Search Details

Word: mellone (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Clearly, the Internet is still not ready for prime time. "Without architectural improvements," warns Jeff Carpenter of the CERT Coordination Center, a federally funded computer-security group affiliated with Carnegie Mellon University, "we will see this again." The next time could be worse. Imagine what a well-designed Love Bug could do when we have become even more dependent on computer networks and those networks are wireless. An Internet outage could keep us not only from sending e-mail but also from gassing up the car or depositing our paychecks. Warns Symantec vice president Steve Cullen: "We're only fractionally...

Author: /time Magazine | Title: Attack Of The Love Bug | 5/15/2000 | See Source »

...angel [dot]com INVESTOR JIM MELLON IS LOOKING FOR A FEW GOOD ASIAN VENTURES

Author: /time Magazine | Title: Asia Catches .Com Fever | 3/13/2000 | See Source »

When your album title is this pretentious, you had better back it up. The Smashing Pumpkins has pulled off the feat in the past--the group's ridiculously titled 1995 album, Mellon Collie and the Infinite Sadness, featured some of the most accomplished rock music of the '90s. The new CD, while not as bold or brilliant, does contain a fair number of standout tracks. Machina is unreconstructed alternative rock, with screeching guitars and obscure lyrics. The best songs (the incantatory The Everlasting Gaze, the thunderously tuneful Stand Inside Your Love) make the less-compelling numbers worth slogging through...

Author: /time Magazine | Title: Music: Machina/The Machines of God | 3/6/2000 | See Source »

...LOSS Last year a Carnegie Mellon study suggested that Internet users are depressed. This year Stanford University is reporting that heavy users are becoming socially isolated. Here's the damage...

Author: /time Magazine | Title: In Brief: Feb. 28, 2000 | 2/28/2000 | See Source »

...constitutional search-and-seizure issues before they begin grabbing electronic evidence. Meanwhile, agents trawled chat rooms looking for the slightest hint of a pseudonymous braggart. Old-fashioned detective work on the cyberbeat is "probably the best we're going to do in this case," says Shawn Hernan of Carnegie Mellon University's computer emergency response team...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

Previous | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | Next