Friday, November 29, 2019

Why did fascist parties emerge in so many European countries in the inter-war years Essay Example Essay Example

Why did fascist parties emerge in so many European countries in the inter-war years? Essay Example Paper Why did fascist parties emerge in so many European countries in the inter-war years Essay Introduction There is indeed no single reason for the rise of fascism in many of the European countries on the inter-war years period. For fascism to not merely emerge but flourish and succeed there were necessary cultural, political, social, economic and international factors which needed to exist and combine together. No single factor is of crucial importance by itself, only as it converged with other influences. It was in these particular circumstances that the emergence of fascism can be explained. After the First World War, there is no doubt that in almost all European states there were movements showing distinct fascist tendencies. With similar ideologies, they rejected the democratic ideas of parliament, and opposed the organized working class and ideas of socialism. They cried out for submission to discipline, authority and an important sense of community. These violently nationalistic movements were at first small sects; indeed some of them remained so. It was in Italy, in 1922 when the fascists seized power and after the 1929 Great Depression that in 1933 Hitler was able to establish the most brutal of fascist regimes; only in Italy and Germany did fascism have truly mass successful and powerful regimes, elsewhere they remained uninfluential movements. Culturally, the emergence of movements displaying fascist tendencies in the majority of European states in the inter-war years can be partly explained by the huge appeal and extensive ‘roots’ of fascist ideology. The fascist movements had much in common in their ideology, so much that they were indeed able to borrow from each other. Behind the stereotypical fascism defined by brutality and violence there lay a coherent body of thought, which had developed from intellectual movements from the late 19th century onwards. It resulted in a fascist ideology that was elusive, drawing from the right and from the left, which was neither capitalist nor communist, yet sought to create a radical ‘Third way.â €™ This strong body of ideas clarifies the ability of fascism to appeal to not merely violent activists, but intellectuals such as the philosophers Giovanni Gentile and Martin Heidegger. The strength of the body of ideas of fascism was crucial, for these ideas mattered: providing inspiration and shaping action. Part of the fascist ideology was the powerful myth of the nation and the race. This took the form of venerating the past: the dominant Roman Empire, the Seventeen Provinces of the Netherlands, and also took the form of the aim of territorial expansion in the quest for a Greater Italy or a Greater Germany. Why did fascist parties emerge in so many European countries in the inter-war years? Essay Body Paragraphs The ‘roots’ of certain ideas of fascism can be traced back to various intellectual movements from the nineteenth century. The Enlightenment ushered in an era of modernity emphasizing liberal ideology, individualism, the constitutional state and the philosophy of laissez-faire. Fascism became the antithesis of all these ideas, a backlash to the ideas of ‘modernity.’ Yet fascism was both a product and reaction to the Enlightenment, for it gave rise to the radical ideas such as the thought that violence was sometimes necessary to purge the existing order and that the will of the people could be incorporated by a mass-based form of politics. There was also the emergence of ideas of reason and rationalist thought in the sciences, with the eugenics and Darwinism highlighting the need for the state to take on the role of selection. It has been perceived that segments of the middle-classes in some countries felt acutely threatened by the major economic, social and p olitical upheavals being generated by modernization, and so retreated into the ideology of radical nationalism. The appeal of fascism was broadened with the use of their key metaphor of rebirth, it was flexible enough to appeal to different varieties of nationalism, for essentially it had the advantage of hiding whether something was essentially old or new. Fascism developed essentially in the central European areas such as Germany, Italy, Austria and Hungary, for they were most affected by these cultural and intellectual trends. Fascism had varying degrees of impact outside greater central Europe for elsewhere fascism was more successfully counter-balanced by opposing cultural influences. France was perhaps one of the most obvious areas for fascist movement to succeed, particularly as many of the concepts and intellectuals originated in France, yet in France the overall sense of crisis was less acute and other elements counterbalanced fascism. Once again, it is clear that for a fas cist movement to fully emerge and succeed all political, economic, cultural and social variables combined were vital. Politically, there are many factors which collectively give rise to the emrergence of fascism, including: the importance of national political traditions, the emergence of the ‘new’ states, divions within