    Enter VaryByParam. This helps you by making ASP.NET cache a new instance of the page when a different value for the CategoryID query string parameter is passed to the Products page.

    <%@ OutputCache Duration="100" VaryByParam="CategoryID" %>

    You can also vary the output cache by multiple parameters by separating the list of params by semicolon in the VaryByParam attribute ..

    <%@ OutputCache Duration="100" VaryByParam="CategoryID;ProductID" %>

    Also you can generate a new version of the page when any of the params change by assigning a  * to the attribute.

    <%@ OutputCache Duration="100" VaryByParam="*" %>

    More information in caching by param can be found in MSDN 

    OutputCaching by browser Header

    It is possible to also use the VaryByHeader attribute to create different versions of a page according to the browser header. For example, my Firefox browser sends the below set of headers with information.

    Connection: keep-alive
    Keep-Alive: 300
    Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
    Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
    Accept-Encoding: gzip,deflate
    Accept-Language: en-gb,en;q=0.5
    Host: localhost
    User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.8.1.13) Gecko/20080311 Firefox/2.0.0.13

    My IE7 sends:

    Connection: Keep-Alive
    Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-ms-application, application/vnd.ms-xpsdocument, application/xaml+xml, application/x-ms-xbap, application/x-silverlight, application/x-shockwave-flash, application/x-silverlight-2-b1, */*
    Accept-Encoding: gzip, deflate
    Accept-Language: en-AU,es-UY;q=0.7,zh-CN;q=0.3
    Host: localhost
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SV1; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 3.5.21022)
    UA-CPU: x86

    You can check what your browser is sneaking out here or here ( as an aside, I heard that in the in 2001 a browser had some customer headers that were used to sneak information about that particular user...read it and see). In .Net I did the above by calling and then iterating the collection.

    NameValueCollection headerCollection = Request.Headers;


    So......
    <%@ OutputCache Duration="1000" VaryByParam="none" VaryByHeader="Accept-Language" %>

    That will cache a different page version according to the language used by the user.Right?

    ...Cache by Browser, getting introduced to the very handy VaryByCustom :-)

    You can also cache by the user's browser by using VaryByCustom attribute and using the 'special' browser attribute. By using this attribute, the page will be cached for each mayor browser, its   name and version, eg IE7 and IE8 will result in two different cached versions.

    <%@ OutputCache Duration="1000" VaryByParam="none" VaryByCustom="browser" %>

    VaryByCustom is very handy. Basically what you can do is write a function in Global.asax or write an HttpModule to handle caching for pages in any way you want.

    In Global.asax you do it by overriding the GetVaryCustomString() function.

    public override string GetVaryByCustomString(HttpContext context, string custom)
    {
         return base.GetVaryByCustomString(context, custom);
    }
    The function takes two parameters, the HttpContext for the request and a string which is the value you can set in VaryByCustom="[custom_string]", this string can be also be a nunber of string passed along separated by semicolon and you can then split it in GetVaryByCustomString() The context gives you access to everything you expect from HttpContext, session, Request etc etc, 
    Example: Say you want to cache pages according to the bosses's mood. 
    <%@ OutputCache Duration="1000" VaryByParam="none" VaryByCustom="BossHappinessLevel" %>
    Then your custom function could look like..
      
    public override string GetVaryByCustomString(HttpContext context, string custom)
    {
        if (custom == "BossHappinessLevel")
        {
            MyAjaxEnabledService a = new MyAjaxEnabledService();
            return a.BossHappinessLevel().ToString();       
        }
        return "default";        
    }

    Based on the string passed, the logic will just return a string that can uniquely identify a request and thus cache a different version of the page according to the current mood! ( The above example doesn't make any sense if your boss is agro all the time, meaning that the "angry" page will be cached most of the time. Of course for this to make more sense, your page will return different content according to the mood too..if he/she is angry or happy or just indifferent. Please drop me an email if you don't get it, I need a drink now! LOL

    Caching profiles in Web.Config

    Instead of setting the cache policy for each page individually, you can configure page caching in the web.config and then apply your killer settings to lots of pages...

    <system.web>
       <caching>
           <outputCacheSettings>
             <outputCacheProfiles>
                   <add duration="1000" name="ByBossHappiness" varyByParam="none" varyByCustom="BossHappinessLevel" />
                   <add duration="1000" name="ByBrowser" varyByCustom="browser" varyByParam="none" />
             </outputCacheProfiles>
           </outputCacheSettings>
       </caching>
    </system.web>

    Then your pages can recall any of the cacheprofiles by using the CacheProfile attribute of OutputCache

    <%@ OutputCache CacheProfile="ByBossHappiness" %>

    Next post:

    In my next post I'd like to investigate how to do the above programmatically and also expire pages in code due to some event for example, if someone in the Northwind database adds a new Product by using the Reponse.RemoveOutputCacheItem() function.

    Other things left to do include:
    • Partial Page caching.
    • UserControl caching.
    • Data caching
    • Caching by dependencies
    • SQL caching policies by using dependencies!

              REST with WCF        

    At the MS Heroes day, a few thursdays ago, our first session was on WCF and is fair to say a few of us were very impressed by what I saw and I just couldn't wait to recreate those presentations on my desk..

    What is WCF?

    From MSDN,

    Is a set of .net Technologies for building and running connected systems. It is a new breed of communications infrastructure built around the Web services architecture. Advanced Web services support in Windows Communication Foundation provides secure, reliable, and transacted messaging along with interoperability. The service-oriented programming model of Windows Communication Foundation is built on the Microsoft .NET Framework and simplifies development of connected systems

     

    What is REST ?

    REST is a architectural model ( it is not a standard ) for distributed computing that defines how resources are distributed and addressed.

    The acronym means Representational State Transfer, translated to mere mortals language it means that each unique URL is a representation of some data. It was term invented by Roy Fielding one of the principal authors of the HTTP protocol.

    I will post resources and links later in the post. However Google for REST and you'll get heaps of results if you are curious. Definitions are boring! I like doing things. But you need to know a bit of the theory.

    eg:

    http://localhost/myWebService/Employee/2

    http://localhost/myWebService/Employee

    http://localhost/myWebService/Product/89

    REST WebServices: An alternative to SOAP

    All the above urls will return you different data ( a representation of the resource requested ) according to (of course) on how you map this URL to your contracts.  First link might be mapped to return you the Employee with ID =2 and so on, or the Product with ID = 89

    Basic principles

    1. Identify the entities you want to expose a representation eg Employee, Product
    2. Create URL for each resource/entity. Resources should be nouns.
    3. Categorise resources according to whether clients can just get a representation of your data or whether they can modify the data. For resources that you just want to make available to clients, make them accessible using HTTP GET, for resources that you want to give the client the possibility to modify data, make them accessible using HTTP POST, PUT or DELETE
    4. Resources accessible via GET should be 'side effect' free. This means the web service call should not modify the data in the back end.

    Yahoo and Flickr amongst others use REST web services. Example of Flickr REST web service can be seen here

    Main advantages of using REST

    • Easy to work with, and easy to read for 'humans'.
    • Easy to consume ( not always, I hear Amazon services can be a pain to parse )
    • Improved server response times.

     

    I started working with this on the weekend after Microsoft Heroes in Sydney. At the time I challenged myself not to Google for answers and get the examples working only with the help of MSDN for WCF.

    It was not easy at first, MSDN is huge and it throws so much information at you, if you are not careful you start losing track of what link you open where and soon you lose track of what you are reading, at least I do!

    Needless to say it wasn't that easy. I find it interesting to see how much developers including myself sometimes google problems searching for tailor-made answers. Imagine a world without Google? Is mindblowing to think how older programmers looked for answers 20 years ago, maybe things where simpler those days. Hrmm..

    Ok, so lets get started, first of all I went NewSite -> WCF Service. Visual Studio will create a simple solution with an IService and a Service class and also a Service.svc file.

    First of all lets look at the IService interface is provided by default.

    [ServiceContract]
    public interface IService
    {
    
        [OperationContract]
        string GetData(int value);
    
        [OperationContract]
        CompositeType GetDataUsingDataContract(CompositeType composite);
    
        // TODO: Add your service operations here
    }

    FIrst thing you do is define a contract. You do this by adding the [ServiceContract]  attribute to your interface.  This contract will define what operations your webservice will ultimately support. Think of an operation as a method call that your service will expose. Each method in the interface that you want to expose, must then have the [OperationContract]  attribute defined / applied to it. If a method does not have this attribute, it won't be exposed therefore it wont be accessible by the service's clients.

    We then have to implement this interface and implement each method that we defined in our ServiceContract.

    I want to expose a method by a REST WebService to return an Employee Name representation when the URL is "GetEmployeeName/{id}".

    Remember that if we just want a representation of our data without any side effect by the REST principles we have to use the HTTP GET verb. WCF Web model allows you to do this by using the WebGet method attribute for Get operations. All you have to do is adorn your method with WebGet.

    For that to happen I have to define  my operation contract in the interface as follows:

    [OperationContract]
    [WebGet(UriTemplate= "GetEmployeeName/{id}", ResponseFormat = WebMessageFormat.Xml)]
    stringGetEmployeeName(Stringid);

    In the WebGet attribute we can also describe the layout of the URL that our WebService will respond to. For example I want the method above to be called upon to answer the GetEmployeeFirstName call when the URL is MyService.svc/GetEmployeeName/2

    We do this by adding a UriTemplate property to our WebGet attribute. This templates allow you to match an incoming URL to an operation in the service. The ResponseFormat attribute is self explanatory, you can choose XML or JSON.

    Now we have to implement our GetEmployeeeFirstName method in our class.

    public class Service : IService
    {
    
        public string GetEmployeeName(string id)
        {
            NorthwindDataContext ct = new NorthwindDataContext();
            return ct.Employees.Where(a => a.EmployeeID == Int32.Parse(id)).Select(a => a.FirstName + " " + a.LastName).Single();
        }
    }

    I'm using LinqToSql again to retrieve employees from the Northwind database.

    We are almost ready to go now. I had my biggest struggle with the web.config and configuring behaviours and endpoints. I wasn't the only one that struggled, for what I can gather around blogs etc and the poor MSDN documentation this wasn't that straightforward.

    I settled for the config settings below...

    <system.serviceModel>
            <bindings>
                <webHttpBinding>
                    <binding name="ServiceBehavior"></binding>                
                </webHttpBinding>        
            </bindings>
            <services>
                <service name="Service" behaviorConfiguration="ServiceBehavior">
                    <!-- Service Endpoints -->
                    <endpoint address=""  binding="webHttpBinding" behaviorConfiguration="ServiceBehavior" contract="IService"></endpoint>
                    <endpoint contract="IService" address="mex" binding="mexHttpBinding"></endpoint>                
                </service>            
            </services>
            <behaviors>
                <endpointBehaviors>
                    <behavior  name="ServiceBehavior">
                        <webHttp />                     
                    </behavior>                
                </endpointBehaviors>
                <serviceBehaviors>
                    <behavior name="ServiceBehavior">
                         To avoid disclosing metadata information, set the value below to false and remove the metadata endpoint above before deployment 
                        <serviceMetadata httpGetEnabled="true" />
                                         To receive exception details in faults for debugging purposes, set the value below to true.  Set to false before deployment to avoid disclosing exception information 
                        <serviceDebug includeExceptionDetailInFaults="true"/>
                    </behavior>  
                </serviceBehaviors>
           </behaviors>
    </system.serviceModel>

    Since I'm using the WCF web model and all my requests are through HTTP and not SOAP I have to use webHttpBinding .

    From MSDN..

    The WCF Web Programming Model allows developers to expose WCF Web services through HTTP requests that use "plain old XML" (POX) style messaging instead of SOAP-based messaging. For clients to communicate with a service using HTTP requests, an endpoint of the service must be configured with the WebHttpBinding that has the WebHttpBehavior attached to it. The WCF Web Programming Model also requires that the individual service operations are annotated with the WebGetAttribute or WebInvokeAttribute attributes. This defines a mapping from a URI and HTTP method to the service operation, as well as the format of the messages used to call the operation and return the results. Support in WCF for syndication and ASP.AJAX integration are both built on top of the WCF Web Programming Model.

    SO far so good, Now if we run our WCF app and we invoke the URL with GetEmployeeName/2 the employee name should be returned...

    http://localhost/DemoWCF/Service.svc/GetEmployeeName/2

    Capture

    http://localhost/DemoWCF/Service.svc/GetEmployeeName/3

    Capture2

    (BTW Vista Snipping Tool kicks bum big time!!!) ( David, I got to talk you into Vista for blogging Windows Live Writer Full, is awesome)

    Lets say I know want to get all the Employees Names by going to an url like this

    http://localhost/DemoWCF/Service.svc/Employees

    [OperationContract]
    [WebGet(UriTemplate = "Employees", ResponseFormat = WebMessageFormat.Xml)]
    List<String> GetEmployeesNames();

    My implementation of the operation would be something along the lines of..

    public List<String> GetEmployeesNames()
    {
        NorthwindDataContext ct = new NorthwindDataContext();
        Enumerable<String> ab = from emps in ct.Employees
                                select emps.FirstName + " " + emps.LastName;
        return ab.ToList();
    }

    And the result would be..

    Capture3 

    Now if I wanted the Response to be of

    WebMessageFormat.Json

    I would then have to change my OperationContract to note my intention as follows

    [OperationContract]
    [WebGet(UriTemplate = "Employees", ResponseFormat = WebMessageFormat.Json)]
    List<String> GetEmployeesNames();

    When I then go to the URI, you will then get prompted to save the response as a file...

    image 

    that upon opening with trusty Notepad you can see the JSON string...

    Capture5 

    In this post I just wanted to show how I got my REST services to work and I then plan to post about how to use PUT, POST and DELETE , how to return complex types, DataContracts and also how to pass querystring values to your OperationContract as a Stream, that in fact was the first thing that I got working. ( Quick preview below). I would also like to post all the source code of my working examples.

    [OperationContract]
    [WebInvoke(UriTemplate = "*", Method = "POST")]
    void UpdateEmployeeName(Stream id);
    Implementation
    public void UpdateEmployeeName(Stream id)
    {
       StreamReader reader = new StreamReader(id);
       String res = reader.ReadToEnd();
       NameValueCollection coll = HttpUtility.ParseQueryString(res);
       int employeeID = Int32.Parse(coll["elid"]);
       String newName = coll["newName"];
       NorthwindDataContext cts = new NorthwindDataContext();
       Employee e = cts.Employees.Where(a => a.EmployeeID == employeeID ).Single();
       e.LastName = newName;
       cts.SubmitChanges();
    }
    See you then.........

              Inaugural Podcast - Part 2 of 2 - Commentary        
    Welcome to the inaugural podcast of David on Enterprise Software.

    In this edition there's coverage of utility computing (both from a virtualization and a software-as-a-service perspective), knowledge management and IBM's Rational Unified Process.

    Please send me or call in your feedback!!

    To directly download this podcast, click here.

    Cheers,

    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Qingdao, China & Menlo Park, California
    DSL.7747350 -at- bloglines.com (used to avoid a bit of spam)
    callto://davidscottlewis
              Inaugural Podcast - Part 1 of 2 - Background & Mission        
    Welcome to the inaugural podcast of David on Enterprise Software.

    For commentary on utility computing (both from a virtualization and software-as-a-service perspective), knowledge management and IBM's Rational Unified Process see the second part of this podcast.

    To directly download part one, click here.
    To directly download part two, click here.


    Cheers,

    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Qingdao, China & Menlo Park, California
    DSL.7747350 -at- bloglines.com (used to avoid a bit of spam)
    callto://davidscottlewis
              [urls/news] The Global Grid: China's HPC Opportunity        
    Thursday, November 11, 2004
    Dateline: China
     
    For this posting, I'm using an annotated urls format.  Let's begin.
     
    The Global Grid
     
    Grid computing.  HPC (high-performance computing).  Lots of trade press coverage.  Lots of academic papers.  Generally, this is a GREAT convergence.  Didn't hold with AI (artificial intelligence), but the coverage of grid computing is much more pervasive.  Also, it's an area where I believe that systems integrators (SIs) in China can play with the globals.  It's new enough that there are no clear leaders.  Okay, maybe IBM is a clear leader, but it's certainly not an established market.
     
    It's also a market where Chinese SIs can leverage work done for domestic applications for Western clients.  This is NOT true in areas such as banking applications; the apps used in China are very different from the apps used in the States.  Fundamentally different systems.  But a lot of grid work is more about infrastructure and custom development.  There's also a lot of open source in the grid sphere.
     
    I've selected some of the best papers and sites for review.  This is certainly not meant to be comprehensive, but simply follow the links for more info.
     
    One last note:  Clicking on any of the following links will likely lead you to an abstract and possibly to some personal commentary not included in this posting.  You may also find related links found by other Furl users.
     
    The "Bible" of the grid world.  The home page will lead to many other relevant papers and reports.  See also The Anatomy of the Grid (PDF).
     
    Hottest journal issue in town!!  Papers may be downloaded for free.  See also Grid computing: Conceptual flyover for developers.
     
    One of the better conferences; covers applications and provides links to several excellent papers and presentations.
     
    Well, the link has been replaced.  Try to get a hold of this paper.  It WAS available for free.  SOA meets the grid.  The lead author, Liang-Jie Zhang, is a researcher at IBM T.J.Watson Research Center and chair of the IEEE Computer Society Technical Steering Committee (technical community) for Services Computing. Contact him at zhanglj@us.ibm.com .  Ask for his related papers, too.
     
    Several excellent papers; recent conference.  Middleware:  Yes, middleware is the key to SI opportunities.
     
    Conference held earlier this month!!  See who is doing what in China.
     
    Want a competitive edge in the grid space?  This is it!!
     
    NOTE:  A search for "grid computing" in my Furl archive yields 164 hits (and most are publicly searchable).  See http://www.furl.net/members/goldentriangle .
     
    Other News
     
    Outsourcing & Offshoring:
     
    I don't agree with this, but it's worth reading, especially considering the source.  I agree that China shouldn't try to be a clone of India, but the arguments in support of the domestic market don't consider margins.
     
    I'll be writing a column for the AlwaysOn Network about the disconnect between China's foreign policy initiatives and the realities of the IT sector.  Suffice it to say that SIs in China should NOT chase after the EU.  Again, do NOT confuse foreign policy with corporate policy!!
     
    More of the same.  Read my comments about Romania by clicking the link ...
     
    Google is coming to China, too.  Think MS Research in Beijing.
     
    Another great move by IBM; they're clearly leading the pack.
     
    This article is a bit confusing.  I suspect that TCS is simply copying the IGS China strategy.  But it's worth noting that they're moving beyond servicing their American clients with a presence in China.
     
    Yes, yes and yes.  Expect a lot more of this.  I wouldn't be surprised to see China's SIs forced to move a bit lower on the U.S. SI food chain for partnerships.  Move up the chain by thinking verticals!!
     
    BPO:
     
    No need to click; it's all about security.
     
    No, not really a new model; more about a new certification!!  Just what the world needs ...
     
    Enterprise Software:
     
    The title says it all.
     
    Maybe the "P" in "LAMP" should stand for "Plone"?
     
    A strategy for USERS, i.e., SIs in China.
     
    Marketing & Management:
     
    Product Management 101, courtesy of the Harvard Business School.
     
    Spread this throughout your organization ... and then ramp up with some paid tools.
     
    SCM (supply chain management) meets marketing, but with a general management and strategy slant.
     
    G2 planning strategies.  A wee bit mathematical, but still fairly easy to follow.
     
    Expect the next original posting in two or three weeks; my next column for the AlwaysOn Network will be sent to this list.  Off to HK/SZ/ZH/GZ next week.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [news] Grudge Match: China vs. Europe + "It's Malaysia Time ..."        
    Tuesday, September 7, 2004
    Dateline: China
     
    This week marks the debut of my bi-weekly (or so) column for the AlwaysOn Network, Silicon Valley's premier online social networking venue (and unofficially linked to Silicon Valley's premier in person social networking venue, the Churchill Club; I'm a member of both).  I will be sharing "Letter from China" columnist duties with Paul Waide, the head of Pacific Epoch, a Shanghai-based boutique consultancy that advises hedge funds on alternative investments in China.  My first column is on Shanghai and a couple/few forthcoming columns will examine cultural differences between Chinese Nationals, Chinese-Americans and Anglo-Americans, especially within the context of IT and IT marketing.  I will post my AlwaysOn "Letter from China" columns to this blog/e-newsletter, although please be advised that my intended audience are readers based in Silicon Valley.
     
    Grudge Match: China vs. Europe
     
    Staying on topic, I'd like to make a comment about a recent "Grudge Match" on the AlwaysOn Network.  See the item marked "Grudge Match" for 08.05.04 (5 August 2004) at http://www.alwayson-network.com/polling/index.php .
     
    In the referenced "Grudge Match," China was pitted against Europe.  China received 45% of the votes in contrast to Europe's 55%.  Frankly, I'm surprised that China did so well.  I've found that the AO "Grudge Match" results tend to indicate sentiment more so than reality.  For example, a recent match pitted SpaceShipOne against NASA and SSO absolutely clobbered NASA (besides, perhaps most of the votes for NASA came from either Ames or the Blue Cube).  Of course, SSO is a high school science experiment compared to what NASA is doing, but I believe the results accurately reflect sentiment. 
     
    But what is amazing (to me, at least) is that China was pitted against Europe in the first place!  Let's face it, this is a rather goofy "grudge match."  For Europe to include First World nations such as Germany, France, the U.K., Ireland, Italy, Switzerland, the Netherlands, Belgium, Sweden, Finland, Norway, Denmark (yes, some countries are intentionally left out) -- and to compare the collective whole of First World Europe (a.k.a. "Western Europe") to China is absurd.  If this was First World Europe vs. China circa 2020, okay.  But TODAY?  Yet, the sentiment indicator showed a strong vote in favor of China.  Europe "won," but barely.
     
