HOW WE GOT HERE Combative; They Suggested That Business and Management Skills Trump Economics

Total Page:16

File Type:pdf, Size:1020Kb

HOW WE GOT HERE Combative; They Suggested That Business and Management Skills Trump Economics Pr epar ed Exclusively for You ALSO BY ANDY KESSLER Wall Street Meat: Jack Grubman, Frank Quattrone, Mary Meeker, Henry Blodget and me Running Money: Hedge Fund Honchos, Monster Markets and My Hunt for the Big Score Pr epar ed Exclusively for You HHooww WWee GGoott HHeerree A Silicon Valley and Wall Street Primer . A History of Technology And Markets Andy Kessler ESCAPE VELOCITY PRESS Pr epar ed Exclusively for You Copyright © 2004 by Andy Kessler All rights reserved, including the right of reproduction in whole or in part in any form. Printed in the United States of America Author photo by Claudia Marcelloni Adobe Acrobat® Edition produced and distributed courtesy of The Pragmatic Programmers, LLC. Please visit www.PragmaticProgrammer.com for more information on our Pragmatic Bookshelf titles. Escape Velocity Press www.escape-velocity-press.com Printing 10 9 8 7 6 5 4 3 2 Printed edition published by HarperBusiness available from Amazon.com and fine bookstores everywhere. Library of Congress Control Number: Cataloging-in-Publication data is available. ISBN 0-9727832-2-9 Pr epar ed Exclusively for You For my Dad, who sparked my interest in technology Pr epar ed Exclusively for You Table of Contents Foreword 5 Logic and Memory 7 Part 1: The Industrial Revolution 13 Cannons to Steam 15 Textiles 29 Positively Electric 37 Transportation Elasticity, Sea and Rail 43 Part 2: Early Capital Markets 57 Funding British Trade 59 Capital Markets and Bubbles 65 Fool’s Gold 73 Part 3: Components Needed for Computing 87 Communications 89 Power Generation 95 Part 4: Digital Computers 99 Ballistics, Codes and Bombs 101 Transistors and Integrated Circuits Provide Scale 117 Software and Networks 131 GPS 153 Part 5: Modern Capital Markets 159 Modern Gold 161 The Business of Wall Street 165 Insurance 177 The Modern Stock Market 187 Bibliography 203 About the Author 205 Pr epar ed Exclusively for You Foreword Talk about twisty-turny paths. I started life as an electrical engineer and ended up running a billion dollar hedge fund on Wall Street. Like a pinball bouncing off of bumpers, I’ve been a chip designer, programmer, Wall Street analyst, investment banker, magazine columnist, venture capitalist, op-ed writer, hedge fund manager and even a book author. My mother thinks I can’t hold a job. Friends suggest I know very little about everything and a lot about nothing. That’s hard to argue with. But throughout it all, I learned over time to live by five simple creeds: 1. Lower prices drive wealth 2. Intelligence moves out to the edge of the network 3. Horizontal beats vertical 4. Capital sloshes around seeking its highest return 5. The military drives commerce and vice versa I’m not entirely sure how I came up with this list, but it has worked. I’ve invested by it and have read and understood the news by it. It has helped explain the unexplainable and has helped me peer into the fog of the future. I sat down with two different groups of people and tried to explain why these creeds are so valuable. The first group, engineering students who lived by math and science, were confused over how technology leads to business, even though advancing technology has driven and continues to drive most everything. The next group, business school students, was Pr epar ed Exclusively for You 6 HOW WE GOT HERE combative; they suggested that business and management skills trump economics. Maybe so. So both groups were equally skeptical, and barraged me with questions like: “How do you know they work?” “How come we’ve never heard of these things?” “Can you prove it?” “What if you’re wrong?” “You’re just making this up, right?” To explain in 20 minutes what took 20 years to seep into my sinews, I’d have to walk them through the history of the computer industry, from the transition from telegraphs to gigabit fiber optic networks and show how we moved from the industrial revolution to an intellectual property economy. And that’s the easy stuff. Add money, and a diatribe turns into a dissertation. I’d have to explain how stock markets came into being, and insurance and the follies of gold standards. And then somewhere in this tale would have to be the link between military doctrine and commerce. I needed to answer a few too many burning questions. What is the history of the computer industry? Of the communications industry? Of the Internet? Why does the