Search Details

Word: connection (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...ideas, share patterns and post pictures of your best work. And it's made possible in part by innovative hardware: a new generation of easy-to-use sewing machines equipped with LCD screens that allow you to view and manipulate stitches even before they hit the fabric. Some even connect with your personal computer--no home-ec experience required...

Author: /time Magazine | Title: Pretty Crafty | 3/1/2005 | See Source »

...their marginalization using similar lyrics, similar music, and similar dress.” Hip hop is the only set of cultural sensibilities that resonates with people that are marginalized globally. Moreso than any other form of culture in the 21st century, it allows the privileged to understand, appreciate, and connect with the struggles of the oppression...

Author: By Kwame Owusu-kesse, | Title: Black to the Future: Hip Hop and the New Negro | 2/28/2005 | See Source »

...Internet in 1993, he had a narcissistic reaction. "I thought, Someone has invented something just for me," recalls Dar, founder of Action Without Borders. The selfishness, however, was in service only to the most charitable of pursuits. The Israeli-born Dar, 44, had been looking for a way to connect nonprofit organizations from around the globe to volunteers eager to donate their time. "I was obsessed with the notion that you have a world rife with problems," says Dar, "but you also have ideas and resources and people with free time and good intentions, and there...

Author: /time Magazine | Title: Philanthropy: A Net for Volunteers: THE INTERNET IDEALIST | 2/27/2005 | See Source »

...University's Center for Internet and Society, says the ChoicePoint scam and T-Mobile hack "show that companies don't take seriously the need to keep our information safe." The solution? Don't store any truly sensitive information on a wireless device and, when possible, disable wireless features that connect users to the Net, such as Bluetooth, which can serve as a back door to hackers. Celebs aren't the only ones at risk. Before he was caught, Jacobsen was reportedly amusing himself by reading the e-mail of another Sidekick customer: a Secret Service agent assigned to hunt down...

Author: /time Magazine | Title: A New Kind of Hack Attack | 2/27/2005 | See Source »

...District Court of Massachusetts, charging that Zuckerberg used their source code, their business model, and their original ideas to build a competing site. The cases of both sides hinge on a yet-to-be-released analysis of the similarities between the original codes of the Connect-U site and TheFacebook...

Author: By Kevin J. Feeney, CRIMSON STAFF WRITER | Title: Business, Casual. | 2/24/2005 | See Source »

Previous | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | Next