    I propose the following "grudge match":  China vs. "Eastern Europe" (i.e., the former Soviet Bloc).  Look, if China can do so well against Europe as a whole (including First World Europe), I'm sure China would absolutely kick Second World Europe's butt!!  And a China "grudge match" against Eastern Europe more accurately reflects current "history."
     
    But even this is a bit misleading.  The real "grudge match" is this:  China + India vs. Second World Europe.  And given this choice, only someone stranded on Mars for the past decade might choose Second World Europe.  Yet, this is the real so-called "grudge match."  First World Europe is in descent, to be sure, but it's descending from a high altitude.  It will take at least a decade or two for China (and/or India) to truly match First World Europe.  But China ALREADY is superior to Second World Europe.  And don't rant about NATO and EU memberships; this is simply window dressing.  Then combine China with India versus Second World Europe, playing into my "Golden Triangle" theme, i.e., it's all about the U.S., India and China.  This is where the action is, ESPECIALLY in IT.
     
    "It's Malaysia Time ..."
     
    I must be getting punchy since I'm borrowing a theme from a beer commercial, but it seems that Malaysia is experiencing its 15 minutes of fame.  The Philippines has recently been "hot," and several articles of late have been touting Malaysia (see, for example, an article which appeared in Space Daily).  Frankly, I'm getting tired of all this nonsense.  Look, when it comes to ITO (IT outsourcing) in East Asia, there are just two choices, i.e., India and China.  And, it's not really a competition; both have their strengths and weaknesses.  A few crumbs to Singers (Singapore), maybe even a few crumbs to the Kiwis (New Zealand).  The Philippines deserves notice, albeit passing notice, and Malaysia might be okay for some BPO.  But ITO?  Come on, give me a break!!  See my Furl archive for more links.
     
    The only thing I recently found interesting regarding Malaysia was an article on Satyam's IT boot camp in Malaysia.  This isn't really unique, after all, IBM has been doing this sort of thing for decades.  So does HP.  Kind of like training plus a bit of brainwashing, but the brainwashing is acceptable since it includes political survival skills -- and said skills are essential, especially in F500 corporations.  But I like the idea of SI (systems integrator)-based training:  This way SIs can focus on "real" versus theoretically perceived needs.
     
    IT Tidbits
     
    Which certifications have the best ROI (return on investment)?  Playing off the idea of SI-based training, which are the most important certifications?  Well, Cisco leads with three out of the top five, although Microsoft picks up a couple of "wins" when looking at fastest-growing ROI, with RedHat and Oracle getting one win each.  SIs in China may also want to benchmark how much U.S. employees are paid given a certain certification, e.g., Microsoft DBAs receive an annual average salary of US$80,600.  Think about how much SIs in China pay for a certified Microsoft DBA.  For example, what do they get paid in Jinan -- or even in Dalian?  Compare this to US$80,600.  Spot any opportunities?  See http://tinyurl.com/3nvpz and http://tinyurl.com/6r2s5 .
     
    ITO in the news.  Two particularly noteworthy items.  First, ITO got Slashdotted.  The Slashdot links are worth a review.  Probably some good insight into what American software engineers are thinking and feeling.  The second is a review of Lou Dobbs' new book on ITO and BPO.  Mr. Dobbs is a well-respected host on CNN; his views shouldn't be taken lightly.  A couple of excerpts from the review:
     
    "GE, as Dobbs makes clear in abundant detail, is only one of many companies outsourcing high-tech and professional jobs to India and other parts of the world where wage expectations are lower.  Among the others spotlighted by Dobbs for outsourcing jobs to India, the Philippines, Romania, Ireland, Poland and other countries are IBM, SAS Institute, Intel, Microsoft, Perot Systems, Apple, Computer Associates, Dell, Hewlett-Packard, Oracle and Sun Microsystems."  My comment:  Romania is the Changsha of Third World Europe, i.e., their programmers are about as cheap as programmers come.
     
    "'India can provide our software; China can provide our toys; Sri Lanka can make our clothes; Japan make our cars.  But at some point we have to ask, what will we export?  At what will Americans work?  And for what kind of wages?  No one I've asked in government, business or academia has been able to answer those questions,' Dobbs writes."  See the review in the Tallahassee Democrat or my Furl link .
     
    So-called infrastructure vendors beat out app vendors in terms of their ability to meet expected ROI and TCO (total cost of ownership) levels.  I don't really like the way infrastructure and application vendors are defined in this article and related survey, but top honors go to IBM and Microsoft.  There's a lot being written between the lines, but in general this plays into my "build-to-a-stack" strategy, albeit Oracle is left behind.  See http://tinyurl.com/3tpjo .
     
    Speaking of Microsoft ...  A good, quick review of the various IBUs (independent business units) at Microsoft.  (See http://tinyurl.com/5rjtk .)  For a take on MBS, see http://tinyurl.com/6k4dp .
     
    New marketing technologies.  Interesting article from the premier issue of CMO (Chief Marketing Officer).  There are two ways to view this:  1) which marketing technologies can be used by SIs in China for their own marketing endeavors, and 2) which marketing technologies will likely be adopted by retailers, e-commerce sites, financial institutions and numerous other sectors -- and which in house skills does an SI in China need to implement these new technologies (all of which are IT-related)?  See http://tinyurl.com/57wvp .
     
    Looking for partners in the utility computing space?  For a start, try the top 25 vendors.  (See http://tinyurl.com/48s9j .)  Yankee gives a quick look at utility computing ROI (see http://tinyurl.com/5fw88 ).  HP chimes in with their take, too (see http://tinyurl.com/58mhg ; it's a PDF).
     
    The battle of the SI globals.  Two related articles both based on the same Forrester report.  (See http://tinyurl.com/6tfrn and http://tinyurl.com/5tljq .)  Issues being considered include scalability (i.e., handling US$100+ million accounts), the need for broad offerings (e.g., strategy consulting) and expanding geographical presence (hey, where is EDS in China?).   "(T)he (Forrester) study finds that Infosys and Wipro have melded together a mix of CMMI, P-CMM, Six Sigma and ISO 9000 to create a culture focused on consistent and repeatable processes and value-added tools."  For China's SIs, mostly food for thought -- and a bit of dreaming.
     
    ... and how to battle the globals.  The article was a bit silly, after all, G2000 firms joining forces to battle Accenture or Infosys doesn't really fit the notion of smaller firms joining forces.  But I believe that they're on the right track and that a myriad of partnerships will be formed to most effectively capture new business and battle the globals.  However, ISVs (independent software vendors) have to walk a very fine line.  SIs need to carefully consider ISV responses and existing alliances.  See http://tinyurl.com/7xj82 .
     
    "Infosys to set up second outsourcing facility in China."  The article states that Infosys is running out of space in their Pudong facility and that they're scouting for additional digs.  Come on, guys, running out of space?  There's not enough space in the Shanghai Pudong Software Park?  I don't think so ...  The reality is that Infosys needs to find lower cost developers.  As my column on Shanghai for AO's "Letter from China" notes, developers in Shanghai are a bit pricey compared to other places in China.  Infosys China is primarily servicing their global customers in China and looking for high-end integration within the domestic market.  However, this is a tough nut to crack and Infosys will need another development center to lower their overall costs -- and this is why they are looking for additional space IN ANOTHER CITY.  The idea that they're running out of space in the SPSP is ridiculous.  (I've been to their Shanghai digs ...)  See http://tinyurl.com/6nz8d .
     
    Zensar gets broader press coverage.  Kind of like watching a meme, a couple of non-Indian IT trades have picked up the Zensar/Broadengate announcement.  See http://tinyurl.com/65afx and http://tinyurl.com/3jh2r .
     
    "Rethinking the business case for Java."  A good article.  Hmmm ... maybe not much of a case, eh?    Hey, I'm still a believer.  See http://tinyurl.com/5hbcn .  Of course, Java programming ain't what it used to be ...
     
    "The selling of SOA."  Two-part series in Line56.  SUPERB!!  (I prefer the singular to the plural, i.e., "architecture" versus "architectures"; personal preference.)  Reviews various viewpoints on SOA.  See http://tinyurl.com/6xqdn and http://tinyurl.com/6tw9o .
     
    Urls update.  Expect to see lots and lots of stuff on software engineering and development.  Great stuff, too!!  Later this week.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [news] "2004 State of Application Development"        
    Friday, August 13, 2004
    Dateline: China
     
    Special issues of journals and magazines are often quite good -- if you're into the subject matter.  But the current issue of VARBusiness is absolutely SUPERB!!  EVERY SYSTEMS INTEGRATOR SHOULD READ IT ASAP -- STOP WHAT YOU'RE DOING AND READ THIS ISSUE!!  (Or, at the very least, read the excerpts which follow.)  See http://tinyurl.com/6smzu .  They even have the survey results to 36 questions ranging from change in project scope to preferred verticals.  In this posting, I'm going to comment on excerpts from this issue.  My comments are in blue.  Bolded excerpted items are MY emphasis.
     
    The lead article and cover story is titled, "The App-Dev Revolution."  "Of the solution providers we surveyed, 72 percent say they currently develop custom applications or tailor packaged software for their customers. Nearly half (45 percent) of their 2003 revenues came from these app-dev projects, and nearly two-thirds of them expect the app-dev portion of total revenue to increase during the next 12 months."  I view this as good news for China's SIs; from what I've observed, many SIs in China would be a good fit for SIs in the U.S. looking for partners to help lower their development costs.  "By necessity, today's solution providers are becoming nimbler in the software work they do, designing and developing targeted projects like those that solve regulatory compliance demands, such as HIPAA, or crafting wireless applications that let doctors and nurses stay connected while they roam hospital halls."  Have a niche; don't try to be everything to everyone.  "Nine in 10 of survey respondents said their average app-dev projects are completed in less than a year now, with the smallest companies (those with less than $1 million in revenue) finishing up in the quickest time, three months, on average."  Need for speed.  "The need to get the job done faster for quick ROI might explain the growing popularity of Microsoft's .Net framework and tools.  In our survey, 53 percent of VARs said they had developed a .Net application in the past 12 months, and 66 percent of them expect to do so in the coming 12 months."  My Microsoft build-to-their-stack strategy.  "Some of the hottest project areas they report this year include application integration, which 69 percent of VARs with between $10 million or more in revenue pinned as their busiest area.  Other top development projects center around e-commerce applications, CRM, business-intelligence solutions, enterprisewide portals and ERP, ..."  How many times have I said this?    "At the same time, VARs in significant numbers are tapping open-source tools and exploiting Web services and XML to help cut down on expensive software-integration work; in effect, acknowledging that application development needs to be more cost-conscious and, thus, take advantage of open standards and reusable components.  Our survey found that 32 percent of VARs had developed applications on Linux in the past six months, while 46 percent of them said they plan to do so in the next six months.  The other open-source technologies they are using today run the gamut from databases and development tools to application servers."  I guess there's really an open source strategy.  I come down hard on open source for one simple reason:  I believe that SIs in China could get more sub-contracting business from a build-to-a-stack strategy.  And building to the open source stack isn't building to a stack at all!!  "As a business, it has many points of entry and areas of specialization.  Our survey participants first arrived in the world of app dev in a variety of ways, from bidding on app-dev projects (45 percent) to partnering with more experienced developers and VARs (28 percent) to hiring more development personnel (31 percent)."  For SIs in China, simply responding to end-user RFQs is kind of silly.  Better to partner on a sub-contracting basis.  "According to our State of Application Development survey, health care (36 percent), retail (31 percent) and manufacturing (30 percent) ranked as the most popular vertical industries for which respondents are building custom applications.  Broken down further, among VARs with less than $1 million in total sales, retail scored highest, while health care topped the list of midrange to large solution providers."  Because of regulatory issues, I'm not so keen on health care.  I'd go with manufacturing followed by retail.  My $ .02.  "When it comes to partnering with the major platform vendors, Microsoft comes out the hands-on winner among ISVs and other development shops.  A whopping 76 percent of developers in our survey favored the Microsoft camp.  Their level of devotion was evenly divided among small, midsize and large VARs who partner with Microsoft to develop and deliver their application solutions.  By contrast, the next closest vendor is IBM, with whom one in four VARs said they partner.  Perhaps unsurprisingly, the IBM percentages were higher among the large VAR category (those with sales of $10 million or more), with 42 percent of their partners coming from that corporate demographic.  Only 16 percent of smaller VARs partner with IBM, according to the survey.  The same goes for Oracle: One-quarter of survey respondents reported partnering with the Redwood Shores, Calif.-based company, with 47 percent of them falling in the large VAR category.  On the deployment side, half of the developers surveyed picked Windows Server 2003/.Net as the primary platform to deliver their applications, while IBM's WebSphere application server was the choice for 7 percent of respondents.  BEA's WebLogic grabbed 4 percent, and Oracle's 9i application server 3 percent of those VARs who said they use these app servers as their primary deployment vehicle."  Microsoft, Microsoft, Microsoft.  Need I say more?  See http://tinyurl.com/45z94 .
     
    The next article is on open source.  "Want a world-class database with all the bells and whistles for a fraction of what IBM or Oracle want?  There's MySQL.  How about a compelling alternative to WebSphere or WebLogic?  Think JBoss.  These are, obviously, the best-known examples of the second generation of open-source software companies following in the footsteps of Apache, Linux and other software initiatives, but there are far more alternatives than these.  Consider Zope, a content-management system downloaded tens of thousands of times per month free of charge, according to Zope CEO Rob Page.  Some believe Zope and applications built with Zope are better than the commercial alternative they threaten to put out of business, Documentum.  Zope is also often used to help build additional open-source applications.  One such example is Plone, an open-source information-management system.  What began as a fledgling movement at the end of the past decade and later became known as building around the "LAMP stack" (LAMP is an acronym that stands for Linux, Apache, MySQL and PHP or Perl) has exploded to virtually all categories of software.  That includes security, where SpamAssassin is battling spam and Symantec, too.  Popular?  Well, it has now become an Apache Software Foundation official project.  The use of open source is so widespread that the percentage of solution providers who say they partner with MySQL nearly equals the percentage who say they partner with Oracle"23 percent to 25 percent, respectively.There are plenty of choices for those SIs willing to play the open source game.  See http://tinyurl.com/4e3c7 .
     
    "It's all about integration" follows.  "There are many reasons for the surge in application-development projects (the recent slowdown in software spending notwithstanding).  For one, many projects that were put on hold when the downturn hit a few years ago are now back in play.  That includes enterprise-portal projects, supply-chain automation efforts, various e-commerce endeavors and the integration of disparate business systems."  Choose carefully, however.  Balance this data with other data.  Right now, I see a lot more play with portals and EAI.  "Indeed, the need for quality and timely information is a key driver of investments in application-integration initiatives and the implementation of database and business-intelligence software and portals.  A healthy majority of solution providers say application integration is a key component of the IT solutions they are deploying for customers.  According to our application-development survey, 60 percent say their projects involved integrating disparate applications and systems during the past 12 months."  "Some customers are moving beyond enterprise-application integration to more standards-based services-oriented architectures (SOAs).  SOAs are a key building block that CIOs are looking to build across their enterprises."  Anyone who regularly reads any one of my three IT-related blogs knows that I'm gung-ho on SOAs.  "Even if your customers are not looking for an SOA, integrating different systems is clearly the order of the day.  To wit, even those partners that say enterprise portals or e-business applications account for the bulk of their business note that the integration component is key."  Yes, integration, integration, integration.  I'll be saying this next year, too.  And the year after ...  "Another way to stay on top of the competition is to participate in beta programs."  Absolutely true -- and a good strategy, too.  See http://tinyurl.com/6x2gg .
     
    The next article is on utility computing versus packaged softwareAgain, if you read what I write, you know that I'm also gung-ho on utility computing.  "According to VARBusiness' survey of application developers, more than 66 percent of the applications created currently reside with the customer, while 22 percent of applications deployed are hosted by the VAR.  And a little more than 12 percent of applications developed are being hosted by a third party.   Where services have made their biggest inroads as an alternative to software is in applications that help companies manage their customer and sales information.The article goes on to state that apps that are not mission-critical have the best chance in the utility computing space.  Time will tell.  Take note, however, that these are often the apps that will most likely be outsourced to partners in China.  "Simply creating services from scratch and then shopping them around isn't the only way to break into this area.  NewView Consulting is expanding its services business by starting with the client and working backward.  The Porter, Ind.-based security consultant takes whatever technology clients have and develops services for them based on need."   And focus on services businesses and .NET, too.  "Most application developers agree that services revenue will continue to climb for the next year or two before they plateau, resulting in a 50-50 or 60-40 services-to-software mix for the typical developer.  The reason for this is that while applications such as CRM are ideally suited to services-based delivery, there are still plenty of other applications that companies would prefer to keep in-house and that are often dependent on the whims of a particular company."  Still, such a split shows a phenomenal rise in the importance of utility computing offerings.  See http://tinyurl.com/54blv .
     
    Next up:  Microsoft wants you!!  (Replace the image of Uncle Sam with the image of Bill Gates!!)  Actually, the article isn't specifically about Microsoft.  "Microsoft is rounding up as many partners as it can and is bolstering them with support to increase software sales.  The attitude is: Here's our platform; go write and prosper.  IBM's strategy, meanwhile, is strikingly different.  While it, too, has created relationships with tens of thousands of ISVs over recent years,  IBM prefers to handpick a relatively select group, numbering approximately 1,000, and develop a hand-holding sales and marketing approach with them in a follow-through, go-to-market strategy."  Both are viable strategies, but NOT both at the same time!!  "To be sure, the results of VARBusiness' 2004 State of Application Development survey indicates that Microsoft's strategy makes it the No. 1 go-to platform vendor among the 472 application developers participating in the survey.  In fact, more than seven out of 10 (76 percent) said they were partnering with Microsoft to deliver custom applications for their clients.  That number is nearly three times the percentage of application developers (26 percent) who said they were working with IBM ..."  Percentages as follows:  Microsoft, 76%; IBM, 26%; Oracle, 25%; MySQL, 23%; Red Hat, 17%; Sun, 16%; Novell, 11%; BEA, 9%.  I said BOTH, NOT ALL.  Think Microsoft and IBM.  However, a Java strategy could be BOTH a Sun AND IBM strategy (and even a BEA strategy).  See http://tinyurl.com/68grf .
     
    There was another article I liked called, "How to Team With A Vendor," although it's not part of the app-dev special section per se.  This posting is too long, so I'll either save it for later or now note that it has been urled.  See http://www.furl.net/item.jsp?id=680282 .  Also a kind of funny article on turning an Xbox into a Linux PC.  See http://tinyurl.com/4mhn6 .  See also http://www.xbox-linux.org .
     
    Quick note:  I'll be in SH and HZ most of next week, so I may not publish again until the week of the 23rd.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [urls] Build a Better Enterprise Application        
    Thursday, August 12, 2004
    Dateline: China
     
    The following is a sampling of my top ten "urls" for the past week or so.  By signing up with Furl (it's free), anyone can subscribe to an e-mail feed of ALL my urls (about 100-250 per week) -- AND limit by subject (e.g., ITO) and/or rating (e.g., articles rated "Very Good" or "Excellent").  It's also possible to receive new urls as an RSS feed.  However, if you'd like to receive a daily feed of my urls but do NOT want to sign up with Furl, I can manually add your name to my daily Furl distribution list.  (And if you want off, I'll promptly remove your e-mail address.)
     
    Top Honors:
     
    * Build a Better Enterprise Application (on Web services and SOA; great review of all the pertinent issues)
     
    Other best new selections (in no particular order):
     
    * Adaptive Document Layout via Manifold Content (PDF) (another hit for Microsoft, this article proposes a user interface for authoring and editing Web content for different form factors; think formatting for ubiquitous devices and pervasive computing)
    A New View on Intelligence (on XML & EII, et al) (thoroughly enjoyable -- so good,  I almost blogged it; insightful perspective)
    InfoWorld Special Report: Has desktop Linux come of age? (IMHO, a resounding "No!!"  But there are other perspectives worth considering.  I still think it's a lot of wishful thinking.)
    * Negotiating in Service-Oriented Environments (PDF) (A slightly annotated excerpt: "The concept of delivering software as a service is relatively simply: 'do not buy software, simply use it as and when you need it'.  Putting such a concept into practice, however, is far more complex and involves many issues.  In this article, we address the question: What are the characteristics of a market for software services?"  Hot topic, good paper.)
    * Real Time Means Real Change (so much talk about the so-called "Real Time Enterprise"; this article takes a look at the realities behind the hype of the "RTE")
    Information Scent on the Web (PDF) (Courtesy of PARC, you need to read this for yourself; Google as The Matrix idea -- worse yet, The Time Machine Reloaded   In reality, useful perspectives for Web designers.)
    Offshoring/Outsourcing: Fragile - Handle With Care (a brief but rather comprehensive overview; points to the various aspects of ITO and BPO along the IT value chain)
    IT Spending For Comprehensive Compliance (original article linked; good review of the various opportunities "thanks" mostly to SOX)
    * The Executive's Guide to Utility Computing - ROI of Utility Computing (a broad perspective on utility computing, different from what is usually published)
     
    Examples of urls that didn't make my "Top Ten List":
     
    > Benchmarking Study Shows 75 Percent of Enterprises Deploying Web Services (need I say more?; includes stats on ebXML and grid computing, too)
    > Probabilistic Model for Contextual Retrieval (PDF) (a sneak peek at Microsoft's emerging search technology?)  See also Block-based Web Search, courtesy of Microsoft Research Asia (Beijing) and Tsinghua University, arguably China's best (the latter article is not urled; from the recent SIGIR conference).  If you think Google is the last word in search, think again.
    > Where To Find New Growth Prospects And What Challenges Need To Be Overcome (necessary action items and preferred geographic regions; China <not Russia, Brazil or the Czech Republic> comes in the number two slot after North America)
    > CIO Magazine: Are We Happy Yet? (on ITO and BPO) (dumb article title, but smart content; good metrics to consider, including a take on SLAs)
    > Developing Killer Apps for Industrial Augmented Reality (restricted access) (this page provides some complimentary information to the restricted access selection, although it's not urled).  I just noticed something:  The apps section of IEEE CG&A is edited by two mil guys, one from the (U.S.) Office of Naval Research and the other from the U.S. Army simulation and training office.  Hey, who says all the good engineering jobs are outsourced!?    Frankly, I believe that the best American engineers can always find jobs within DoD or the intelligence community.  Besides, they do all the truly fun computing stuff!!  Trust me, there isn't so much fun stuff done at Oracle.
     
    and many, many more ...
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [news] Excerpt from a McKinsey Paper on IT Spending Trends        
    Monday, August 9, 2004
    Dateline: China
     
    I recently urled the abstract for this paper, but CNET and McKinsey were kind enough to post the full-text of the paper on the CNET news site (which downloads at glacial speed, at least from China).  Now that the article from the current issue of The McKinsey Quarterly is in the public domain, I'd like to include an excerpt in this posting.  (Bolded and colored notations are MY emphasis.)
     
