Search Details

Word: dos (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Being able to walk into Louie’s and get yourself a case of Dos Equis without resorting to groveling at Mr. Chen’s feet? Been there, done that. Harvard-Yale? Hard to believe, but winning gets old after the 804913th time. Primal scream? Yawn...

Author: By Liyun Jin | Title: Upper...Fail. | 9/15/2009 | See Source »

...himself as the industry's creator. The founder of Prison Coach, Oberfest - whose background includes a 15-month stint in a New York prison on racketeering charges - has been preparing wealthy convicts for their incarceration since 2002. He talked to TIME about the business of prison prep and the dos and don'ts of inmate etiquette...

Author: /time Magazine | Title: What to Expect When You're Going to Jail | 8/25/2009 | See Source »

...Zimbabweans and the world to rethink how they deal with Mugabe and other African Big Men. Demonizing them may be principled and cathartic, Tsvangirai believes, but it is ineffective. Criticism has done nothing to dislodge Muammar Gaddafi in Libya (in his 40th year in power) or José Eduardo dos Santos in Angola or Teodoro Obiang in Equatorial Guinea (both in their 30th), while Africa's most enduring autocrat, Gabon's Omar Bongo, died in June in his 42nd year in office. Criticism has actually strengthened Mugabe, allowing him to cast himself as a heroic defender of Africa taking...

Author: /time Magazine | Title: Can a Team of (Bitter) Rivals Heal Zimbabwe? | 8/3/2009 | See Source »

Then there's the nature of the attacks: crude and essentially harmless. Cyberexperts call them denial-of-service (DOS) attacks, because they do no more harm than slow down or temporarily shut down networks. No sensitive government network was affected: the hackers (or lone hacker, since this could easily be the work of one person) only went after unrestricted, so-called public-facing sites. The assumption among some cyberexperts is that such unsophisticated attacks must come from an unsophisticated source...

Author: /time Magazine | Title: Is North Korea Behind the Cyberattacks? | 7/10/2009 | See Source »

...intent on how we are going to execute operations in general [to be released soon]. But specifically, the use of deadly force. The reason I spent a lot of time personally writing that intent is because I wanted to make sure that before they went into the specific dos and don'ts, that they understood the framework and the concept behind it. And the concept behind it is that although you are still authorized to use close air support when you need to - and I lay out some very specific conditions that they must meet to do that...

Author: /time Magazine | Title: TIME's Interview with General Stanley McChrystal | 7/8/2009 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | Next