Search Details

Word: computerizes (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

The group decided that a Web site collating various aid opportunities would be the most effective response to the crisis in Haiti, according to Hysen, a computer science concentrator who designed the interface of the Web site.

Author: By Janie M. Tankard, CRIMSON STAFF WRITER | Title: UC To Launch Haiti Website | 2/3/2010 | See Source »

Dean of the Faculty of Arts and Sciences Michael D. Smith, a computer scientist with years of teaching under his belt, assumed a professorial role at yesterday’s Faculty meeting and used a popular lecture tool—a PowerPoint presentation.

Author: By Noah S. Rayman and Elyssa A. L. Spitzer, CRIMSON STAFF WRITERS | Title: FAS Dean Takes a Professorial Role at Faculty Meeting, Armed With Slideshow | 2/3/2010 | See Source »

But Elmendorf acknowledges that he has benefited enormously from the work Orszag did before he left for the Obama White House. Orszag expanded the CBO staff, particularly the number who specialize in health care, and produced volumes of research on the subject. Nonetheless, Elmendorf says, the workload this year has...

Author: /time Magazine | Title: Douglas Elmendorf: The Numbers Man Whom D.C. Trusts — and Loathes | 2/3/2010 | See Source »

The Air Force wants the ability to burrow into any computer system anywhere in the world "completely undetected." It wants to slip computer code into a potential foe's computer and let it sit there for years, "maintaining a 'low and slow' gathering paradigm" to thwart detection. Clandestinely exploring such...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

It's the instantaneous nature of cyberattacks that has rendered defenses against them obsolete. Once an enemy finds a chink in U.S. cyberarmor and opts to exploit it, it will be too late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

Previous | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | Next