    "Although IT customers also want to improve their software, they are wary of big-bang packaged applications--purchases that are just now rolling off accrual budgets.  This time around, CIOs are shunning expensive panaceas, especially large-scale customer relationship management (CRM) systems.  Many tech executives lost face (or jobs) when the promised benefits didn't materialize, often because the technology demanded difficult-to-realize changes in processes and in employee behavior.  Even worse than buying packaged applications, CIOs told us, was buying applications and then customizing them, for this strategy made it necessary to reinvest in customization with each subsequent upgrade.  CIOs now favor narrower, more-targeted, less-ambitious improvements that mitigate the risk of organizational rejection.  Custom software that closely adheres to a company's existing processes (and therefore requires little or no process change) is popular, and so is software developed for a specific industry.  Meanwhile, integration--a higher priority now than it was during the boom--is generating demand for enterprise application integration (EAI) technologies.  Web services are gaining traction faster than anticipated, especially in small telecom and other companies at the forefront of IT innovation.  Of the CIOs we interviewed, 8 percent said that Web services were their primary integration strategy.  Despite these inroads, most companies are still at the experimental stage with this technology, which demands advanced skills and a high degree of commitment from the IT organization.  Others are choosing a different path:  Roughly half of the CIOs we spoke with have been (or are thinking about) investing in integration broker software, often combined with Web services.  Adoption is strongest among telecommunications and financial-services companies, whose technical complexity makes the software especially attractive.  The third-party services market could feel the pinch, however.  Many companies, spurred by lower IT salaries after the economic slowdown, hired talent and brought IT development in-house.  These new hires often support and develop the more-customized applications that today's IT budgets favor.  But this move could boomerang on companies in the future:  The absence of vendor support could reduce economies of scale and push up costs.  Offshoring in less-expensive labor markets could, of course, offset them."
     
    ADDENDUM: Seeing Beyond "Traditional" Market Research ...
     
    I've already received a few messages regarding my "Seeing Beyond" posting.
     
    One of the questions was very simple to answer.  The question:  Can you name a few ISVs in China which could develop a hosted version of their packaged software?  Certainly.  Simple answer:  Bamboo, KingdeeUFSoft (all three are in the ERP space).
     
    A reader also asked me about Fisher-Pry, having heard of this technique but not really familiar with it.  In simple terms, Fisher-Pry functions best as a substitution model.  I'm not thrilled about using it to predict end of life and market size issues per seWhere I find it useful -- EXTREMELY USEFUL -- is in determining when a NEW technology is likely to EMERGE.  I then put on my Geoffrey Moore glasses to look at the technology from a chasm crossing perspective.  And, if I'm really interested, I'll put on my Ed Roberts and Gordon Bell glasses -- and will evaluate the technology using other techniques as well.  But Fisher-Pry itself is extremely simple to use and a Geoffrey Moore analysis is also a no-brainer.  (Ed Roberts' -- and I'm the unofficial president of the Ed Roberts fan club -- various approaches to evaluating new markets and technologies requires me to fire a lot more neurons than Moore's approach.)  To me, Fisher-Pry is all about inflection points and EMERGING marketsTo see an application of Fisher-Pry, read an A.T. Kearney report on wireless futures at http://tinyurl.com/4zcas (and it's an excellent report, too).  See also a recent evaluation of the remote sensing market at http://tinyurl.com/6zxqm .  For a brief review of Fisher-Pry and a couple of related techniques for technology trend analysis, see http://tinyurl.com/4hf7t .
     
    Finally, another reader questioned whether MIT's Innovation Futures market was doomed to focus on short(er)-term "bets."  My answer is that MIT may need to repackage Innovation Futures for addressing long(er)-term issues.  Many of us in America can remember playing the stock market in one of our classes.  For me, it was in my eighth grade government class.  We had to pick stocks and trade them through the course of the year.  Unfortunately, the very nature of this learning experience put a premium on trading versus investing.  In other words, picking stocks which might be solid over a three-plus year time horizon simply wouldn't work; it was much better to "gamble" on high Beta (i.e., higher volatility) issues.  Innovation Futures suffers from the same "need" to determine winners and losers on a relatively timely basis.  Probably time horizons of three or more years won't suffice, at least not from a "gamblers" perspective (sans venture capitalists).
     
    I'd like to see their system changed to allow different types of "players" and "traders," namely the crop I had suggested in my last posting, but also another class of "all others."  Think of this as an experiment in social computing among technophiles, not online gambling.  In some ways, it could reveal the type of knowledge that is found in the blogosphere.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
     

              [commentary] Seeing Beyond "Traditional" Market Research + A Golden Opportunity for China's ISVs        
    Sunday, August 8, 2004
    Dateline: China
     
    More general commentary than news commentary per se; let's dig in ...
     
    Seeing Beyond "Traditional" Market Research
     
    We're all familiar ad nauseum with market forecasts by firms such as Gartner, Forrester, IDC and even i-bankers (albeit i-bankers tend to have a shorter time horizon).  I've always been a bit suspect of IT market forecasts and was delighted that the META Group (where I was VP, Electronic Business Strategies) focused on qualitative and consultative approaches to serving our end-user and vendor clients.  We were more like a SWAT team version of McKinsey:  Get in, get it done, get out, move on.  The Kensington Group, an IT advisory services industry watchdog firm, has found that most forecasts are simply dead wrong.  Frankly, it's hard to blame the IT advisory services:  Forecasting is tough stuff!!  Some of the firms claim that they are not producing forecasts, but are producing projections.  Call it what you will:  It's a forecast -- and it's usually wrong.  (In defense of the IT advisory services, often the commentary which accompanies a forecast is quite useful.  The forecast may be wrong, but often other issues are adequately -- and usefully -- addressed.)
     
    I've been a long-time proponent of more "advanced" forecasting techniques ranging from Delphi (pioneered by the RAND Corporation) to cellular automata to Lotka-Volterra (which in a plain vanilla and watered-down form was the basis of a lead article in an issue of Harvard Business Review) to the good 'ol Fisher-Pry technique -- and just about every flavor of forecasting in between.  Not only do I read Technological Forecasting & Social Change, but I annually read numerous papers published in a few hundred engineering journals and in all ACM, IEEE and SPIE conference proceedings which cite a paper published in TF&SC.  (Think CiteSeer.)  And something relatively new has captured my attention; I want to share this with the readers of this blog/e-newsletter.
     
    MIT's Technology Review has embarked on a interesting project called "Innovation Futures".  (They may not view this as a "project," but it feels like a "project" to me.)  There is a fair amount of history behind the project -- and some may recall the related DARPA fiasco last year -- but I'd like to stick specifically to the MIT project.  To quote Technology Review, "Innovation Futures is a predictive market system that enables technologyreview.com users to predict the outcome of events related to emerging technologies."  Think of it as a futures and options market for emerging technologies -- NOT about companies, but about the underlying technologies.  For example, rather than betting for or against Nanosys as a pure-play nano firm, a "player" (think "trader") can bet for or against a definable nano event (e.g., commercial devices produced using molecular self-assembly techniques with combined annual sales of at least $100 million by 2006).  Something "easier" to phantom might be a bet that VoIP will be implemented in some form by at least 75% of G2000 companies by 2007.  Think about this:  Which would give a better indicator of buying intentions, the MIT predictive market system or an IT advisory service forecast?  I'll put my money on Innovation Futures or a clone.  (Frankly, I'd put my money on other technological forecasting techniques.  But if the choice is between the MIT system or Gartner, I'll go with MIT.  And the MIT market is a lot easier to follow than building a nonlinear model.  Leave the tough stuff to Pugh-Roberts; leave the everyday stuff to Innovation Futures.)
     
    At this point, the MIT site doesn't have very much and most of what they have is focused on short(er)-term bets.  But this will be very interesting to watch, especially as broader -- and long(er)-term -- issues are market tested.  What happens when the marketing folks at IBM, Microsoft, Oracle, HP, Accenture, CSC, TCS, Infosys and SAP play?  And when the members of the Global Business Network and their brethren play?  And when IT advisory services analysts play?  And, perhaps most importantly, when CIOs representing companies of all different sizes and from all parts of globe start to play?  Food for thought.  I'll keep this readership posted:  I plan to have several long discussions with the folks running Innovation Futures.  I have many specific ideas to share with them.  For more information, see http://tinyurl.com/5bevb .
     
    A Golden Opportunity for China's ISVs
     
    In the past I've talked about the opportunities for SIs (systems integrators) in China to work with utility computing vendors in the States.  Well, I've given this a lot of thought and have another idea:  What about ISVs (independent software vendors) in China floating utility computing offerings in the States?  As one example, let's take Free CRM (see http://www.freecrm.com/ ).  The totally free version seems a bit worthless, but gives a smaller firm a chance to play with the idea with very little risk.  However, the "Professional" version is only $10 per month per user, far less than Salesforce.com's average of $70 per month per user.  Okay, the "Professional" version of Free CRM (maybe they should call it "Cheap CRM" -- or some B-school grad might name it "Value-Driven CRM) certainly doesn't have the industrial strength features of Salesforce.com.  However, think a modified Pareto strategy:  A good chuck of the functionality, but at a fraction of the cost.  Add a few zingers like syncing for a PDA/smartphone and/or pages automatically "modified" to fit any form factor (see the current issue of CACM for a great article on this; hot research area and tomorrow's urls listing will include a link to a downloadable paper on this subject) and the offering from the ISV in China becomes incredibly -- perhaps irresistibly -- enticing.  And guess what:  At least in theory the platform could be leveraged for both the market in the States and in China.  (I have some reservations about this, but it's theoretically doable.)  BTW, the Free CRM solutions are NOT hosted, but for in-house initiatives.  However, the same marketing principles apply in this analysis.
     
    Bottom line:  This is truly a golden opportunity for ISVs in ChinaDon't target the F1000; go after SMEs, perhaps the same firms that are normally targeted by the largest ISVs using telemarketing.  (I'm not suggesting a telemarketing strategy; I'm simply segmenting the market in Oracle fashion.)  Think of a U.S. company with less than 500 employees.  The world (well, at least the U.S. part of it) will be your oyster ...
     
    China: A Hotbed for Management Consulting?
     
    An interesting article published on the China Economic Net site (in Chinglish, no less) kind of uses the phrase "management consulting" in a rather broad way.  But when it gets to specifics, it's illuminating.  First, there is the claim that "China has become the management consulting market with the most rapid growth rate."  Not sure if this is really true, but it's certainly one of the more interesting markets. 
     
    For specifics, BearingPoint is cited.  Basically, they're bursting at the seams and projecting growth from about 1,000 today to 6,000 in 2008.  CapGemini went the acquisition route.  The average annual salary of a "good management consultant" is about US$40,000 -- a far cry from what a "good management consultant" makes in the States.  And what do the consultants bring to the table?  Well, this is where the article went from being written in English to Chinglish.  But if I can make out what they mean, it's the ability for management consultants to help with implementation and operational issues.  See http://tinyurl.com/43hlr .
     
    Bottom line:  SIs in China should look to adding so-called "management consulting" services to their offerings.  I am NOT suggesting a massive move in this direction, but a selected approach.  Also, China's SIs should look to partner with Western management consulting firms already in or planning to enter China.  On the one hand, the BearingPoints of the world make good partners, especially for sub-contracting work.  On the other hand, the BCGs of the world are more complimentary and not directly competitive.  Have a strategy and plan for dealing with both types of management consulting firms, i.e., the strategy firms with a stake in IT (e.g., @McKinsey) and the IT consultancies/SIs with a strategy play (e.g., IGS, Accenture, ...).
     
    What I'm Reading (and Why I Didn't Post as Often as Usual Last Week)
     
    The new proceedings for SIGIR04 are out and I've been sifting through dozens of papers.  Google seems like child's play compared to what is brewing.  However, I have it on good authority that Google is brewing many of the same things.  But so is Microsoft.  In the future, we all benefit.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [urls] Top 10 Urls: 25 July-1 August 2004        
    Monday, August 2, 2004
    Dateline: China
     
    The following is a sampling of my "urls" for the past eight days.  By signing up with Furl (it's free), anyone can subscribe to an e-mail feed of ALL my urls (about 150-350 per week) -- AND limit by subject (e.g., ITO) and/or rating (e.g., articles rated "Very Good" or "Excellent").  It's also possible to receive new urls as an RSS feed.  However, if you'd like to receive a daily feed of my urls but do NOT want to sign up with Furl, I can manually add your name to my daily Furl distribution list.  (And if you want off, I'll promptly remove your e-mail address.)
     
    Best new selections (in no particular order):
     
    * A Web Services Choreography Scenario for Interoperating Bioinformatics Applications (SUPERB, covering all the bases; might serve as the foundation for a blog posting)
    * ICC Report: Software Focus, June 2004 issue (if you're not familiar with this monthly newsletter from Red Herring, it's worth scanning; this particular issue is their "annual" on enterprise software)
    * Northeast Asia: Cultural Influences on the U.S. National Security Strategy (this might serve as the basis for a blog posting; EXCELLENT, broad-based review of cultural issues)
    * Economics of an Information Intermediary with Aggregation Benefits (think B2B and e-markets, although the implications are wide-ranging)
    * How to Increase Your Return on Your Innovation Investment (provides a link to an article published in the current issue of Harvard Business Review; good food for thought)
    * Why Mobile Services Fail (insights from Howard Rheingold)
    * Anything That Promotes ebXML Is Good (lots of good links; I'm an ebXML advocate, so the tone of this article is one which I fully support)
     
    Examples of urls that didn't make my "Top Ten List":
     
    > RightNow, Sierra Atlantic Announce Partnership to Deliver Enterprise CRM Integration (a trend in the making; I've talked about this quite a bit, i.e., systems integrators working with utility computing vendors)
     
    and many, many more ...
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
    e-mail: click on http://tinyurl.com/3mbzq (temporary, until Gmail resolves their problems; I haven't been able to access my Gmail messages for the past week)
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [news] Cognizant & the "Intelligent Internet" + a Peek at 2005 IT Budgets (Part 2 of 2)        
    Sunday, August 1, 2004
    Dateline: China
     
    Ah, the World Future Society.  Much to say about the WFS, but I'll save it for the end of this post.  An article which appears in the March-April 2004 issue of The Futurist was reprinted in a recent issue of Government Computer News (see http://tinyurl.com/yrp2w ); the original paper which was the basis for The Futurist article is also available (see http://tinyurl.com/5ymos ).  The article focuses heavily on findings from the TechCast Project at George Washington University (see http://www.techcast.org ; BTW, they're seeking beta testers).
     
    The article acknowledges hype during the bubble, but goes on to indicate that 20 commercial aspects of Internet use should reach 30% "take-off" adoption levels over the next several years -- and will rejuvenate the (American) economy.  One area of particular interest is a "conversational" human-computer interface, called "TeleLiving," based on advances in speech recognition, AI, hardware/grid computing, virtual environments and flat wall monitors.  (Sounds like stuff out of PARC and Microsoft Research.)
     
    Their Project results "portray a striking scenario in which the dominate forms of e-commerce - broadband, business-to-business (B2B), online finance, entertainment-on-demand, wireless, e-training, knowledge-on-demand, electronic public services, online publishing, e-tailing - grow from their present 5%-20% adoption levels to 30% between 2004 and 2010.  TechCast considers the 30% penetration level significant because this roughly marks the 'take-off point' when technologies move from their early-adopter phase into the mainstream, where they permeate economic and social life."  (Think of chasm crossing.  Also think of expeditionary marketing within the context of broadband.  BTW, bolded and colored items are MY emphasis.)
     
    The authors discuss the notion that many think that the Internet is already mainstream, yet challenge that notion by stating that this is true only for nonpaying use, citing surfing for free information as one example.  "As of 2003, commercial operations involving monetary exchange were limited to about 23% for broadband, 10% for e-tailing, 12% for B2B, 10% for distance learning, and 5% for music.  And these are the most popular Internet applications.  Others hardly register in adoption levels at all."  Bottom line:  It's all about e-commerce, I guess.  Jerry Maguire said it best. 
     
    A Look at 2005 IT Spending
     
    Not as much as I had originally hoped for in the Forrester glimpse at 2005 IT budgets, but some things to note.  (See http://tinyurl.com/67pse .)  Example:  52% of finance and insurance firms -- led by insurers -- will spend more on IT in 2005.  Okay, sounds like an opportunity for SIs (systems integrators) building .NET solutions.  (For those who don't know, Microsoft has fairly strong solutions for the insurance vertical.)  At the subvertical level, media and nongovernment public sector plays look good, whereas the utilities and transportation sectors look weak.  Also, Siebel and PeopleSoft customers are planning to spend more on IT relative to customers of other key vendors, most notably SAP.  (I don't see this, but I don't dispute their data.  Frankly, I think we'll see a lot of activity for SAP SIs in 2005.  P'Soft is too hard to tell, especially with the confusion caused by Oracle.  Oracle benefits whether the acquisition goes through or not!!  It's the FUD factor.)
     
    Not to be outdone, AMR came out with their peek at 2005 budgets for SMEs (small and medium enterprises).  (See http://tinyurl.com/5vlvo .  I got a lot more out of the AMR report.)  Something that is rather common knowledge among IT analysts, but may not be known by those not involved in the IT budgeting process, is that a typical large U.S. manufacturer spends 2% of its annual revs (i.e., revenues) on IT and a large service firm spends 5%.  However, the average for U.S. SMEs is 6.4% of revs, although a good chunk is for basic IT infrastructure.
     
    CRM looks like a hot item for U.S. SMEs and the AMR report makes an interesting comment about the perceived need for other countries to implement a "keeping up with the Joneses" strategy.  This being said, then domestic firms in China may follow suit.  As far as operating systems are concerned, there is only one:  Windows.  And U.S. SMEs spend about 20% of their IT budget on software and software maintenance, with discrete manufacturers outspending process manufacturers or retailers.  Typical apps are for financial management and customer management, although expensive CRM suites (think Siebel or Oracle) are rare.  Sounds like an opportunity for utility computing vendorsBottom line:  If the SMEs market is your key market (by size), then go with Microsoft CRM solutions!
     
    Fast Forward Over Three Decades
     
    At this point, I'm going to get a bit personal.  If you're not interested, simply skip the remainder of this message:  It briefly covers three decades and my so-called "futurist" origins.
     
    The first "adult" organization I ever joined was the World Future Society.  (Remember, the basis for the first section of this posting was an article published in their flagship publication, The Futurist.)  The year was 1971.  I had been an adolescent "futurist" since March 1968, the month that my father bought me a copy of Sky & Telescope magazine.  Although the Vietnam War was on the news each night, I was simply too young for it to really matter.  Both the war and protests against the war were merely uninspiring TV images.
     
    But something caught my imagination and that "something" was the space program.  I can still recall the liftoff of Apollo 11 on July 16, 1969 at 6:32 am PDT.  Believe it or not, I can still recite the countdown.  I can also recite part of the landing sequence of the Eagle -- the Lunar Excursion Module housing Neil Armstrong and Edwin E. "Buzz" Aldrin.  And, of course, I can remember Neil Armstrong stepping off the foot of the LEM on July 20th, probably around 7 or 7:30 pm.  Two movies also inspired me toward a "tech" future:  The obvious, 2001: A Space Odyssey, and the not-so-obvious, The Andromeda Strain.  (My parents didn't let me stay up to watch Star Trek, so Star Trek didn't have any impact on my life during my early adolescence.)  Although I have been a member of the L-5 Society and the British Interplanetary Society (anyone remember Project Daedalus?), the World Future Society was the most influential organization in my life during my high school years.  Well, a wee bit of personal history.  Those were the good 'ol days ...
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [emerging tech] "Web Engineering: The Evolution of New Technologies" & the Ultimate Killer App        
    Friday, July 23, 2004
    Dateline: China
     
    Reviews of papers from the current (July/August 2004) issue of Computing in Science & Engineering, special issue on "Web Engineering: The Evolution of New Technologies."  To order articles from this issue, first click on http://tinyurl.com/5ktaw .
     
    Earlier this week I posted excerpts from the lead article in the current issue of CiSE.  The article was titled, "Managing XML Data: An Abridged Overview," which is a good, accurate title.  The excerpts contain useful links, too. 
     
    I am going to take a variety of approaches for handling four other papers in this special issue.  However, I first want to provide a link to the introduction to this special issue, i.e., http://tinyurl.com/6sbjx .  The intro itself provides a few useful references and links.
     
    The second article is titled, "Information Retrieval Techniques for Peer-to-Peer Networks."  Fortunately, a full-text PDF copy of this paper can be accessed at either http://dblab.cs.ucr.edu/ or http://tinyurl.com/6v2ru, although the URL for the former looks a little bit too generic and might change at a moment's notice (also, the two papers are slightly different).  I have 19 bookmarks on my smartphone for this paper, but I guess I can summarize by saying that IR for P2P networks is hard and very different from "traditional" searchThe last statement actually says a lot -- read between the lines.  This paper covers all the usual suspects and also includes Skype. This paper is based upon the lead author's Master's thesis which can be accessed from http://tinyurl.com/696ml .  Other papers by the lead author can be accessed at http://tinyurl.com/43kkh .  This is an important issue which needs to be resolved, especially as collaborative grid computing (CGC) comes to life.
     
