Word: dos
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...America's Commanders in Chief since her first assignment covering JFK's Administration. In her latest book, Listen Up, Mr. President, Thomas offers a how-to guide for future occupants of the Oval Office using a combination of firsthand accounts and historical anecdotes. TIME spoke with Thomas about the dos and don'ts of the American presidency, why sassiness pays off and what she keeps in her prayers (hint: it's black and white...
Being able to walk into Louie’s and get yourself a case of Dos Equis without resorting to groveling at Mr. Chen’s feet? Been there, done that. Harvard-Yale? Hard to believe, but winning gets old after the 804913th time. Primal scream? Yawn...
...himself as the industry's creator. The founder of Prison Coach, Oberfest - whose background includes a 15-month stint in a New York prison on racketeering charges - has been preparing wealthy convicts for their incarceration since 2002. He talked to TIME about the business of prison prep and the dos and don'ts of inmate etiquette...
...Zimbabweans and the world to rethink how they deal with Mugabe and other African Big Men. Demonizing them may be principled and cathartic, Tsvangirai believes, but it is ineffective. Criticism has done nothing to dislodge Muammar Gaddafi in Libya (in his 40th year in power) or José Eduardo dos Santos in Angola or Teodoro Obiang in Equatorial Guinea (both in their 30th), while Africa's most enduring autocrat, Gabon's Omar Bongo, died in June in his 42nd year in office. Criticism has actually strengthened Mugabe, allowing him to cast himself as a heroic defender of Africa taking...
Then there's the nature of the attacks: crude and essentially harmless. Cyberexperts call them denial-of-service (DOS) attacks, because they do no more harm than slow down or temporarily shut down networks. No sensitive government network was affected: the hackers (or lone hacker, since this could easily be the work of one person) only went after unrestricted, so-called public-facing sites. The assumption among some cyberexperts is that such unsophisticated attacks must come from an unsophisticated source...