Search Details

Word: monitorable (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...wasn't just U.S. media, there were various Italian agencies that ran with a lot of details, and a Kuwaiti news agency that ran with it, they all pulled it down,? the Monitor?s managing editor, Marshall Ingwerson, told Editor & Publisher. ?Basically, everyone who ran with it, once we reached them, was cooperative. I was surprised and very heartened that people were so willing to help...

Author: /time Magazine | Title: The Abduction of Jill Carroll | 1/10/2006 | See Source »

When Jill Carroll, 28, a Baghdad-based freelancer for the Christian Science Monitor was kidnapped on Saturday, the tightly knit community of reporters in the Iraqi capital knew of the abduction within hours. But in an almost unprecedented move, media organizations in Baghdad- Arabic and English alike-kept a lid on the news in hopes that a media blackout would give negotiators and rescuers time to win her release. For two days it mostly held, to the point where early reports mentioning her affiliation with the Christian Science Monitor were pulled from Web pages. A blog kept by her sister...

Author: /time Magazine | Title: The Abduction of Jill Carroll | 1/10/2006 | See Source »

...Nixon years, when the NSA as well as the FBI were used by the White House to spy on civil rights and anti-Vietnam War activists. In 1978 Congress passed the Foreign Intelligence Surveillance Act (FISA), which required the NSA to obtain a warrant any time it sought to monitor communications within the U.S. (Outside the U.S., it still enjoys a free hand.) The new law created the FISA court, an 11-member secret panel whose job it is to hear the NSA requests and issue--or deny--the warrants. In the event that the NSA comes upon a situation...

Author: /time Magazine | Title: Has Bush Gone Too Far? | 1/1/2006 | See Source »

...Such programs, called spyware, run on your PC behind the scenes and perform a range of functions, from the nasty to the merely annoying. Some versions of spyware, called adware, monitor surfing habits and report back to advertisers; others insinuate themselves as browser toolbars and deliver "search results" that favor marketers. And then there are the keyloggers, which are designed to record your keystrokes as you type, potentially collecting your bank account passwords and credit card numbers and transmitting them back to a central server. "The amount of spyware out there has grown significantly, and it's gotten more malicious...

Author: /time Magazine | Title: Seven Ways to Fend Off Spyware | 12/23/2005 | See Source »

...piano-black "cans" to cover your ears, and a detachable wire to connect to your source. You only need a single AAA battery to power it up, and it will last up to 30 hours. Since noise-cancellation uses microphones to listen to the environment, there's also a "Monitor" button that sends through everything outside, so you don't have to take off your headphones to tell the flight attendant what kind of beverage you want...

Author: /time Magazine | Title: Headphones Made for a Noisy World | 12/20/2005 | See Source »

Previous | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | Next