the present political system, the existence of the threat from the left and the necessity of efficient leadership and the existence of a fascist role model. It is crucial to study fascism within different national contexts, for national political traditions certainly played their part in molding the fascist movements that emerged. Political traditions in different nations could not only encourage but also defuse fascism. The French republican belief in Liberty, Equality and Fraternity and Britain’s emphasis on individual rights and constitutional, parliamentary government indeed failed to encourage fascism. The seventeenth century English Revolut ion was vital in consolidating parliamentary government, and the rise of Protestantism with its sense of rights and tolerance provided a foundation stone of national identity. Along with the emergence of elected local government after the 1880s, which encouraged the development of two mass political parties, Britain was not the most fertile ground for fascism to develop. Germany and Italy’s political history however, could be perceived to have encouraged Fascism. Germany had a strong Romantic tradition of nationalism, producing a longing for strong leadership and a sense of community. There was also the German tendency to define citizenship in terms of blood, which reinforced the growth of anti-Semitism. Italy was finally reunited as a state in 1870, before then she had been merely a geographical expression, yet she was still divided socially. It is clear that fascism was by all means far more successful in the comparatively new European states, formed in the 1860s and 1870s such as Italy, Germany, Austria and Hungary. These states had late-developing political systems, and had failed to achieve empire and status. It was during the period that these newly established states were making the transition to a liberal democracy, often that they had just recently made this transition. It ensured that liberal democracy in these counties was indeed unconsolidated. These sufficient conditions seemed necessary for movements of fascism to emerge and flourish. Fragmentations, divisions or polarization within a country’s political system was also a clear requirement for fascism. Fascism certainly had far less impact in countries such as Britain, France and the Low Countries, which had stable party systems and hence remained largely immune to fascism. Generally fascist movements appeared to emerge in countries where there was a real or even perceived threat from the left. In Romania, even though the communist party had been effectively suppressed there was sti ll the presence of a communist threat, for she now shared a new border with the Soviet Union and hence anti-communism remained a significant factor in Romanian political affairs. Hungary was the only country outside the Soviet Union that had been briefly ruled by a revolutionary communist regime. This exacerbated anti-communion and anti-left ideas, the sting of the communist regime still taunted Hungarian politics for the next generation. Germany was the home of possibly the strongest communist party in Europe that was outside of the Soviet Union. Communism was indeed always perceived as a serious threat by many of the Germans. These conditions helped to create an atmosphere where only a radical non-leftist movement such as fascism could appeal, rally social discontent and flourish. The authoritarian principles of fascism necessitated strong, effective leadership for it to succeed. Indeed the more successful the movement, the more important the character and strength of the leader. This factor can help to illustrate why certain fascist movements were perhaps not more successful for not all of the fascist leaders in the inter-war years period were charismatic and efficient. Ferenc Szalasi of Hungary is possibly one of the best negative examples. A strong leader was certainly a factor in determining the success of the movement. There is no debate regarding the manipulative, calculating and efficient character of Hitler, and the tremendous frenzied impact he was known to have on the crowds at mass rallies. Fascist ideology certainly played upon the myth of the leader, who was indeed venerated like a Saint, he was God-given and had super-human qualities. The impact of the existence abroad of a fascist role model should certainly not be underestimated. Foreign examples of fascism indeed encouraged the majority of movements, except for those in Germany and Italy, which provided the role model. Only in Germany in Italy did fascist movements develop entirely on their own. This perhaps also explains the further success of the movements in Germany and Italy, for not only did they develop on their own but also it ensured that the roots of their fascist movements were more deeply embedded. We will write a custom essay sample on Why did fascist parties emerge in so many European countries in the inter-war years? Essay Example specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Why did fascist parties emerge in so many European countries in the inter-war years? Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Why did fascist parties emerge in so many European countries in the inter-war years? Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Monday, November 25, 2019

