Henry Ford was born in 1863 in Dearborn, Michigan, four weeks after the Battle of Gettysburg. As a boy, he had an instinct for gadgets and machines but little use for literature or history, which he considered "more or less bunk." He quit school at the age of 15 and soon headed for the big city. Want to learn more?
Browse a gallery of Model Ts
See what you're missing . . .
Become a lifetime member of
KnowledgeNews today!
Monday, February 21, 2005
America’s Missing: Broadcast Emergency Response
CodeAmber.org went live on August 23rd, 2002. Since that time we have grown rapidly as you can see by the statistics in the top right hand column. The number of Web and Desktop tickers are real time counters but we update the number of tickers served on the first of each month.
Saturday, February 19, 2005
Beirut's Roots
This week, a bomb in Beirut killed former Lebanese prime minister Rafik Hariri. The popular leader resigned last October while calling on Syria to remove the 14,000 troops it keeps inside Lebanon. Now that call is coming even louder. In fact, Hariri's funeral quickly turned into an anti-Syrian rally, with more than 150,000 mourners chanting "Syria out! Syria out!"
Your paper will tell you that Syrian troops have been deployed around Beirut for decades, ever since the Lebanese civil war raged from 1975 to 1990. It probably won't mention that Beirut itself has been around since biblical times--and that its relationship with Syria has ancient roots, too.
Beirut's Roots
The first mention of a city called "Biruta" dates to the 15th century BC. Back then, the region now called Lebanon was inhabited by seafaring traders whom the Old Testament calls Canaanites.
The Greeks called these merchant mariners Phoenicians (from "phoinikies," a purple dye they sold), and adapted their alphabetic script for their own use. Unfortunately for the Phoenicians, neighbors coveted more than their letters. Beirut's wealth made it a target. At various times, the ancient city and its natural harbor were conquered by Egyptians, Assyrians, Babylonians, Greeks, and Romans.
Want to learn more?
Visit Lebanon's historic sites online
All for a one-time payment of just $34.95--
no renewals, ever!
KnowledgeNews.net * 123 South 6th Street * Marshall, Illinois 62441 * USA
Questions? Comments? Suggestions? Write to us at info@knowledgenews.net
We read every note and answer as quickly as possible.
Your paper will tell you that Syrian troops have been deployed around Beirut for decades, ever since the Lebanese civil war raged from 1975 to 1990. It probably won't mention that Beirut itself has been around since biblical times--and that its relationship with Syria has ancient roots, too.
Beirut's Roots
The first mention of a city called "Biruta" dates to the 15th century BC. Back then, the region now called Lebanon was inhabited by seafaring traders whom the Old Testament calls Canaanites.
The Greeks called these merchant mariners Phoenicians (from "phoinikies," a purple dye they sold), and adapted their alphabetic script for their own use. Unfortunately for the Phoenicians, neighbors coveted more than their letters. Beirut's wealth made it a target. At various times, the ancient city and its natural harbor were conquered by Egyptians, Assyrians, Babylonians, Greeks, and Romans.
Want to learn more?
Visit Lebanon's historic sites online
All for a one-time payment of just $34.95--
no renewals, ever!
KnowledgeNews.net * 123 South 6th Street * Marshall, Illinois 62441 * USA
Questions? Comments? Suggestions? Write to us at info@knowledgenews.net
We read every note and answer as quickly as possible.
Friday, February 18, 2005
The official support and discussion site for FeedBurner.
So you've burned your feed and you've dropped the "FeedBurner chicklet" on your web page or blog. Congratulations! When you go look at your feed stats, however, are you seeing all of your feed traffic? Maybe not. The rest of this entry contains some hints and tips to make your stats as useful and accurate as they can be. more»
O'Reilly Books
Google Hacks,
2nd Edition Google Hacks, 2nd Edition -- Featuring dozens of refreshed hacks, plus 25 completely new ones, this updated edition of Google Hacks is a collection of real-world solutions to practical Google research problems. Thanks to these industrial-strength tips, now you can easily save hours of research time mining Google. Best of all, each of the book's 100 hacks is easy to read and digest; there's no confusing terminology or extraneous information to hamper your understanding. Sample Hacks are available free online. more »
2nd Edition Google Hacks, 2nd Edition -- Featuring dozens of refreshed hacks, plus 25 completely new ones, this updated edition of Google Hacks is a collection of real-world solutions to practical Google research problems. Thanks to these industrial-strength tips, now you can easily save hours of research time mining Google. Best of all, each of the book's 100 hacks is easy to read and digest; there's no confusing terminology or extraneous information to hamper your understanding. Sample Hacks are available free online. more »
Wednesday, February 16, 2005
A free family boardgame for five or more players about Tudor England and Henry VIII
by Garry Stevens PhD
Back to Garry's Games.
Current release: Last modified and updated July 2003.