    Two figures; 20 references (28 references in the preprint).
     
    Less luck with the paper titled, "Web Searching and Information Retrieval," i.e., I couldn't find a free copy on the Web.  The author's site is woefully outdated, too.  The author does speak favorably of a particular approach to decentralized P2P web crawling called "Apoidea."   A copy of a paper describing Apoidea can be accessed at http://tinyurl.com/4m2v5 ; accompanying slides can be accessed at http://tinyurl.com/4b4sh .  As described in the CiSE paper, "Apoidea is both self-managing and uses the resource's geographical proximity to its peers for a better and faster crawl."
     
    Two figures; 21 references.
     
    To request a copy of this article click on: http://tinyurl.com/7yyl2 or http://tinyurl.com/6m6ff (I'm not sure which address works; I already have a copy of this article so I don't need to contact the author!).
     
    "Web Mining: Research and Practice" is not available, either, but a lot of excellent info on the senior author's projects related to this paper is available.  First, take a look at the eBiquity research areas at http://tinyurl.com/52p9n .  Next, you may want to take a look at the abstracts for papers published as part of the eBiquity Group at http://tinyurl.com/5om58 (current through December 2004 -- it doesn't get more current!!).  Move on to their "Semantic Web" page at http://tinyurl.com/4a8fr .  I then downloaded a PDF copy of their paper titled, "Mining Domain Specific Texts and Glossaries to Evaluate and Enrich Domain Ontologies" (see http://tinyurl.com/3lg2m ).  It looks like a relatively recent paper, newer than the CiSE paper (different authors and different subject matter, though).  The PDF is part of their Semantic Web research, whereas the CiSE paper is more "generic."  Anyway, the "Web Mining" paper is another call for distributed mining techniques, and covers fuzzy clustering as well as content-based recommender systems -- but doesn't forget good 'ol HITS (Hyperlink-Induced Topic Search), the basis for IBM's Clever and Google (to a certain extent).
     
    No figures; 31 references.
     
    To request a copy of this article click on: http://tinyurl.com/5xv3p .
     
    Finally, "Intelligent Agents on the Web: A Review" was very disappointing.  The lead author has impeccable credentials, but his paper is based on yesterday's news:  Old, outdated, buried stuff (like Firefly).  Matter of fact, the only live link I can recall finding was Recursion Software's "Voyager" home page (see http://tinyurl.com/3wpem ), which states that the "Voyager applications development platform provides the software layer which handles communications across the network for distributed JAVA applications."  (Looks interesting.)
     
    I did a little more digging and surfed over to two stand-by sites (both referenced directly or indirectly in the "Intelligent Agents" paper), namely the MIT Media Lab Software Agents page and Oren Etzioni's (oops, I mean the University of Washington, Department of Computer Science) page.  At the MIT projects page (see http://tinyurl.com/4ocss ) is a listing of several "commonsense" projects, e.g., "Using Commonsense Reasoning to Enable the Semantic Web" (see http://tinyurl.com/4deq7 ).  A draft White Paper on this is available at http://tinyurl.com/4e4bv , as is a presentation at http://tinyurl.com/4le2n along with a couple of video demos.  I also downloaded a paper on GOOSE (GOal-Oriented Search Engine) at http://tinyurl.com/4fyeu .  At UWash I went to their XML data management page (see http://tinyurl.com/5x98a ) and then grabbed two papers:  One on "Probabilistic Methods For Querying Global Information Systems" dated 14 July 2004 (see http://tinyurl.com/45uz7 ) and another titled, "Learning Text Patterns for Web Information Extraction and Assessment" dated May 2004 (see http://tinyurl.com/6k5fz ).  (To download other unrestricted reports, go to http://tinyurl.com/5z2x7 .)  Frankly, I need a bit of time to digest the two recently published UWash papers.
     
    As the chair of the Internet and Web applications session of the First International Conference on Autonomous Agents (1996), I have a soft spot for agent-oriented everything (especially Web apps).  I remember an old saying from IJCAI (International Joint Conference on Artificial Intelligence) in the mid-70's:  Artificial intelligence is better than none.  (I probably still have a button with this saying somewhere.)  I'm keeping the faith, sans the hype and more toward the realities of software agents.  BTW, this CiSE paper isn't bad if you don't have any background in this space.  It covers the basics, such as ACLs, but with an "updated" perspective.
     
    No figures; 27 references.
     
    To request a copy of this article click on: http://tinyurl.com/6zzqs .
     
     
    The Ultimate Killer App
     
    BTW, the "Ultimate Killer App" is attached and in some browsers it will automatically download.  (See the bottom of this message.)  You have to admit, this really is the ultimate killer app!!
     
    I've never sent an attachment this way simultaneously to both my e-newsletter and blogs (and blog variants).  Just in case the attachment isn't included, I've uploaded it to the "Photos" section of the e-newsletter (see http://tinyurl.com/2r3pa .)
     
    >> Note to AlwaysOn readers: You'll need to go to the e-newsletter ( http://tinyurl.com/2r3pa ) in order to see the "Ultimate Killer App."  You can try the blogs, but no guarantees.
     
     
    Tidbits on Enterprise Software
     
    .NET wins converts.  For the VARBusiness story see http://tinyurl.com/3omd2 .  Evans Data reports that .NET usage showed a sharp YoY increase in adoption with 52% saying they use .NET and 68% saying they plan to deploy .NET apps by 2005.  In May, Forrester reported that 56% of developers consider .NET their primary development environment contrasted with 44% for J2EE.  (It must have been a binary choice!)  VARBusiness found in a May survey that 53% have already deployed a .NET app and 66% plan to do so within the next 12 months.  In the VARBusiness survey, the most important reasons for going with .NET were ease of use and quicker time to market.  A developer goes on to state that .NET development time is to Java what Java is to C++.  (Wow, what a claim!)
     
    Python and Perl beat Java?  (See http://tinyurl.com/44m5t for the PDF file.)  Actually, an indirect "attack" against all "mainstream" programming languages, notably Java, C and C++.  The idea is that the "mainstream" languages are ill-suited for many distributed computing and integration apps.  Gives a "thumbs up" to Python, Perl and PHP, with a peek at PEAK -- the Python Enterprise Application Kit.  (Sorry for the pun.)  PEAK's developers claim future superiority over J2EE.  They also knock Java for not being suited to rapid application development.  PEAK's developers believe a Python-based approach to component-based apps will result in systems that are simpler, faster and easier to install, manage and maintain than variants in J2EE.  PEAK, however, is still immature.
     
    Grid computing takes off.  Another survey from Evans Data (see http://tinyurl.com/4l2qb ).  37% of database developers are implementing or planning to implement a grid computing architecture.  In related data, 34% of companies are focusing their database development work on BI (business intelligence) platforms.  See also Oracle's spin on this at http://tinyurl.com/4n2kf .
     
    The spoils of ROI.  From IDC's Group VP, Solutions Research, there are several issues which must be addressed in order to maximize IT ROI.  (See http://tinyurl.com/228kv .)  Four of the key issues are:
    • Should the IT agenda include investment in outsourcing technologies or services?
    • Does the future of the business include operations in, or electronic trade with, additional countries - China, for example?
    • Are the services of an outside provider being considered to help in managing proliferating applications or complex "interenterprise" business relationships?
    • What role will utility computing play in the future of IT?
    (All items in bold are my emphasis.)  The article goes on to discuss various ways of evaluating ROI, including one of my favorite ways, ROA (real options analysis). 
     
    TTFN.  Have a GREAT weekend!
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
    WARNING:  To avoid spam (well, to avoid getting at least some spam), I'm using a Gmail account with a special address.  However, I have NOT been able to access the messages in my Gmail account for the past FOUR days!!  Not sure how long this will last.  In the interim, also use:
    DavidScottLewis.2520656@bloglines.com -- but also Cc: the above address.  Of course, if you already know me, feel free to send messages to my primary and secondary e-mail accounts.  (If you know me, you already know what they are.  The primary account is working fine.)
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .

              [emerging tech] "Managing XML Data" (Web Engineering: The Evolution of New Technologies)        
    Monday, July 19, 2004
    Dateline: China
     
    Excerpts from the current issue of Computing in Science & Engineering, special issue on "Web Engineering: The Evolution of New Technologies."  To order this article, click on http://tinyurl.com/6v3cc .  (Note: Formatting has been changed from the original article; however, ordering is consistent.)
     
    XML's flexibility makes it a natural format for both exchanging and integrating data from diverse data sources.  In this survey, the authors give an overview of issues in managing XML data, discuss existing solutions, and outline the current technology's open problems and limitations.

    A diverse set of factors has fueled the explosion of interest in XML ( http://www.w3.org/TR/REC-xml ): XML's self-describing nature makes it more amenable for use in loosely coupled data-exchange systems, and the flexible semistructured data model behind it makes it natural as a format for integrating data from various sources.

    But much of its success stems from the existence of standard languages for each aspect of XML processing and the rapid emergence of tools for manipulating XML.  Popular tools include parsers such as Xerces ( http://xml.apache.org/xerces-j ), query processors such as Galax ( http://db.bell-labs.com/galax ), and transformation tools such as Xalan ( http://xml.apache.org/xalan-j ).  The development of this standards framework has made XML dialects powerful vehicles for standardization in communities that exchange data.

    In this article, we discuss the main problems involved in managing XML data.  Our objective is to clarify potential issues that must be considered when building XML-based applications---in particular, XML solutions' benefits as well as possible pitfalls.  Our intent is not to give an exhaustive review of XML data-management (XDM) literature, XML standards, or a detailed study of commercial products.  Instead, we aim to provide an overview of a representative subset to illustrate how some XDM problems are addressed. 

    Because data typically is stored in non-XML database systems, applications must publish data in XML for exchange purposes.  When a target application receives XML data, it can remap and store it in internal data structures or a target database system.  Applications can also access an XML document either through APIs such as the Document Object Model (DOM; http://www.w3.org/DOM ) or query languages.  The applications can directly access the document in native format or, with conversion, from a network stream or non-XML database format.

    In contrast with relational database management systems (RDBMSs) that had a clear initial motivation in supporting online transaction processing (OLTP) scenarios, XML applications' requirements vary widely.  Applications must deal with several different kinds of queries (structured and keyword-based) in different scenarios (with or without transaction support, over stored or streaming data), as well as data with varying characteristics (ordered and unordered, with or without a schema).

    Commercial database vendors have also shown significant interest in XDM---support for XML data is present in most RDBMSs.  Examples include IBM's DB2 XML Extender ( http://www4.ibm.com/software/data/db2/extenders/xmlext.html ), Microsoft's support for XML ( http://msdn.microsoft.com/sqlxml/ ), and Oracle's XML DB ( http://otn.oracle.com/tech/xml/xmldb/ ).

    In XML, common querying tasks include filtering and selecting values, merging and integrating values from multiple documents, and transforming XML documents.  While XML has enabled the creation of standard data formats within industries and communities, adoption of these standards has led to an enormous and immediate problem of exporting data available in legacy formats to meet newly created standard schemata.  Several publishing languages have been proposed to specify XML views over the legacy data---that is, how to map legacy data (such as tables) into a predefined XML format.

    In this section, we discuss limitations of existing solutions as well as some open problems.  Our discussion is biased toward problems we have encountered in trying to create effective and scalable XDM solutions; it is by no means exhaustive.

    Parsing and validating a document against an XML Schema or DTD are CPU-intensive tasks that can be a major bottleneck in XML management.  A recent study of XML parsing and validation performance indicates that response times and transaction rates over XML data cannot be achieved without significant improvements in XML parsing technology.  It suggests enhancements such as using parallel processing techniques and preparsed binary XML formats as well as better support for incremental parsing and validation.

    By using XML-specific compression techniques, tools such as XMill compare favorably against several generic compressors.  Compression techniques have also been proposed that support direct querying over the compressed data, which besides saving space, also improve query processing times.

    The ability to support updates is becoming increasingly important as XML evolves into a universal data representation format.  Although proposals for defining and implementing updates have emerged, a standard has yet to be defined for an update language.

    Three figures & sample code; 23 references.

    To request a copy of this article click on: http://tinyurl.com/6kcqw .

     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
     
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [news] A Special Report on Business Intelligence        
    Thursday, July 8, 2004
    Dateline: China
     
    One of my favorite industry trades, Computerworld, recently published a special report on business intelligence (BI).  (See http://tinyurl.com/2w8j2 .)  As regular readers of this blog know, I'm hot, hot and hotter on BI.  Not only are BI apps booming in their own right, but BI also provides an open door into other structured data apps (e.g., ERP and SCM).  Also, there is a burgeoning number of apps requiring both BI and knowledge management (KM) solutions, providing a host of new opportunities.  (For now, think of BI for structured data and KM for unstructured data.  But the lines between KM and BI are blurring.)
     
    The Computerworld report includes an introduction to BI titled, "BI for the Masses," an introduction to Web harvesting, and a superb article on text mining; there are several online exclusives as well.  In this post, I'm going to focus on an article titled, "Predictions for BI's Future," by providing excerpts with commentary.  As usual, items in bold are MY emphasis; items in red are MY commentary.
     
    Embedded BI.  "Over the next four to six years, BI systems will become embedded in small, mobile devices, such as manufacturing sensors and PDAs in the field, which in turn will be linked to more centralized systems." -- Erik Thomsen, distinguished scientist, Hyperion Solutions Corp., Sunnyvale, Calif.
     
    PB DM (petabyte data mining).  "Within three years, companies and governmental agencies will be able to successfully run analytics within a centralized data warehouse containing 1 petabyte or more of data -- without performance limitations." -- Dave Schrader, technology futurist, Teradata, a division of NCR Corp., El Segundo, Calif.
     
    HPC to the rescue!  "Within the next two to three years, high-performance computing technology used by scientific and engineering communities and national R&D labs will make its way into mainstream business for high-performance business analytics. This transition will be driven by the growing volume of complex data and the pressing need for companies to use forecasting and predictive analytics to minimize risk and maximize profit-generating opportunities." -- Phil Fraher, chief operating officer, Visual Numerics Inc., San Ramon, Calif.
     
    BI meets AI.  "In the near future, business leaders will manage by exception, and automated systems will handle significant loads of routine tasks." -- Mike Covert, chief operating officer, Infinis Inc., Columbus, Ohio
     
    Visualization.  "Over the next two to three years, BI systems will automatically suggest appropriate visualizations, which in turn will dramatically increase the use of visualization and our understanding of complex relationships." -- Erik Thomsen, distinguished scientist, Hyperion Solutions
     
    BI + BPM + BAM.  "Businesses need more than a rearview mirror to drive their business forward into the next era. A new category of intelligence tools will emerge over the next two to three years that combines business process management, business activity monitoring (BAM) and business intelligence to enable the "actively managed enterprise." This will combine the scorecards and rearview-analysis capabilities of BI with the real-time, event-driven analysis of BAM and feed that information into automated business processes for on-the-fly steering of the business towards scorecard goals. This will exponentially elevate the speed at which businesses are able to operate, adapt and make critical decisions." -- Tim Wolters, chief architect of business activity monitoring solutions, webMethods Inc., Fairfax, Va.
     
    Bottom line:  Go to a BI-related ACM or IEEE CS conference and you'll hear a lot of presentations on all of the apps described above.  It's where the rubber meets the road:  This stuff is real!!  However, it's important to differentiate "real" BI with much more simplistic reporting software (like a good "chunk" of the so-called BI solutions provided by Business Objects, Cognos and even Microsoft -- via their recent acquisition of ActiveViews).
     
    A BI Site to Review
     
    Last week I came across a paper published in the current issue of the Journal of Intelligent and Fuzzy Systems.  In this paper the project called "Data Mining and Decision Support for Business Competitiveness: A European Virtual Enterprise" (SolEuNet) is used as a case study and "the source of lessons learned."  The paper provides a link to the SolEuNet Web site (see http://tinyurl.com/3x5vo ); at the SolEuNet site I found a wealth of case studies with supporting technical documents on leading-edge BI apps (see, for example, Workpackage 7 on "Combining Data Mining and Decision Support with Information Systems" at http://tinyurl.com/yqkqm ).  Remember, strategy consulting isn't merely about comparing product specs (regardless what the IT advisory services may say).
     
    The Gartner Conference on BI
     
    I got my hands on three i-banking analyst reviews of the Gartner BI conference.  The Morgan Stanley report (dated 27 April) noted that customer activity levels appeared to be strong and "many seem to be taking a more strategic approach to BI, resulting in the emergence of larger transactions."  (My emphasis.)  Corporate performance management (CPM) is driving some of the larger deals, with Cognos and Hyperion taking the lead.  Evidently, systems integrators (SIs) are getting religion and developing collaterals around CPM messaging.  RBC Dominion Securities produced a more in-depth report (dated 29 April) and noted the following:
    • Gartner expects the market to accelerate in 2004.
    • The ETL (extraction, transformation, and load) market will flatten (finally).
    • CPM is hot.  "Hyperion, Cognos, and SAS appeared to be the best positioned non-ERP vendors to capitalize on the CPM market opportunity."  However, "(they) believe that SAP is the best-positioned large enterprise software vendor to execute in both the BI and CPM market ..."
    • Finally, the Gartner BI conference itself was hot, with 973 attendees, an increase in attendance of 70% over last year.
    UBS chimed in with their own report (dated 30 April), which in some ways was a bit more technical than the other two reports cited above.  UBS noted that heterogeneous environments require independent tools (e.g., it is very difficult to get heterogeneous data into an ERP data warehouse <DW>).  Gartner's rule of thumb is that an ERP-derived BI/DW solution should be on the short-list only if more than 60% of an organization's BI data resides within that single app vendorUBS also noted that the importance of BI is leading to the formation of BI competency centers.  They also believe that SAP and Microsoft remain significant long-term threats to the independent software vendors such as Cognos and Business Objects.  BTW, all three reports seemed a bit down on Business Objects.
     
    Another Computerworld feature on BI
     
    Sometimes advertorials can be a good thing.  A case in point is the 26 April issue of Computerworld which provides a link to a new, six page Computerworld White Paper on BI.  The paper is titled, "Charting the Course: A Guide to Evaluating Business Intelligence Products"; it's a good, practical read.  Tactical, product spec advice and guidelines, but still a good read.  The PDF can be found at http://tinyurl.com/2gt3d .
     
    Recent Tidbits on BI
     
    The New Straits Times (Malaysia) via Asia Africa Intelligence Wire reported on 24 June that SAS "expects the BI market in Asia to register double-digit growth for the next five years.  (Don Cooper Williams, director of marketing and alliances for SAS Asia-Pacific) cites a recent report from research house International Data Corp, which predicts that BI software market in the region (excluding Japan) to grow by 12 per cent this year, up from 7.5 per cent in 2003."  Note to SIs in China:  BI isn't just hot in the States; leverage your skills for serving the U.S. market and the domestic market.
     
    From the channel, India Business Insight (also via Asia Africa Intelligence Wire) on 31 May announced that "Business Objects has entered into a long-standing systems integrator agreement with Wipro Infotech (WI) to provide business intelligence (BI) solutions to customers."  Note to SIs in China:  Don't be left without a dance partner.
     
    Additional Articles for Review
     
    I did a quick scan of trade lit and found a few articles worth reading.  First, the March-April issue of Financial Executive talks about CPM -- Corporate Performance Management -- as it relates to BI.  The May issue of Insurance & Technology takes a vertical look at BI (rather basic apps), as does the April issue of Business Credit.  Always think verticals.
     
    A Final Wrap (or Should I Say, "Rap"?)
     
    Back to Computerworld.  More specifically, see the 29 March issue of Computerworld.  According to a survey conducted by IBM Business Consulting Services, BI is a high priority on the plate of C-level execs.  In a Computerworld poll, 39% of IT executives listed business intelligence projects as their most critical IT projects.  By 2005, market research firm IDC projects that the worldwide market for business intelligence software will total about $6 billion -- up from $2.5 billion in 2003 -- signaling a major increase in business intelligence projects.  IT executives say the skills they need on business intelligence projects include systems integration, data modeling, database administration, data standardization and project management.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              [news] IT Spending Trends        
    Tuesday, July 6, 2004
    Dateline: China
     
    A quick recap on IT spending trends from three recently published Smith Barney surveys.  The three reports are the May and June editions of their CIO Vendor Preference Survey and the 6 June issue of softwareWEEK.  Tom Berquist, my favorite i-banking analyst, was the lead for all three reports.  I have a backlog of blogs to write, so I'll use as many quotes as possible and add context where necessary.  (I'm mostly extracting from my smartphone bookmarks for these reports.  Warning:  I may have coded the May and June issues incorrectly, but the quotes are correct.)  NOTE:  Highlighted items (e.g., items in bold, like this sentence) are MY emphasis.  Items in red are my commentary.
     
    Starting with the Survey editions, "(t)he strongest areas of spending appear to be software (apps, security, storage, and database) and network equipment/apps (Gigabit Ethernet, WLAN, VPNs)" and regarding software, "larger and more well known vendors continue to dominate the list in each category with vendors such as Microsoft, SAP, IBM, Veritas, Symantec and Computer Associates getting significantly more mentions in each of their groups than the remaining vendors did."  However, the report admits that their sample group might be biased.  Yes, vendors matter -- and so do vendor partnering strategies.  However, I'm a bit skeptical about CA and I don't particular care very much for Veritas or Symantec.  Not my part of the universe.
     
