Word: exploited
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...Conflicts like the one in Niyamgiri are becoming increasingly common in India, as the country tries to extract and exploit the mineral wealth in its forests and mountains. India allows state governments to appropriate land for use by private companies provided the people displaced are compensated and resettled. People living on that land cannot object once the state acquires it, and in Orissa the authorities have approved 54 projects worth $46 billion. That process has already displaced 1.4 million people in the state since 2001, according to India's Rural Development Ministry. The Dongria are challenging this policy...
...stings even more since the E.U. had hoped its new Lisbon Treaty - intended to create a more streamlined institution with a strong President and Foreign Minister speaking on its behalf - would ensure the bloc would have a bigger presence on the global stage. But China has historically sought to exploit the E.U.'s internal divisions to fuel its economic growth, not deal with the bloc as a whole. All of the E.U.'s biggest members have cozied up to Beijing at one point or another in the hopes of guaranteeing lucrative trade deals. (See pictures of China mourning the potential...
...This further victimizes people in many ways: it provides leaders with a golden opportunity to censure the media, an opportunity to instill fear among people, a justification to arrest people on charges of conspiracy, and a reason to align with corrupt foreign governments that wait for an opportunity to exploit the situation. Mahinda Rajapakse’s government has already taken measures to block several web based news sources from people living in Sri Lanka. The government has already started to arrest newspaper editors...
...disappointing element of the user interface, or UI, is the home screen, which is virtually unchanged from the original iPhone UI. (The iPad is far, far more than a blown-up iPod Touch, but you can't tell from the home screen.) Surely there's a better way to exploit multitouch and that extra screen real estate for navigating all the information that will be stored on these machines. I have no inside information on this, but given the inventiveness of the iWork user experience, I can't help thinking that an iPad-native home environment was a project that...
...instantaneous nature of cyberattacks that has rendered defenses against them obsolete. Once an enemy finds a chink in U.S. cyberarmor and opts to exploit it, it will be too late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around the world). Far better to be on the prowl for cybertrouble and - with a few keystrokes or by activating secret codes long ago secreted in a prospective foe's computer system - thwart any attack. Cyberdefense "never works" by itself, says the senior Pentagon officer. "There has to be an element of offense...