Sunday, August 3, 2008

12 IT skills that employers can't say no to...

Mary Brandel outlines some of the areas in demand right now

1. Machine learning As companies work to build software such as collaborative filtering, spam filtering and fraud-detection applications, some observers are seeing a rapid increase in the need for people with machine-learning knowledge, or the ability to design and develop algorithms and techniques to improve computers’ performance, says Kevin Scott, senior engineering manager at Google.

“There are lots of applications that have big, big, big data sizes, which creates a fundamental problem of how you organise the data and present it to users,” he says.

Demand for these applications is expanding the need for data mining, statistical modelling and data structure skills, among others, Scott says.

2. Mobilising applications

The race to deliver content over mobile devices is akin to the wild days of the internet during the 1990s, says Sean Ebner, vice president of professional services at US recruiter Spherion Pacific Enterprises. And with devices like BlackBerries and Treos becoming more important as business tools, companies will need people who are adept at extending applications such as ERP, procurement and expense approval to these devices, he says.

3. Wireless networking

With the proliferation of de facto wireless standards such as wi-fi, WiMax and Bluetooth, securing wireless transmissions is top-of-mind for employers seeking technology talent, says Neill Hopkins, vice president of skills development for the US Computing Technology Industry Association (CompTIA).

“There’s lots of wireless technologies taking hold, and companies are concerned about how do these all fit together, and what are the security risks, which are much bigger than on wired networks,” he says.

4. Human-computer interface

Another area that will see growing demand is human-computer interaction or user interface design, Google’s Scott says. “There’s been more recognition over time that it’s not OK for an engineer to throw together a crappy interface,” he says. Thanks to companies like Apple, he says, “consumers are increasingly seeing well-designed products, so why shouldn’t they demand that in every piece of software they use?”

5. Project management

Project managers have always been in high demand, but with growing intolerance for over-budget or failed projects, the ones who can prove that they know what they’re doing are very much in demand, says Grant Gordon, managing director at staffing firm Intronic Solutions. “Job reqs are coming in for ‘true project managers’, not just people who have that denotation on their title,” Gordon says. “Employers want people who can ride herd, make sense of the project life cycle and truly project-manage.”

6. General networking skills

No matter where you work in IT, you can no longer escape the network, and that has made it crucial for non-networking professionals, such as software engineers, to have some basic understanding of networking concepts, Scott says. At the very least, they should brush up on networking basics, such as TCP/IP, Ethernet and fibre optics, he says, and have a working knowledge of distributed and networked computing.

“There’s an acute need for people writing applications deployed in data centres to be aware of how their applications are using the network,” he says.

7. Network convergence technicians

With more companies implementing voice over IP, there’s a growing demand for network administrators who understand all sorts of networks — LANs, WANs, voice, the internet — and how they all converge together, according to CompTIA’s Hopkins.

“Our research has validated that there’s a huge demand for people who’ve been in the phone world and understand what the IT network is, or someone managing the IT network who understands the voice network and how it converges,” he says.

8. Open-source programming

There’s been an uptick in employers interested in hiring open-source talent, Ebner says. “Some people thought the sun was setting on open source, but it’s coming back in a big way, both at the operating system level and in application development,” he says. People with experience in Linux, Apache, MySQL and PHP, collectively referred to as LAMP, will find themselves in high demand, he says.

9. Business intelligence systems

Momentum is also building around business intelligence, Spherion’s Ebner says, creating demand for people who are skilled in BI technologies such as Cognos, Business Objects and Hyperion, and who can apply those to the business.

“Clients are making significant investments in business intelligence,” Ebner says. “But they don’t need pure technicians creating scripts and queries. To be a skilled data miner, you need hard-core functional knowledge of the business you’re trying to dissect,” he says.

10. Embedded security

Security professionals have been in high demand in recent years, but today, according to Howard Schmidt, president of the Information Systems Security Association, there’s a surge in employers looking for security skills and certifications in all their job applicants, not just the ones for security positions.

“In virtually every job description I’ve seen in the last six months, there’s been some use of the word security in there,” he says.

“Employers are asking for the ability to create a secure environment, whether the person is running the email server or doing software development. It’s becoming part of the job description,” he says.

Sunday, July 13, 2008

Advice for preparing to apply and actually applying to science Ph.D. programs

by Philip Guo (philip@pgbovine.net)

Summary:
The Ph.D. application is best viewed as a job application rather than as a traditional college or professional school application. Candidates are applying for the job of a paid research assistant who just happens to also be able to take classes and work towards a degree. Therefore, to maximize your chances of admission, you must show how you will be a valuable asset to the school in terms of producing research results.

Obligatory introductory section

I applied to Computer Science Ph.D. programs in Fall 2005 with almost no idea of how to approach the process or what I had to do to prepare. Fortunately, with a combination of good luck and helpful advice from my friends and colleagues, I was able to make it into the Ph.D. program at Stanford University, which I began attending in Fall 2006.

This advice will probably benefit you the most if you are a sophomore or junior who intends to apply for Ph.D. programs at top research universities during your senior year, because there is still adequate time to improve your resume before application time by gaining more research experience. If you are actually in the process of applying right now, the only thing you can really control is refining your writing to cast your research experiences in the most favorable light; all of the research work leading up to your application has already been done (or is in the process of being done).

Disclaimer: At the time of writing, I have never served as a member of a Ph.D. admissions committee, so this advice is based purely on my own experiences and on conversations I had with professors and graduate students. Please seek advice from multiple reputable sources before and during your application process.

I'm gonna try to do this in the format of an FAQ. Some of these questions are real ones that I've asked or been asked; others are made up just to stick to the format. Let's see how this goes ...

What really is a Ph.D. program application?

In my opinion, an application to a Ph.D. program is really just a job application, and likewise, the admissions process is like the hiring process for a company. (The analogy is not perfect, but it's good enough to carry us through the rest of this FAQ.)

So what kind of job are you applying for?

You are applying for the job of a research assistant in a university research laboratory. As a research assistant, your school tuition will be paid for by your advisor's grants and you will be given a monthly stipend to spend on housing, food, gummi bears, etc. Your annual salary will total around $50,000 to $60,000, but of course, most of that goes into paying your tuition. In exchange, you are expected to work on projects that will lead to innovative results that can be published in peer-reviewed journals or conference proceedings. The exact day-to-day work differs depending on your field, but expect to work long hours and weekends :)

How does a Ph.D. program fundamentally differ from all other graduate school programs, such as M.D. (medical), J.D. (law), or M.B.A. (business) programs?

The fundamental difference is that you are being paid to pursue a Ph.D. whereas, for all other graduate school programs, you are paying to pursue the respective degree. You must understand this key economic difference in order to understand why Ph.D. program applications differ from med school, law school, or business school applications.

How is this fundamental difference relevant to the application process?

Because you are being paid to pursue a Ph.D., it is really a job (with the perk of getting a doctorate degree after N years), so the application process is like a job application. Simply put, the admissions committee wants to see how well you can perform as a paid research assistant. In contrast, for medical, law, business school, etc., you are paying a hefty tuition for the opportunity to learn specific skills in an area. Thus, the application processes for these schools are designed to assess whether you have the potential to be a good learner and to be a successful practitioner of the learned skills after you graduate. Thus, the admissions committees for these programs may seriously consider secondary factors such as character traits, community service, leadership potential, and charisma during an in-person interview.

What is the most important part of my application?

The most important part of your application is your prior experience in performing research and your potential for being a creative, hardworking, and productive graduate research assistant. This is pretty much the only factor in determining whether you are admitted to a Ph.D. program at a top research university (I've heard that grades and GRE scores matter a bit more at lower-ranked universities). All other secondary factors, such as your leadership roles, community service, clubs, hobbies, and other experiences that portray you as a well-rounded and balanced individual count for almost nothing. Why? Because the job description simply calls for a research assistant, not an all-around gregarious fun-loving charismatic stud.

Of course, it doesn't hurt if you really are an all-around gregarious fun-loving charismatic stud, but you still need to have strong credentials as a researcher in order to be admitted. You can't just charm your way into a reputable science Ph.D. program. You can't bullshit or game the system. The Ph.D. admissions committee consists of professors in your field who will scrutinize your application for its technical merits, not at all like the undergraduate admissions officers who are constantly on the look-out for well-rounded, diverse, charming, and emotionally healthy high school students to admit to their college.

What do you mean by research experiences being the only thing that matters?

I mean just that --- plain and simple. You are being hired to do research for a university, so the best predictor of whether you have the potential to do more good research is whether you have contributed productively to research in the past.

But what about all my wonderful extracurricular activities? My med school and business school friends keep on telling me how important they are.

There will be spots in your application to write those in, but don't bother to elaborate on them in your statement of purpose (application essay), unless they are somehow relevant to motivating you to do research. It's great to be well-rounded, and given two individuals with near-identical research credentials, I'm sure that the admissions committee would rather admit the student with better extracurriculars, but your research is really the primary factor in determining your admissions. If you've got good extracurriculars, especially those demonstrating leadership, write them down on your application, but recognize that they are really only used as a tie-breaker in close calls; your research alone will mostly determine whether you are admitted or not.

Admissions to other graduate programs such as M.D., J.D., or M.B.A. (where you have to pay to attend) is usually a more holistic process that takes secondary factors (extracurriculars, personality, etc.) seriously, because these schools want to produce graduates who are not only knowledgeable but also personable and charismatic. A business executive or doctor who is more well-rounded and emotionally healthy can interact with others better than one who is a recluse. However, Ph.D. students aren't hired for their well-rounded personalities; they are hired because they have the ability and willingness to work long hours to churn out publishable research for their advisors while they are in graduate school. Once they graduate, students who are more personable may have an easier time finding better jobs, but the research and publications for the graduate institution have already been done by that time.

How much research is 'enough'?

I think that working in 3 different research groups is ideal, although this is purely my own opinion. I only say 3 because you will need 3 letters of recommendation for your applications, and if all 3 come from professors or research scientists whom you've done research for, then your application can be quite competitive. You should get started early, preferably on your first project at the beginning of your sophomore year. It doesn't matter if your first project isn't exactly what you want to pursue for your future research career; the whole point of getting started early is to explore what you like and don't like. Doing a research-based summer internship in a government or industry laboratory is a great way to earn an extra research experience without devoting your entire school year to it. If you work at the same lab for 2 summers, then that might be enough to earn you a strong letter from your supervisor.

Of course, I know many people who've been admitted to great Ph.D. programs who have only worked in 1 or 2 research groups during their undergraduate years, so 3 is not a hard-and-fast rule. However, if you've only worked in 1 or 2 groups, you'll be expected to have done more significant work for them; in effect, to demonstrate depth rather than breadth.

What research is 'good enough'?

'Good enough' is really a subjective notion, but what the admissions committee is looking for is impact. In other words, did your work have tangible results? Or were you simply cheap labor for performing data entry and maintaining the group website?

The ideal indicator of 'good enough' is having publications in a peer-reviewed journal or conference (being first author is even more marvelous, but extremely rare for an undergraduate). Being published shows that you have made a non-trivial contribution to a research project that advances your field. However, most undergraduates (myself included) will not be able to publish by the time they apply to Ph.D. programs, so don't worry if you can't either.