    "Applications again stand out as a clear area of strength."  "Within applications, Enterprise Resource Planning (ERP), Supply Chain Management (SCM), Customer Relationship Management (CRM) and Business Intelligence (BI) all showed extremely well ..."  Well, this is the first sign that a recovery may be in the making for SCM.  However, I'd emphasize BI and ERP, followed by CRM; don't count on a lot happening in the SCM space just yet.  Some other key surveys do NOT validate that SCM is in recovery.  "In terms of specific vendors, Microsoft, Symantec, Veritas, SAP, and Adobe were the top beneficiaries of CIOs intentions to increase spending."  The report continues that only SAP showed statistically significant results, both in ERP and SCM.  "Results were more mixed for best-of-breed vendors in this area, suggesting that horizontal applications vendors are having a tough time competing with the large ERP vendors even as vertically-focused vendors continue to have some measure of success on this front."  For the more adventurous SIs in China, SAP presents a lot of opportunities.  Tread carefully, though.  And "Adobe's enterprise strategy appears to be gaining momentum.  Adobe was a clear standout in content management ..."  "Survey results were also positive (though somewhat less so) for other leading content management players, notably Microsoft and IBM."  Another "win" for Microsoft.  Funny that none of the traditionally leading content management players were mentioned.  A take on Linux:  "Linux continues to garner mind share, but large enterprises remain the main adopter.  Interestingly, nearly 83% of our respondents stated that they were not currently moving any applications to Linux.  Of the 17% that said they were moving applications to Linux, only one company under $1.0 billion in revenue was making the transition to Linux confirming our views that Linux is primarily being used by large companies to shift Unix applications to Linux on Intel."
     
    "Among CIOs who indicated a higher level of consulting spend, IBM was the clear winner, followed by Accenture as a distant second.  Unisys was also mentioned as a vendor being considered, but it was a distant third.  However, we note that Unisys being mentioned ahead of a pure-play consultant like BearingPoint (a low number of mentions, which included mentions of decreased spending) or EDS is positive, given that Unisys chooses to focus in 2 specific verticals, including one-public sector-that was not in the survey."  "Over two-thirds of CIOs indicated that they do not use IT outsourcers.  Most of the rest said they were unlikely to change the level of outsourcing spend.  IBM, ACS and CSC were the only vendors explicitly mentioned as likely to get more outsourcing business."  The "two-thirds" figure will likely change in favor of outsourcing.  This trend is fairly clear.  See a BCG report at http://tinyurl.com/2muy8 , although the report takes a relatively broad perspective.
     
    From softwareWEEK, "(t)he CIOs were also very focused on rapid 'time to market' with purchases.  None were interested in starting projects that would take greater than 2 quarters to complete."  "This requirement was not a 'payback' requirement, but rather an implementation time frame requirement.  The CIOs did recognize that payback times could be longer, though the payback times on IT utility spending were much shorter than on applications or emerging area spending."
     
    "In terms of spending, the CIOs all used a similar methodology for making decisions that essentially divides their IT spending into one of three categories: 1) sustained spending on their 'IT utility' (i.e., infrastructure such as network equipment, servers, storage, databases, etc.); 2) new project spending on applications (business intelligence, portals, CRM, etc.); and 3) investment spending on select emerging areas (grid/utility computing, identity management, collaboration, etc.)  It was pretty obvious that the CIOs recognized that business unit managers were more interested in spending on new applications/emerging areas than on the IT utility ..."  "(S)ome of the CIOs were experimenting with grid/utility computing initiatives to try to increase their utilization of storage/servers and reduce the amount of new equipment to be purchased.  In one example, a CIO showed their storage/server utilization around the world and many regions were in the 50% or worse bucket for average utilization.  Their goal was to use grid computing architectures and storage area networks (along with faster communication links) to better share the pool of resources."  Yes, this is it!!  Take this to heart!!  If you think grid and utility computing are Star Trek stuff, think again.
     
    "In terms of new projects, the CIOs mentioned they were spending on business intelligence, portal/self-service applications, CRM, and collaboration.  Collaboration was a heated discussion, with all CIOs commenting that this was a big problem for them and there was no clear solution on the market.  While it wasn't completely clear to the audience what the CIOs were looking for in a collaboration solution, the elements that were described included: more intelligent email, corporate instant messaging, web conferencing, integrated voice over IP with instant messaging (so that a conversation could quickly shift from typing to talking), and collaborative document editing (spreadsheets, presentations, publications, etc.).  Within the business intelligence arena, business activity monitoring was discussed as was building of enterprise data warehouses/data marts.  The portal/self-service applications being built or deployed were primarily for customer and employee self-service (remote access to email, applications, and files was a big deal for all of the companies).  On the CRM front, the discussion from one CIO was around their need to increase revenues and manage channel conflict better."  [I'll be posting to this blog a bit more about collaboration opportunities over the next week.]
     
    "While vendors were not discussed in any detail during the panel, the CIOs did say that they remain open to working with smaller vendors (public and private) as long as they have plenty of relevant references (in their industry, particularly with close competitors) and they offer a compelling value proposition versus larger vendors.  One CIO stated that they get called by 20 startups a week to sell products to them, but most of them cannot articulate the value proposition of their product.  Nonetheless, the CIO does take 5 meetings a month from startups because some of them are working on things that are interesting to the business."
     
    Whew ...  Lots of good materials.  To reiterate, all highlighted items are my emphasis.  Bottom line:  The market is heating up.  Get your ISV relationships in place.  Pick your verticals (see the "Tidbit on Microsoft" which follows).  Pick your apps -- and the apps I like the best are content management and BI, although ERP is looking good, too.  Collaboration can be a major source of revenue if the SI can provide a truly effective solution.
     
    Tidbits on Microsoft
     
    A quick update on some happenings in the Redmond universe.  (See http://tinyurl.com/36xgu ; the article is titled, "Microsoft focuses on its enterprise-applications business".)  First, app areas that are of particular interest to MS include those for manufacturing and life sciences.  So, how about a MS build-to-their-stack strategy focused on either of these two verticals?  Second, MS is moving beyond purely horizontal offerings to very specific functionality.  Their Encore acquisition is an example of MS moving in this direction.  Finally, new releases of all four of Microsoft's ERP product lines are due for this year.  Not surprisingly, MBS marketing is up 20% from FY04.  Hmmm ... ERP spending intentions are strong and MS is a key player in this space -- with several updated offerings scheduled for release this year.  Another opportunity?
     
    Tidbits on Infosys
     
    Infosys formally enters the IT strategy consulting biz.  (See http://tinyurl.com/2xxlo .)  Yes, it was inevitable.  In April Infosys Consulting, Inc. was formed and, "(i)t's no secret that the winning model will be high-end business consulting combined with high-quality, low-cost technology delivery done offshore," according to Stephen Pratt, the head of Infosys' consulting unit.  The Infosys Consulting unit now has 150 employees in the States and plans to expand to 500 within three years.  Note to SIs in China:  You need more -- a lot more -- IT strategy types  And you need people in the States (at least on an "as needed" basis) in order to capture -- and serve -- new accounts.
     
    Cheers,
     
    David Scott Lewis
    President & Principal Analyst
    IT E-Strategies, Inc.
    Menlo Park, CA & Qingdao, China
    http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
    http://tinyurl.com/2r3pa (access to blog content archives in China)
    http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
    http://tinyurl.com/2hg2e (AvantGo channel)
     
    To automatically subscribe click on http://tinyurl.com/388yf .
     

              Open Source is just the other side, the wild side!        
    March is a rather event-laden month for Open Source and Open Standards in networking: the 89th IETF, EclipseCon 2014, RSA 2014, the Open Networking Summit, the IEEE International Conference on Cloud (where I’ll be talking about the role of Open Source as we morph the Cloud down to Fog computing) and my favorite, the one […]
              Ukraine Air Enterprise : Are these the Last Days of Putin? - EnerPub        
    Ukraine Air Enterprise : Are these the Last Days of Putin? - EnerPub
              Leeds University Business School        














    Hej! Vi som gör detta blogginlägg Ã¤r Emma och Maria, tvÃ¥ doktorander vid Biblioteks- & informationsvetenskap/BHS, som under tre veckor besökt professor David Allen och hans forskningsgrupp vid AIMTech research centre, Leeds University Business School. Centret har ett tydligt fokus pÃ¥ forskning och undervisning inom Information Systems och Information Management. Själva forskar vi pÃ¥ ny teknik i organisationer: sociala medier (Emma) och cloud computing (Maria). Resan var oerhört värdefull, dels för att  kunna knyta kontakter med andra forskare inom omrÃ¥det men ocksÃ¥ fÃ¥ vidgade perspektiv. 

    Under vÃ¥r tid i Leeds undersökte vi ocksÃ¥ möjligheterna till framtida samarbete mellan Magisterprogrammet i Strategisk Information och Kommunikation, som ges vid BHS (där vi bÃ¥da är aktiva som programansvarig/kursansvarig/lärare), samt deras MSc Information Systems and Information Management. Det var mycket intressant att utbyta kunskap och erfarenheter kring programmen samt diskutera spännande utvecklingsmöjligheter. 






    Vi arbetade inte hela tiden utan hann ocksÃ¥ med en hel del annat: sociala aktiviteter med andra doktorander, utforska Leeds, som är en fantastiskt charmig stad med tillmötesgÃ¥ende människor, besök till Edinburgh och Manchester samt mÃ¥nga promenader längs kanalen i vÃ¥rt näromrÃ¥de. Vi fann snabbt att det fanns kopplingar mellan Leeds och BorÃ¥s. Staden har en lÃ¥ng textilhistoria samt en samt en växande profil inom skulptur och konst. Vi är säkra pÃ¥ att det finns mÃ¥nga anledningar att Ã¥terkomma (förhoppningsvis redan i september) och det är med ny pÃ¥fylld energi som vi befinner oss hemma i Sverige igen. Till sist, stort tack till professor David Allen och hans kolleger för ett fantastiskt varmt mottagande! 










              Minor Field Studies - Malaysia        
    23rd of January 2015 - Singapore - 新加坡共和国 - Singapura

    Marina Bay Sands, Marina Bay, Singapore
    To be back in Singapore, after working at the National University of Singapore in 2012, is very exciting. The purpose of this trip is to go to Malaysia, but first I stay for two days here in the lovely "Lion City". Since there are no lions in Singapore, one might wonder why it's nickname is Lion City. There is a long story, but to make it short; in Malay Singapore is Singapura - derived from "Singa" for lion and "Pura" for city.

    I have an interesting day ahead, going to work as a volunteer and plant trees at the Pasir Ris Park.


    25th of January Malaysia – Johor Bahru

    Pulai Springs Resort, JB, Malaysia
    I got much later than expected to Malaysia today due to something I ate last night. Quite troublesome to go through the Woodlands Checkpoint feeling sick, there is like a highly secured fort at the border of Singapore/Malaysia. Well, it was worth the trouble once I arrived at my hotel in Johor Bahru. I was supposed to meet with the the faculty today, but it changed in the very last minute. Early night to get ready for a morning meeting at the Universiti Teknologi Malaysia, UTM.



    26th of January Malaysia – Johor Bahru - Universiti Teknologi Malaysia


    Visit at Universiti Teknologi Malaysia, UTM
    My morning meeting took place at Media and Game Innovation Centre of Excellence (MaGICX), located on the UTM campus. The director of MaGICX, Dr. Mohd Sharizal Sunar, and Dr. Farhan Mohamed started the meeting with a presentation of their research centre and UTM. 
    We discussed possibilities for computer science and information systems students from the University of BorÃ¥s to do field studies in the region. 


    They were interested and are willing to help students from Sweden applying for a Minor Field Study scholarship, great news for students with ambitions of conducting field studies in Malaysia. 

    During the morning I was also introduced to other members of MaGICX and had a chance to see what kind of research they were conducting.




    At lunchtime I was introduced to Dr. Adrian David Cheok from City University of London. He is a professor of Pervasive Computing and is setting up a new research lab in Iskandar, in the south of Malaysia. This region is very dynamic and interesting things are happening here! 


    27th - 28th of January Malaysia – Johor Bahru - Universiti Teknologi Malaysia

    I participated in the weekly morning meetings at MaGICX. The staff meet on Tuesdays for three presentations by either seniors, Ph.D students or master students. Excellent opportunity for me to get an insight in their work. I also had a chance to introduce myself, the purpose of my trip and my own research.
    After a nice lunch it was time for a campus tour, UTM has a large and lush campus. They even have stables at the campus!
    The last meeting of the day was with the Deputy Dean of the Faculty of Computing, Dr. Siti Zaiton Mohd Hashim. We realized that we had a lot to discuss and booked another meeting the following day.




              Computing education: we already know about it!        
    By Naoko Asano Enomoto Computing Education today: Is it boring? Why? Have you experienced computing lessons during your school days? Did you like those lessons? British kids these days “No” to their computing lessons in schools–Although British school takes pride in having more computers per students among the European countries, their computing lessons have been […]
              Tort cu crema de vanilie si glazura de ciocolata        
    Ingrediente blat


    10 oua
    5 linguri de faina
    50g ciocolata menajera
    12 linguri de zahar
    2 linguri de cacao
    1 plic praf de copt
    unt pentru tapetat

    Ingrediente pentru crema

    750g mascarpone
    5 linguri de lapte
    10 linguri sirop de vanilie
    2 linguri zahar pudra
    2 galbenusuri
    2 fiole esenta de vanilie

    Ingrediente glazura

    200g ciocolata menajera
    2 linguri de ulei
    100ml panna

    200ml frisca pentru ornat
    500g fructe de padure pentru ornat

    Incepem cu pregatirea blatului astfel:   separam albusurile de galbenusuri si le batem spuma.Turnam zaharul putin cate putin pana la incorporare. Adaugam alternativ faina si galbenusurile, apoi cacaoa, ciocolata taiata bucatele mici si praful de copt. Tapetam forma cu unt si introducem la cuptor pentru aproximativ 30 minute la o temperatura de 180C. Scoatem blatul din cuptor si-l lasam la racit. Il taiem apoi in trei si il pregatim pentru montat.
    Consistenta cremei trebuie sa fie una moale asa incat blatul sa nu mai fie necesar siropul pentru blat. Amestecam crema mascarpone cu laptele, siropul de vanilie si esenta de vanilie. Int-o caticioara mica amestecam galbenusurile si zaharul pudra si apoi le punem in bain marie amestecand continuu pana capata o consistenta spumoasa. Le amestecam cu crema mascarpone pana la omogenizare si montam intre blaturi.
    Ciocolata impreuna cu uleiul si cu panna le punem pe foc amestecand continuu pana cand ciocolata este topita in intregime iar glazura devine omogena. O montam pe tort si introducem la frigider pentru o ora apoi batem frisca si ornam cu acesta si fructele de padure.



              Eclere cu frisca        
    Ingrediente carcase

    4 oua
    200ml apa
    100ml ulei
    4 linguri de faina

    Ingrediente cema

    500ml lapte
    2 galbenusuri
    3 linguri de faina
    4 linguri de zahar
    50g unt
    1 fiola esenta vanilie

    Ingrediente glazura ciocolata

    150g ciocolata menajera
    50ml smantana dulce pentru gatit
    2 linguri de ulei


    200ml frisca


    Preparam prima oara carcasele astfel: punem la fiert intr-o craticioara apa si uleiul. Cand aceasta da in clocot, adaugam faina putin cate putin pana obtinem o compozitie asemanatoare cu mamaliga, amestecand continuu. Tinem pe foc amestecand pana cand aceasta incepe sa se lipeasca de fundul craticioarei. Luam de pe foc si lasam la racit. Adaugam oualele unul cate unul si amestecam pana la omogenizare. Punem hartie de copt in tava si folosim un sprit pentru a da forma aluatului. Introducem la cuptor la 180C pana cad acestea capata culoare aurie apoi oprim cuptorul si le lasam in interior pana cand acestea se racesc. Le scoatem din cuptor si le taiem capacele.
    Pentru crema punem la fiert 300 ml de lapte impreuna cu zaharul si untul.In cei 200 ml lapte ramasi dizolvam faina. Cand laptele a inceput sa fiarba, adaugam laptele in care am dizolvat faina si amestecam pana cand compozitia se ingroasa. Luam de pe foc si incorporam galbenusurile unul cate unul.  Turnam esenta si amestecam bine pana la omogenizare.Dam crema obtinuta la rece. 
    Batem frisca pana capata consistenta solida si ne apucam de umplut carcasele cu crema si apoi cu frisca. Punem capacele si dam la rece.
    Punem pe foc ingredientele pentru glazura. Amestecam continuu pentru a nu se lipi pana cand obtinem o crema omogena. O turnam pe capacele eclerelor si le lasam apoi la rece pentru inca o ora.





              Prajitura cu nuci, crema de vanilie si ciocolata alba        
    Ingrediente blat

    10 oua
    10 linguri de zahar
    150g miez de nuca macinat
    5 linguri deulei
    10 linguri de faina
    1 plic praf de copt

    Ingrediente crema

    1L lapte
    100g unt
    5 linguri de faina
    10 linguri de zahar
    4 galbenusuri
    2 fiole esenta de vanilie
    3 plicuri de gelatina
    200ml frisca lichida

    Ingrediente glazura ciocolata alba

    400g ciocolata alba menajera
    80ml panna
    3 linguri de ulei

    300g miez de nuca macinat
    cirese confiate pentru ornat


    Incepem cu prepararea blatului astfel: separati albusurile de galbenusuri si bateti-le spuma apoi incorporati zaharul putin cate putin. Turnati alternativ galbenusurile si faina, apoi esenta, uleiul,praful de copt si nuca. Tapetati tava cu unt, turnati compozitia si introduceti la cuptor pentru aproximativ 40 minute la 180C.
    Puneti 800 ml lapte la fiert impreuna cu zaharul si untul iar in cei 200 ml ramasi dizolvati faina. Cand laptele a fiert, turnati cei 200 ml si amestecati continuu ca sa nu se prinda. Cand faina este fiarta, amestecati galbenusurile pe rand cu miscari energice, apoi turnati esenta. Lasati sa se raceasca, bateti frisca si incorporati. Dizolvati gelatina conform indicatiilor de pe plic si amestecati.
    Taiati blatul in doua.Turnati cema pe prima parte a blatului si dasupra puneti a doua parte a blatului. Acoperiti si dati la rece. De mentionat ca va trebui sa montati prajitura intr-o tava inalta deoarece crema va fi moale si este posibil sa curga. O puteti monta in tava in care ati copt blatul.
    Cand crema s-a intarit, topiti ciocolata impreuna cu panna si uleiul.Inveliti prajitura cu aceasta glazura apoi, cand aceasta este calda presarati deasupra nuca macinata. Ornati cu cirese confiate.






     



              Piept de pui intre lipii        
    Ingrediente

    10g drojdie
    30ml apa
    3 linguri faina
    2 lingura ulei masline
    2 linguri ulei de floarea soarelui
    1 ceapa
    250g ciuperci din conserva
    3 linguri panna
    5-6 catei de usturoi
    1buc piept de pui
    1buc ou
    rozmarin si busuioc proaspat
    sare si piper


    Dizolvam drojdia si putina sare in apa calduta. Adaugam o lingura de ulei si faina putin cate putin pana cand obtinem o coca elastica. O intindem cu sucitorul si decupam cu forma sau cu un pahar 3 lipii. Le punem la copt in tigaia incinsa ( fara ulei ) si le lasam aproximativ 2 minute pe fiecare parte. Batem pieptul de pui asa incat sa putem decupa din el cu aceeasi forma ca pentru lipii. Dupa ce l-am decupat, il ungem bine cu ulei de masline, il potrivim de sare si piper si il presaram cu busuioc si rozmarin taiate foarte marunt. Il punem apoi pe gratar.
    In timp ce pieptul de pui sta pe gratar,  punem la incins uleiul de floarea soarelui apoi adaugam ceapa taiata marunt. O tragem la tigaie pentru aproximativ 5 minute, apoi adaugam ciupercile si mai tinem pe foc cateva minute. Turnam panna si usturoiul pisat. Ametecam continuu pentru inca un minut apoi luam de pe foc.
    Punem la fiert apa pentru oul poche. Cand aceasta da in clocot, dam focul la minim si spargem oul cat mai aproape de suprafata apei. Il lasam la fiert 3-4 minute, apoi il scoatem cu o paleta.
    Montam pe farfurie prima data lipiile, apoi primul piept de pui peste care punem doua linguri de ciuperci in sos, apoi continuam cu inca o lipie, piept de pui si sos. Acoperim cu ultima bucata de lipie iar deasupra punem oul.


              Cupa cu fructe        
    Ingrediente

    1 buc mar ( mare )
    20 buc capsuni
    250g mascarpone
    coja rasa de la 1/2 lamaie
    8 buc piscoturi
    1 lingura de zahar tos
    2 linguri zahar pudra
    20ml sirop de lime
    1 galbenus ou
    topping de vanilie
    1/2 lingurita scortisoara macinata
    20g unt

    Curatam marul de coaja si-l taiem cubulete. Topim untul si adaugam merele, zaharul si scortisoara. Tinem pe foc si amestecam pentru aproximativ 5 minute, pana cand merele si-au lasat putina zeama iar zaharul este topit complet. Luam apoi de pe foc si lasam sa se raceasca. 
    Frecam galbenusul cu zaharul pudra pana obtinem o spuma apoi il amestecam cu crema de mascarpone si coaja de lamaie .
    Pregatim 4 cupe in care faramam piscoturile ( cate doua pentru fiecare cupa ). Punem apoi cate 5ml sirop de lime peste piscoturi ( 5ml pentru fiecare cupa ). Impartim crema de mascarpone in patru si o turnam peste piscoturi. Adaugam apoi merele si siropul de scortisoara rezultat din calire, apoi capsunile taiate jumatati ( aproximativ 10 jumatati pentru fiecare cupa ). La final turnam topping-ul de vanilie si dam la rece pentru 2 ore.