The US was justified in Dropping the atomic bomb. essays

The US was justified in Dropping the atomic bomb. essays On August 6, 1945, the eighth largest city in Japan, Hiroshima suffered an extremely sepulchral day. The United States had unleashed Little Boy. Little Boy was an extremely powerful, atomic bomb. Little Boy had killed some 80,000 people in the city of Hiroshima (Hoare 18-20). Three days later an analogous situation had occurred in the Japanese city of Nagasaki . This atomic bomb, Fat Man, had killed another 100,000 people (Hoare 18-20). Many people were killed and many others were injured. Some believe that the dropping of the atomic bombs was inhumane, but these people do not realize what could have been lost if World War II would have continued any longer. The United States had been fighting this massive war since 1941. Despite these lurid occurrences, the United States was justified in the dropping of the atomic bombs on the Japanese cities of Hiroshima and Nagasaki. The dropping of the atomic bombs was, and still is, an extremely controversial military strategy in the United States and all over the world. Many scientists believed that it would be immoral to drop the atomic bomb on the two Japanese cities without warning them, therefore, they began a petition (The Americans 751). Others supported a demonstration of the power of the bomb in a deserted location that the Japanese would be able to view. They believed that they could convince the Japanese to surrender (The Americans 751). Many people also believed that the United States should have chose to invade rather than drop the atomic bombs and kill 200,000 of the Japanese people. These people are ignorant to how many lives would have been lost if the United States had chose to invade. Atomic bombs produce heat millions of degrees high. They also produce visible ultraviolet and infrared rays (Stein 3). Everyone and everything exposed to the atomic blast is effected, whether i...

Thursday, November 21, 2019

Essay questions Assignment Example | Topics and Well Written Essays - 750 words

Essay questions - Assignment Example Constitution were universal and should be shared with everyone. By the end of the 19th century, the Monroe Doctrine was to come into full effect in a war with the Spanish. Not only would the Americans take control of Spanish possessions in the Caribbean such as Cuba, Puerto Rica, and other islands, but as the war expanded so would the remit of the Monroe Doctrine. The United States would gain control of the Philippines, far from its own shore, and attempt to remake the Spanish colonialism political system in its own image. The result would be a bloody conflict fought with Filipino insurgents that would take America many years to quell. Following the American victory over Spain and the taking of the Philippines, there was a great deal of tension between the U.S. and the locals. This came to a head in 1899 when American soldiers shot some Filipinos. Things quickly got out of hand with both sides raising armies and fighting conventional wars. The Americans rapidly defeated the convention Filipino forces, killing two of their best generals and pacifying many of the urban areas. During this period, the President appointed distinguished Americans to investigate conditions in the Philippines and report back on ways to improve the administration of the country. The first Commission’s report was a rejoinder to those who argued America had no place in Southeast Asia: Should our power by any fatality be withdrawn, the commission believe that the government of the Philippines would speedily lapse into anarchy, which would excuse, if it did not necessitate, the intervention of other powers and the eventual division of the islands among them. Only through American occupation, therefore, is the idea of a free, self-governing, and united Philippine commonwealth at all conceivable. And the indispensable need from the Filipino point of view of maintaining American sovereignty over the archipelago is recognized by all intelligent Filipinos and

Wednesday, November 20, 2019

The Apprentice TV Program Assignment Example | Topics and Well Written Essays - 1500 words

The Apprentice TV Program - Assignment Example The shortlisted contestants live communally in a suite at Trump Tower in New York City. The successful applicants become divided into two groups. The groups indulge in tasks set to stretch their creativity and business skills. Each group selects a project manager to lead them in the mission. The failing team leaves the competition. The remaining group then splits into two other groups. These undertake another task in the subsequent week. Elimination follows until three contestants remain. The competition ends with the selection of one participant who secures a one year contract in one of the business interests belonging to Donald Trump. The elimination is competitive with profitability heavily emphasized. Teams that make losses during their task face elimination. Elimination takes place in two phases. After failure, the project manager in charge of the team selects two to three people most likely to be the cause of poor performance. The other members get dismissed while the project m anager and the selected members face Trump in the boardroom where their fate awaits. Executives from selected companies interview the finalist duo from which Trump hires the apprentice. The apprentice TV program places its basis on apprenticeship. It is one of the oldest forms of work-based learning. The traditional system, however, lacked sufficiency causing variance in quality. A time-based apprenticeship presents the most benefits to both an organization and a prospective worker. It forms a strategic approach to learning in a field of work as opposed to possession of certain skills. Apprenticeship allows workers to absorb values and ideas of a field of trade. Placement into apprenticeship varies with company's policy. Some firms prefer young people straight out of school while others prefer new learners in the team (Cunningham et al, 2004, pp.62). Apprenticeship programs began way back in time. They incorporate what is learned in class with hand on experience.