What if I can't get published by the time that I apply?

This was my biggest fear when I applied to Ph.D. programs. Don't worry; most undergraduates will not be able to publish by the time they apply, so relax! If you have published in any smaller venues like the undergraduate research journal of your college, made a poster presentation, or presented your work in any other way, make a note of that. If you have submitted papers to venues and are awaiting reviews, list those papers in your application and write Submitted for publication next to them to demonstrate that you and your advisor are actively working towards publishing research that you've been involved in.

Besides having publications, how do I demonstrate that my research has impact?

You need to show tangible results of your work, whether it be a software system you've built, an experiment you've run to completion, a statistical analysis you've performed on real-world data, etc., and more importantly, demonstrate the significance of those results in advancing your particular field (even if it's in some tiny way). You will need to write persuasively about the impact of your research in your statement of purpose, and your advisor will have to corroborate your claims in his/her letter of recommendation.

But I'm just an undergraduate! I can't be expected to do research on par with all the graduate students and postdocs!

Yes, the admissions committee knows this, and does not expect you to perform at the level of a graduate student! You are not expected to be overly original or innovative, because the truth about undergraduates working in research is that most start out performing menial tasks that the graduate students don't want to do, basically the lowest of grunt work. However, the hope is that you will eventually move up to doing less grunt-like work and have a more direct impact on creating results for your research group.

The admissions committee is looking for the potential to become a productive Ph.D. student, so demonstrating your work ethic, determination, and willingness to take initiative in learning (in addition to the impact of your research, however small) are great ways to improve your chances of admissions.

Don't be an idealist and expect to completely push through your own wild ideas to fruition while you are still an undergraduate; you are at the absolute bottom of the research food chain, so you should accept your role and perform it with diligence so that you maximize your chances of moving up to the next higher level as a Ph.D. student.

But what about my grades and GPA?

This isn't med school or law school; Ph.D. admissions committees at top-ranked graduate schools don't care as much about your GPA, unless it's egregiously low. Basically, if you have a GPA that shows that you're a pretty good student, and you have great research experiences to write about on your application, then you're all good. It's hard to define exact numbers, but I would say that a 3.6 GPA is probably fine for applying to top-ranked schools (I originally just threw that number out there as an educated guess, but I actually got an email response confirming that 3.6 GPA is good enough as long as you demonstrate strong research experience and potential ... of course, it's only one sample point, but that's better than zero). If you feel self-conscious about your low GPA, try to explain somewhere on your application why your GPA was low ... perhaps you spent so much time and focus on your research that you didn't have enough time or effort to study for the final exams in certain classes (or something like that).

Don't be intimidated by the fact that most top schools report that the average GPA of their incoming class is 3.8 or 3.9. That doesn't mean that you can't get in with a 3.5 or 3.6. It simply means that, most of the time, students with the potential to do great research at the Ph.D. level also take their studies seriously enough to earn a high undergraduate GPA. However, they didn't get accepted primarily because of their high GPA. Having a high GPA alone can never get you accepted into a top Ph.D. program.

Who should I get to write my letters of recommendation?

You will most likely need 3 letters of recommendation for your Ph.D. applications. The best-case scenario is that all three letters come from professors for whom you have done research (a.k.a. your research advisors). If you have worked in research positions in industry or for the government, then your supervisor could also write a letter for you. If you can't get 3 research-based letters, then you will need to get letters from other sources. (However, if none of your letters come from research advisors, then your chances of getting in are quite slim.) These alternate sources might include supervisors from non-research industry positions, researchers you worked with who were not your primary advisor, or professors of classes you excelled in.

Getting a letter from a professor whose class you excelled in isn't the strongest endorsement since it doesn't directly demonstrate your research experience or potential, but it is necessary if you can't get 3 research-based letters. If you must get a letter from a professor for getting a good grade in his/her class, it's better to have that letter come from a professor who's taught you in an upper-division (possibly graduate) class rather than an introductory class. That shows you've taken the initiative to take on more challenging classes, and a letter commending your achievements in a difficult upper-division course (such as a 15-person seminar) can better demonstrate your potential for graduate-level research work than a letter talking about how you got an A+ in a 400-person freshman class.

Also, if you can get a letter from a professor for a class for which you've gone a really cool final project that demonstrated creativity, ingenuity, and/or clever insight, that's much better than a letter from a professor who taught you in a standard lecture/exam class. In fact, it's a good idea to seek out opportunities to do open-ended final projects for classes, because that often demonstrates the same kind of skills as required for being a Ph.D. student.

If I am a sophomore or junior, what can I do to prepare for my applications during my senior year?

Favor research over taking more upper-division classes, if you don't think you can manage doing both effectively. Try out different research groups if you want to, but by your junior year, find one that you can dedicate yourself to for the duration of your undergraduate years (1.5 to 2 years), and really buckle down and focus on that work. Graduate schools want to see that you can dedicate yourself to one project over several semesters instead of jumping around all the time.

Meanwhile, in the summertime, try to either get research-based internships or work in a research lab in your university rather than getting non-research internships in industry (this bit of advice is extreme, because it is often educational to get industry work experience; you might find that, like most people, you actually like working in industry better than working on research).

Take advanced graduate-level classes if you feel passionate about the subject matter, and if you can still make reasonable progress on your research at the same time. Don't fret so much about your GPA; if you don't get such good grades in those classes, you can either drop them or mention that you tried taking on more challenging classes. Taking graduate-level classes exposes you to cutting-edge research that you might actually be working on in the near future (instead of the classic well-established research that you find in undergraduate course textbooks), gives you a smaller, more intimate environment for interacting with professors and graduate students, and gives you a preview of what graduate school is like (aside from doing research).

What about if I've been working out in industry for the past couple of years but want to go back to school for a Ph.D.? What are my chances of being admitted?

Perhaps 1/4 of my incoming Ph.D. class had worked in industry before starting the Ph.D. program (in other words, they didn't come right out of college), so it is definitely possible to get in. The statistics might vary by department or school. My intuition is that you would stand a better chance of being admitted if you did more research-like work in industry rather than production-like work, but I have very little knowledge about this issue. You might have to tailor your application a bit differently, but the end goal is the same: to demonstrate that you have the potential to contribute to the research community during your years as a Ph.D. student (and hopefully beyond).

I've been advised that if you've only been in industry for several years (maybe 1 to 3 years), then you can still get recommendation letters from professors you've worked for or taken classes from in your undergraduate institution, and you will be considered similarly to students applying straight from college. However, if you've worked for a significant amount of time (e.g., 8 years), then you should show how your work experience prepared and motivated you to come back to pursue a Ph.D., which might be difficult if you've been outside of the research community for too long.

How much should I stress about my Ph.D. program applications?

None, or almost none. By the time you apply to Ph.D. programs, all of the hard work --- the research that you have worked on during your undergraduate years --- has already been done (or is continuing to be done). All that remains is to get 3 letters of recommendation from your professors and write a statement of purpose that summarizes your research experiences and mentions examples of research that you would like to pursue at the respective institution.

The Ph.D. program application is notoriously simple. Most of it is just routine fill-in-the-blanks which don't matter much at all (e.g., personal information, list of classes, awards and honors, GRE scores). Spend lots of time refining your statement of purpose because the admissions committee is going to read that piece of writing the most carefully.

Be honest and straightforward in your application, but write with assertiveness and confidence; there is not much you can do to game the system and improve your chances if you are not qualified with adequate research experience. Professors on the admissions committees didn't get where they are now by being naive and easily fooled.

Why do graduate schools ask me what other schools I am applying to?

You might notice that some graduate schools have a section on their application where they ask you to list what other institutions you are applying to at the same time. Some people are wary that the school might be biased if you put down certain choices (something like, "oh, this applicant is applying to 4 other top schools, so it's okay if we don't accept her ... one of the other schools will"), but I don't think that this is the case. They simply want to collect statistics about where else their applicants are considering. My advice is to simply answer that question truthfully, but if you're really uncomfortable about revealing this information, simply leave it blank. It should not penalize you.

Should I make contact with professors whose research I'm really interested in working on? Will that improve my chances of admissions?

The short answer: no. The longer answer: no most of the time, but yes only if you have some sort of connection to the professor (usually through a professor at your own school who is favorable to you). I'll explain:

Do not contact professors whom you have no visible connections with or else you will most likely not get a response since you are essentially sending them spam (unsolicited email). If you take the time to look on the websites of professors, many of them have a note on there saying something like Please do not contact me about information regarding admissions --- only the admissions committee can decide who is admitted; professors cannot admit individual students (with varying degrees of politeness). To a professor who receives tons of emails every day, there is nothing that sounds more insincere, contrived, and annoying than receiving impersonal emails from students who express an interest in his/her research, paraphrasing the contents of abstracts from his/her papers, and citing elaborate stories about their enthusiasm. There is no possible way that a professor you don't know will respond favorably to you if you send them email before you are admitted.

One way to legitimately contact a professor is if you either know them personally (which is unlikely for an undergraduate) or, more likely, your current research advisor (you ARE doing research right now, aren't you?) knows that professor. It doesn't hurt to ask whether your advisor knows professors at schools that you are applying to, and to ask whether it would be appropriate for you to contact them regarding possible research opportunities. Please be tactful, however, because you don't want to annoy your current advisor since he/she will be writing your recommendation letter :)

Another way to legitimately contact a professor is if you have met him/her at a conference or other professional venue and had some meaningful discussions about your own research (or someone else's research that you assisted with); that way, there is some solid basis to your email so that it is not totally spam. Again, please be tactful; you'll know when you are in a position to take this approach (very few undergraduates are ... I certainly wasn't).

If you have no connections, don't sweat it. I didn't contact any professors before I was admitted, and I was still okay. If you still genuinely want to find out information about the professor's research (beyond what you can find on the Internet, which is often more than adequate) or whether he/she is looking for new students in the upcoming year, the best thing to do is to email the professor's current Ph.D. students. Students are usually less annoyed at those kinds of unsolicited emails because they usually have no say in determining admissions. However, do this sparingly or else you will be the butt of the jokes around the grad student lounge water cooler (Hey, did you also get that email from that loser undergrad who wants to work with our advisor? What a chump!).

Addendum (2007-01-10): Several people have informed me that in their field of study, they are actually encouraged to contact professors before they are admitted and have had positive experiences doing so. Perhaps it depends on the field or even on the department (professors at smaller departments who receive fewer applicants might want to reach out to them more than professors from larger departments who get thousands of applicants annually). Ask your friends and academic advisors about how best to proceed.

Addendum (2007-02-22): Additionally, I've also heard that it really depends on the status of the particular department you're applying to. Perhaps professors at lesser-known schools are more likely to be receptive to receiving personalized emails than those at more well-known schools, but I don't know this from firsthand experience (I've received some email feedback mentioning this opinion, though).

Addendum (2007-06-27): I have since softened my tone on this issue, due to comments from several other graduate students. My previous hard-ass stance used to be NEVER CONTACT PROFESSORS BEFORE YOU ARE ADMITTED, but now my more liberal stance is, "only contact professors if you have some sort of connection to them, most likely via a professor from your own school."

