Word: arounders
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...ultimately reveals more contradictions than solutions to the mystery of their behavior. In the hands of a writer less observant of human nature, the enigmatic behavior of the supporting characters would rob the novel of its internal consistency. But Tassie’s observations of the people around her are often skewed by her misunderstandings of her new city and her employers, and the way their behavior confuses her is crucial to the novel’s concern...
...Karl Rove. Her dialogue is laconic, but her inner monologue is full of surprisingly acute observations. Moore gives Tassie an interest in the unsavory and a preoccupation with Sufism, extending Tassie’s savant-like eccentricities to ridiculous levels. Just when her confusion at the hypocrisies of people around her begins to cross the line between clever and insufferable, she’ll use her roommate’s vibrator to stir a glass of chocolate milk, or write a college paper about “The Plausible Sufic Geology of Stonehenge.” Tassie is at once...
...said that he was prompted to think about the issue of how barefoot runners were able to run long distance for millions of years without the aid of shoes after he gave a speech before the start of the Boston Marathon. A man who was wearing only duct tape around his socks had insisted on asking Lieberman difficult questions about running...
...stage before warfare," cyberwarfare expert James Lewis told a Washington audience on Jan. 27. "We're in the stages of people poking around." Lewis, with the Center for Strategic and International Studies (CSIS), said cyberdefenses are inadequate. "Unless we find a way to use offensive capabilities as part of a deterrence or strategic defense," he said, "we will be unable to defeat these opponents." CSIS also released last week a survey of cybersecurity experts from around the world who "rank the U.S. as the country 'of greatest concern' in the context of foreign cyberattacks, just ahead of China...
...instantaneous nature of cyberattacks that has rendered defenses against them obsolete. Once an enemy finds a chink in U.S. cyberarmor and opts to exploit it, it will be too late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around the world). Far better to be on the prowl for cybertrouble and - with a few keystrokes or by activating secret codes long ago secreted in a prospective foe's computer system - thwart any attack. Cyberdefense "never works" by itself, says the senior Pentagon officer. "There has to be an element of offense...