              Pulpa de porc umpluta cu varza si carne tocata        
    Ingrediente

    1buc pulpa porc ( aproximativ 1kg )
    1/2 varza dulce ( varza sa fie mica )
    300g carne tocata porc sau amestec vita-porc
    2 buc ceapa
    1 morcov
    3 linguri suc de rosii concentrat sau bulion
    1 lingurita cimbru
    60ml ulei
    sare si piper dupa gust

    Alegem o bucata de pulpa de porc pe care sa o putem sectiona in vederea umlerii ulterioare. Sectionam pulpa de porc pe jumatate dar nu total ci asa incat sa obtinem o bucata ca o foaie. O batem bine, o presaram cu sare, cimbru si o ungem cu ulei.
    Tocam o ceapa si varza marunt. Punem ceapa la calit apoi adaugam si varza. Turnam putina apa astfel incat varza sa poata fierbe. Dupa aproximativ 10 minute, turnam o lingura de suc de rosii sau bulion. Tinem pe foc aproximativ 20-30 minute, iar daca apa se evapora, mai turnam. La final potrivim de sare, piper si adaugam putin cimbru.Daca uleiul in care am calit ceapa nu este suficient pentru varza, mai putem adauga putin.
    Tragem la tigaie o ceapa taiata marunt si un morcov ras pe razatoarea mica. Adaugam apoi carnea si tinem pe foc pana aceasta este gata. Turnam apoi bulionul si mai tinem apoi pe foc aproximativ 10 minute.
    Intindem bucata de pulpa, apoi repartizam pe toata suprafata ei varza calita. Deasupra verzei repartizam carnea tocata. Rulam pulpa usor, apoi legam cu sfoara. Ungem bine cu restul de ulei si presaram cu cimbru. Introducem la cuptor la 240C, pana cand ruloul prinde culoare aurie.


              Tort cu capsuni        
    Ingrediente blat

    4 oua
    150g ciocolata rasa
    5 linguri de faina
    100g unt
    4 linguri de zahar
    1 fiola esenta rom
    1 plic praf de copt

    Ingrediente crema vanilie

    200ml frisca lichida
    3 linguri panna
    2 fiola esenta vanilie
    1 plic gelatina

    Ingrediente crema cacao

    200ml frisca lichida
    3 linguri panna
    1 plic gelatina
    2 linguri cacao
    1 fiola esenta rom

    Ingrediente crema mascarpone

    500g mascarpone
    3 galbenusuri ou
    50ml lichior triplu sec
    5 linguri de zahar pudra

    1 kg capsuni

     Cu 30 minute inainte de prepararea blatului, lasam untul sa se inmoaie la temperatura camerei. Separam albusurile de galbenusuri si batem albusurile spuma. Incorporam apoi zaharul putin cate putin, apoi alternativ faina si galbenusurile. Continuam cu untul, ciocolata rasa, esenta si praful de copt. Tapetam forma cu unt, turnam compozitia si introducem la cuptor la 200C pentru aproximativ 30 minute. Scoatem din cuptor si lasam la racit.
    Continuam cu crema de vanilie. Batem frisca pana cand obtinem consistenta cremoasa, adaugam panna si esenta. Preparam gelatina conform indicatiilor de pe ambalaj apoi adaugam in frisca si amestecam. Taiem aproximativ 600g capsuni in bucatele mici, iar jumatate din ele le adaugam in crema apoi turnam toata crema obtinuta peste blat si dam la rece.
    Pentru crema de cacao batem frisca spuma, adaugam pudra de cacao, esenta, panna, gelatina preparata conform indicatiilor de pe ambalaj. Amestecam totul cu cealalta jumatate de capsuni taiate marunt si turnam peste crema de vanilie, apoi dam la rece.
    Frecam galbenusurile in bain marie pana cand zaharul s-a topit, apoi le amestecam cu crema mascarpone si lichiorul pana la omogenizare. Turnam crema obtinuta peste tort si dam la rece pentru cateva ore inainte de servire. Scoatem si ornam cu restul de capsuni.




              Vrabioara de vita cu pachet de sparanghel si morcov        
    Ingrediente friptura

    2 bucati vrabioara de vita ( aprox 350g )
    4 linguri ulei de masline
    sucul de la 1/2 lamaie
    2 linguri sos de soia
    1 lingurita maghiran uscat
    1 lingura de rom
    1 lingura sos worcestershire
    sare si piper dupa gust

    Ingrediente pachet

    7-8 felii de bacon crud
    3 buc sparanghel
    1 buc morcov
    1 fir ceapa verde
    2 linguri ulei de masline
    1 crenguta rozmarin
    sare si piper dupa gust

    Cu cateva ore inainte de preparare, curatam vrabioara bine de pielite iar din restul ingredientelor ( mai putin sarea si piperul ) facem o marinata in care introducem vrabioara, apoi dam la rece.
    Folosim o forma de ceramica pentru copt, eventual o forma pentru sufleu, pentru a pregati pachetul de legume.  Tapetam forma cu feliile bacon, astfel incat marginile sa ramana afara pe toate partile formei. Taiem tulpina de sparanghel in 3-4 bucati, apoi morcovul il taiem pe lung in bucati de lungimea bucatilor de sparanghel. Adaugam si ceapa taiata rondele. Potrivim de sare, adaugam piper, ulei de masline si rozmarinul. Impachetam cu marginile baconului si introducem la cuptor la o temperatura de 200C pentru aproximativ 40 minute. Incingem bine gratarul si scoatem vrabioara din marinata. O potrivim de piper si o punem pe gratar. O tinem 3-4 minute pe fiecare parte apoi o montam pe farfurie langa pachetul pe care-l scoatem din forma, fara sa uitam sa  potrivim friptura de sare. 


              Cotlet de miel cu cartofi la cuptor        
    Ingrediente

    4-5 cartofi
    6-7 catei de usturoi
    sare si piper dupa gust
    2-3 frunze busuioc
    1 crenguta rozmarin proaspat
    2 linguri sos de soia
    6 linguri de uei
    1-1,5 kg carne miel ( cotlet )
    2 linguri sos worcestershire
    1 frunza dafin

    Spalam bine si fasonam cotletul de miel. Curatam cartofii, ii spalam si-i taiem bucati mari. Asezam totul in tava. Punem in blender, mai putin 2 linguri de ulei. Obtinem o pasta cu care ungem cotletul si cartofii. Turnam apoi o cana de apa in tava. Introducem la cuptor la 200C pentru 30 minute. Scoatem din cuptor si ungem din nou cu restul de ulei apoi introducem din nou pentru alte 30 minute.



              Piept de curcan umplut cu orez        
    Ingrediente

    50 gr unt
    sare si piper dupa gust
    1 ou
    1 dovlecel mic
    1 cescuta mica cu orez bob lung
    2 linguri porumb fiert
    700 gr piept curcan
    1 buc. morcov mic

    Puneti 3 cescute cu apa la fiert. Adaugati sare. Cand apa da in clocot, adaugati orezul spalat cu apa calda. Acoperiti vasul, dati focul la minim si lasati pana se umfla orezul. Luati de pe foc si taiati dovlecelul si morcovul cubulete. Trageti la tigaie dovlecelul si morcovul pana cand acestea incep sa capete o culoare usor aurie, apoi adaugati orezul si porumbul. Potriviti de sare. Amestecati si lasati la racit. Cand orezul s-a racit amestecati cu oul batut si piperul.
    Bateti pieptul de curcan si fasonati-l asa incat sa-l puteti umple. Puneti sare si piper dupa gust, Adaugati orezul si faceti un rulou pe care-l legati cu sfoara sau il prindeti cu scobitori. Topim untul si ungem ruloul cu acesta. Introducem la cuptor la 200C pentru aproximativ 45 minute. Scoatem din cuptor si lasam putin la racit inainte de a taia.


              CIS Emergency Maintenance - CCV / CIS - GPFS         
    General Alert

    CIS will perform emergency maintenance for CCV / CIS - GPFS file system today, 8/3, at 11:00 AM - 12:30 PM.
    There is no expected outage during this time.

    This may affect your ability to establish scp, sftp, or GlobusConnect sessions on transfer.ccv.brown.edu.  It could also affect Batch Computing, CIFS and Rdata Mounts, and Interactive Logins

    We apologize for any inconvenience this may cause.


              Web Conferencing for Students (WebEx)        
    General Alert
    7/13 6:04pm

    As of now, the problem with Web Conferencing (WebEx) has been resolved and it should be fully functional. 

    If you continue to experience problems with this service, please report them to the CIS IT Service Center at (401) 863-4357. After business hours, select option 0 to report a critical issue. 

    Thank you for your patience,
    Computing and Information Services

     


              51) Which one of the following statements concerning production and staffing plans is best? A. A master production schedule is a projected statement of income, costs, and profits. B. Aggregation can be performed along three dimensions: product families, labor, and time. C. Production plans are based primarily on information from the master production plan. D. A staffing plan is the intermediate link between the business plan and the master production schedule.         

    BUS/475 Guide 4


    1) The cost principle requires that when assets are acquired, they be recorded at __________.
    A.   list price B.   selling price C.   exchange price paid D.   appraisal value
    2) "Generally accepted" in the phrase generally accepted accounting principles means that the principles __________.
    A.   have been approved for use by the managements of business firms
    B.   have been approved by the Internal Revenue Service C.   have substantial authoritative support D.   are proven theories of accounting
    3) The standards and rules that are recognized as a general guide for financial reporting are called __________.
    A.   standards of financial reporting B.   operating guidelines C.   generally accepted accounting principles D.   generally accepted accounting standards
    4) Sam's Used Cars uses the specific identification method of costing inventory. During March, Sam purchased three cars for $6,000, $7,500, and $9,750, respectively. During March, two cars are sold for $9,000 each. Sam determines that at March 31, the $9,750 car is still on hand. What is Sam’s gross profit for March?
    A.   $8,250
    B.   $750 C.   $4,500
    D.   $5,250
               
    5) Hess, Inc. sells a single product with a contribution margin of $12 per unit and fixed costs of $74,400 and sales for the current year of $100,000. How much is Hess’s break even point?
    A.   2,133 units
    B.   6,200 units
    C.   $25,600 D.   4,600 units
               
    6) As Plant Controller, you are trying to determine which costs over which you have the most control on a day to day basis. Your goal is to achieve better profitability. The Plant Operations Manager suggests that overhead is the easiest area to directly reduce costs. Which of the following items would be classified as manufacturing overhead?
    A.   The western division’s vice president’s salary
    B.   Cost of landscaping the corporate office C.   General corporate liability insurance D.   Factory janitor
    7) What is the preparation of reports for each level of responsibility in the company’s organization chart called?
    A.   Master budgeting analysis
    B.   Exception reporting C.   Responsibility reporting
    D.   Static reporting
    8) Disney’s variable costs are 30% of sales. The company is contemplating an advertising campaign that will cost $22,000. If sales are expected to increase $40,000, by how much will the company's net income increase?
    A.   $6,000 B.   $12,000
    C.   $28,000
    D.   $18,000
               
    9) The cost of an asset and its fair market value are __________.
    A.   never the same B.   irrelevant when the asset is used by the business in its operations
    C.   the same on the date of acquisition D.   the same when the asset is sold
    10) Which one of the following is a product cost?
    A.   Indirect labor B.   Sales person’s salaries
    C.   Advertising costs D.   Office salaries
    11) What exists when budgeted costs exceed actual results?
    A.   A budgeting error B.   An unfavorable difference
    C.   An excess profit D.   A favorable difference
    12) The income statement and balance sheet columns of Pine Company's worksheet reflects the following totals:
                            Income Statement                  Balance Sheet
                Dr.       Cr.                   Dr.       Cr.
    Totals              $58,000           $48,000                       $34,000           $44,000
               

    Closing entries are necessary for __________.
    A.   permanent accounts only B.   both permanent and temporary accounts
    C.   permanent or real accounts only D.   temporary accounts only
    13) Managerial accounting __________.
    A.   is concerned with costing products B.   pertains to the entity as a whole and is highly aggregated
    C.   places emphasis on special-purpose information D.   is governed by generally accepted accounting principles
               
    14) H55 Company sells two products, beer and wine. Beer has a 10 percent profit margin and wine has a 12 percent profit margin. Beer has a 27 percent contribution margin and wine has a 25 percent contribution margin. If other factors are equal, which product should H55 push to customers?
    A.   Beer B.   Selling either results in the same additional income for the company
    C.   It should sell an equal quantity of both D.   Wine
    15) Lekeisha's income exceeds her expenditures. Lekeisha is a __________.
    A.   saver who demands money from the financial system B.   borrower who demands money from the financial system
    C.   borrower who supplies money to the financial system D.   saver who supplies money to the financial system
    16) Maurice receives $100 as a birthday gift. In deciding how to spend the money, he narrows his options down to four choices: Option A, Option B, Option C, and Option D. Each option costs $100. Finally he decides on Option B. The opportunity cost of this decision is __________.
    A.   the value to Maurice of the option he would have chosen had Option B not been available
    B.   $100 C.   $300 D.   the value to Maurice of Options A, C and D combined
    17) A production possibilities frontier will be a straight line if __________.
    A.   the economy is producing efficiently B.   the economy is engaged in trade with at least one other economy C.   increasing the production of one good by x units entails no opportunity cost in terms of the other good
    D.   increasing the production of one good by x units entails a constant opportunity cost in terms of the other good
               
    18) In economics, the cost of something is __________.
    A.   what you give up to get it B.   often impossible to quantify, even in principle C.   the dollar amount of obtaining it D.   always measured in units of time given up to get it
               
    19) A tax on an imported good is called a __________.
    A.   supply tax
    B.   trade tax C.   quota D.   tariff
    20) Which of the following statements about GDP is correct?
    A.   GDP is to a nation’s economy as household income is to a household. B.   GDP increases if the total population increases. C.   GDP measures two things at once: the total income of everyone in the economy and the unemployment rate.
    D.   Money continuously flows from households to government and then back to households, and GDP measures this flow of money.
               
    21) In computing GDP, market prices are used to value final goods and services because __________.
    A.   if market prices are out of line with how people value goods, the government sets price ceilings and price floors
    B.   Market prices are not used in computing GDP C.   market prices reflect the values of goods and services D.   market prices do not change much over time, so it is easy to make comparisons between years

    22) Which of the following statements about GDP is correct?
    A.   Nominal GDP values production at market prices, whereas real GDP values production at the cost of the resources used in the production process.
    B.   Nominal GDP consistently underestimates the value of production, whereas real GDP consistently overestimates the value of production.
    C.   Nominal GDP values production at current prices, whereas real GDP values production at constant prices.
    D.   Nominal GDP values production at constant prices, whereas real GDP values production at current prices.
               
    23) Which of the following is not correct?
    A.   The U.S. debt per-person is large compared with average lifetime income.
    B.   In 2005, the U.S. government had a deficit. C.   A potential cost of deficits is that they reduce national saving, thereby reducing growth of the capital stock and output growth.
    D.   Deficits give people the opportunity to consume at the expense of their children, but they do not require them to do so.
               
    24) The part of the balance of payments account that lists all long-term flows of payments is called the:
    A.   balance of trade. B.   financial and capital account.
    C.   government financial account.
    D.   current account.
    25) Edward Prescott and Finn Kydland won the Nobel Prize in Economics in 2004. One of their contributions was to argue that if a central bank could convince people to expect zero inflation, then the Fed would be tempted to raise output by increasing inflation. This possibility is known as __________.
    A.   the sacrifice ratio dilemma B.   the monetary policy reaction lag
    C.   the time inconsistency of policy
    D.   inflation targeting
    26) In general, the longest lag for __________.
    A.   fiscal policy is the time it takes to change policy, while for monetary policy the longest lag is the time it takes for policy to affect aggregate demand
    B.   both fiscal and monetary policy is the time it takes for policy to affect aggregate demand
    C.   monetary policy is the time it takes to change policy, while for fiscal policy the longest lag is the time it takes for policy to affect aggregate demand
    D.   both fiscal and monetary policy is the time it takes to change policy
    27) Consider two items that might be included in GDP: (1) The estimated rental value of owner-occupied housing; and (2) purchases of newly-constructed homes. How are these two items accounted for when GDP is calculated?
    A.   Only item (2) is included in GDP and it is included in the investment component.
    B.   Item (1) is included in the consumption component, while item (2) is included in the investment component.
    C.   Item (1) is included in the investment component, while item (2) is included in the consumption component.
    D.   Both item (1) and item (2) are included in the consumption component of GDP.

    28) Managers will utilize __________ skills with increasing frequency as they rise within an organization.
    A.   Professional B.   Interpersonal and communication
    C.   Technical D.   Professional E.   Conceptual and decision
    29) Which of these represent skills that managers need?
    A.   Interpersonal, quantitative, and professional B.   Technical, interpersonal & communication and conceptual & decision making
    C.   Professional, technical and interpersonal & communication D.   Conceptual & decision making, professional and technical E.   Interpersonal & communication, conceptual & decision making and professional
               
    30) Building a dynamic organization is another way of describing which function of management?
    A.   Staffing B.   Organizing
    C.   Leading D.   Controlling
    E.   Planning
    31) Your roommate is interested in starting a business and everybody has been giving him different information about being an entrepreneur. Since you have been studying about entrepreneurship and new ventures, which of these would you tell him is true?
    A.   Anyone can start a business B.   All entrepreneurs need venture capital in order to get started C.   Successful entrepreneurs take very careful, calculated risks D.   Entrepreneurs are their own bosses and completely independent
    E.   Money should not be considered a start-up ingredient
    32) The term used to refer to all kinds of differences including religious affiliation, age, disability status, economic class and lifestyle in addition to gender, race, ethnicity and nationality is:
    A.   Diversity B.   Managerial ethics
    C.   Recruiting D.   Employment E.   Selection
    33) A manager's ability to stimulate people to be high performers is referred to as:
    A.   Planning B.   Supervising
    C.   Controlling
    D.   Organizing E.   Leading
    34) A series of quality standards developed by a committee working under the International Organization for Standardization to improve total quality in all businesses for the benefit of both producers and consumers is:
    A.   Total quality management B.   Customer-based integration C.   Computer-integrated manufacturing (CIM)
    D.   Just-in-time control (JIT)
    E.   ISO 9000
    35) Japanese manufacturers' kaizen (continuous improvement) programs enable them to maintain:
    A.   A strategic alliance B.   A homogeneous workforce C.   Positive working relationships with all employees
    D.   A Learning advantage over their competition E.   Larger, faster facilities
    36) Listening to employee suggestions, gaining support for organizational objectives and fostering an atmosphere of teamwork are all considered:
    A.   Technical skills B.   Conceptual C.   Professional skills D.   Interpersonal/communication skills
    E.   Diagnostic skills
    37) The basic components of an effective sexual harassment policy include the following EXCEPT:
    A.   To develop an organization wide policy on sexual harassment B.   To establish a means for ongoing training C.   To act immediately when employees complain of sexual harassment
    D.   To establish a performance appraisal system E.   To establish a formal complaint procedure
    38) Teams that operate separately from the regular work structure and exist temporarily are known as:
    A.   Management teams B.   Transnational teams
    C.   Self-managed teams
    D.   Parallel teams E.   Self-designing teams
               
    39) The Aquatic Center, Inc. periodically reviews the goals of the company. During the process, The Aquatic Center managers analyze their current strategies as compared to their competitors, determine goals that they will pursue and decide upon specific actions for each area of the company to take in pursuit of these goals. The Aquatic Center managers have been engaged in the management function of:
    A.   Goal Coordination
    B.   Controlling C.   Organizing D.   Staffing E.   Planning
    40) As related to managing of human resources, diversity refers to:
    A.   Differences in demographics (such as age, race, gender, disability status, lifestyle, veteran status, educational level, etc.)
    B.   Differences in pay methods (such as hourly, salaried, overtime, hazard-pay, commissioned, etc.)
    C.   Differences in employee benefit plans (such as pensions, insurance, vacations, memberships, etc.)
    D.   Differences in retention strategies (such as training, hiring, incentives, etc) E.   Differences in recruiting methods (such as newspapers, schools, flyers, magazines, agencies, etc.)
               
    41) __________ is the process of working with people and resources to accomplish organizational goals.
    A.   Controlling B.   Decision making
    C.   Planning D.   Supervising E.   Management
    42) Twelve randomly-chosen students were asked how many times they had missed class during a certain semester, with this result: 2, 1, 5, 1, 1, 3, 4, 3, 1, 1, 5, 18.
    For this sample, the median is _____.
    A.   3 B.   3.5
    C.   2.5
    D.   2
    43) Use the following table to answer question:
     P(S | W) is approximately _____.
    A.   .40
    B.   .30
    C.   .12
    D.   .58
               
    44) Use the following table to answer question:
     P(M  A) is approximately _____.
    A.   .50 B.   .625
    C.   .125
    D.   .25
    45) Dullco Manufacturing claims that its alkaline batteries last forty hours on average in a certain type of portable CD player. Tests on a random sample of 18 batteries showed a mean battery life of 37.8 hours with a standard deviation of 5.4 hours.
    In determining the p-value for reporting the study's findings, which of the following is true?
    A.   The p-value is equal to .05. B.   The p-value is greater than .05. C.   The p-value cannot be determined without specifying  . D.   The p-value is less than .05.
    46) William used a sample of 68 U.S. cities to estimate the relationship between Crime (annual property crimes per 100,000 persons) and Income (median income per capita). His estimated regression equation was Crime = 428 + .050 Income.
    Which outcomes would be likely in a bivariate regression on 45 randomly chosen U.S. cities in 2005 with
    Y = number of robberies in each city (thousands of robberies) and
    X = size of police force in each city (thousands of police)?
    A.   High R2 (due to city size). B.   Positive slope (due to city size).
    C.   No correlation. D.   Autocorrelation.
    47) Twelve randomly-chosen students were asked how many times they had missed class during a certain semester, with this result: 2, 1, 5, 1, 1, 3, 4, 3, 1, 1, 5, 18.
    For this sample, which measure of central tendency is least representative of the “typical” student?
    A.   Midrange
    B.   Mean C.   Mode D.   Median
               
    48) Likely reasons for inaccurate control limits would include which of the following?
    A.   Process variation was not zero, as expected. B.   The engineering parameter for variance is unknown.
    C.   There was insufficient preliminary sampling. D.   The engineers were underpaid for their work.
    49) You are faced with a linear programming objective function of:
    Max P = $20X + $30Y
    and constraints of:
    3X + 4Y = 24 (Constraint A)
    5X – Y = 18 (Constraint B)
    You discover that the shadow price for Constraint A is 7.5 and the shadow price for Constraint B is 0. Which of these statements is TRUE?
    A.   The most you would want to pay for an additional unit of A would be $7.50.
    B.   You can change quantities of X and Y at no cost for Constraint B. C.   For every additional unit of the objective function you create, the price of A rises by $7.50.
    D.   For every additional unit of the objective function you create, you lose 0 units of B.
               
