Saturday, 15 September 2018

Aji Amarillo and other cooking adventures

I have recently been revisiting some of my recipe books to improve the variety and quality of my cooking. I have more time to cook now and James and Alasdair love a healthy, home-cooked meal, all ready for them when they come in from work. So I have been making large quantities of different kinds of stews and casseroles, and freezing the extra. The freezer in the garage is filling up satisfyingly with tasty meals.
This week I have been using my Avoca cookbook, which I purchased on my first visit years ago to that amazing cafรฉ for proper foodies in Dublin. It has some really hearty stew recipes including peppered beef (which has a distinctly sweet and sour taste) and beef in orange sauce (rather on the sweet side, but tasty). However James and Alasdair’s favourite is the more traditional beef in Guinness which has very dark, rich gravy. Also this week Alasdair mentioned a meal which he ate a lot when he was in Peru, so I decided to make it for him. It’s called Lomo Saltado and is a stir fried dish containing (among many other things) aji amarillo, which is yellow Peruvian pepper. The recipe sternly states that if you can’t get aji amarillo then there is no point in substituting it with anything else, so I immediately set out on a quest to find it which took me all around the west end of Glasgow. I proudly served the Lomo Saltado on Thursday evening and anxiously asked Ally whether it measured up. “Probably, I can’t remember exactly what it tasted like” he replied insouciantly.
It’s not all about beef by the way - I have also frozen a quantity of marinated chicken kebabs and our favourite Jamie Oliver fish pie. I am finally becoming a domestic goddess! 

2 comments:

  1. ๐ŸŽ†THE HACK GEEKS๐ŸŽ†
    Have you ever wondered if it's possible to hack things the way hackers do it in the movies.๐Ÿค”๐Ÿค”
    Yeah its possible!!!๐Ÿ˜๐Ÿ˜๐Ÿ˜
    "AS LONG AS IT'S TECHNOLOGY, IT CAN BE HACKED"
    Hacking can easily be done by planting a computer virus or spyware(depending on what the hacker intend to do) in the targeted device.๐Ÿค๐Ÿค
    We at THE HACK GEEKS give you the best hacking service there ever is.๐Ÿ‘Œ๐Ÿ‘Œ
    We understand the Issues of scammers all over the internet and that's why we give you a solid prove of our services.
    We have got the top hackers in hackerone.com that are always ready to hack for you anytime ,anywhere, any device, organisation, federal agencies, university, college you just think of it.
    We can help:
    *To Hack, Clone or Track a Phone?๐Ÿ“ฑ๐Ÿ“ฒ
    Eg: Cloning of phones
    Spying on kids, wife or husband.
    Tracking of user location & daily routine.
    *To Sniff, Erase or Change a file in a Company, Organisation or in a Federal agency?๐Ÿ“–๐Ÿ“ƒ
    Eg: Changing of grades in a university.
    Changing of identity.
    Deleting of files such as criminal records and evidence.
    Changing of files and evidence in federal facilities.
    Stealing of files and document from companies and organizations.
    *To retrieve lost BitCoin๐Ÿ’ฐ๐Ÿ’ฐ
    *Mining of BitCoin๐Ÿ’ฐ๐Ÿ’ฐ
    *To hack an Email or any Social Media account?๐Ÿ’ž
    *To Transfer funds without been detected?๐Ÿ’ด๐Ÿ’ต๐Ÿ’ท
    *To increase your credit score?๐Ÿ”๐Ÿ”
    *To Hack Credit/Debit card?๐Ÿ’ณ๐Ÿ’ณ
    *Obtaining black Credit/Debit card.๐Ÿ’ณ๐Ÿ’ณ
    ALL THESE ARE WHAT WE CAN DO FOR YOU.
    We are descrete and won't expose our service to you to anyone.
    Contact:
    thehackgeeks@gmail.com
    We look forward to hacking for you.

    ReplyDelete
  2. Never met any hacker as discreet and fast like this Albania Hacker. He’s called TRUCE and he has helped me in multiple ways first was when my ex wife cheated on me and now he’s helping me paying my credit cards debts. I must say he’s the best at what he do and I recommend him to the world. Email; AlbaniaspyhackerAtGmailDotCom, you can be sure to thank me later.

    ReplyDelete