Word: firmnesses
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...former Justice Minister Philip Banks took out copyright on the new national law code. The U.S. embassy in Monrovia found it had to pay Banks' company $5,000 for its 20 copies, says one Western diplomat; in theory, Liberian courts must do the same. The U.N. panel believes the firm's "grounds for claiming copyright are questionable and ethically dubious." Little wonder that Johnson Sirleaf struggles. "The President's default position is to do the right thing," says the diplomat. "When she makes the wrong decision - and it does happen - it is because the local political pressure is overwhelming...
...Economics Foundation (NEF), a London think tank, compared the effects of purchasing produce at a supermarket and at a farmer's market and found that twice the money stayed in a community when folks bought locally. A study of Grand Rapids, Mich., released last fall by consulting firm Civic Economics, concluded that a 10% shift in market share from chain stores to independents would yield 1,600 new jobs and pump $137 million into the area. "Money is like blood," says NEF researcher David Boyle. Local purchases recirculate it, but patronize mega-chains or online retailers, he says...
...Officer, a regular contributor to TIME.com, works at a Chicago-based proprietary trading firm...
...Technically, NYMEX has placed limits such that no one firm can control more than 20 million bbl. of oil. Then again, a previously unknown energy-trading company called Vitol controlled 11% of the open interest on NYMEX at one point last summer, which amounted to four times that. Around the same time, SemGroup, a large oil-distribution company, filed for bankruptcy after losing $2.4 billion on a short position that also dwarfed the supposed limit...
...even if the trail does lead to North Korea, there's no reason to believe it ends there. Meyerrose, now with the consulting firm Harris Corp., points out that hackers routinely route their attacks through other countries and networks, using multiple cutouts to evade detection. "In every attack I've ever seen, the attackers were careful to use cybersurrogates," he says...