Is the statement of purpose kinda like my awesomely creative college admissions essay?

No, not at all! Don't try to be cute and creative. The people who are going to be reading your statement of purpose (otherwise known as your application essay) are professors in your field who expect to find out about your research experiences, motivations, and reasons why you want to work towards a Ph.D.; they do not want to wade through some melodramatic narrative of how you were a child genius who suffered through lunchroom attacks by bullies but persevered to study even harder and pursue your passions for science. Your writing should be passionate and persuasive, but it should mainly focus on your research, not on your personal life. Professors don't want to read sappy bullshit essays.

How should I write my statement of purpose?

Show, don't tell. Reinforce every claim you make with supporting evidence from your own experiences. Professors can easily sniff out fluff and bullshit.

Motivation is great. Don't just list out your research projects as successive bullet points. What motivated you to undertake those projects? What did you learn from those projects that motivated you to further pursue research? Why do you want to pursue a Ph.D.?

Transitions are important. Don't just have sentences mash up against one another without any connective tissue. This is mostly a stylistic tidbit, so don't worry about it when you're doing your initial drafts, but an essay that flows well shows that you are better-organized and simply makes a more appealing impression.

Try to put a 'researchy' spin on your work, even if the research work that you did was mostly grunt work, which is understandable because most undergrads have to do a lot of grunt work (programming, entering data, making graphs, running simulations, wet lab work, etc.) as part of a research team. After all, you're at the absolute bottom of the academic food chain. What I mean by that is to not just say that you did the grunt work for a project, but try to step back and mention the 'bigger picture' of what impact your grunt work had on the rest of the project. However, don't be too facetious or you'll end up sounding like a pathological exaggerator (don't say that you co-developed a novel algorithm when all you did was code it up and test it on some simple inputs, under the guidance of the grad student who actually developed the algorithm).

Should I name names (of professors whose research interest me) in my statement of purpose? How can I go about doing this intelligently?

Yes, you should, if you have an interest in actually working with them, especially if they work in an area that relates to your prior research in some way (show, don't tell). At the end of your statement of purpose, briefly mention the professors and projects that interest you, but don't suck up too much. Aim for being concise and direct.

Before mentioning a professor whom you'd like to work with, though, try to make sure that they are willing to accept new students in the upcoming year. Don't email them directly to ask that question, because they will just get pissed and delete your email. Instead, if you're a bit brave, email their current Ph.D. students to ask whether their advisor is planning to accept new students.

Also, if you are going to name names, name several of them and not just one (unless, of course, you would only be willing to work with one professor at that school). If you only name one professor, you risk being pigeonholed and getting your application discarded if that one professor is simply not taking new students in the upcoming year.

Should I customize my statement for each school?

Yes, if you want, but not much. The only part that should be customized is the paragraph (probably the last one) where you mention which professors or projects at that school interest you. There is no need to suck up to the school by saying how it's such an esteemed institution or how it's world-famous for this kind of research, blah blah blah. If the school is famous for something, I'm sure that they already know that. Just cut out the bullshit to leave more room for real content. (It's perfectly fine to not customize, either, if you don't feel like doing so.)

Related Guides

Monday, July 7, 2008

Honesty pays after all

An emperor in the Far East was growing old and knew it was time to choose his successor. Instead of choosing one of his assistants or his children, he decided something different. He called young people in the kingdom together one day. He said, "It is time for me to step down and choose the next emperor. I have decided to choose one of you."

The kids were shocked! But the emperor continued. "I am going to give each one of you a seed today. One very special seed. I want you to plant the seed, water it and come back here after one year from today with what you have grown from this one seed. I will then judge the plants that you bring, and the one I choose will be the next emperor!"

One boy named Ling was there that day and he, like the others, received a seed. He went home and excitedly told his mother the story. She helped him get a pot and planting soil, and he planted the seed and watered it carefully. Every day he would water it and watch to see if it had grown. After about three weeks, some of the other youths began to talk about their seeds and the plants that were beginning to grow.
Ling kept checking his seed, but nothing ever grew. 3 weeks, 4 weeks, 5 weeks went by. Still nothing. By now, others were talking about their plants but Ling didn't have a plant, and he felt like a failure. Six months went by, still nothing in Ling's pot. He just knew he had killed his seed.

Everyone else had trees and tall plants, but he had nothing. Ling didn't say anything to his friends, however. He just kept waiting for his seed to grow.

A year finally went by and all the youths of the kingdom brought their plants to the emperor for inspection. Ling told his mother that he wasn't going to take an empty pot. But honest about what happened, Ling felt sick to his stomach, but he knew his mother was right.
He took his empty pot to the palace. When Ling arrived, he was amazed at the variety of plants grown by the other youths. They were beautiful in all shapes and sizes. Ling put his empty pot on the floor and many of the other kinds laughed at him. A few felt sorry for him and just said, "Hey nice try.."

When the emperor arrived, he surveyed the room and greeted the young people. Ling just tried to hide in the back. "What great plants, trees and flowers you have grown," said the emperor. "Today, one of you will be appointed the next emperor!" All of a sudden, the emperor spotted Ling at the back of the room with his empty pot. He ordered his guards to bring him to the front. Ling was terrified. "The emperor knows I'm a failure! Maybe he will have me killed!"

When Ling got to the front, the Emperor asked his name. "My name is Ling," he replied. All the kids were laughing and making fun of him. The emperor asked everyone to quiet down. He looked at Ling, and then announced to the crowd, "Behold your new emperor! His name is Ling!" Ling couldn't believe it. Ling couldn't even grow his seed. How could he be the new emperor?

Then the emperor said, "One year ago today, I gave everyone here a seed. I told you to take the seed, plant it, water it, and bring it back to me today. But I gave you all boiled seeds, which would not grow. All of you, except Ling, have brought me trees and plants and flowers. When you found that the seed would not grow, you substituted another seed for the one I gave you. Ling was the only one with the courage and honesty to bring me a pot with my seed in it. Therefore, he is the one who will be the new emperor!"

*********

If you plant honesty, you will reap trust.

If you plant goodness, you will reap friends.

If you plant humility, you will reap greatness.

If you plant perseverance, you will reap victory.

If you plant consideration, you will reap harmony.

If you plant hard work, you will reap success.

If you plant forgiveness, you will reap reconciliation.

If you plant openness, you will reap intimacy.

If you plant patience, you will reap improvements.

If you plant faith, you will reap miracles.

But

If you plant dishonesty, you will reap distrust.

If you plant selfishness, you will reap loneliness.

If you plant pride, you will reap destruction.

If you plant envy, you will reap trouble.

If you plant laziness, you will reap stagnation.

If you plant bitterness, you will reap isolation.

If you plant greed, you will reap loss.

If you plant gossip, you will reap enemies.

If you plant worries, you will reap wrinkles.

If you plant sin, you will reap guilt.

Friday, June 27, 2008

Thats called "Qaumi Ghairat"


Samad Khurram, Harvard student and an active SAC member refuses to receive award from US Ambassador in protest against killings of Pakistani people.

It makes me feel very proud that when the rules of my country are busy pleasing their American masters, there exists fresh blood who has the guts to do what is just. The principled stand that Samad has taken should be an eye-opener for the rulers of this land of the pure. When a student who awaits a bright career ahead is concerned for his fellow citizens being killed by the US, why are the rules of Pakistan being blind to this ?

Samad has proved his dedication and commitment to Pakistan several times since the imposition of emergency in Pakistan. He took a semester off then to play his role in resistance against Musharraf and the movement for restoration of Judiciary. He has been super active since then. Last week, he came back from the US to attend the long march.

Watch it on YouTube.



THREE CHAIRS TO KHURRAM...

Wednesday, April 30, 2008

The Case of the System Process CPU Spikes (by Mark Russinovich)

As you’ve probably surmised by my blog posts and other writings, I like knowing exactly what my systems are doing. I want to know if a process is running away with the CPU, causing memory pressure, or hitting the disk. Besides keeping my computers running smoothly, my vigilance sometimes helps me spot performance and reliability problems in Windows and third-party code.

The main way I keep tabs on things is to configure Process Explorer to run automatically when I log in. Whenever I configure a new computer, I add a shortcut to Process Explorer to my profile’s Start directory that includes the /t (minimize) switch. Process Explorer runs otherwise hidden with tray icon that shows a small historical view of CPU activity level. Because I want access to detailed information about system processes, as well as my own, I also specify the /e option on Vista, which causes Windows to present a UAC prompt on logon that allows me to grant Process Explorer administrative rights.

Because I keep an eye out for CPU spikes in Process Explorer’s tray icon, which show up as green or red for user-mode (application) and kernel-mode (operating system and drivers) CPU usage, respectively, I’ve identified several application bugs over the last few months. In this post, I’ll share how I used both Process Explorer and another tool, Kernrate, to identify a problem with a third-party driver and followed the problem through to a fix by the vendor.

Not long after I got a new laptop several months ago, I noticed that the system sometimes felt sluggish. Process Explorer’s tray icon corroborated my perception by displaying a mini-graph of red CPU activity. The icon opens a tooltip that reports the name of the process consuming the most CPU when you move the mouse over it, and in this case the tooltip showed the System process as being responsible:

The first few times I noticed the problem, it resolved itself shortly after and I didn’t have a chance to troubleshoot. However, I could see by opening Process Explorer’s System Information dialog that the CPU spikes were significant:

The System process is special because it doesn’t host an executable image like other processes. It exists solely to host operating system threads for the memory manager, cache manager, and other subsystems, as well as device driver threads. These threads execute entirely in kernel mode, which is why System process CPU usage shows up as red in Process Explorer’s graphs.

I suspected that a third-party device driver was the cause of the problem, so the first step in my investigation was to figure out which thread was using CPU, which would hopefully point me at the guilty party. I watched vigilantly for signs of trouble every time I switched networks and jumped the first time I saw one. Process Explorer shows the threads running in a process on the Threads page of the Process Properties dialog, so I double-clicked on the System process and switched to the Threads page the next time I noticed the CPU spike:

The “ntkrnlpa.exe” prefix on each thread’s start address identified the ones I saw at the top of the CPU usage sort order as operating system threads (Ntkrnlpa.exe is the version of the kernel loaded on 32-bit client systems that have no execute memory protection or server systems that need to address more than 4GB of memory). Because I had previously configured Process Explorer to retrieve symbols for operating system images from the Microsoft public symbol server, the thread list also showed the names of the thread start functions. The most active threads began in the ExpWorkerThread function, which means that they were worker threads that perform work on behalf of the system and device drivers. Instead of creating dedicated threads that consume memory resources, the system and drivers can throw work at the shared pool of operating system worker threads.

