Tuesday, February 2, 2010
Waiting quietly
A woman sitting innocently window, silently imagined her future, a woman born to love to dream, most recently a woman in love, and love after the woman became more silly, and still every day yourself in the dream is still every days stood waiting for a loved one back balcony. ... ... ... ... Over a period of time, men did not return until late in the day, a woman according to the balcony waiting for him. Until he returned. Women see a man pale face, a woman cry, even if you do not come back, I would have been waiting for you here. Men began to feel sorry for tears, and ... ... ... ... ... ... The next morning, a woman was awakened by phone, a woman hastily went to the hospital, women see his face and white, like yesterday, like there is no bloodshot eyes, a doctor told a woman that he encountered on their way from work yesterday in an accident. Heartbreak of a woman, a woman had a glimmer of hope in the eyes indistinct. A woman quietly away, quietly returned, wait ... ... ... ... ... ... then the woman is still the same silly, Tens of waiting for him every day, every day doing the same dream.
A Strong Stock Market
The increase in the margin rate from 50% to 70% was not an attempt to stem any rampant speculation on the part of the public—actually the market seemed technically quite strong, with public participation essentially dignified—but rather an attempt by the Federal Reserve Board to preserve the sound underpinnings that existed in the market. Naturally, such a move had a momentarily chilling effect upon prices but if the FRB had been preoccupied with undue speculation, the increase might have been to the 80% or even 90% level. Such an increases in the margin rate is a confirmation of a strong stock market and since 19…,such increases have resulted in interim market highs over twelve months later. Obviously, there could be no guarantee that this would once again be the case, but if history is any guideline—and if business and corporate earnings were to continue on the same course—continued optimism over the outlook for the stock market would seem more prudent than pessimism.
The margin increase underscored the good rise that stocks had enjoyed for the previous year—and the fact that a 50% rate was maintained as long as it was pointed up the fact that the rise was mainly conservative in that it was concentrated in the blue chips for the most part. In past Investment Letters we have voiced the thought that speciality stocks could outperform the general market from this point. We continue to believe that this could be the case. For example, steel stocks tend to sell at certain fixed price/earnings ratios. Below a certain ratio they are considered good value—above a certain ratio, overpriced. If a company produces a unique product it is far more difficult for market analysis to place a numerical ratio upon the company’s earnings. We have also contended in the past Letters that the stock market reflects mass psychology as well as the business outlook. When investors—both the public and the institutions—are nervous and pessimistic they definitely hesitate to buy stocks: they seek low price/earnings multiples and high yields. These same investors—when they are in an optimistic frame of mind—become for less preoccupied with yields and more wiling to pay a premium(high p/e multiples) for accelerated growth. If the public’s attitude towards the auto industry is any measure, then this period seems to have been one of optimism.
The margin increase underscored the good rise that stocks had enjoyed for the previous year—and the fact that a 50% rate was maintained as long as it was pointed up the fact that the rise was mainly conservative in that it was concentrated in the blue chips for the most part. In past Investment Letters we have voiced the thought that speciality stocks could outperform the general market from this point. We continue to believe that this could be the case. For example, steel stocks tend to sell at certain fixed price/earnings ratios. Below a certain ratio they are considered good value—above a certain ratio, overpriced. If a company produces a unique product it is far more difficult for market analysis to place a numerical ratio upon the company’s earnings. We have also contended in the past Letters that the stock market reflects mass psychology as well as the business outlook. When investors—both the public and the institutions—are nervous and pessimistic they definitely hesitate to buy stocks: they seek low price/earnings multiples and high yields. These same investors—when they are in an optimistic frame of mind—become for less preoccupied with yields and more wiling to pay a premium(high p/e multiples) for accelerated growth. If the public’s attitude towards the auto industry is any measure, then this period seems to have been one of optimism.
New Beginning
It is over.
Thornten and Craehb and Shanchie
Have taken their spoil
And have gone,
And now the land,
Barren and wasted,
Fights for a new birth.
I'll heal my wounds,
Like before,
And turn the soil
With the sweat of brow and back,
And with God's grace and might,
May there be green again
Upon these hills.
We will burn the former encampments,
And their soldier weapons
Will be turned
Into plows,
Forks.
Their armour
Melted and beaten
Into storm lamps
And water basins
For the sheep
And goats.
I pray for peace...
Thornten and Craehb and Shanchie
Have taken their spoil
And have gone,
And now the land,
Barren and wasted,
Fights for a new birth.
I'll heal my wounds,
Like before,
And turn the soil
With the sweat of brow and back,
And with God's grace and might,
May there be green again
Upon these hills.
We will burn the former encampments,
And their soldier weapons
Will be turned
Into plows,
Forks.
Their armour
Melted and beaten
Into storm lamps
And water basins
For the sheep
And goats.
I pray for peace...
The joy of snow flake
If I was a piece of snow flake,
dancing gracefully in the midst of the air,
I should know for where I’ll make ---
Flying, flying and flying there ---
The ground as my direction I’ll take.
dancing gracefully in the midst of the air,
I should know for where I’ll make ---
Flying, flying and flying there ---
The ground as my direction I’ll take.
Not going to cold and secluded dale,
not heading for sad and lonely hill,
not making for street that is beyond the pale---
Flying, flying and flying on till ---
Look, I’ll find where I desire for without fail.
not heading for sad and lonely hill,
not making for street that is beyond the pale---
Flying, flying and flying on till ---
Look, I’ll find where I desire for without fail.
Gracefully dancing in the middle of the sky,
Making out the very peaceful place,
I wait for her to appear at garden, for I know why---
Flying, flying and flying on to brace---
her body full of fragrance of red plum, banzai!
Thanks to my light body momentarily,
I touch her blouse without her knowing,
and get to her soft and wavy chest closely---
Melting, melting and melting ---
I melt into her soft and wavy chest completely.
Making out the very peaceful place,
I wait for her to appear at garden, for I know why---
Flying, flying and flying on to brace---
her body full of fragrance of red plum, banzai!
Thanks to my light body momentarily,
I touch her blouse without her knowing,
and get to her soft and wavy chest closely---
Melting, melting and melting ---
I melt into her soft and wavy chest completely.
Crime in Computer
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes…
Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders…. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders…. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
Subscribe to:
Posts (Atom)