Monday, November 18, 2019

Narrative paper about Essay Example | Topics and Well Written Essays - 500 words

Narrative paper about - Essay Example I could not wait for the heady rush of adrenalin, the wind whistling past my face, deafening me a little and making my eyes tear up, and the sheer energy that a pair of screeching wheels can bring. Most grown men love speed, but youngsters can be addicted to it. Mopeds were glamorous at the time, and in my mind's eyes I met a hundred admiring glances. In those times, renting a bike was a breeze, you did not need a license, proof of age, paperwork or insurance. If you could put money on the table, the bike could be yours for the day. I took myself to the nearest rental, and was immediately able to get my hands on what I thought a handsome blue mount. It was not able to exceed 40 miles an hour, but that did not deter me from pushing it to its limit. I was lost in my hour of glory, speeding along without a care in the world and a tune on my lips. As it happened, I should have been paying more attention. Because all of a sudden there appeared a small boy from nowhere and dashed across the road. Everything around me stopped for that moment, and went into an excruciatingly slow motion. I knew I was going to hit the kid before I actually did, but there was nothing I could do to stop it. My hands were paralyzed in the shock of the moment and did not make it to the hand brake on time.

Saturday, November 16, 2019

The Tcp Service Model Information Technology Essay

The Tcp Service Model Information Technology Essay The transport service is implemented by a transport protocol used between two transport entities. The transport protocol have to deal with error control, sequencing, and flow control. UDP is a simple protocol and it has some niche uses, such as client-server interactions and multimedia, but for the most Internet applications, reliable, sequenced delivery is needed.UDP cannot provide this, so another protocol is required. It is called TCP and is the main workhouse of the internet. THE TCP SERVICE MODEL: TCP service is obtained by both the sender and receiver creating end points, called sockets. A socket may be used for multiple connections at the same time. All TCP connections are full duplex and point to point. Full duplex means that the traffic can go in both directions at the same time. Point-to-point connection contains exactly two end points. Another feature of the TCP service is URGENT DATA. When the urgent data are received at the destination. The receiving application is interrupted so it can stop whatever it was doing and read the data stream to find the urgent data. The start of the urgent data is not marked while the end is marked so the application knows when it is over. This scheme basically provides a crude signaling. THE TCP PROTOCOL: A key feature of TCP, and one which dominates the protocol design, is that every byte on a TCP connection has its own 32-bit sequencer. When the internet began, the lines between routers were mostly 56-kbps leased lines, so a host blasting away at full speed took over 1 week to cycle through the sequence numbers. Separate 32-bit sequence numbers are used for acknowledgements and for the window mechanism. The sending and receiving TCP entities exchange data in the form of segments. What should a segment have? 1.Each segment including the TCP header, must fit in the 65,515-bytes IP payload. 2.Each network has a maximum transfer unit, or MTU, and each segment must fit in the MTU. THE TCP SEGMENT HEADER: The following is the dissection of TCP header field by field. The Source port and Destination port fields identify the local end points of the connection. The source port number is of 16 bits and indentifies the sending host TSAP(client port number). The destination port number is of 16 bits and is used to identify the receiver host TSAP(server port number). The sequence number is of 32 bits size. Since TCP supports Byte-stream, in which each byte is numbered, big space is allocated for numbering i.e.(2 power 32=4096 million).With the help of these numbers only ,one can be able to differentiate the old delayed duplicate with fresh ones. The acknowledgement number is of 32 bits size. It specifies the next byte expected. The length of TCP header is of 4 bits size and indicates the number of rows. Next comes a 6-bit field that is UNUSED. The fact that this field has survived intact for over a quarter of a century is testimony to how well thought out TCP is. Lesser protocols would have needed it to fix bugs in the original design. Six 1-bit flags: 1. URG is set to 1 if the urgent flag pointer is in use. 2. The ACK bit is set to 1 to indicate that the acknowledgement number is valid. If ACK is 0, the segment does not contain an acknowledgement so the ACKNOWLEDGEMENT NUMBER is ignored. 3. The PSH bit indicates pushed data. 4. The RST bit is used to reset a connection that has become confused due to a host crash or some other reason. It is also used to reject an invalid segment or refuse an attempt to open a connection. In general, if you get a segment with the RST bit on, you have problem on your hands. 5. The SYN bit is Synchronization flag. It is used to establish connections. The connection request has SYN=1 and ACK=0 to indicate that the piggyback acknowledgement field is not in use. The connection reply does bear an acknowledgement, so it has SYN=1 and ACK=1. 6. The FIN bit is finish flag. It is used to release a connection. It specifies that the sender has no more data to transmit. CHECKSUM: A checksum is also provided for extra reliability. It checks the header, the data and the conceptual pseudoheader. When performing this computation, the TCP Checksum field is set to zero and the data field is padded out with an additional zero byte if its length is an odd number. PSEUDOHEADER: The pseudoheader contains the 32-bit IP addresses of the source and destination machines, the protocol number for TCP (6), and the byte count for the TCP segment. Including the pseudoheader in the TCP checksum computation helps detect misbelieved packets. TCP CONNECTION MANAGEMENT MODELING: The steps required to establish and release connections can be represented in a finite state machine with the 11 states listed below. In each state, certain events are legal .when a legal event happens, some action may be taken. If some other event happens, an error is reported. State Description CLOSED No connection is active or pending LISTEN The server is waiting for an incoming call SYN, RCVD A connection request has arrived: wait for ACK SYN SENT The application has started to open a connection ESTABLISH The normal data transfer state FIN WAIT 1 The application has said it is finished FIN WAIT 2 The other side has agreed to release TIMED WAIT Wait for all packets to die off CLOSING Both sides have tried to close simultaneously CLOSING WAIT The