Unfortunately, knowing that worker threads were causing the CPU usage didn’t get me any closer to solving identifying a root cause. I really needed to know what functions the worker threads were calling, because the functions would be inside the device driver or operating system component on whose behalf the threads were running. One way to look inside a thread’s execution is to look at the thread’s stack with Process Explorer. The stack is a memory region that stores function invocations and Process Explorer will show you a thread’s stack when you select the thread press the Stack button or double-click on the thread. On Vista, however, you get this error when you try and look at the stack for threads in the System process:


The System process is a special type of process on Vista called a “protected process” that doesn’t allow any access to its threads or memory. Protected processes were introduced to support Digital Rights Management (DRM) so that hi-definition content providers can store content encryption keys with a reduced risk of an administrative user using DRM-stripping tools to reach into the process and read the keys.

That approach foiled, I had to find another way to see what the worker threads were doing. For that, I turned to KernRate, a command-line profiling tool that’s a free download from Microsoft. KernRate can profile user-mode processes and kernel-mode threads. It uses the sample-based profiling facility that was introduced in the first release of Windows NT, which records the unique addresses at which the CPU is executing when the profiling interval timer fires. When you stop a profile capture, Kernrate retrieves the information from the kernel, maps the addresses to the loaded device drivers into which the fall, and can even use the symbol engine to report the names of functions.

I wouldn’t need symbols if the trace identified a device driver, so I ran Kernrate without passing it any arguments. Despite the fact that there’s no officially supported version of Kernrate for Vista, the version for Windows XP, Kernrate_i386_XP.exe, works on Vista 32-bit (you can also use the recently-released xperf tool to perform similar profiling - xperf requires Vista or Server 2008, but works on 64-bit versions). I let the profile run through heavy bursts of CPU and then hit Ctrl+C to print the results to the console window:


In first place were hits in the kernel, but in second was a driver that I didn’t recognize, b57nd60x. Most driver files are located in the %systemroot%\system32\drivers directory, so I could have opened that folder and viewed the file’s properties in Explorer, but I had Process Explorer open so a quicker way to check the driver’s vendor and version was to open the DLL view for the System process. The DLL view shows the DLLs and files mapped into the address space of user-mode processes, but for the System process it shows the kernel modules, including drivers, loaded on the system. The DLL view revealed that the driver was for my laptop’s NIC, was from Broadcom, and was version 10.10:


Now that I knew that the Broadcom driver was causing the CPU usage, the next step was to see if there was a newer version available. I went to Dell’s download page for my system, but didn’t find anything. Suspecting that what I noticed might not be a known issue, I decided to notify Broadcom. I used contacts on the hardware ecosystem team here at Microsoft to find the Broadcom driver representative and email him a detailed description of the symptoms and my investigation. He forwarded my email to the driver developer, who acknowledged that they didn’t know the cause and within a few days sent me a debug version of the driver with symbols so that I could capture a Kernrate profile that would tell them what functions in the driver were active during the spikes. The problem reoccurred a few days later and I sent back the kernrate output with function information.

The developer explained that my trace revealed that the driver didn’t efficiently interact with the PCIe bus when processing specific queries and the problem seemed to be exacerbated by my particular hardware configuration. He gave me new driver for me to try and after a few weeks of monitoring my laptop closely for issues, I confirmed that the problem appeared to be resolved. The updated driver has not yet been posted to Dell’s support site, but I expect it to show up there in the near future. Another case closed, this time with Process Explorer, Kernrate, and a helpful Broadcom driver developer.

If you like these troubleshooting blog posts, you’ll enjoy the webcast of my “Case of the Unexplained…” session from TechEd/ITforum. Its 75 minutes are packed with real-world troubleshooting examples, including the one written up in this post and others, as well as some that I haven’t documented. At the end of the session I ask the audience to send me screenshots, log files and descriptions of their own troubleshooting success stories, in return for which I’ll send back a signed copy of Windows Internals. The offer stands, so remember to document your investigation and you can get a free book. I’ve gotten a number of great examples and my next blog post will be a guest post by someone that watched the webcast and used Process Monitor to solve a problem with their web server.

Finally, if you want to see me speak live, come to TechEd US/IT Pro in June in Orlando where I’ll be delivering “The Case of the Unexplained…”, “Windows Server 2008 Kernel Advances”, and “Windows Security Boundaries”. Hope to see you there!

Wednesday, April 16, 2008

Wireless Java and J2ME Tutorials

Exploring J2ME: Building an expense tracker The Java 2 Micro Edition (J2ME), coupled with the CLDC and MIDP specifications, provides a platform that enables developers to build Java applications that run on PDAs and BlackBerry-style e-mail pagers and that interface with corporate software "back home" via a wireless connection. This article kicks off a series that will introduce you to development on the MIDP platform.

Exploring J2ME: Building an expense detail form the detail form used to edit an existing expense item or add a new one and let you get your feet wet with the Item family of components.

Exploring J2ME: Using the Record Management System creating a record store for the ExpensesApp MIDlet suite using the MIDP’s Record Management System (RMS).

Exploring J2ME: Sorting records the RMS’s record-sorting API, the RecordEnumeration class and RecordComparator interface, both of which you find in the javax.microedition.rms package.

Exploring J2ME: Being a good mobile citizen polish up ExpensesApp a bit by reducing its memory requirements and correcting some data problems using the record change notification API.

Java Programming for Wireless devices using J2ME/CLDC/MIDP
J2ME Overview, J2ME Building Blocks: Virtual Machine, Configurations and Profiles, Connected Limited Device Configuration (CLDC), Mobile Information Device Profile (MIDP), MIDP Applications (MIDlets) and MIDlet Lifecycle, Writing a simple MIDP Application...

Running J2ME Applications on Palm-powered Devices Learn how to migrate your Enterprise J2ME applications to Palm-Powered devices including the Treo 650 and Palm LifeDrive.

J2ME for the Java Developer How does Sun's Java 2 Micro Edition (J2ME) platform for smaller devices compare to the more familiar Java 2 Standard Edition? Let's dig into the details a little...

Deploy Your J2ME Application on a Sprint Phone Web server configuration and caching problems are just two of the obstacles you'll need to overcome when you deploy Java applications on cell phones. This article provides the workarounds and solutions you'll need to overcome these bumps.

Don's Wireless Journal Java ME programming tutorials, mostly geared towards game programming.

BREWing Java code Can Java code be enhanced by good BREW in wireless development? Recently IBM introduced a single JVM (Java Virtual Machine), which acts as an extension to BREW. Java developers can take advantage of this JVM to write Java applications once and run them on all BREW-enabled devices as long as they have sufficient memory footprints, regardless of manufacturer. The BREW platform is standardized, so porting applications from one device to another is simplified. BREW also makes getting Java applications onto handsets much easier, and enables upgrading and recalling JVMs over the air.

Java 2 Micro Edition Basics (PDF) A Very Brief History of Java, Architecture of Java, Java 2, Java Community Process, Java 2 Micro Edition, Profiles, Connected Limited Device Configuration (CLDC), Supported J2SE Classes, Generic Connection Framework...

Programming Strategies for Small Devices (PDF) If in Doubt, Do Not Use Java, Move Computation to the Server, Simplify the Application, Build Smaller Applications, Remove the Public Members, Use Less Memory at Run Time, Use Scalar Types, Do Not Depend on the Garbage Collector, Help the Garbage Collector, Use Lazy Instantiation, Release Resources Early, Reuse Objects, Avoid Exceptions, Code with Performance in Mind, Use Local Variables, Avoid String Concatenation, Use Threads, but Avoid Synchronization, Separate the Model...

Java 2 Micro Edition (J2ME) Specifications (PDF) Introducing the Micro Edition, A New Virtual Machine, New and Changed Classes, Configurations and Profiles, Building Blocks, The KVM, Related Technologies,

Dealing With Dates and Times in MIDP Applications Parsing and displaying dates and times is often complicated because of formatting and locale issues. J2SE provides several classes to simplify date and time handling -- classes such as java.util.Calendar, java.util.Date, java.util.TimeZone, and java.text.DateFormat. By comparison, MIDP defines only subsets of the Calendar, Date and TimeZone classes, and does not include any form of DateFormat...

Developing Custom Components for the Mobile Information Device Profile A question that novice MIDP programmers often ask is "How can I extend the MIDP user interface classes to define my own custom components?" You might want to extend the TextField class, for example, to support more kinds of constraints or alternate forms of input. Or you might want to define a completely new kind of UI component...

Using Passwords to Protect Your MIDlets Security is always a concern when you are writing an application that deals with sensitive data. It's especially so on handheld devices, which are more apt to be lost or stolen than a desktop computer. A handheld device is likely to hold truly personal information that you don't want strangers to know, things such as important phone numbers and addresses. Safeguarding that information should always be a priority...

Adapting Images for MIDP Devices The MIDP supports the display of bitmapped images, but not with the flexibility of J2SE. The MIDP specification only requires support for a single format, the PNG format. PNG was developed primarily as a replacement for the older GIF, and has the support of the World Wide Web consortium. Modern web browsers and image editors can load and save images in PNG format..

Making HTTP Connections Using Background Threads All user interface frameworks share some basic concepts. This is true no matter if the UI framework is the LCDUI classes defined by the MIDP, or the AWT and Swing classes defined by J2SE. One of the basic concepts is that the user interface must always be responsive to the user's interaction...

Using MIDP Gauges The MIDP defines a number of high-level user interface components. Most of these components are designed to be placed on a top-level window called a form. Such components are referred to as items, because they all extend the javax.microedition.lcdui.Item class. The form itself is an instance of the javax.microedition.lcdui.Form class, and acts primarily as a container for items...

Building Splash Screens for MIDlets A splash screen is an informational screen that presents the name and version of an application, along with any necessary legal information such as the copyright and trademark notices. It's something you might want your MIDlets to display on startup. Adding a splash screen to a MIDlet is easy to do, but there are a few things to watch out for...

Client-Server Communication over HTTP using MIDP and Servlets Many, if not most, MIDP applications have a server-side piece to them. In other words, a client-server paradigm is used to offload complicated work from the limited capabilities of the MIDP device to the more capable server environment. Because the MIDP 1.0 specification only mandates support for HTTP, all client-server communication must be done through an HTTP gateway...

Drawing Flicker-Free Graphics with the MIDP The term "double buffering" refers to a common technique used in computer graphics. If you consider a device's display to be a memory buffer into which drawing primitives write (the drawing primitives are the basic drawing methods such as drawLine and drawArc), with double buffering you draw into a second, offscreen memory buffer and then copy the entire contents of the second buffer into the display buffer...

Parsing XML in CLDC-based Profiles XML is a portable, text-based way of representing structured data. More and more applications are using XML to exchange information, and at some point your CLDC-based applications are going to need to process XML documents. Over time, even HTML pages will likely migrate to an XML-based format called XHTML...

Using the MIDP List Component The MIDP groups its user interface components into two sets of classes: the high-level API and the low-level API. With the high-level API you define your user interface using a set of platform-independent abstractions and let the MIDP implementation decide the look and behavior of the user interface...

Enumerating, Filtering, and Sorting MIDP Record Stores The RMS, part of the MIDP, lets you store arbitrary byte arrays as records in a database. The set of records is referred to as a record store. The RMS assigns a record ID to each record when it is created. The record ID is an integer greater than or equal to 1. The application uses this ID to get and set the content of a record...