    50) A project has three paths. A–B–C has a length of 25 days. A–D–C has a length of 15 days. Finally, A–E–C has a length of 20 days. Which one of the following statements is TRUE?
    A.   The expected duration of this project is 25 + 15 + 20 = 60 days.
    B.   A–D–C is the critical path. C.   The expected duration of this project is 25 days. D.   A–B–C has the most slack.
    51) Which one of the following statements concerning production and staffing plans is best?
    A.   A master production schedule is a projected statement of income, costs, and profits.
    B.   Aggregation can be performed along three dimensions: product families, labor, and time.
    C.   Production plans are based primarily on information from the master production plan.
    D.   A staffing plan is the intermediate link between the business plan and the master production schedule.
               
    52) While glancing over the sensitivity report, you note that the stitching labor has a shadow price of $10 and a lower limit of 24 hours with an upper limit of 36 hours. If your original right hand value for stitching labor was 30 hours, you know that:
    A.   you would lose $80 if one of your workers missed an entire 8 hour shift. B.   the next worker that offers to work an extra 8 hours should receive at least $80.
    C.   you would be willing pay up to $60 for someone to work another 6 hours.
    D.   you can send someone home 6 hours early and still pay them the $60 they would have earned while on the clock.

    53) The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel.
    A.   physical, digital B.   e-commerce, digital
    C.   physical, financial D.   digital, e-commerce
    E.   digital, physical
    54) When customers access a Web site and make purchases, they generate __________.
    A.   Tracking cookies B.   Web data C.   Information D.   Clickstream data
    E.   Hyperlink data
    55) _____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information.
    A.   regionalization B.   globalization C.   nationalization D.   business environment
               
    56) Various organizations that promote fair and responsible use of information systems often develop __________.
    A.   a code of ethics B.   responsibility charters
    C.   a strategic plan D.   a mission statement E.   a goals outline
    57) What is _____ is not necessarily _____.
    A.   Illegal, unethical B.   Unethical, legal C.   Ethical, illegal D.   Unethical, illegal
    E.   Ethical, legal
    58) _____ provides users with a view of what is happening, where _____ addresses why it is happening.
    A.   Multidimensional data analysis, structured query language
    B.   Multidimensional data analysis, neural networks C.   Data mining, multidimensional data analysis D.   Data mining, expert system E.   Multidimensional data analysis, data mining
    59) Computer support is greatest for which of the following problems?
    A.   Semistructured and strategic planning B.   Semistructured and management control
    C.   Unstructured and operational control D.   Structured and operational control E.   Structured and management control
    60) The management cockpit best exemplifies which type of system?
    A.   Decision support system B.   Functional area information system
    C.   Expert system D.   Digital dashboard E.   Group decision support system
    61) _____ is the efficient and effective execution of specific tasks.
    A.   Operational control
    B.   Expertise C.   Management control
    D.   Strategic planning E.   Wisdom
    62) Geocoding is __________.
    A.   accessing geographical information B.   integrating maps with spatially oriented databases and other databases
    C.   integrating organizational transactions with spatially oriented databases D.   programming spatially oriented databases E.   encrypting spatial information
    63) At 8% compounded annually, how long will it take $750 to double?
    A.   48 months
    B.   6.5 years C.   9 years D.   12 years
    64) Which of the following represents an attempt to measure the earnings of the firm’s operations over a given time period?
    A.   Cash flow statement
    B.   Balance sheet C.   Income statement D.   Quarterly statement
               
    65) A machine costs $1,000, has a three-year life, and has an estimated salvage value of $100. It will generate after-tax annual cash flows (ACF) of $600 a year, starting next year. If your required rate of return for the project is 10%, what is the NPV of this investment? (Round your answerwer to the nearest $10.)
    A.   $570 B.   $490 C.   $900 D.   -$150
               
    66) Disadvantages of using current liabilities as opposed to long-term debt include:
    A.   higher cash flow exposure B.   greater risk of illiquidity, and uncertainty of interest costs
    C.   decreased risk of liquidity D.   certainty of interest costs E.   uncertainty of future liabilities
    67) Petrified Forest Skin Care, Inc. pays an annual perpetual dividend of $1.70 per share. If the stock is currently selling for $21.25 per share, what is the expected rate of return on this stock?
    A.   12.5% B.   36.13%
    C.   8.0% D.   13.6%
    68) Which of the following is most consistent with the hedging principle in working capital management?
    A.   Fixed assets should be financed with short-term notes payable. B.   Inventory should be financed with preferred stock. C.   Accounts receivable should be financed with short-term lines of credit.
    D.   Borrow on a floating rate basis to finance investments in permanent assets.
               
    69) An increase in future value can be caused by an increase in the __________.
    A.   original amount invested B.   annual interest rate and number of compounding periods
    C.   rate of return D.   dividends paid E.   starting value
    70) If the quote for a forward exchange contract is greater than the computed price, the forward contract is:
    A.   at equilibrium.
    B.   undervalued. C.   a good buy. D.   overvalued.
    71) Your company is considering an investment in a project which would require an initial outlay of $300,000 and produce expected cash flows in Years 1 through 5 of $87,385 per year. You have determined that the current after-tax cost of the firm’s capital (required rate of return) for each source of financing is as follows:
    Cost of debt     8%
    Cost of preferred stock           12%
    Cost of common stock            16%
    Long-term debt currently makes up 20% of the capital structure, preferred stock 10%, and common stock 70%. What is the net present value of this project?
    A.   $1,568
    B.   $871 C.   $1,241
    D.   $463
    72) Suppose you determine that the NPV of a project is $1,525,855. What does that mean?
    A.   The project’s IRR would have to be less that the firm’s discount rate. B.   The project would add value to the firm. C.   Under all conditions, the project’s payback would be less than the profitability index.
    D.   In all cases, investing in this project would be better than investing in a project that has an NPV of $850,000.
               
    73) The common stockholders are most concerned with:
    A.   the spread between the return generated on new investments and the investor’s required rate of return.
    B.   the size of the firm’s beginning earnings per share. C.   the risk of the investment. D.   the percentage of profits retained.
    74) PepsiCo calculates unlevered betas for each peer group in order to:
    A.   eliminate different financial risks.
    B.   eliminate competitive factors. C.   eliminate judgment factors. D.   eliminate different business risks.
    75) Which of the following best represents operating income?
    A.   Income from discontinued operations
    B.   Earnings before interest and taxes C.   Income from capital gains D.   Income after financing activities
    76) In comparison to the buying of final consumers, the purchasing of organizational buyers:
    A.   is even less predictable. B.   leans basically toward economy, quality, and dependability.
    C.   is always emotional. D.   is strictly economic and not at all emotional. E.   is always based on competitive bids from multiple suppliers.
               
    77) The basic objective of the U.S. market-directed economic system is to:
    A.   achieve an annual growth rate of at least 10 percent. B.   provide each person with an equal share of the economic output.
    C.   make the most efficient use of the country's resources. D.   minimize inflation. E.   satisfy consumer needs as they--the consumers--see them.
    78) Comparing GDP for foreign countries can help a marketing manager evaluate potential markets if the manager remembers that:
    A.   GDP measures show people's tendency to buy particular products. B.   income tends to be evenly distributed among consumers in most countries. C.   GDP estimates may not be very accurate for very different cultures and economies.
    D.   Other countries most likely don’t use the US Dollar as their primary currency.
    E.   GDP measures show the degree of competition in a market.
    79) A firm's "marketing mix" decision areas would NOT include:
    A.   Promotion.
    B.   People. C.   Price. D.   Place. E.   Product.
    80) __________ is a marketing management aid which refers to how customers think about proposed and/or present brands in a market.
    A.   Brand familiarity B.   Positioning
    C.   Market scanning D.   Customer relationship management (CRM)
    E.   Market segmentation
    81) The "four Ps" of a marketing mix are:
    A.   Production, Personnel, Price, and Physical Distribution
    B.   Promotion, Production, Price, and People C.   Potential customers, Product, Price, and Personal Selling
    D.   Product, Price, Promotion, and Profit E.   Product, Place, Promotion, and Price
    82) When evaluating macro-marketing:
    A.   the evaluation is necessarily subjective. B.   the best approach is to consider the profit generated by individual firms within the overall system.
    C.   one must determine how efficiently the society's resources are used. D.   one must consider the society’s role in the marketing system. E.   one must consider each individual firm's role in the marketing system.
    83) A cluster analysis of the "toothpaste market" would probably show that:
    A.   the broad product-market can be served effectively with one marketing mix.
    B.   most consu
              52) While glancing over the sensitivity report, you note that the stitching labor has a shadow price of $10 and a lower limit of 24 hours with an upper limit of 36 hours. If your original right hand value for stitching labor was 30 hours, you know that: A. you would lose $80 if one of your workers missed an entire 8 hour shift. B. the next worker that offers to work an extra 8 hours should receive at least $80. C. you would be willing pay up to $60 for someone to work another 6 hours. D.         

    BUS/475 Guide 4


    1) The cost principle requires that when assets are acquired, they be recorded at __________.
    A.   list price B.   selling price C.   exchange price paid D.   appraisal value
    2) "Generally accepted" in the phrase generally accepted accounting principles means that the principles __________.
    A.   have been approved for use by the managements of business firms
    B.   have been approved by the Internal Revenue Service C.   have substantial authoritative support D.   are proven theories of accounting
    3) The standards and rules that are recognized as a general guide for financial reporting are called __________.
    A.   standards of financial reporting B.   operating guidelines C.   generally accepted accounting principles D.   generally accepted accounting standards
    4) Sam's Used Cars uses the specific identification method of costing inventory. During March, Sam purchased three cars for $6,000, $7,500, and $9,750, respectively. During March, two cars are sold for $9,000 each. Sam determines that at March 31, the $9,750 car is still on hand. What is Sam’s gross profit for March?
    A.   $8,250
    B.   $750 C.   $4,500
    D.   $5,250
               
    5) Hess, Inc. sells a single product with a contribution margin of $12 per unit and fixed costs of $74,400 and sales for the current year of $100,000. How much is Hess’s break even point?
    A.   2,133 units
    B.   6,200 units
    C.   $25,600 D.   4,600 units
               
    6) As Plant Controller, you are trying to determine which costs over which you have the most control on a day to day basis. Your goal is to achieve better profitability. The Plant Operations Manager suggests that overhead is the easiest area to directly reduce costs. Which of the following items would be classified as manufacturing overhead?
    A.   The western division’s vice president’s salary
    B.   Cost of landscaping the corporate office C.   General corporate liability insurance D.   Factory janitor
    7) What is the preparation of reports for each level of responsibility in the company’s organization chart called?
    A.   Master budgeting analysis
    B.   Exception reporting C.   Responsibility reporting
    D.   Static reporting
    8) Disney’s variable costs are 30% of sales. The company is contemplating an advertising campaign that will cost $22,000. If sales are expected to increase $40,000, by how much will the company's net income increase?
    A.   $6,000 B.   $12,000
    C.   $28,000
    D.   $18,000
               
    9) The cost of an asset and its fair market value are __________.
    A.   never the same B.   irrelevant when the asset is used by the business in its operations
    C.   the same on the date of acquisition D.   the same when the asset is sold
    10) Which one of the following is a product cost?
    A.   Indirect labor B.   Sales person’s salaries
    C.   Advertising costs D.   Office salaries
    11) What exists when budgeted costs exceed actual results?
    A.   A budgeting error B.   An unfavorable difference
    C.   An excess profit D.   A favorable difference
    12) The income statement and balance sheet columns of Pine Company's worksheet reflects the following totals:
                            Income Statement                  Balance Sheet
                Dr.       Cr.                   Dr.       Cr.
    Totals              $58,000           $48,000                       $34,000           $44,000
               

    Closing entries are necessary for __________.
    A.   permanent accounts only B.   both permanent and temporary accounts
    C.   permanent or real accounts only D.   temporary accounts only
    13) Managerial accounting __________.
    A.   is concerned with costing products B.   pertains to the entity as a whole and is highly aggregated
    C.   places emphasis on special-purpose information D.   is governed by generally accepted accounting principles
               
    14) H55 Company sells two products, beer and wine. Beer has a 10 percent profit margin and wine has a 12 percent profit margin. Beer has a 27 percent contribution margin and wine has a 25 percent contribution margin. If other factors are equal, which product should H55 push to customers?
    A.   Beer B.   Selling either results in the same additional income for the company
    C.   It should sell an equal quantity of both D.   Wine
    15) Lekeisha's income exceeds her expenditures. Lekeisha is a __________.
    A.   saver who demands money from the financial system B.   borrower who demands money from the financial system
    C.   borrower who supplies money to the financial system D.   saver who supplies money to the financial system
    16) Maurice receives $100 as a birthday gift. In deciding how to spend the money, he narrows his options down to four choices: Option A, Option B, Option C, and Option D. Each option costs $100. Finally he decides on Option B. The opportunity cost of this decision is __________.
    A.   the value to Maurice of the option he would have chosen had Option B not been available
    B.   $100 C.   $300 D.   the value to Maurice of Options A, C and D combined
    17) A production possibilities frontier will be a straight line if __________.
    A.   the economy is producing efficiently B.   the economy is engaged in trade with at least one other economy C.   increasing the production of one good by x units entails no opportunity cost in terms of the other good
    D.   increasing the production of one good by x units entails a constant opportunity cost in terms of the other good
               
    18) In economics, the cost of something is __________.
    A.   what you give up to get it B.   often impossible to quantify, even in principle C.   the dollar amount of obtaining it D.   always measured in units of time given up to get it
               
    19) A tax on an imported good is called a __________.
    A.   supply tax
    B.   trade tax C.   quota D.   tariff
    20) Which of the following statements about GDP is correct?
    A.   GDP is to a nation’s economy as household income is to a household. B.   GDP increases if the total population increases. C.   GDP measures two things at once: the total income of everyone in the economy and the unemployment rate.
    D.   Money continuously flows from households to government and then back to households, and GDP measures this flow of money.
               
    21) In computing GDP, market prices are used to value final goods and services because __________.
    A.   if market prices are out of line with how people value goods, the government sets price ceilings and price floors
    B.   Market prices are not used in computing GDP C.   market prices reflect the values of goods and services D.   market prices do not change much over time, so it is easy to make comparisons between years

    22) Which of the following statements about GDP is correct?
    A.   Nominal GDP values production at market prices, whereas real GDP values production at the cost of the resources used in the production process.
    B.   Nominal GDP consistently underestimates the value of production, whereas real GDP consistently overestimates the value of production.
    C.   Nominal GDP values production at current prices, whereas real GDP values production at constant prices.
    D.   Nominal GDP values production at constant prices, whereas real GDP values production at current prices.
               
    23) Which of the following is not correct?
    A.   The U.S. debt per-person is large compared with average lifetime income.
    B.   In 2005, the U.S. government had a deficit. C.   A potential cost of deficits is that they reduce national saving, thereby reducing growth of the capital stock and output growth.
    D.   Deficits give people the opportunity to consume at the expense of their children, but they do not require them to do so.
               
    24) The part of the balance of payments account that lists all long-term flows of payments is called the:
    A.   balance of trade. B.   financial and capital account.
    C.   government financial account.
    D.   current account.
    25) Edward Prescott and Finn Kydland won the Nobel Prize in Economics in 2004. One of their contributions was to argue that if a central bank could convince people to expect zero inflation, then the Fed would be tempted to raise output by increasing inflation. This possibility is known as __________.
    A.   the sacrifice ratio dilemma B.   the monetary policy reaction lag
    C.   the time inconsistency of policy
    D.   inflation targeting
    26) In general, the longest lag for __________.
    A.   fiscal policy is the time it takes to change policy, while for monetary policy the longest lag is the time it takes for policy to affect aggregate demand
    B.   both fiscal and monetary policy is the time it takes for policy to affect aggregate demand
    C.   monetary policy is the time it takes to change policy, while for fiscal policy the longest lag is the time it takes for policy to affect aggregate demand
    D.   both fiscal and monetary policy is the time it takes to change policy
    27) Consider two items that might be included in GDP: (1) The estimated rental value of owner-occupied housing; and (2) purchases of newly-constructed homes. How are these two items accounted for when GDP is calculated?
    A.   Only item (2) is included in GDP and it is included in the investment component.
    B.   Item (1) is included in the consumption component, while item (2) is included in the investment component.
    C.   Item (1) is included in the investment component, while item (2) is included in the consumption component.
    D.   Both item (1) and item (2) are included in the consumption component of GDP.

    28) Managers will utilize __________ skills with increasing frequency as they rise within an organization.
    A.   Professional B.   Interpersonal and communication
    C.   Technical D.   Professional E.   Conceptual and decision
    29) Which of these represent skills that managers need?
    A.   Interpersonal, quantitative, and professional B.   Technical, interpersonal & communication and conceptual & decision making
    C.   Professional, technical and interpersonal & communication D.   Conceptual & decision making, professional and technical E.   Interpersonal & communication, conceptual & decision making and professional
               
    30) Building a dynamic organization is another way of describing which function of management?
    A.   Staffing B.   Organizing
    C.   Leading D.   Controlling
    E.   Planning
    31) Your roommate is interested in starting a business and everybody has been giving him different information about being an entrepreneur. Since you have been studying about entrepreneurship and new ventures, which of these would you tell him is true?
    A.   Anyone can start a business B.   All entrepreneurs need venture capital in order to get started C.   Successful entrepreneurs take very careful, calculated risks D.   Entrepreneurs are their own bosses and completely independent
    E.   Money should not be considered a start-up ingredient
    32) The term used to refer to all kinds of differences including religious affiliation, age, disability status, economic class and lifestyle in addition to gender, race, ethnicity and nationality is:
    A.   Diversity B.   Managerial ethics
    C.   Recruiting D.   Employment E.   Selection
    33) A manager's ability to stimulate people to be high performers is referred to as:
    A.   Planning B.   Supervising
    C.   Controlling
    D.   Organizing E.   Leading
    34) A series of quality standards developed by a committee working under the International Organization for Standardization to improve total quality in all businesses for the benefit of both producers and consumers is:
    A.   Total quality management B.   Customer-based integration C.   Computer-integrated manufacturing (CIM)
    D.   Just-in-time control (JIT)
    E.   ISO 9000
    35) Japanese manufacturers' kaizen (continuous improvement) programs enable them to maintain:
    A.   A strategic alliance B.   A homogeneous workforce C.   Positive working relationships with all employees
    D.   A Learning advantage over their competition E.   Larger, faster facilities
    36) Listening to employee suggestions, gaining support for organizational objectives and fostering an atmosphere of teamwork are all considered:
    A.   Technical skills B.   Conceptual C.   Professional skills D.   Interpersonal/communication skills
    E.   Diagnostic skills
    37) The basic components of an effective sexual harassment policy include the following EXCEPT:
    A.   To develop an organization wide policy on sexual harassment B.   To establish a means for ongoing training C.   To act immediately when employees complain of sexual harassment
    D.   To establish a performance appraisal system E.   To establish a formal complaint procedure
    38) Teams that operate separately from the regular work structure and exist temporarily are known as:
    A.   Management teams B.   Transnational teams
    C.   Self-managed teams
    D.   Parallel teams E.   Self-designing teams
               
    39) The Aquatic Center, Inc. periodically reviews the goals of the company. During the process, The Aquatic Center managers analyze their current strategies as compared to their competitors, determine goals that they will pursue and decide upon specific actions for each area of the company to take in pursuit of these goals. The Aquatic Center managers have been engaged in the management function of:
    A.   Goal Coordination
    B.   Controlling C.   Organizing D.   Staffing E.   Planning
    40) As related to managing of human resources, diversity refers to:
    A.   Differences in demographics (such as age, race, gender, disability status, lifestyle, veteran status, educational level, etc.)
    B.   Differences in pay methods (such as hourly, salaried, overtime, hazard-pay, commissioned, etc.)
    C.   Differences in employee benefit plans (such as pensions, insurance, vacations, memberships, etc.)
    D.   Differences in retention strategies (such as training, hiring, incentives, etc) E.   Differences in recruiting methods (such as newspapers, schools, flyers, magazines, agencies, etc.)
               