Download Henry VIII: Intrigue in the Tudor Court for free!What the Game is About
The Year Is 1525
Henry VIII, King of England, is troubled. After many years of marriage to Catherine of Aragon, he still has no son. The Tudor dynasty is young. The bloody family squabbles of the House of Plantagenet (that we know as the Wars of the Roses) were ended by his father. But still they haunt the memories of men. And the remnants of the House of York yearn to rule once again over this upstart Lancastrian. more »
Back to Garry's Games.
Current release: Last modified and updated July 2003.
Download Henry VIII: Intrigue in the Tudor Court for free!What the Game is About
The Year Is 1525
Henry VIII, King of England, is troubled. After many years of marriage to Catherine of Aragon, he still has no son. The Tudor dynasty is young. The bloody family squabbles of the House of Plantagenet (that we know as the Wars of the Roses) were ended by his father. But still they haunt the memories of men. And the remnants of the House of York yearn to rule once again over this upstart Lancastrian. more »
How I Learned to Stop Worrying and Love the Command Line,
You've always been told to write maintainable code. All of those fancy books on Extreme Programming and every computer science course you've ever had has emphasized commenting and clarity and all of those other broccoli-is-good-for-you-so-clean-your-plate directives. This article, and its second half, are about the opposite of that—unreadable code, inscrutable code, and disposable code. But, also, indispensable code. It is the editor we will use that will be the dominating factor in the way we write our code, however, and that editor is the bash command line prompt. more »
Flash Newsletter:
Mandrakesoft offers you, free, a 3-month subscription
to the Mandrakelinux Club!
Are you a happy Mandrake Linux user who would like to directly support your favorite distribution while also receiving special membership privileges?
Would you like to get more related products and services? more details »
to the Mandrakelinux Club!
Are you a happy Mandrake Linux user who would like to directly support your favorite distribution while also receiving special membership privileges?
Would you like to get more related products and services? more details »
ISN Security Watch -
ISN Security Watch - Get daily security checks
on the Euro-Atlantic region. For full news
service visit their website,
on the Euro-Atlantic region. For full news
service visit their website,
Help removing error guard
Close all windows,rerun HJT, put a tick beside these and
click FIX CHECKED
O4 - HKLM\..\Run: [ErrorGuard] C:\Program Files\ErrorGuard\ErrorGuard.Exe
O16 - DPF: {205FF73B-CA67-11D5-99DD-444553540006} (CInstall Class) - http://www.errorguard.com/installation/Install.cab
Then boot up in SAFE MODE
then go to C:\Program Files and delete ErrorGuard <---folder
then reboot and post a fresh Hijackthis log.
more excellent help »
click FIX CHECKED
O4 - HKLM\..\Run: [ErrorGuard] C:\Program Files\ErrorGuard\ErrorGuard.Exe
O16 - DPF: {205FF73B-CA67-11D5-99DD-444553540006} (CInstall Class) - http://www.errorguard.com/installation/Install.cab
Then boot up in SAFE MODE
then go to C:\Program Files and delete ErrorGuard <---folder
then reboot and post a fresh Hijackthis log.
more excellent help »
Interoperable Communications Network
City of Harrisonburg and Rockingham County, Va., Deploy Interoperable Communications Network
"For the first time, the city of Harrisonburg and Rockingham County's Police, Sheriff, Fire and Emergency Medical first-responders will be able to talk to one another and coordinate with other city and county service agencies."
"For the first time, the city of Harrisonburg and Rockingham County's Police, Sheriff, Fire and Emergency Medical first-responders will be able to talk to one another and coordinate with other city and county service agencies."
BlackBerry 7520 use the JABRA® Bluetooth headset
Get the most from your phone with powerful custom accessories. For your BlackBerry 7520 use the JABRA® Bluetooth headset for hands-free wireless conversation. Or, if you have a non-Bluetooth-enabled phone you can get the JABRA Universal Multi-Adapter to support wireless communication.