The Connected Device Configuration and the Foundation Profile Much of what's been written about J2ME talks about the Connected Limited Device Configuration. The CLDC defines an extremely small subset of the Java Platform for very limited devices -- devices, like cellular telephones, that do not have enough memory or enough processing power to handle a full-blown Java implementation. There is, however, another configuration available that is midway between the CLDC and a full J2SE implementation: the Connected Device Profile...

Handling Multiple Simultaneous MIDP Alerts If you write a multithreaded MIDP application it's easy to trigger two or more alerts simultaneously. In other words, while one alert is being displayed, a second alert is triggered. Dealing with this situation is not as simple as you might think. Alerts are displayed using the two-argument form of the Display object's setCurrent method...

Using Timers One of the improvements in version 1.3 of J2SE are classes that make it simpler to schedule tasks for execution by a background thread. The MIDP also includes these new classes, so J2ME developers also benefit...

An Introduction to the High-Level User Interface API: Alerts and Tickers The MIDP includes both a low-level UI API and a high-level UI API. The low-level API gives you complete access to a device's screen and to raw key and pointer events. However, no user interface controls are available with the low-level API -- your application must explicitly draw buttons and other familiar controls. This is the price you pay for the flexibility of the low-level API...

Using Record Stores Efficiently The data in a record store is stored in chunks called records. A record is a set of arbitrary binary data, basically an array of bytes. You always read or write an entire record at once, using the getRecord, addRecord and setRecord methods of the RecordStore class...

Using the MIDP Low-Level User Interface API With J2ME, profiles are responsible for defining the user interface (UI) API. The MIDP defines two such APIs, referred to as the high-level and low-level APIs. The high-level API requires you to use task-oriented abstractions to define what the user interface does. You have no real control over what gets drawn on the screen -- the implementation selects the best approach for the device...

Making Connections With the CLDC As you can tell from its name, the Connected Limited Device Configuration (CLDC) is designed for connected devices. A connected device has the ability to connect to the outside world, whether the connection is serial, infrared, wireless, or something else entirely. How then do you take advantage of this connectivity in your Java applications? The answer is: through a set of classes called the Generic Connection framework, or GCF for short.

Record Management System Basics The Mobile Information Device Profile (MIDP) defines a set of classes for storing and retrieving data. These classes are called the Record Management System (RMS). With the RMS, it's possible to make data persist across invocations of a MIDlet. Different MIDlets in the same MIDlet suite can also use the RMS to share data...

Writing World-Aware J2ME Applications Well-written applications are both internationalized and localized. An application is internationalized, if it can correctly handle different encodings of character data. An application is localized, if it formats and interprets data (dates, times, timezones, currencies, messages and so on) according to rules specific to the user's locale. An application that is both internationalized and localized, can be referred to as "world-aware."...

Dealing With Missing J2SE Classes A problem you might run into when writing J2ME applications is how to deal with missing classes, that is, classes that are available in J2SE but not in J2ME. Note that J2ME configurations and profiles include subsets of the J2SE core classes. This means that specific methods or classes that you would normally use when writing a J2SE application are not always available. Ideally, you want to maximize the amount of code that is portable between your J2ME and J2SE applications...

The J2ME Development Cycle J2ME is a set of technologies and specifications that enable Java applications to run on devices such as cell phones, Personal Digital Assistants, or set top boxes, that are unable to accommodate the J2SE runtime environment. These devices have severe resource constraints when compared to desktop or server computers, limitations that kept the Java Platform off these devices until now...

Making HTTP Connections with MIDP HTTP connectivity is one of the requirements of the MIDP. A MIDP-enabled device must be able to interact with a web server through conventional HTTP requests. If the network doesn't directly support HTTP, then the device must route its requests through a gateway. But this is all transparent to the application developer...

Getting Started with Java on PDAs (2/02) PDAs are becoming a permanent fixture in the everyday lives of consumers and business people. There's no question that we have Palm to thank for bringing us a small, pen-based, easy-to-use organizer to help keep our busy lives on track. At the same time, Microsoft has been trying to hit one out of the park for years with its Windows CE operating system running on a variety of handheld devices. J2ME Tutorial, Part 1: Creating MIDlets Java 2 Micro Edition (J2ME) combines a resource-constrained JVM and a set of Java APIs for developing applications for mobile devices. This article is the first in a series. This time, after a quick introduction to J2ME, I will provide a step-by-step guide to creating J2ME applications, also known as MIDlets, using a simple example. This will cover how to test and deploy these MIDlets as well. Finally, I will round out this installment with a look at the lifecycle of a MIDlet. JavaMobiles.com Do you need a mobile telephone with Java? Are you searching for Java virtual machine for your PDA? You want to know what is this wireless Java about? You will find answers to all these questions here, at JavaMobiles.com!

Develop wireless applications using J2ME Update on Java support for mobile phones, two-way pagers, and related consumer products. Learn more about programming mobile devices and consumer gadgets of all sorts in Bill Day's report from JavaOne on the Java 2 Platform, Micro Edition.

Track wireless sessions with J2ME/MIDP (4/02) Every e-commerce application must support session tracking. Unfortunately, MIDP (Mobile Information Device Profile), a J2ME (Java 2 Platform, Micro Edition) technology, supports only the standard HTTP protocol, which is stateless. In this article, Michael Juntao Yuan and Ju Long explore ways to add session support into the current MIDP network API framework...

SyncML and Micro Java Development When I heard the crunch of my phone underneath the tire of the car I had two concurrent thoughts blare in my head: 1. You Idiot! Why didn't you make sure that you left your phone in the car when you got out to push it out of the snow bank? 2. I wish all that info I spent hours keying into my phone was wirelessly synchronized to my office network. Until mobile devices have the ability to be constantly connected to a network, and are made of the same substance as the famous "black box", synchronization is an integral component of the wireless application architecture.

Introduction To Midlets And The Display A MIDlet is a Java application designed to run on a mobile device. There are two core Java libraries that make up the develop-ment environment for these mobile applications, the Connected, Limited Device Configuration (CLDC) and the Mobile Information Device Profile (MIDP).

Event Handling Through the Item Object Event processing is essential to most every MIDlet. It's hard to imagine an application where there is no user interaction what-so-ever, even if this interaction is as simple as requesting to start or stop a MIDlet. In this article we'll learn the specifics of event handling using the MIDP Command object.

Nokia MIDP Example Applications Animated Example MIDlet, Networked MIDlet Example, Workflow Application Example, Game MIDlet Example Using The Nokia UI API, Nokia UI API Sound Example...

Developer Platforms: Guidelines For Testing J2ME Applications v1.0 This document lists fundamental issues that must be taken into account when testing J2ME™ MIDP applications.

Porting BREW Games to Java MIDP v1.0 This document assists developers who want to port BREW games to the J2ME platform, and who want to plan the development of BREW titles to make it easier to port them.

Java 2ME and MIDP Development Welcome to the world of MIDlets. A MIDlet is a Java application that conforms to the specifications set out by the Connected, Limited Device Configuration (CLDC) and the Mobile Information Device Profile (MIDP)...

Your First Micro Java Game (12/02) Mobile phone manufacturers have embraced Java in a way that not even PC manufacturers have. Java is clearly one of the platforms of choice for mobile devices, and an ideal language for throwing together mobile games. The Mobile Information Device Profile (MIDP) of J2ME is a subset of the standard Java you know and love, with a few minor modifications. Writing a basic MIDlet game is simple as apple pie. This article will show you how to start cookin'.

Personal Basis Profile vs. Personal Profile: What's the Difference? (5/03) For a long while, all the excitement in J2ME was centered on the Connected Limited Device Configuration (CLDC), released in final form in May, 2000. The first CLDC-based profile, the MIDP, followed two months later. MIDP garnered much interest in the Java community because it defined a new application model, as well as classes for user interface and persistence. In other words, it provided a complete environment for deploying and running interactive applications.

J2ME Low-Level Network Programming with MIDP 2.0 (4/03) Version 1.0 of the Mobile Information Device Profile (MIDP) lacks low-level networking support for TCP/IP sockets and UDP/IP datagrams, but the MIDP 2.0 specification (JSR 118) has responded to the needs of the 2.5G and 3G networks now being deployed by adding support for sockets and datagrams, thus providing mobile applications more capable networking interfaces.

Wireless Software Design Techniques What every wireless software developer should know (5/02) Developing applications for devices with limited resources requires skillful developers who are willing to learn and understand how the wireless environment operates, and able to make intelligent decisions regarding software architecture and performance issues. The purpose of this article is to enlighten you about concerns you should keep in mind when developing J2ME applications.

MIDP Code Samples This page provides links to a variety of code samples that use the MIDP APIs. M-Commerce, Alerts and Timers, Event Handling, Internationalization, Network Connections, Persistent Storage, Getting Started, Servlets, User Interface...

J2ME for Home Appliances and Consumer Electronic Devices (1/03) Describes the CDC, related profiles, and how to develop applications for consumer and embedded devices.

The Internet Developer's Guide to J2ME One of your jobs as a Web developer is to track up-and-coming technologies that affect how you write and deploy applications. You're probably familiar with Java as a server-side development language even though most people turn to DHTML instead of Java for building client applications. However, a new kind of client-based Java is on the horizon. It's the Java 2 Micro Edition, or J2ME for short. J2ME has the chance to succeed where applets failed.

Network Programming with J2ME Wireless Devices The wireless devices such as cell phones and two-way pagers keep their owners connected to the outside world at anytime from anywhere. They offer great connectivity that other types of devices couldn’t offer. Application development for these wireless devices is going to be in great demand for the next couple years. Network programming plays an important role in wireless application development to take advantage of the connectivity these devices have to offer

Monday, April 14, 2008

Wisdom works everywhere

An old man lived alone in Minnesota . He wanted to spade his potato garden, but it was very hard work. His only son, who would have helped him, was in prison. The old man wrote a letter to his son and mentioned his situation:

Dear Son,

I am feeling pretty bad because it looks like I won't be able to plant my potato garden this year. I hate to miss doing the ga rden, because your mother always loved planting time.

I'm just getting too old to be digging up a garden plot. If you were here, all my troubles would be over. I know you would dig the plot for me, if you weren't in prison.

Love,

Dad

Shortly, the old man received this telegram:

For Heaven's sake, Dad, don't dig up the garden!! That's where I buried the GUNS!!

At 4 a.m. the next morning, a dozen police officers showed up and dug up the entire garden without finding any guns.

Confused, the old man wrote another note to his son telling him what happened, and asked him what to do next.

His son's reply was:

'Go ahead and plant your potatoes, Dad, It's the best I could do for you from here.'

Friday, March 28, 2008

Taliban in Afghanistan



IN THE NAME OF ALLAH, THE MOST COMPASSIONATE, THE MOST MERCIFUL



LECTURE: Taliban in Afghanistan



Syed Rahmatullah Hashimi



(Senior Advisor to Amir ul-Mu'mineen, Mullah 'Umar, Afghanistan)





MARCH 10, 2001



UNIVERSITY OF SOUTHERN CALIFORNIA,



LOS ANGELES, CALIFORNIA







*Note: [--] Indicate words that were not heard clearly in the recording.