U.S. dominate these businesses? Didn’t the British rule the last big cycle? What happened to them? Why do we have money? What is it backed by? What was the gold standard all about? Do we still have a gold standard? How did the stock market come into being and what is it for? Aren’t banks good enough? Who wins – money or ideas? Does the military get its technology from industry or the other way around? Did anything besides Velcro and Tang come out of the Space Program? Why does the U.S. have any industrial businesses left? There are too many questions to answer. So instead, I wrote this primer. Enjoy. Send me feedback, ideas and suggestions at [email protected] with HWGH in the subject. Pr epar ed Exclusively for You Logic and Memory I hate to admit it, but it was taxes that got it all started. In 1642, 18-year-old Blaise Pascal, the son of a French tax collector, tired of waiting for his dad to come play a game of “le catch”. Blaise’s dad was what is known as a tax farmer, sort of a 17th century version of a loan shark, threat of broken bones and all. Tax farmers advanced tax money to the government and then had a license to collect taxes, hopefully “harvesting” more than they advanced. Elder Pascal was constantly busy calculating and tabulating his potential tax haul. To help him out, Blaise envisioned a mechanical device with wheels and cogs and gears and numeric dials that could sum up numbers to eight digits long. That’s 10 million francs. Dad must have been a top tax guy. Clockmakers were the high-tech folks of the era so Pascal built a model for his device by modifying gears and dials that he probably scrounged from clocks. The Pascaline fit in a brass box and was an amazing 17th century device. The computer industry was on its way, albeit at the pace of a woozy escargot. In 1649, King Louis XIV granted Pascal a patent for his odd device but it failed to affect much change over the next 45 years. Pascal, by the way, would contribute more than a mechanical calculator to this tale. He proved that vacuums exist; that one could measure pressure by inverting a tube of mercury; and as a vicious gambler, tried to figure how to beat the house and ended up inventing probability theory. Pr epar ed Exclusively for You 8 HOW WE GOT HERE In 1694, a German, Gottfried Wilhelm von Leibniz, created a box similar to Pascal’s but his could actually multiply. Leibniz used something called a stepped drum, a cylinder with a number of cogs carved into it, and gears that would engage a different number of cogs depending on their position. It was incredibly complex, which is why very few were ever built. Inside a Pascaline or a Leibniz box were two simple elements needed to create the modern computer: Logic and Memory. The memory depended on the position of the mechanical dials. If the dial said 5, unless someone moved it, it would stay a 5. That’s pretty simple memory. Pascal’s complex gears produced the arithmetic logic. If you add a 7 to the 5, the first dial was designed to show a 2 and then would kick the second dial ever so slightly to have it incrementally carry a 1 to the 10’s column. Logic. All this was rather slow, figure an addition every second if you were lucky. Plus, you had to write down the results every once in a while. But it beat ink and paper, in both speed and accuracy. So Pascal got the computer business started, but with a whimper, not a bang. Logic and memory. That’s it. My kingdom for Logic and Memory. So simple, yet so hard to implement. * * * Let’s fast forward a bit. In 1880, 238 years after the Pascaline, the constitutionally-mandated U.S. census took place as usual. The results were ready in 1887. Because of population growth, many feared the results of the 1890 census wouldn’t be ready until well after the 1900 census! Big problem. But the solution was simple. A guy named Herman Hollerith came along and invented punched cards for the census, based on punched cards that a countryman of Pascal’s named Joseph Jacquard had invented in order to program automatic looms. But Hollerith invented three devices--a puncher, a sorter and a tabulator that would read the census punched cards and keep a running count. The memory was the holes in the punched cards, and the logic was a set of mechanical gears and wheels that would keep a running count. It was complex, but it worked. He built 50 machines, each capable of tabulating 7000 records per day, roughly a 10 times improvement over hand tabulation. The 1890 census quickly counted 62,979,766 U.S. residents. Pr epar ed Exclusively for You LOGIC AND MEMORY 9 Hollerith formed the Tabulating Machine Company in 1896.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Cryptography in a Quantum World