Featured discussion: This guy should be stoned... (with rocks)
TechRepublic member mrafrohead has some unkind words for a computer user: "Basically, this [guy] got himself infected with a Trojan... [he] is suing his bank for the lost funds... I hope [the bank] counter sues him and takes him for the rest of what he's worth." more »
NEW PHP ORAL HISTORY COLLECTION:
Dear Madam, dear Sir,
INSIGHTS INTO SOVIET-CZECHOSLOVAK MILITARY PLANNING IN THE COLD WARThe interviews with 15 Czechoslovak generals of the cold war era throw new light on Czechoslovakia’s role in Soviet military planning prior to 1968, when its army was assigned to bear the brunt of any confrontation with NATO because of the absence from its territory of Soviet or other Warsaw Pact troops. Conversely, the stationing of Soviet forces there after 1968, amid doubts about the reliability of the Czechoslovak army in the event of war, reduced the country’s strategic exceptionalism and with it also the importance of the information that could be supplied by its highest ranking officers. The interviews offer fascinating reading. Most of the generals were willing to speak openly about the secret operational plans. Some of their testimonies provide the most authoritative and illuminating views that we have on the 1964 war plan discovered and first published by the PHP, prompting an animated discussion about its significance on the PHP website. Other intriguing topics are the deployment of Soviet nuclear warheads on Czechoslovak territory before 1968 and the severity of the economic strain that membership in the Warsaw Pact imposed upon Czechoslovakia, forcing it to maintain a military establishment entirely out of proportion with the country’s resources. Please read the original transcripts in Czech as well as topical selections in both English and Czech as well as introductory remarks by Czech cold war historian Karel Sieber, who conducted the interviews, and PHP coordinator Vojtech Mastny at www.isn.ethz.ch/php/collections/coll_ceska.htm. We invite your feedback on the interviews. Please send your comments and reflections to
mailto:php@sipo.gess.ethz.ch. more »
INSIGHTS INTO SOVIET-CZECHOSLOVAK MILITARY PLANNING IN THE COLD WARThe interviews with 15 Czechoslovak generals of the cold war era throw new light on Czechoslovakia’s role in Soviet military planning prior to 1968, when its army was assigned to bear the brunt of any confrontation with NATO because of the absence from its territory of Soviet or other Warsaw Pact troops. Conversely, the stationing of Soviet forces there after 1968, amid doubts about the reliability of the Czechoslovak army in the event of war, reduced the country’s strategic exceptionalism and with it also the importance of the information that could be supplied by its highest ranking officers. The interviews offer fascinating reading. Most of the generals were willing to speak openly about the secret operational plans. Some of their testimonies provide the most authoritative and illuminating views that we have on the 1964 war plan discovered and first published by the PHP, prompting an animated discussion about its significance on the PHP website. Other intriguing topics are the deployment of Soviet nuclear warheads on Czechoslovak territory before 1968 and the severity of the economic strain that membership in the Warsaw Pact imposed upon Czechoslovakia, forcing it to maintain a military establishment entirely out of proportion with the country’s resources. Please read the original transcripts in Czech as well as topical selections in both English and Czech as well as introductory remarks by Czech cold war historian Karel Sieber, who conducted the interviews, and PHP coordinator Vojtech Mastny at www.isn.ethz.ch/php/collections/coll_ceska.htm. We invite your feedback on the interviews. Please send your comments and reflections to
mailto:php@sipo.gess.ethz.ch. more »
Did you miss the recent unveiling of the Sun Grid,
Sun's radically simple vision for the future of Network Computing? You can still tune in and see it on-demand at Sun's Network Computing Web event. Just go to www.sun.com/nc
Find out why IT matters to your core competitiveness, and explore the far-reaching benefits of Sun Grid and Sun's Six Global Expertise Practices.
Hear from Sun leaders as they zero in on how Network Computing is evolving in 2005. See why Sun is serious about open sourcing Solaris and why Service Oriented Architectures are the next wave. more »
Find out why IT matters to your core competitiveness, and explore the far-reaching benefits of Sun Grid and Sun's Six Global Expertise Practices.
Hear from Sun leaders as they zero in on how Network Computing is evolving in 2005. See why Sun is serious about open sourcing Solaris and why Service Oriented Architectures are the next wave. more »
Free IT White Papers Delivered to Your Inbox
Receive practical, UNIX-specific information that you can apply immediately to meet your project management, vendor selection, and problem-solving needs. ITtoolbox UNIX White Paper Alert brings you the latest information from top vendors, research firms, and the ITtoolbox community. Subscribe today! more »
Embedded Software Engineers Needed
Scientific Atlanta is seeking Embedded Software Engineers who are skilled in C/C++, JavaScript, XML, GUI Interfaces, UNIX, Assembler, Embedded Software, Software Version Control, IP networking, and more to work as developers for embedded projects in...more »
How to Create a WYSIWYG Rich Text Editor in JavaScript.
WebDeveloper: Credit Card Validation Script
Need help figuring out how to choose either credit card validation or checks on a form? This thread should give you some real answers.
WebDeveloper: Changing Font in Menu Script
What is the best method for adding fonts to a menu using JavaScript? Here is one method ...
How to Create a WYSIWYG Rich Text Editor in JavaScript. Pt. 2
Today, you'll learn about different methods for handling keyboard input and the RichEdit control. Keyboard input is handled by two functions; onKeyPress() and onKeyDown(). The RichEdit constructor creates the necessary HTML elements to display the control.
Need help figuring out how to choose either credit card validation or checks on a form? This thread should give you some real answers.
WebDeveloper: Changing Font in Menu Script
What is the best method for adding fonts to a menu using JavaScript? Here is one method ...
How to Create a WYSIWYG Rich Text Editor in JavaScript. Pt. 2
Today, you'll learn about different methods for handling keyboard input and the RichEdit control. Keyboard input is handled by two functions; onKeyPress() and onKeyDown(). The RichEdit constructor creates the necessary HTML elements to display the control.
Judge Denies IBM's Dismissal of SCO Case (UNIX News)
A federal judge has rejected efforts by International Business Machines Corp. to dismiss a major portion of a lawsuit brought by SCO Group accusing the computer giant of copyright infringement.... more »
Subscribe to:
Posts (Atom)