I was just coming from [a meeting with] a group of scholars, and the first thing we started there was the statues. And the first thing we started here was also the statues. It s very unfortunate how little we see and how little we know. And it really confuses me, if people really know that

little or not. Nobody has seen the problems of Afghanistan; nobody saw their problems before. And the only thing that represents Afghanistan today are the statues.



The problem of Afghanistan was not new. As you know that Afghanistan is called, The Crossroads of Asia. So, we are suffering because of our geo-strategic location. We have suffered in the 18th century, 19th century, and we are still suffering in this century.



We have not attacked the British. We have not attacked the Russians. It was them who attacked us. So the problems in Afghanistan you see is not our creation. That reflects the image of the world. If you don t like the image in the mirror, do not break the mirror; break your face.



The problems in Afghanistan started in 1979. Afghanistan was a peaceful country and it was doing its own job. The Russians, along with their 140,000 troops attacked Afghanistan in the December of 1979, just 21 years ago, stayed there for a decade, killed one and a half million people, maimed one million more people, and six million out of the eighteen million people migrated because of the Russian brutalities. Even today, our children are dying because of the landmines that they planted for us. And nobody knows about this.



After the Russians left during the Russian occupation, on the other side, the American government, the British government, the French, the Chinese, and all of the rest, supported the counter-revolutionaries called the Mujahideen; 7 parties only in Pakistan and 8 parties in Iran who fought the Russian occupation. And after the Russians left, these parties went into Afghanistan. All of them had different ideologies, a lot of weapon[s]. And instead of having a single administration, they fought in Afghanistan. The destruction that they brought was worse than the destruction the Russians brought. 63,000 people were only killed in the capitol, Kabul. Seeing all this chaos, and the complete destruction of our country, and I don t have to forget that after the Soviets left, another million people migrated because of the lawlessness that existed in

Afghanistan 7 million people.



So seeing this destruction and lawlessness, a group of students called the Taliban (Taliban is the plural word of students in our language; it may be two students in Arabic, but in our language it means students) so a group of students started a movement called the Movement of Students. It first started in a village in the southern province of Afghanistan, called Kandahar. It happened when a war-lord, or a commander abducted two minor girls, raped them, and the parents of those girls went to a school and asked the teacher of the school to help them. The teacher of that school, along with his 53 students, finding only 16 guns, went and attacked the base of that commander. After releasing those two girls, they hanged that commander, and so many of their [the commander s] people were also hanged. This story was told everywhere; and this was called the terrorist story of the Taliban, or the Students. BBC also quoted this story. Seeing or hearing this story, many other students joined this movement and started disarming the rest of the warlords, who were worse than these. I will not prolong this story so far, this same students movement controls 95% of the country; they captured the capitol, including the four major cities. And only a bunch of those warlords are remaining in the northern corridor of Afghanistan.



So our achievements are as follows. We are in a government for only five years, and the following things that we have done, and many of you may not know:





* The first thing we have done is reunify the fragmented country. Afghanistan was formerly fragmented into five parts. The first thing we have done is to reunify that country. The United Nations, the United States, everybody was confused as to how to reunify that country, and

nobody could do it. First thing we have done is to reunify that country.



* Second thing we have done, which everybody failed to do, was disarming a population. After dealing [with] the war of the Russians, and the Americans I would say, every Afghan got a Kalashnikov, and even sophisticated weapons such as stinger missiles, and they even got fighter planes and fighter helicopters. So disarming these people was impossible. The United Nations in 1992 passed an appeal asking for 3 billion dollars to re-purchase that arms, to start a process of repurchasing those arms. And suddenly, because of its impracticalibility, that plan never materialized, and everybody forgot about Afghanistan. So the second thing we have done is to disarm 95% of that country.



* And the third thing that we have done is to establish a single administration under Afghanistan, which did not exist for 10 years.



* And the fourth achievement that we have that is surprising to everybody is that we have eradicated 75% of all worlds Opium cultivation. Afghanistan produced 75% of all worlds Opium. The drug, you know that Opium? The Narcotics business? And last year we issued an

edict asking the people to stop growing Opium, and this year, the United Nations Drug Control Program, UNDCP, and their head, [Mr.] Barnard F., proudly announced that there was 0% of Opium cultivation. Not at all. And this was not a good news for UN itself because many of them lost their jobs. In the UNDCP, 700 so called experts were working there and they got their salaries and they! never went into Afghanistan. So when we issued this edict, I know that they were not happy. And this year they lost their jobs. And this was our fourth achievement.



* The fifth achievement that we have, but it s a little controversial, some of our friends will not know is the restoration of Human rights. Now, YOU may think that is a violation of Human Rights, but from OUR perspective that is the restoration of Human Rights. Because usually [among] the fundamental rights of a human being is the right to Live. Before us, nobody could live peacefully in Afghanistan. So the first thing we have done, begun [to give] to the people is a secure and peaceful life. The second major thing that we have restored is to give them free and fair justice; you don t have to buy justice, unlike here. You will have justice freely. And you have criticized us for violating women s rights; now, who knows what happened before us. Only some symbolic schools, or symbolic posts were given to some women in the ministry, and that was called the restoration of women s rights. I can see some Afghans living here, and they will agree with me, that in the rural areas of Afghanistan, women were used as animals. They were SOLD actually. The first thing we have done is to give the self-determination to women, and it happened not in the history of Afghanistan. Throughout the history of Afghanistan, during all the so-called civilized kings or whatever, they didn t give this right to women, so women were sold.! They didn t have the right to select their husbands, or to reject their husbands. First thing we have done is to let them choose their future. And you will know that throughout south Asia, women are killed under the title of honor killings. It happens when a woman s relation is detected with a man, whether or not the relation was sexual, they're both killed. But now this is not happening in our country. And the third thing that happened only in Afghanistan, was women were exchanged as gifts; this was not something religious; this was something cultural. When two tribal tribes were fighting among themselves, then in order to get their tribal issue reconciliated, they would exchange women, and then [they]! would make, or announce reconciliation. And this has been stopped. If we [had to give] fundamental rights of woman, we had to start from zero; we couldn t jump in the middle. Now you ve asked me about the rights of women s education and the rights of women's work. Unlike what is said here, women do work in Afghanistan. You're right that until 1997 I mean, in 1996 when we captured the capitol Kabul, we did ask women to stay home. It didn t mean that we wanted them to stay at home forever, but nobody listened to us. We said that there is no law, and there is no order, and have to stay at home. They were raped before us, ever! yday. So, after we disarmed the people, and after we brought law and order, and now women are working. You are right that women are not working in the ministry of defense, like here. We don t want our women to be fighter pilot[s], or to be used as objects of decoration for advertisements. But they do work. They work in the Ministry of Health, Interior, Ministry of Education, Ministry of Social Affairs, and so on. So, and we don t have any problem with women s education. We have said that we want education, and we will have education whether or not we are under anybody s pressure, because that is part of our belief. We are ordered to do that. When we say that there should be segregated schools, it does not mean that we don t want our

women to be educated. It is true that we are against co-education; but it is not true that we are against women s education. We do have schools even now, but the problem is the resources. We cannot expand these programs. Before, our government there were numerous curriculums that

were going on; there were curriculums which preached the king for the kings, and there were curriculums which preached for the communists, and there were curriculums from all these seven parties [the previously mentioned]. So, the Students were confused as to what to study, and the first we have done today is to unify that curriculum, and that s going on. But we are criticized, and we say that instead of criticism, if you just help us once, that will make a difference. Because criticism will not make a difference. If you [talk?] criticism from New York, thousands of miles away, we don t care. But if you come there and help us, we do care. So actually there are more girls students studying in the faculty of medical sciences than boys are. This is not me who is saying this, it is the United Nations who has announced this. Recently we reopened the faculty of medical science in all major cities of Afghanistan and in Kandahar, there are more girl students than boys. But they are segregated. And the Swedish committees have also established schools for girls. I know they are not enough, but that s what we can do. So, that

is what I say that we have restored. I don t say we are 100% perfect, and nobody will say that they are 100% perfect. We do have shortcomings, and we do need to amend our policies. But we can t do everything over night.



* And the sixth problem, that we are... is it sixth or seventh? Seventh I think the seventh problem that we are accused of is Terrorism, or the existence of terrorists in Afghanistan. And for Americans terrorism or terrorist means only bin Laden. Now you will not know that Afghanistan,

or bin Laden was in Afghanistan 17 years before even we existed. Bin Laden was in Afghanistan, fought the Soviet Union, and Mr. Ronald Reagan, the president of America in that time, and Dick, Mr. Dick Chaney called such people freedom fighters or the Heroes of Independence, because they were fighting for their cause. So Osama bin Laden was one of those guys who was instigated by such media reports, so in that provocation by these countries to go to Afghanistan and fight the Soviets there. And now when the Soviet Union is fragmented, such people were not needed anymore, and they were transformed into terrorists from heroes to terrorists. So exactly like Mr. Yassir Arafat was transformed from a terrorist to a hero. So we don t know as to what is the definition of Terrorism. We do regret that the terrorists were actually horrific acts and they were terrorist acts. But if they are terrorist acts, what is the difference between those terrorist acts and the attacks on Afghanistan when in 1998 attacks, cruise missile attacks on Afghanistan. Neither of the two were declared and both of them killed civilians. So we are confused as to what is the definition of Terrorism. If it means killing civilians blindly, both of them killed civilians blindly. And the fact is, I m not going to be offensive or rude, or rude about this, I m going to be frank. And I think it s sometimes honest to be rude. If the United States that it has acted for its defense, lets see. The United States government tried to kill a man without even giving him a fair trial. In 1998, they just sent cruise missiles into Afghanistan and they announced that they were trying to kill Osama bin Laden. We didn't know Osama bin Laden then. I didn t know him; he was just a simple man. So we were all shocked. I was one of those men who was sitting at home at night, I was called for an immediate council meeting and we all were told the United States have attacked Afghanistan. With 75 cruise missiles and trying to kill one man. And they missed that man; killed 19 other students and never apologized for those killings. So what would you do if you were in our status; if we were to go and send 75 cruise missiles into the United States and say that we were going to kill a man that we thought not believed that we thought was responsible for our embassy, and we missed that man, and we killed 19 other Americans what would the United States do? An instant declaration of war. But we we! re polite. We didn't declare war. We had a lot of problems at home; we didn't t want further problem[s]. And since then, we are very open-minded on this issue. We have said, that if really this man is involved in the Kenya/Tanzania acts, if anybody can give us proof or evidence about his involvement in these horrific acts, we will punish him. Nobody gave us evidence. We put him on trial for 45 days and nobody gave us any kind of evidence. The fact is that the United States told us they did not believe in our judicial system. We were surprised as to what kind of judicial system they have. They showed us as to what they are doing to the people they just tried to kill a man without even giving him a fair trial, even if one of us is a criminal here, the police is not going to blow his house, he must go to a court first. So, that was rejected. Our first proposal, despite all these things, was rejected. They said they will not believe in our judicial system, and we must give him to New York. The second proposal that we gave after the rejection of this first proposal we gave was, we are ready to accept an international monitoring group to come into Afghanistan and monitor this man s activities in Afghanistan. So that he does nothing. Even that he has no telecommunications [--]. That proposal was also rejected. And the third proposal we gave, six months ago, was that we were ready, that we were ready to try or accept a third Islamic country s decision, or the trial of [--] in a third Islamic country, with consent of Saudi Arabia and Afghanistan that was also rejected. So we don t know, as to what is the problem behind. If bin Laden was the only issue, we are still very open minded, and for the fourth time, I m here, with a letter from my leadership that I m going to submit to the state department hoping that they will resolve the problem. But I don t think so [that] they'll solve the problem. Because we think, and I personally think now that maybe the United States is looking for a Boogy Man always. Remember what Gorbachev said? He said, that he s going to do the worst thing ever to the United States. And everybody thought that he s going to blow the United States with nuclear weapon[s]. But he said, "I m going to remove their enemy". And then he fragmented Soviet Union. And he was right. After he fragmented Soviet Union, a lot of people lost their jobs in the Pentagon, in the CIA, and the FBI, because they were not needed anymore. So we think that maybe these guys are looking for a Boogy Man now. Maybe they want to justify their annual budget, maybe they want to make their citizens feel that they are still needed to defend them. Afghanistan is not a terrorist state; we cannot even make a needle. How are we going to be a terrorist state? How are we going to be a threat to the world? If the world terrorism is really derived from the word terror , then there are countries making weapons of mass destruction, countries making nuclear weapons, forest deforestation, soil, air, and water pollution they are terrorist states; we are not. We cannot even make a needle; how are we going to be a threat to the world? So as I said in the beginning, the situation in Afghanistan is not our creation. The situation in Afghanistan reflects the world s image. If you don t like the image in the mirror, do not break the mirror; break your face.