    Cryptography in a Quantum World ⋆ Gilles Brassard 1,2 1 D´epartement d’informatique et de recherche op´erationnelle Universit´ede Montr´eal, C.P. 6128, Succursale Centre-ville Montr´eal (QC), H3C 3J7 Canada 2 Canadian Institute for Advanced Research [email protected] http://www.iro.umontreal.ca/~brassard/en/ Abstract. Although practised as an art and science for ages, cryptog- raphy had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon’s approach was rooted is his own information theory, itself inspired by the classical physics of Newton and Einstein. But our world is ruled by the laws of quantum mechanics. When quantum-mechanical phenomena are taken into account, new vistas open up both for codemakers and codebreakers. Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out! Keywords: Cryptography, Quantum mechanics, Quantum computa- tion, Post-quantum cryptography, Quantum communication, Quantum key distribution, Edgar Allan Poe 1 Introduction For thousands of years, cryptography has been an ongoing battle between code- makers and codebreakers [1,2], who are more formally called cryptographers and cryptanalysts. Naturally, good and evil are subjective terms to designate code- makers and codebreakers. As a passionate advocate for the right to privacy, my allegiance is clearly on the side of codemakers. I admit that I laughed hyster- ically when I saw the Zona Vigilada warning that awaits visitors of the Pla¸ca de George Orwell near City Hall in Barcelona [3]. Nevertheless, I recognize that codebreakers at Bletchley Park during the Second World War were definitely on the side of good.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • The Great Telecom Meltdown for a Listing of Recent Titles in the Artech House Telecommunications Library, Turn to the Back of This Book
    The Great Telecom Meltdown For a listing of recent titles in the Artech House Telecommunications Library, turn to the back of this book. The Great Telecom Meltdown Fred R. Goldstein a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Goldstein, Fred R. The great telecom meltdown.—(Artech House telecommunications Library) 1. Telecommunication—History 2. Telecommunciation—Technological innovations— History 3. Telecommunication—Finance—History I. Title 384’.09 ISBN 1-58053-939-4 Cover design by Leslie Genser © 2005 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-939-4 10987654321 Contents ix Hybrid Fiber-Coax (HFC) Gave Cable Providers an Advantage on “Triple Play” 122 RBOCs Took the Threat Seriously 123 Hybrid Fiber-Coax Is Developed 123 Cable Modems
    [Show full text]
  • Early Forms of Long-Distance Communication
    EARLY FORMS OF LONG-DISTANCE COMMUNICATION In this material, you will learn about Telegraphy, Telephone and GSM architecture Before the development of the electric telegraph in the 19th century revolutionized how information was transmitted across long distances, ancient civilizations such as those in China, Egypt and Greece used drumbeats or smoke signals to exchange information between far-flung points. However, such methods were limited by the weather and the need for an uninterrupted line of sight between receptor points. These limitations also lessened the effectiveness of the semaphore, a modern precursor to the electric telegraph. Developed in the early 1790s, the semaphore consisted of a series of hilltop stations that each had large movable arms to signal letters and numbers and two telescopes with which to see the other stations. Like ancient smoke signals, the semaphore was susceptible to weather and other factors that hindered visibility. A different method of transmitting information was needed to make regular and reliable long-distance communication workable. Did You Know? SOS, the internationally recognized distress signal, does not stand for any particular words. Instead, the letters were chosen because they are easy to transmit in Morse code: "S" is three dots, and "O" is three dashes. The Electric Telegraph In the early 19th century, two developments in the field of electricity opened the door to the production of the electric telegraph. First, in 1800, the Italian physicist Alessandro Volta (1745-1827) invented the battery, which reliably stored an electric current and allowed the current to be used in a controlled environment. Second, in 1820, the Danish physicist Hans Christian Oersted (1777-1851) demonstrated the connection between electricity and magnetism by deflecting a magnetic needle with an electric current.
    [Show full text]
  • Enron and Co
    Enron and Co. - the fiasco of the new USA-style economy Eric Toussaint (*) Twenty years of deregulation and market liberalization on a planetary scale have eliminated all the safety barriers that might have prevented the cascade effect of crises of the Enron type. All capitalist companies of the Triad and emerging markets have evolved, some with their own variations, on the same lines as in the USA. The planet's private banking and financial institutions (as well as insurance companies) are in a bad way, having adopted ever riskier practices. The big industrial groups have all undergone a high degree of financialization and they, too, are very vulnerable. The succession of scandals shows just how vacuous are the declarations of the US leaders and their admirers in the four corners of the globe (see Ahold, Parmalat,…). A mechanism equivalent to several time -bombs is under way on the scale of all the economies on the planet. To name just a few of those bombs: over indebtedness of companies and households, the derivatives market (which in the words of the billionaire Warren Buffet, are « financial weapons of mass destruction »), the bubble of property speculation (most explosive in the USA and the UK), the crisis of insurance companies and that of pension funds. It is time to defuse these bombs and think of another way of doing things, in the USA and elsewhere. Of course, it is not enough to defuse the bombs and dream of another possible world. We have to grapple with the roots of the problems by redistributing wealth on the basis of social justice.
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • When Exactly Is It Time to Make Your Personal Exit?
    When exactly is it time to make your personal exit? Consider all of the players who have over stood their hands in the last two years. And I am not talking about you, or me, or our personal stock holdings here. Not all that long ago, Ken Lay was the toast of Houston; a regular at the White House, the Texas if not the California Governor’s Mansion, and all the best charity events in town. Consider Enron even bought the naming rights for the local arena. Now Lay would be most welcome all over town on a barbeque spit, anybody’s barbeque spit, rotating around with his tail feathers just above the coals. How about Bernie Ebbers? What must the new trophy wife be thinking? Whatever lifestyle she thought she was signing on to enjoy a couple of years ago surely didn’t include the prospect of personal bankruptcy and a three-bedroom ranch house with a carport for the used Chevy. Let’s just watch and see how long true love lasts in the face of what lies ahead for Mrs. Ebbers. What will the new little wifey really think as the “wealthy tycoon” is exposed for having been right up to his elbows in cooking the revenues? Will she really hang out when he trades in his vertical pinstripes for the government -issue horizontal ones? Perhaps you prefer Sam Waksal? Recently Sam decided to go the full 100 yards dash naked. He insisted in Court in August that Imclone will ultimately help a lot of people beat cancer, that he would not plea bargain but rather prove his innocence, and all those apparent efforts to sell his stock were just a big misunderstanding.
    [Show full text]
  • A Concise History of Fort Monmouth, New Jersey and the U.S
    A CONCISE HISTORY OF FORT MONMOUTH, NEW JERSEY AND THE U.S. ARMY CECOM LIFE CYCLE MANAGEMENT COMMAND Prepared by the Staff of the CECOM LCMC Historical Office U.S. Army CECOM Life Cycle Management Command Fort Monmouth, New Jersey Fall 2009 Design and Layout by CTSC Visual Information Services, Myer Center Fort Monmouth, New Jersey Visit our Website: www.monmouth.army.mil/historian/ When asked to explain a loyalty that time had not been able to dim, one of the Camp Vail veterans said shyly, "The place sort of gets into your blood, especially when you have seen it grow from nothing into all this. It keeps growing and growing, and you want to be part of its growing pains." Many of the local communities have become very attached to Fort Monmouth because of the friendship instilled...not for just a war period but for as long as...Fort Monmouth...will inhabit Monmouth County. - From “A Brief History of the Beginnings of the Fort Monmouth Radio Laboratories,” Rebecca Klang, 1942 FOREWORD The name “Monmouth” has been synonymous with the defense of freedom since our country’s inception. Scientists, engineers, program managers, and logisticians here have delivered technological breakthroughs and advancements to our Soldiers, Sailors, Airmen, Marines, and Coast Guardsmen for almost a century. These innovations have included the development of FM radio and radar, bouncing signals off the moon to prove the feasibility of extraterrestrial radio communication, the use of homing pigeons through the late-1950s, frequency hopping tactical radios, and today’s networking capabilities supporting our troops in Overseas Contingency Operations.
