Chapter 5: Black-box operations