    41) __________ is the process of working with people and resources to accomplish organizational goals.
    A.   Controlling B.   Decision making
    C.   Planning D.   Supervising E.   Management
    42) Twelve randomly-chosen students were asked how many times they had missed class during a certain semester, with this result: 2, 1, 5, 1, 1, 3, 4, 3, 1, 1, 5, 18.
    For this sample, the median is _____.
    A.   3 B.   3.5
    C.   2.5
    D.   2
    43) Use the following table to answer question:
     P(S | W) is approximately _____.
    A.   .40
    B.   .30
    C.   .12
    D.   .58
               
    44) Use the following table to answer question:
     P(M  A) is approximately _____.
    A.   .50 B.   .625
    C.   .125
    D.   .25
    45) Dullco Manufacturing claims that its alkaline batteries last forty hours on average in a certain type of portable CD player. Tests on a random sample of 18 batteries showed a mean battery life of 37.8 hours with a standard deviation of 5.4 hours.
    In determining the p-value for reporting the study's findings, which of the following is true?
    A.   The p-value is equal to .05. B.   The p-value is greater than .05. C.   The p-value cannot be determined without specifying  . D.   The p-value is less than .05.
    46) William used a sample of 68 U.S. cities to estimate the relationship between Crime (annual property crimes per 100,000 persons) and Income (median income per capita). His estimated regression equation was Crime = 428 + .050 Income.
    Which outcomes would be likely in a bivariate regression on 45 randomly chosen U.S. cities in 2005 with
    Y = number of robberies in each city (thousands of robberies) and
    X = size of police force in each city (thousands of police)?
    A.   High R2 (due to city size). B.   Positive slope (due to city size).
    C.   No correlation. D.   Autocorrelation.
    47) Twelve randomly-chosen students were asked how many times they had missed class during a certain semester, with this result: 2, 1, 5, 1, 1, 3, 4, 3, 1, 1, 5, 18.
    For this sample, which measure of central tendency is least representative of the “typical” student?
    A.   Midrange
    B.   Mean C.   Mode D.   Median
               
    48) Likely reasons for inaccurate control limits would include which of the following?
    A.   Process variation was not zero, as expected. B.   The engineering parameter for variance is unknown.
    C.   There was insufficient preliminary sampling. D.   The engineers were underpaid for their work.
    49) You are faced with a linear programming objective function of:
    Max P = $20X + $30Y
    and constraints of:
    3X + 4Y = 24 (Constraint A)
    5X – Y = 18 (Constraint B)
    You discover that the shadow price for Constraint A is 7.5 and the shadow price for Constraint B is 0. Which of these statements is TRUE?
    A.   The most you would want to pay for an additional unit of A would be $7.50.
    B.   You can change quantities of X and Y at no cost for Constraint B. C.   For every additional unit of the objective function you create, the price of A rises by $7.50.
    D.   For every additional unit of the objective function you create, you lose 0 units of B.
               
    50) A project has three paths. A–B–C has a length of 25 days. A–D–C has a length of 15 days. Finally, A–E–C has a length of 20 days. Which one of the following statements is TRUE?
    A.   The expected duration of this project is 25 + 15 + 20 = 60 days.
    B.   A–D–C is the critical path. C.   The expected duration of this project is 25 days. D.   A–B–C has the most slack.
    51) Which one of the following statements concerning production and staffing plans is best?
    A.   A master production schedule is a projected statement of income, costs, and profits.
    B.   Aggregation can be performed along three dimensions: product families, labor, and time.
    C.   Production plans are based primarily on information from the master production plan.
    D.   A staffing plan is the intermediate link between the business plan and the master production schedule.
               
    52) While glancing over the sensitivity report, you note that the stitching labor has a shadow price of $10 and a lower limit of 24 hours with an upper limit of 36 hours. If your original right hand value for stitching labor was 30 hours, you know that:
    A.   you would lose $80 if one of your workers missed an entire 8 hour shift. B.   the next worker that offers to work an extra 8 hours should receive at least $80.
    C.   you would be willing pay up to $60 for someone to work another 6 hours.
    D.   you can send someone home 6 hours early and still pay them the $60 they would have earned while on the clock.

    53) The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel.
    A.   physical, digital B.   e-commerce, digital
    C.   physical, financial D.   digital, e-commerce
    E.   digital, physical
    54) When customers access a Web site and make purchases, they generate __________.
    A.   Tracking cookies B.   Web data C.   Information D.   Clickstream data
    E.   Hyperlink data
    55) _____ is the integration of economic, social, cultural, and ecological facets of life, enabled by information.
    A.   regionalization B.   globalization C.   nationalization D.   business environment
               
    56) Various organizations that promote fair and responsible use of information systems often develop __________.
    A.   a code of ethics B.   responsibility charters
    C.   a strategic plan D.   a mission statement E.   a goals outline
    57) What is _____ is not necessarily _____.
    A.   Illegal, unethical B.   Unethical, legal C.   Ethical, illegal D.   Unethical, illegal
    E.   Ethical, legal
    58) _____ provides users with a view of what is happening, where _____ addresses why it is happening.
    A.   Multidimensional data analysis, structured query language
    B.   Multidimensional data analysis, neural networks C.   Data mining, multidimensional data analysis D.   Data mining, expert system E.   Multidimensional data analysis, data mining
    59) Computer support is greatest for which of the following problems?
    A.   Semistructured and strategic planning B.   Semistructured and management control
    C.   Unstructured and operational control D.   Structured and operational control E.   Structured and management control
    60) The management cockpit best exemplifies which type of system?
    A.   Decision support system B.   Functional area information system
    C.   Expert system D.   Digital dashboard E.   Group decision support system
    61) _____ is the efficient and effective execution of specific tasks.
    A.   Operational control
    B.   Expertise C.   Management control
    D.   Strategic planning E.   Wisdom
    62) Geocoding is __________.
    A.   accessing geographical information B.   integrating maps with spatially oriented databases and other databases
    C.   integrating organizational transactions with spatially oriented databases D.   programming spatially oriented databases E.   encrypting spatial information
    63) At 8% compounded annually, how long will it take $750 to double?
    A.   48 months
    B.   6.5 years C.   9 years D.   12 years
    64) Which of the following represents an attempt to measure the earnings of the firm’s operations over a given time period?
    A.   Cash flow statement
    B.   Balance sheet C.   Income statement D.   Quarterly statement
               
    65) A machine costs $1,000, has a three-year life, and has an estimated salvage value of $100. It will generate after-tax annual cash flows (ACF) of $600 a year, starting next year. If your required rate of return for the project is 10%, what is the NPV of this investment? (Round your answerwer to the nearest $10.)
    A.   $570 B.   $490 C.   $900 D.   -$150
               
    66) Disadvantages of using current liabilities as opposed to long-term debt include:
    A.   higher cash flow exposure B.   greater risk of illiquidity, and uncertainty of interest costs
    C.   decreased risk of liquidity D.   certainty of interest costs E.   uncertainty of future liabilities
    67) Petrified Forest Skin Care, Inc. pays an annual perpetual dividend of $1.70 per share. If the stock is currently selling for $21.25 per share, what is the expected rate of return on this stock?
    A.   12.5% B.   36.13%
    C.   8.0% D.   13.6%
    68) Which of the following is most consistent with the hedging principle in working capital management?
    A.   Fixed assets should be financed with short-term notes payable. B.   Inventory should be financed with preferred stock. C.   Accounts receivable should be financed with short-term lines of credit.
    D.   Borrow on a floating rate basis to finance investments in permanent assets.
               
    69) An increase in future value can be caused by an increase in the __________.
    A.   original amount invested B.   annual interest rate and number of compounding periods
    C.   rate of return D.   dividends paid E.   starting value
    70) If the quote for a forward exchange contract is greater than the computed price, the forward contract is:
    A.   at equilibrium.
    B.   undervalued. C.   a good buy. D.   overvalued.
    71) Your company is considering an investment in a project which would require an initial outlay of $300,000 and produce expected cash flows in Years 1 through 5 of $87,385 per year. You have determined that the current after-tax cost of the firm’s capital (required rate of return) for each source of financing is as follows:
    Cost of debt     8%
    Cost of preferred stock           12%
    Cost of common stock            16%
    Long-term debt currently makes up 20% of the capital structure, preferred stock 10%, and common stock 70%. What is the net present value of this project?
    A.   $1,568
    B.   $871 C.   $1,241
    D.   $463
    72) Suppose you determine that the NPV of a project is $1,525,855. What does that mean?
    A.   The project’s IRR would have to be less that the firm’s discount rate. B.   The project would add value to the firm. C.   Under all conditions, the project’s payback would be less than the profitability index.
    D.   In all cases, investing in this project would be better than investing in a project that has an NPV of $850,000.
               
    73) The common stockholders are most concerned with:
    A.   the spread between the return generated on new investments and the investor’s required rate of return.
    B.   the size of the firm’s beginning earnings per share. C.   the risk of the investment. D.   the percentage of profits retained.
    74) PepsiCo calculates unlevered betas for each peer group in order to:
    A.   eliminate different financial risks.
    B.   eliminate competitive factors. C.   eliminate judgment factors. D.   eliminate different business risks.
    75) Which of the following best represents operating income?
    A.   Income from discontinued operations
    B.   Earnings before interest and taxes C.   Income from capital gains D.   Income after financing activities
    76) In comparison to the buying of final consumers, the purchasing of organizational buyers:
    A.   is even less predictable. B.   leans basically toward economy, quality, and dependability.
    C.   is always emotional. D.   is strictly economic and not at all emotional. E.   is always based on competitive bids from multiple suppliers.
               
    77) The basic objective of the U.S. market-directed economic system is to:
    A.   achieve an annual growth rate of at least 10 percent. B.   provide each person with an equal share of the economic output.
    C.   make the most efficient use of the country's resources. D.   minimize inflation. E.   satisfy consumer needs as they--the consumers--see them.
    78) Comparing GDP for foreign countries can help a marketing manager evaluate potential markets if the manager remembers that:
    A.   GDP measures show people's tendency to buy particular products. B.   income tends to be evenly distributed among consumers in most countries. C.   GDP estimates may not be very accurate for very different cultures and economies.
    D.   Other countries most likely don’t use the US Dollar as their primary currency.
    E.   GDP measures show the degree of competition in a market.
    79) A firm's "marketing mix" decision areas would NOT include:
    A.   Promotion.
    B.   People. C.   Price. D.   Place. E.   Product.
    80) __________ is a marketing management aid which refers to how customers think about proposed and/or present brands in a market.
    A.   Brand familiarity B.   Positioning
    C.   Market scanning D.   Customer relationship management (CRM)
    E.   Market segmentation
    81) The "four Ps" of a marketing mix are:
    A.   Production, Personnel, Price, and Physical Distribution
    B.   Promotion, Production, Price, and People C.   Potential customers, Product, Price, and Personal Selling
    D.   Product, Price, Promotion, and Profit E.   Product, Place, Promotion, and Price
    82) When evaluating macro-marketing:
    A.   the evaluation is necessarily subjective. B.   the best approach is to consider the profit generated by individual firms within the overall system.
    C.   one must determine how efficiently the society's resources are used. D.   one must consider the society’s role in the marketing system. E.   one must consider each individual firm's role in the marketing system.
    83) A cluster analysis of the "toothpaste market" would probably show that:
    A.   the broad product-market can be served effectively with one marketing mix.
    B.   most consu
              53) The costs of delivering products in the _____ channel are much higher than delivering products in the _____ channel. A. physical, digital B. e-commerce, digital C. physical, financial D. digital, e-commerce E. digital, physical        

    BUS/475 Guide 4


    1) The cost principle requires that when assets are acquired, they be recorded at __________.
    A.   list price B.   selling price C.   exchange price paid D.   appraisal value
    2) "Generally accepted" in the phrase generally accepted accounting principles means that the principles __________.
    A.   have been approved for use by the managements of business firms
    B.   have been approved by the Internal Revenue Service C.   have substantial authoritative support D.   are proven theories of accounting
    3) The standards and rules that are recognized as a general guide for financial reporting are called __________.
    A.   standards of financial reporting B.   operating guidelines C.   generally accepted accounting principles D.   generally accepted accounting standards
    4) Sam's Used Cars uses the specific identification method of costing inventory. During March, Sam purchased three cars for $6,000, $7,500, and $9,750, respectively. During March, two cars are sold for $9,000 each. Sam determines that at March 31, the $9,750 car is still on hand. What is Sam’s gross profit for March?
    A.   $8,250
    B.   $750 C.   $4,500
    D.   $5,250
               
    5) Hess, Inc. sells a single product with a contribution margin of $12 per unit and fixed costs of $74,400 and sales for the current year of $100,000. How much is Hess’s break even point?
    A.   2,133 units
    B.   6,200 units
    C.   $25,600 D.   4,600 units
               
    6) As Plant Controller, you are trying to determine which costs over which you have the most control on a day to day basis. Your goal is to achieve better profitability. The Plant Operations Manager suggests that overhead is the easiest area to directly reduce costs. Which of the following items would be classified as manufacturing overhead?
    A.   The western division’s vice president’s salary
    B.   Cost of landscaping the corporate office C.   General corporate liability insurance D.   Factory janitor
    7) What is the preparation of reports for each level of responsibility in the company’s organization chart called?
    A.   Master budgeting analysis
    B.   Exception reporting C.   Responsibility reporting
    D.   Static reporting
    8) Disney’s variable costs are 30% of sales. The company is contemplating an advertising campaign that will cost $22,000. If sales are expected to increase $40,000, by how much will the company's net income increase?
    A.   $6,000 B.   $12,000
    C.   $28,000
    D.   $18,000
               
    9) The cost of an asset and its fair market value are __________.
    A.   never the same B.   irrelevant when the asset is used by the business in its operations
    C.   the same on the date of acquisition D.   the same when the asset is sold
    10) Which one of the following is a product cost?
    A.   Indirect labor B.   Sales person’s salaries
    C.   Advertising costs D.   Office salaries
    11) What exists when budgeted costs exceed actual results?
    A.   A budgeting error B.   An unfavorable difference
    C.   An excess profit D.   A favorable difference
    12) The income statement and balance sheet columns of Pine Company's worksheet reflects the following totals:
                            Income Statement                  Balance Sheet
                Dr.       Cr.                   Dr.       Cr.
    Totals              $58,000           $48,000                       $34,000           $44,000
               

    Closing entries are necessary for __________.
    A.   permanent accounts only B.   both permanent and temporary accounts
    C.   permanent or real accounts only D.   temporary accounts only
    13) Managerial accounting __________.
    A.   is concerned with costing products B.   pertains to the entity as a whole and is highly aggregated
    C.   places emphasis on special-purpose information D.   is governed by generally accepted accounting principles
               
    14) H55 Company sells two products, beer and wine. Beer has a 10 percent profit margin and wine has a 12 percent profit margin. Beer has a 27 percent contribution margin and wine has a 25 percent contribution margin. If other factors are equal, which product should H55 push to customers?
    A.   Beer B.   Selling either results in the same additional income for the company
    C.   It should sell an equal quantity of both D.   Wine
    15) Lekeisha's income exceeds her expenditures. Lekeisha is a __________.
    A.   saver who demands money from the financial system B.   borrower who demands money from the financial system
    C.   borrower who supplies money to the financial system D.   saver who supplies money to the financial system
    16) Maurice receives $100 as a birthday gift. In deciding how to spend the money, he narrows his options down to four choices: Option A, Option B, Option C, and Option D. Each option costs $100. Finally he decides on Option B. The opportunity cost of this decision is __________.
    A.   the value to Maurice of the option he would have chosen had Option B not been available
    B.   $100 C.   $300 D.   the value to Maurice of Options A, C and D combined
    17) A production possibilities frontier will be a straight line if __________.
    A.   the economy is producing efficiently B.   the economy is engaged in trade with at least one other economy C.   increasing the production of one good by x units entails no opportunity cost in terms of the other good
    D.   increasing the production of one good by x units entails a constant opportunity cost in terms of the other good
               
    18) In economics, the cost of something is __________.
    A.   what you give up to get it B.   often impossible to quantify, even in principle C.   the dollar amount of obtaining it D.   always measured in units of time given up to get it
               
    19) A tax on an imported good is called a __________.
    A.   supply tax
    B.   trade tax C.   quota D.   tariff
    20) Which of the following statements about GDP is correct?
    A.   GDP is to a nation’s economy as household income is to a household. B.   GDP increases if the total population increases. C.   GDP measures two things at once: the total income of everyone in the economy and the unemployment rate.
    D.   Money continuously flows from households to government and then back to households, and GDP measures this flow of money.
               
    21) In computing GDP, market prices are used to value final goods and services because __________.
    A.   if market prices are out of line with how people value goods, the government sets price ceilings and price floors
    B.   Market prices are not used in computing GDP C.   market prices reflect the values of goods and services D.   market prices do not change much over time, so it is easy to make comparisons between years

    22) Which of the following statements about GDP is correct?
    A.   Nominal GDP values production at market prices, whereas real GDP values production at the cost of the resources used in the production process.
    B.   Nominal GDP consistently underestimates the value of production, whereas real GDP consistently overestimates the value of production.
    C.   Nominal GDP values production at current prices, whereas real GDP values production at constant prices.
    D.   Nominal GDP values production at constant prices, whereas real GDP values production at current prices.
               
    23) Which of the following is not correct?
    A.   The U.S. debt per-person is large compared with average lifetime income.
    B.   In 2005, the U.S. government had a deficit. C.   A potential cost of deficits is that they reduce national saving, thereby reducing growth of the capital stock and output growth.
    D.   Deficits give people the opportunity to consume at the expense of their children, but they do not require them to do so.
               
    24) The part of the balance of payments account that lists all long-term flows of payments is called the:
    A.   balance of trade. B.   financial and capital account.
    C.   government financial account.
    D.   current account.
    25) Edward Prescott and Finn Kydland won the Nobel Prize in Economics in 2004. One of their contributions was to argue that if a central bank could convince people to expect zero inflation, then the Fed would be tempted to raise output by increasing inflation. This possibility is known as __________.
    A.   the sacrifice ratio dilemma B.   the monetary policy reaction lag
    C.   the time inconsistency of policy
    D.   inflation targeting
    26) In general, the longest lag for __________.
    A.   fiscal policy is the time it takes to change policy, while for monetary policy the longest lag is the time it takes for policy to affect aggregate demand
    B.   both fiscal and monetary policy is the time it takes for policy to affect aggregate demand
    C.   monetary policy is the time it takes to change policy, while for fiscal policy the longest lag is the time it takes for policy to affect aggregate demand
    D.   both fiscal and monetary policy is the time it takes to change policy
    27) Consider two items that might be included in GDP: (1) The estimated rental value of owner-occupied housing; and (2) purchases of newly-constructed homes. How are these two items accounted for when GDP is calculated?
    A.   Only item (2) is included in GDP and it is included in the investment component.
    B.   Item (1) is included in the consumption component, while item (2) is included in the investment component.
    C.   Item (1) is included in the investment component, while item (2) is included in the consumption component.
    D.   Both item (1) and item (2) are included in the consumption component of GDP.

    28) Managers will utilize __________ skills with increasing frequency as they rise within an organization.
    A.   Professional B.   Interpersonal and communication
    C.   Technical D.   Professional E.   Conceptual and decision
    29) Which of these represent skills that managers need?
    A.   Interpersonal, quantitative, and professional B.   Technical, interpersonal & communication and conceptual & decision making
    C.   Professional, technical and interpersonal & communication D.   Conceptual & decision making, professional and technical E.   Interpersonal & communication, conceptual & decision making and professional
               
    30) Building a dynamic organization is another way of describing which function of management?
    A.   Staffing B.   Organizing
    C.   Leading D.   Controlling
    E.   Planning
    31) Your roommate is interested in starting a business and everybody has been giving him different information about being an entrepreneur. Since you have been studying about entrepreneurship and new ventures, which of these would you tell him is true?
    A.   Anyone can start a business B.   All entrepreneurs need venture capital in order to get started C.   Successful entrepreneurs take very careful, calculated risks D.   Entrepreneurs are their own bosses and completely independent
    E.   Money should not be considered a start-up ingredient
    32) The term used to refer to all kinds of differences including religious affiliation, age, disability status, economic class and lifestyle in addition to gender, race, ethnicity and nationality is:
    A.   Diversity B.   Managerial ethics
    C.   Recruiting D.   Employment E.   Selection
    33) A manager's ability to stimulate people to be high performers is referred to as:
    A.   Planning B.   Supervising
    C.   Controlling
    D.   Organizing E.   Leading
    34) A series of quality standards developed by a committee working under the International Organization for Standardization to improve total quality in all businesses for the benefit of both producers and consumers is:
    A.   Total quality management B.   Customer-based integration C.   Computer-integrated manufacturing (CIM)
    D.   Just-in-time control (JIT)
    E.   ISO 9000
    35) Japanese manufacturers' kaizen (continuous improvement) programs enable them to maintain:
    A.   A strategic alliance B.   A homogeneous workforce C.   Positive working relationships with all employees
    D.   A Learning advantage over their competition E.   Larger, faster facilities
    36) Listening to employee suggestions, gaining support for organizational objectives and fostering an atmosphere of teamwork are all considered:
    A.   Technical skills B.   Conceptual C.   Professional skills D.   Interpersonal/communication skills
    E.   Diagnostic skills
    37) The basic components of an effective sexual harassment policy include the following EXCEPT:
    A.   To develop an organization wide policy on sexual harassment B.   To establish a means for ongoing training C.   To act immediately when employees complain of sexual harassment
    D.   To establish a performance appraisal system E.   To establish a formal complaint procedure
    38) Teams that operate separately from the regular work structure and exist temporarily are known as:
    A.   Management teams B.   Transnational teams
    C.   Self-managed teams
    D.   Parallel teams E.   Self-designing teams
               
    39) The Aquatic Center, Inc. periodically reviews the goals of the company. During the process, The Aquatic Center managers analyze their current strategies as compared to their competitors, determine goals that they will pursue and decide upon specific actions for each area of the company to take in pursuit of these goals. The Aquatic Center managers have been engaged in the management function of:
    A.   Goal Coordination
    B.   Controlling C.   Organizing D.   Staffing E.   Planning
    40) As related to managing of human resources, diversity refers to:
    A.   Differences in demographics (such as age, race, gender, disability status, lifestyle, veteran status, educational level, etc.)
    B.   Differences in pay methods (such as hourly, salaried, overtime, hazard-pay, commissioned, etc.)
    C.   Differences in employee benefit plans (such as pensions, insurance, vacations, memberships, etc.)
    D.   Differences in retention strategies (such as training, hiring, incentives, etc) E.   Differences in recruiting methods (such as newspapers, schools, flyers, magazines, agencies, etc.)
               
    41) __________ is the process of working with people and resources to accomplish organizational goals.
    A.   Controlling B.   Decision making
    C.   Planning D.   Supervising E.   Management
    42) Twelve randomly-chosen students were asked how many times they had missed class during a certain semester, with this result: 2, 1, 5, 1, 1, 3, 4, 3, 1, 1, 5, 18.
    For this sample, the median is _____.
    A.   3 B.   3.5
    C.   2.5
    D.   2
    43) Use the following table to answer question:
     P(S | W) is approximately _____.
    A.   .40
    B.   .30
    C.   .12
    D.   .58
          &