    [Show full text]
  • The Ieee North Jersey Section Newsletter
    1 PUBLICATION OF THE NORTH JERSEY SECTION OF THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS THE IEEE NORTH JERSEY SECTION NEWSLETTER Vol. 60, No. 2 FEBRUARY 2013 Calendar of Events • February 6, 10:30 AM to 4:30 PM: FCC Workshop on Network Resiliency Read More… Location: Brooklyn Law School, 22nd floor, Forchelli Center, Feil Hall, 205 State Street, Brooklyn, NY 11201, Getting to Brooklyn Law School NY Contact: Prof. Henning Schulzrinne, CTO, FCC and/or Adriaan J. van Wijngaarden, ([email protected]) • February 6, 5:00 PM to 7:00 PM: AP/MTT - The Evolution of Low Noise Devices and Amplifiers - Dr. Edward Niehenke of Niehenke Consulting Read More… Location: NJIT - ECE 202, 161 Warren Street, Newark, NJ 07102 Getting to NJIT Contact: Dr. Ajay Kumar Poddar (201)-560-3806, ([email protected]), Prof. Edip Niver (973)596-3542, ([email protected]) • February 6, 6:00 PM to 8:45 PM: IEEE North Jersey Section EXCOM meeting - Clifton, NJ Read More… Location: Clifton Public Library - Allwood Branch, Activity Room, 44 Lyall Road, Clifton, NJ 07012, Getting to Clifton Library Contact: Russell Pepe ([email protected]), Chris Peckham [email protected] and/or Adriaan J. van Wijngaarden, ([email protected]) • February 8, 9:00 AM to 2:00 PM: The PES and IAS Chapters: Batteries - Andrew Sagl of Megger Read More… Location: PSE&G - Hadley Road Facility, Auditorium, 4000 Hadley Road, South Plainfield, NJ 07080 Getting to PSE&G Contact: Ronald W. Quade, P.E ([email protected]), Ken Oexle ([email protected]) • February 12, 6:00 PM to 7:30 PM IEEE Control System Society - Feedback, Control and Dynamic Networks – Prof.
    [Show full text]
  • Ethics and Investment Management: True Reform Marianne M
    Ethics and Investment Management: True Reform Marianne M. Jennings These are introspective times for those involved in the financial markets. Some feel a sense of renewal via reform. Others, who have come to the realization that Frank Quattrone, late Silicon Valley guru of Credit Suisse First Boston, will do about one month in prison for each word that he wrote in a hasty e-mail to his employees, feel fear, particularly of New York Attorney General Eliot Spitzer and e-mail.1 Others wonder if we really “get it.” That is, after all that we have In the era of Enron, witnessed, been involved with, and, sadly, in some cases, sanctioned, are we really renewed and reformed, or have we simply taken our WorldCom, and lashes and moved on to find other circuitous ways to do what we were doing before? the rest, the lapses The answer to the question of true reform requires exploration of three areas: (1) the crises that led to the current market and regulatory reforms, (2) the reforms themselves, and (3) what will were great, the bring about true reform. conflicts many, Crises That Led to Reforms Taking stock of the types of conduct that led to indictments, reforms, and the cost, in settlements, and fines yields two groups of observations: (1) The practices and conduct of analysts that were sanctioned and reformed terms of investor were not close calls. (2) We were engaged in repetitive behavior; we’ve been down this road before. trust, nearly Not Close Calls. One of the common defenses offered by those accused of ethical or legal lapses is, “It’s a gray area,” “The law is unspeakable.
    [Show full text]