Now, we are under sanctions. And the sanctions have caused a lot of problems, despite that we are going under so many problems, the 23 years of continuous war, the total destruction of our infrastructure, and the problem of refugees, and the problem of land mines in our agricultural

lands, all of a sudden the United Nations, with the provocation of Russia, is imposing sanctions on Afghanistan. And the sanctions have been approved; we are under sanctions. Several hundred children died a month ago, here it is (holds up pamphlet). Seven hundred children died because of malnutrition and the severe cold weather. Nobody even talked about that. Everybody knows about t! he statues. For us, we are surprised, that the world is destroying our future with economic sanctions, then they have no right to worry about our past. Everybody is saying that they are destroying their heritage they don t have any right to talk about that. They are destroying the future of our children with economic sanctions, how are they going to justify talking about our past? I know it s not rational and logical to blow the statues for, for retaliation of economic sanctions. But this is how it is. I called, after this announcements, I called my headquarters, and I found out, I was really confused, I asked them, why are they going to blow the statues, and I talked to the head of the council of scholars of people, who had actually decided this, he told me that UNESCO and NGO from Sweden, or from one of these Scandinavian countries Norway, Sweden, one of these they had actually come, with a project of rebuilding the face of these statues, which have worn by rain. So the council of people had told them to spend that money in saving the lives of these children, instead of spending that money to [restore these] statues. And these guys said that, No, this money is only for the statues. And the people were really pissed off. They said that, If you don t care about our children, we are going to blow those statues.



[Person from the Audience yells, Takbeer! ]



[Audience responds, Allahu Akbar! ]



I don t say that he s right or wrong, the decision is yours. Think of yourself. If you are in such a problem, what would you do? If your children are dying in front of your eyes, and you are under sanctions, and then the same people who have imposed sanctions and are coming and

building statues here? What will you do? So, I talked to my headquarters today, and they said that the statues have not been blown so far. But the people are so angry. They are really angry, they want to blow them. And there is Kofi Annan is going, you know Kofi Annan, the Secretary General of United Nations? He went to [--], to Pakistan, and he said he s going to meet our representative there. This man never bothered to enter, to talk about these children, he never bothered himself to talk about six million refugees, and he never talked about [the] poverty of Afghanistan. He only goes to that region because of these statues. And the OIC is also, they ve also sent a mission to go to Kabul and talk about those statues. So we re really confused. That the world is really caring about the statues, and then they don t care about human beings. I don t say we have to retaliate in blowing the statues; we have not done that. But if we were to destroy those statues! , we would have destroyed them three years before now, because we captured those areas those areas three years before now. We didn t want to blow them. And now the situation has come, and it s not our decision. This is the decision of the scholars and the people. And that is the decision has been approved by the Supreme Court. We cannot reject this decision. So these guys are there, the OIC and some, even I think some ministers from different countries are there to save the lives of these statutes. I think they will not be blown because of the concerns of these people. But it is really, really ridiculous. These people do no! t care about children, about people who are dying there, about the foreign interference that still exists, they only care about the statues. And I m sure they don t care about our heritage. They don t care about our heritage; they only care about their picnic site one time. Maybe they ll have a good picnic site there, seeing those statues. They don t care about our heritage, I m sure. If they were to care about our past, they wouldn t destroy our future. And I m sure these sanctions which are imposed on our government will never change us, because for us, our ideology is everything. To try to change our ideology with economic sanctions will never work. It may work i! n the United States, where the economy is everything, but for us, our ideology is everything. [--] And we believe that it is better to die for something than to live for nothing.



We are still open-minded. We are still, we have still opened our doors for negotiations, but our offices are closed everywhere our office was closed in New York a week ago. They are trying to shut our offices in other countries, trying to isolate us, and they don t know that isolation is

counter-productive. Because they don t have experts; the only experts they have are those people who speak English. They don t even speak the language. Those experts who are advising the sanctions, or the sanction committee have not even been to Afghanistan. And they are setting benchmarks for us to achieve.



I m prolonging this speech, I m sorry, because I have been repeating it everywhere, so I may have left some thing in it, and I will let you ask me questions.



[Applause from Audience]







***Important Note: What follows are some of the answers to some of the questions that were asked during the Question and Answer session. Most of the questions were not included due to the poor recording. Apologies for the inconvenience.***



[A questioner asks about the statement he heard on the radio from the Afghan former minister (Mutawakkil) confirming that the statues have been destroyed, and further adds, Does that mean the statues of Hindus and Sikhs will also be destroyed? He further asked that since the destruction of the statues was done in retaliation, Was it really saving the children? (it was asked in a provocative manner)]



Thank you very much and unfortunately again, the first question is the statues. So the statues as I told you, have not been destroyed so far. And I have contacted my headquarters there, and if they were destroyed, then people would not bother going there; as I told you Kofi Annan is there, OIC is there, and our foreign minister is there. And for us, as he [the questioner] said that Mutawakkil has said that [that the statues have been destroyed], I don t think he has said that they are destroyed. He said that [that the statues have not been destroyed]. And I don t reject this. They raised an edict which says these [the statues] should be! blown. And we are not against Buddhists; absolutely wrong. We are not against any religion. There are Hindus living in Afghanistan; there are different religions. There is one man who is a Jew living in Afghanistan.



[Audience laughs]



So we are not against any religion. And there is no Buddhist in Afghanistan, this I can say. In our religion, if anything, you can leave anything until it is not harmful to you. If these Buddhas were not harmful to us, so far. But now when the money is going to Buddhas reconstruction, and the children are dying next door, we think it's harmful now. Not we think, the people think. And I told you that this decision is taken by the council of scholars and the council of people. And has been approved by the Supreme Court. And the media is saying everywhere that it is an edict by our leadership. Have you ever seen our leadership on TV? Have you ever seen or heard him (Mullah Umar) on international radio? He has never been on radio, so it's absolutely wrong that we issued an edict. I do agree that there is an edict, but by the council of people and the scholars, and has been approved by the Supreme Court, but has not been implemented so far. Is it enough? You know, really, I am asked so much about these statues that I have a headache now. If I go back to Afghanistan, I will blow them.



[Audience laughs]



[Questioner asks about the infighting between Mujahideens now. He asks, in the past we knew that there was one common enemy (the Russians) and it was easy to support the Mujahideen but now it s the groups of Mujahideens fighting between each other. How do you explain this?]



They [the different Mujahideen groups] killed so many people, and there were so many problem[s]. And that s why we started our movement. It s all in these people. They didn't t fight for Shari ah, or they didn't fight for Afghanistan, they only fought for their future post in power. So we, as I told you that, we finished that. And only now, we have one opposition headed by Ahmed Shah Masood. And we don t have much problems with him. We had talks with his representative in Ashkabad in Ramadhaan this year, and I was there. So, we say that he failed in bringing about a constitution, a unified gove! rnment; he could not even unify the capitol, Kabul. So we did all these things. So we asked him, despite that he controls nothing, except 5% in the mountains, and we have said we are still open-minded. We agree that he should have a post, because he has fought the Russians. And in `98, we agreed on a joint government; actually, I was also there, so we agreed in giving them three ministries and accepting their judicial system merging with our judicial system, and giving them three or four district or provincial governors or something like that. And they agreed on that. Our, on our part, we asked them to give us their weapons, because the problem in Afghanistan is not political differences. The problem in Afghanis! tan is the weapons. Everybody has had weapons, and now if they are fighting us, it is not because of our very much ideological differences; it s because of weapons. There were a lot of weapons before, and you know, the Afghans will know that so many times they tried to have one government and then after a week or so, they fought, because all of them got different defense ministries, and they would fight. So now we have said that the problems in Afghanistan is not the political problem; it is the arms which exist. We are, we will accept them to be in our government if he accepts to give his arms to the Ministers of Defense. We have no problem however.



[A questioner asked, As Salaamu `Alaykum wa Rahmatullaahi wa Barakaatuh. Brother, Afghanistan is now supposed to be a Muslim country, Insha Allah. And these statues are just like the statues in Makkah, when Rasoolillah (saws) came to Makkah, and it was the very first thing that he did was to destroy the statues. What is taking us so long? Why aren't they destroyed already? [Audience laughs, some say Takbeer]



So, I don t know what to say. We don t have any Buddhists as I told you; we have to look at the problems of the Muslim minorities in some countries. So we do not want to create problems for them, that' s why we are still waiting, and we hope that we will resolve this problem.





[ A written question read, What is your opinion about killing the Iranian officers in Heraat in 1998? ]



So, there is this story about seven nine, nine Iranians, one of them was a journalist, and the rest of them were called diplomats. It happened in `98 when we were capturing a city in the north of Afghanistan called Mazar-e-Shareef when we were, we announced before our campaign in

liberating that city, we announced that all diplomats of organizations, including the UN, the diplomatic missions, and NGOs to evacuate because of the possible fighting that may happen in the city too. So, all of them evacuated, the United Nations, the NGOs, and even those people who

actually bombed them, they also evacuated, so the only people who remained there was some seven, or eight, night Iranians, who were actually not diplomats, who were actually military advisors to their puppets in Afghanistan. So, and we didn t kill them in di! plomatic mission; they

were killed on their way to Bamiyan; Bamiyan is another city in central Afghanistan, so they were and we didn t want to kill them; they just died because of the shelling that happened. And we issued an edict, and we declared that we were sorry for what happened. And now the Iranian

government has also sent their mission, and when I was coming there, three of their villages were in Afghanistan; they reopened their consulate here and I think they have re-thought their policies now and maybe they will have a new chapter of friendship with us and I hope it will happen.



