Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq

Buy
The war in Iraq is not only controversial, it's also astronomically expensive. Now Rob Simpson answers the question many concerned Americans have been asking: Wasn't there some other way the government could have spent one trillion of our tax dollars?

What We Could Have Done with the Money presents 50 thought-provoking spending alternatives. With a trillion dollars, we could . . .

  • Fix Social Security right now: Stop worrying. Stop debating. It's done. Over. Fixed.
  • End homelessness in America: House 15 million homeless families, get a million kids out of foster care, and have change to spare!
  • Give everyone in the world satellite TV: Can we have the revolution later? I'm watching CSI right now.
  • Pay everyone in Iraq to be nice to each other: Hey! If someone tripled your salary for the next 20 years, wouldn't you behave?
  • Go Green: Give 100 million car buyers a $10,000 subsidy on their hybrid.
  • Or gold . . . : Pave every highway in America with gold leaf.
  • Play ball! : Fly everyone in Iraq to America, put them up in a nice hotel for three days with all the extras, take them to a baseball game and fly them home . . . and have a lot leftover.
  • Cure cancer: Double research spending for as long as it takes.

. . . not to mention paying all credit card debt, buying everyone in the world an iPod, building 75 million solar-powered homes, and 39 other revealing pipe dreams.

Shocking, thought-provoking, and incredibly entertaining, Simpson takes a hard look at the government's top priorities--both what they are and what they should be.

About the Author

Rob Simpson
has been a music critic, a radio announcer, and a voiceover actor, but most of his working life has been spent as a political junkie, a smart-ass, and a creative director in the advertising industry. Mr. Simpson currently makes his home in Knoxville, Tennessee. He's been in love with his wife for thirty years.
(HTML tags aren't allowed.)

Computer Telephony Integration, Second Edition
Computer Telephony Integration, Second Edition
Since the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies...
Observing the Sun with Coronado Telescopes (Patrick Moore's Practical Astronomy Series)
Observing the Sun with Coronado Telescopes (Patrick Moore's Practical Astronomy Series)
The Sun provides amateur astronomers with one of the few opportunities for daytime astronomy.

In order to see the major features of our nearest star, special telescopes that have a very narrow visible bandwidth are essential. The bandwidth has to be as narrow as 1 × 10-10 m (1 Angstrom) and centred on the absorption line...

Strategies and Tools for Corporate Blogging
Strategies and Tools for Corporate Blogging
While this book describes some of the benefits of corporate blogging, the book’s focus is to give the reader the tools and strategies to develop expertise in how to build a successful corporate blog. This book is not about why blogging is necessary for a company per se; rather, the focus is on enabling the reader to conduct effective...

The Distance Education Evolution: Issues and Case Studies
The Distance Education Evolution: Issues and Case Studies
The Distance Education Evolution: Case Studies addresses issues regarding the development and design of online courses, and the implementation and evaluation of an online learning program. Several chapters include design strategies for online courses that range from the specific to the universal. Many authors address pedagogical issues from both a...
J2EE Best Practices: Java Design Patterns, Automation, and Performance
J2EE Best Practices: Java Design Patterns, Automation, and Performance
Learn how to apply robust application design to your J2EE projects

There are a number of best practices you need to consider to build highly effective J2EE components and integrate them into applications. These practices include evaluating and selecting the right set of software components and services to handle the job....

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy