Search Details

Word: keyboards (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...thief who steals and reveals credit-card data. Businesses must now watch for organized-crime groups adept at lifting valuable, private information and extorting money with it. The Federal Government and key industries must keep aspiring cyberterrorists from busting open dams or shorting out our electric grid from a keyboard in Pakistan. Reason: al-Qaeda and other terrorist groups have started scoping infrastructure and learning about cyberattack techniques...

Author: /time Magazine | Title: The Code Warriors | 11/10/2003 | See Source »

...more bluntly, our country's critical data systems are the World Trade towers, and the hijacked planes are heading in their direction. Criminals have discovered how much easier it is to rob banks with a keyboard than a mask and gun. Will terrorists figure out how to shut down the banking system and strangle the economy? Information technology controls the nation's physical infrastructure--nuclear plants, air-traffic control, water systems--like a central nervous system. "Hits against the IT network will cascade to the other critical infrastructures," Stolfo said. (Consider the cascading effect of this year's blackout...

Author: /time Magazine | Title: The Code Warriors | 11/10/2003 | See Source »

...comfortable with that. Everybody you meet at Packer is carrying a laptop. Kids in the hall wave wireless cards and argue about where to download drivers. When teachers talk, there's a low, collective clicking sound in the background--the sound of hundreds of fingers taking notes via keyboard. "It was painful for me," admits Elissa Krebs, who heads the English Department at Packer. "Inevitably you would just have lines of seventh- and eighth-graders up against the walls with their energy completely focused on their laptops, en masse. It was just so hard to transition to that image, from...

Author: /time Magazine | Title: Old School, New Tricks | 11/3/2003 | See Source »

Typically found in a cordless computer mouse or keyboard sending little bits of data. Must be near a receiver...

Author: /time Magazine | Title: Wireless Pursuit | 11/3/2003 | See Source »

...been generating in the music press (the snob’s Bible), perhaps The Strokes are likely suspects. “12:51,” their new single, shares a lot of the same genetic material as “Hey Ya!”: Handclaps, catchy keyboard-sounding riffs and the backbeat that has been the granddaddy of every rock song since Elvis. Casablancas’ drawl is as bewitching as ever, the perfect combination of bored and earnest...

Author: By Andrew R. Iliff, CRIMSON STAFF WRITER | Title: Sound and Fury | 10/31/2003 | See Source »

Previous | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | Next