other side has initiated a release LAST ACK Wait for all packets to die off Each connection starts in the CLOSED state. When it performs either a passive open {LISTEN}, or an active open {CONNECT}, it leaves the state. If the other side does the opposite one, a connection is established and the state becomes ESTABLISHED. Connection release can be initiated by either side. The state returns to CLOSED, after it is completed. Description of the figure: The heavy solid line is the normal path for a client. The heavy dashed line is the normal path for a server. The light lines are unusual events. Each transition is labeled by the event causing it and the action resulting from it, separated by a slash. The event can either be a user à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬initiated system call {CONNECT, LISTEN, SEND or CLOSE}, a segment arrival [SYN, FIN, ACK or RST}, or in one case, a timeout of twice the maximum packet lifetime. The action is the sending of a control segment {SYN, FIN or RST} or nothing, indicated by -.Comments is shown in parentheses. Figure: TCP connection management finite state machine. TCP TRANSMISSION POLICY: Windows Management in TCP is not directly tied to acknowledgements as it is in most data link protocols. If the sender transmits a 2048-byte segment that is correctly received, the receiver will acknowledge the segment. However, since it now has only 2048 bytes of buffer space (until the application removes some data from the buffer), it will advertise a window of 2048 starting at the next byte expected. The window management in TCP is shown in the following figure. Now the sender transmits another 2048 bytes, which are acknowledged, but the advertised window is 0. The sender must stop until the application process on the receiving host has removed some data from the buffer, at which time TCP can advertise a larger window. Senders are not required to transmit data as soon as they come in from the application. When the first 2 KB of data came in, TCP, knowing that it had a 4 KB window available, would have been completely correct in just buffering the data until another 2KB came in, to be able to transmit a segment with a 4KB payload. This freedom can be exploited to improve performance. On the following grounds the sender com still send segments upon receiving the win=0(window size) or (buffer available). When the window=0;the sender may not normally send segments, with two exceptions i)URGENT DATA MAY BE SENT To allow the user to kill the process running on the remote machine. ii)The sender may send a 1byte segment to make the receiver re-announce the next byte expected and window size. SILLY WINDOW SYNDROME: To transmit 1byte of message TCP overhead 20 bytes, IP are required.In other words just to transmit 1 byte, extra 40 Bytes are required. Whenever there is a 1 byte room available at the receiver buffer, the window update segment is sent. Since the receiver is requested for 1 byte the sender sends 1 byte which leads to the receiver buffer to be full over again. Asking for 1 Byte and sending 1 byte appears to be silly, hence the name silly window syndrome. To avoid Silly window syndrome, Nagle suggested NAGLES APPROACH: When the data comes to the sender 1 byte at a time, just send the first Byte and buffer, all the rest until the outstanding Byte is acknowledged. Then send all the buffered characters in one 1 TCP segment and start buffering again until they are all acknowledged. Nagles approach cannot be implemented for all applications. In particular, when as X-windows application is being run over the internet, mouse movements have to be sent to the remote computer. Gathering them and sending them in bursts makes the mouse cursor more erratically, which makes users dissatisfied. CLARKS ALGORITHM: This approach is to prevent the receiver from sending a window update for 1byte instead, it is forced to wait until it has a decent amount of space available and then advertise that. Nagles algorithm is with respect to sender and Clarkà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s algorithm with respect to solve Silly window syndrome. The overall goal is for the sender not to send small segments and the receiver not to ask for them. TCP CONGESTION CONTROL: When the load offered to any network is more than it can handle, congestion builds up. The Internet is no exception. Although network layer also tries to manage congestion, most of the heavy lifting is done by TCP because the real solution to congestion is to slow down the data rate. In theory, congestion can be dealt with by employing a principle borrowed from physics: the law of conservation of packets. The idea is to refrain from injecting a new packet into the network until an old one leaves.TCP attempts to achieve this goal by dynamically manipulating the window size. The first step in managing congestion is detecting it. A timeout caused by a lost packet could have been caused by either (1) noise on a transmission line or (2) packet discard at a congested router. Nowadays, packet loss due to transmission errors is relatively rare because most long-haul trunks are fiber. All the Internet TCP algorithms assume that timeouts are caused by congestion and monitor timeouts for signs of trouble the way miners watch their canaries. TCP TIMER MANAGEMENT: TCP uses multiple timers to do its work. The most important of these is the retransmission timer. When a segment is sent, a retransmission timer is started. If the segment is acknowledged before the timer expires, the timer is stopped. If, on the other hand, the timer goes off before the acknowledgement comes in, and the segment is retransmitted. A second timer is the persistence timer. It is designed to prevent the following deadlock. The receiver sends an acknowledgement with a window size of 0, telling the sender to wait.Later, the receiver updates the window, but the packet with the update is lost. Now both the sender and the receiver are waiting for each other to do something. When the persistence timer goes off, the sender transmits a probe to the receiver. The response to the probe gives the window size. If it is still zero, the persistence timer is set again and the cycle repeats. If it is nonzero, data can now be sent. A third timer that some implementations use is the keep alive timer. When a connection has been idle for a long time, the keep alive timer may go off to cause one side to check whether the other side is still here. If it fails to respond, the connection is terminated. This feature is controversial because it adds overhead and may terminate an otherwise healthy connection due to transient network partition. The last timer used on each TCP connection is the one used in the TIMED WAIT state while closing. It runs for twice the maximum packet lifetime to make sure that when a connection is closed; all packets created by it have died off.