[Question asked about how people, especially Muslims, need to be educated about the situation in Afghanistan. He went on further to ask about whether or not he would be under a physical threat if he were to shave his beard and walk into Afghanistan, or if a sister would be under a physical threat if a sister were to wear Hijab according to the Islamic standards, not wearing Burqah.]



You say that all the Muslims, or all the people, must be educated on the situation in Afghanistan. And now I am thinking that first they must be de-educated to try to understand what we are saying. There are not [--], they are really trying how to approach, and you are right, and I agree

that you must have Public Relations, in teaching people, or at least, letting them know what we say. But as I told you that we have other priorities. Our priority is to save the children. Our priority is to de-mine our country. Our priority is to reunify our country. Our priority is to stop the foreign! interference. Our priority is to fight the [--] that is already operating in our country. So for us to talk about Public Relations, it is important, but it cannot what would you do if you were in this status? And it is not easy to do Public Relations. You have to spend a lot of money. I will tell you a story of CNN. CNN was in Afghanistan interviewing bin Laden, in `98. You have to be careful in listening to this. I was there, and they asked bin Laden as to what was the thinking about the killing of civilians in Iraq. After three hours of formal conversation, and the camera was rolling. He said, that if all American citizens and if all British citizens are willing, or supporting, to kill all Iraqi civ! ilians, then all American citizens and all British citizens deserve the same thing or to be killed. CNN cut everything. Three-hour conversation was not there, only thing they put was and it was not complete the only clause that they said was, the independent clause of what he said, they said that, all American and British citizens must be killed. This is what came on the air. But he didn t mean this. And I know that all Americans do not support the killing [of] civilians there. Not even a quarter of that. That was impossible. But now what they taught their people was that bin Laden is saying that all American civilians must be killed. That is the story of media, and the media here is very irresponsible. They are commercialized, and they'll do anything for selling advertisements.



He [the questioner] talked about the beard and the veil. First of all, for all non-Afghans, this rule does not apply. So there are many non-Afghans who are working there; there are actually Americans who are working there in the UN, there are many people from different parts of the world. And they do whatever [--], they don t care. And we don t have a law for them. But Afghanistan is a country that has gone through 23 years of war, and there is still war, and the military is mixed with the people. Then you must have some sort of strict law, in order to insure

security and peace in Afghanistan. So, maybe it is ridiculous for you that we ask people to grow beards, but this is what, it is in Afghanistan, and the Afghans do leave beard, whether or not you tell them. And it s something natural, and it s something [--]. And regarding the veil, or the Burqas, or the Islamic dress code, that is something that exists in Afghanistan for centuries. And it does exist in Iran, it does exist in Saudi Arabia, it exists in many Islamic countries. It has nothing to do only with Afghanistan. And it does even exist here. So you can t force people not to have Burqas, and we do have that constitution that at this time, women should cover up. For us because our priority is that they should be safe.



[Questioner asks about what Afghans living in the US can do for Afghanistan. She also gives a brief account of her experience in Afghanistan, when she traveled there recently, and gave proof that schools existed there, and that the situation there is much better, more peaceful than it was six years ago. She traveled alone, all over the country.]



Thank you very much. I m very happy that at least I found a proof!



[Audience laughs]



I m thankful to you [for] what you say, and I really appreciate the emotions you have for your country. I myself, I m 24, and serving my country. I could play football now, and I could even play here, and I could stay in the United States, but I don't do any of those things I serve my country. So I agree that whatever, all those things that exist in Afghanistan, maybe there are many things that we don t want, but they do exist. So we are not a sponsor for that. They did exist for two decade[s]. So the best thing to do for Afghanistan is to have an association of Afghans to raise funds, and the best thing I would say [is to] educate people. Instead of criticism, they can come there! and open a school. They can open a school for girls, for boys. But that would be the best thing. Unfortunately some of our Afghans are sitting in their air-conditioning rooms here, play their TV s, and when they have nothing to do, then they criticize us because we can t make Europe for them. We can do it, we have a lot of problems, but the first thing they should do is to stop harming us. They have to come and help us, in all the sectors. We do need all the Afghans from here. If they really criticize our policies, they should come there and criticize our policies, not from here. So the best thing for ! you is for you people to raise funds, do NOT give it to us, one of you should come there, help the people.



[Questioner: Do you respect our right to tell you that if you didn t believe in PR, you wouldn t be here right now. [--] Actually I d like to ask you, does your version of Islam preach hate? I don t know, I m asking you; do you believe in the religion of hate? Because I was very disgusted when that lady got up and asked you why don t you blow those idols, because that boy right there (points to a boy in the audience) laughed. MSA Representative interrupts, Please ask your question. Questioner, I m asking you, are you preaching hate? MSA Representative, Is that your question? Questioner, That is the question. He continues to argue.]



Enough? I don t know what to say but you only expressed your emotions. Islam means Peace. First you have to understand. And a peaceful religion will never preach for Hate. And we do not preach for Hate. And you said that if we didn t believe in Public Relations, I wouldn t be here. It s

my first time here, and I ve waited for an American Visa for a long time, and I m not used to doing these things. I brought a letter from my leadership that I explained before that I will be submitting to the leader of the administration here, and hoping that they will re-think their policies. So I do believe that, I say that we must believe in Public Relations because they are very important. But I say that Public Relations needs a lot resources, and at this time we have resources for the [--] for the plight of our people.



[Questioner: I actually agree with you about the western media; they are very biased [--], but looking at people like him (the young boy who laughed) at such a young age [--]. ]



[Small dispute in the Audience]



[Father of young boy: He is my son, ok, and you have come here to accuse him..[--]. MSA Representatives calm both parties and rest of Audience, and apologizes to audience.]



[Questioner asks about women being required to have a male escort whenever they go out. She also questions whether or not if she were to go into Afghanistan wearing what she was now (a jilbab and hijab) would she be under any physical threat.]



You [the questioner] said, told me about whether a woman was allowed to go without a male escort. I m here, and my wife is shopping in Kandahar now. So they don t have to be escorted, this is absolutely wrong. Yes, they were, in those cities that we captured first, because that was for their safety. Now, they don t have to. And I don t have any problem with whatever you wear, and women do wear the same thing that you do wear, and they don t have any problems. And I say that those cities, which are close to the frontline and there is military operations going on close, there are thousands of military soldiers of ours, we do ask women to avoid the social areas. Now you re not understanding what I mean, but some of our friends here do understand. In a country that is in a war, the military is mixed with the people, and there are certain

limitations. So I can t go beyond that, and I say that women does not have to be escorted. I m here now and my wife is shopping maybe in Kandahar.



[Questioner asks What is Afghanistan s priority in regards to establishing an Islamic state for all Muslims, not just for Afghans? ]



He'd like to destroy us.



[Audience laughs]



We have our first headache in Afghanistan, and that s a big headache. We have a full-time job there. If we were worked 24 hours a day, we will hardly ever be able to re-construct an [--] Islamic system in our own country. And we have no intention of going beyond our borders, and

neither we can. So, all these people who exist in other countries, or their policies, they have nothing to do with us. We are only concerned about Afghanistan. And please do not try to make assumptions. Ask me questions. I was asked in... I was in Bay Area just yesterday, a journalist asked me, Why do you hate women? And I told him, Why do you beat your wife? And he said, I don t beat my wife. I said, I don t hate women.



[Audience laughs]



So you have to ask me questions. You just make assumptions. You just make an assumption. Like he said, you explain for one hour, for five minutes saying the same thing again and again, you ve made an assumption. You didn t ask me whether a woman must be escorted or not

this is an easy question. But if you say, Why are you doing this , Why are you doing... We re not doing it. The question is, here, you don t have to make assumptions.



[Questioner: My country (Iran) is suffering from drug-trafficking from Afghanistan; you said that you [--] drugs from your area, but how can you explain this contradiction? You have said that you cannot even make a needle, what does it mean..? ]



I would like to answer this question first and then I will not forget. I said Afghanistan produced 75% of all worlds Opium, 75% of all worlds. And we eradicated it last year. And this was announced not only by United Nations, who rejects this? All of them know it was announced by Iranian government [--]. I don t say it was we eradicated five years ago [it was] this year. United Nations announced ...





[Questioner: You mean 2001? So that s two months ago?? But our country is still suffering from that?! He continues to argue]



Please, please try to hear what I m saying.



[Questioner continues to talk and argue, MSA representatives try to calm him down.]



[Questioner goes on, I know, but this is the question I wanted to ask ...]



My brother, listen to me. You say that your country is still suffering from Opium from Afghanistan. I do not say that we eradicated it five years ago. This year, the United Nations Drug Control Program, announced that there was 0% Opium cultivation; Iran, too, admitted that. So if you don t know that, your problem. New York Times announced this; it was in a New York Times editoral. So if you don t know this, then it s your problem. I do admit that there are still some piles of Opium that exists from the years before the last cultivation that may [have been sent] to

your country. But we will admit, that we have, and I told you that, there are missions for us, across Afghanistan, to Iran, to our country, and they are trying to eradicate the already existing Opium; it was not produced this year; it was produced the year before last.



[Questioner asks whether or not they have asked for a loan from the World Bank or IMF]



Not yet. We have not asked IMF neither the World Bank to help us. But if they do help us, we will no reject it. So we are not asking because we are not being recognized so we can t ask them for loans.



[Questioner : is a Political Scientist and is asking whether or not Bureaucrats and Technocrats are needed in Afghanistan because, according to him, the Taliban are not smart enough, suitable to be governing Afghanistan.]



We never say that we are perfect. The question is, Who could do more than we do? These seven parties? The Communists? Or the King? Who did this? The things that we have done? Who could do more than that? It s very easy to say, to criticize from here, Do this, do this, do that.. But it s very difficult to do that. You said that the Taliban are not Bureaucrats and Technocrats, and we re not going to change that. I m sorry to say, you know what the old king of Afghanistan, he was 88 years old, and he spent seven years living in Rome, he had bought an island there, and now this man wants to come back to Afghanistan and head the government. The old, rotten knucklehead.



[Audience laughs]



So, we were very surprised as to what did he do in 43 years of his government? He didn t do anything. He only knew how to decorate his palace. I m sorry to say this. And now the same man, after 43 years Sorry, 27 years, is willing to go back and govern; he cannot even take a

flight back to Afghanistan. He s too weak. So how s he going to? So we do need professionals. We don t say that we are perfect. And I repeat it again, we cannot come here, and ask everybody to come help us. We have asked so many times. Anybody willing to help their country, come and

help. And many people come and ask me, Well, how do we go? ..How did you come here?!



[Audience laughs]



And yeah, go there if women can go there, what is the problem? But if you ask us to give you the government, then that s difficult. So I agree with you that we need Technocrats, but we don t need politicians.







[END OF SESSION]