Wednesday, November 13, 2019

Microsoft: Trust or Antitrust? :: Argumentative Persuasive Argument

Microsoft: Trust or Antitrust? "Oh, come on, just trust me." Those six simple words have been the pleadings of many when, for whatever reason, they find themselves in a situation, where others don't give their actions or claims any credibility. They have nothing left to fall upon, except the hope that they can be thought of as trustworthy, and that others are willing to give them an opportunity. This is the situation Microsoft has found itself in, and in response, they have launched "Trustworthy Computing," a campaign to help gain credibility and respect in the marketplace. Why, you might ask, is a company that controls 90 percent of its market worried about public perception? Why would such a major influence in the computer industry shut down production of new software, in an attempt to correct countless errors? Why did Bill Gates hire Wieden and Kennedy, the advertising agency that gave us such things as the Nike Swoosh, to change Microsoft's public image? It is because the people at Microsoft have realized that consumers use their software not because they want to, but because they have no other choice. As I sit here writing my paper in Microsoft Word, listening to a CD play in Windows Media Player, surfing the internet for sources in Microsoft Internet Explorer, all parts of my Windows XP setup, it might seem that Microsoft has itself entrenched in my life and that of the computer industry. Yet, the powers that be at Microsoft aren't just sitting around watching their MS Office licensing fees come in, they've sounded the alarm. "There must have been a moment of crisis, either they were feeling insecure, or Microsoft was putting pressure on them," Erik Adigard, a former consultant for Microsoft, suggests. The root of the problem may be, as Sara Basse observed, "Programmers and system designers are often overconfident too, and do not give enough thought to the potential consequences of errors or poor design." Those oversights are the reason that Microsoft shut down most of its production of programs, and instead shifted resources to correct bugs and errors in pre-existing programs. One might then, wonder why Microsoft has sold programs with errors, and instead of taking the time to correct the mistakes of past versions, they have moved on to completely new concepts. It appears that Microsoft has gotten the message from its consumers. They have begun unprecedented disclosures of their codes to their competitors, so that they are better able to integrate their programs into Windows.