Search Details

Word: network (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Care of the total person involves not just professional help, but support from friends and family. Mucci found that men who were given their diagnosis in the presence of their families were less likely to kill themselves than those who bore the news alone. Having a social support network may not take the cancer away, but it could help ease the anxiety of learning to live with...

Author: /time Magazine | Title: Study: Cancer Patients at Higher Suicide Risk | 2/3/2010 | See Source »

Berkenfeld added that he also wanted to strengthen the Dems’ alumni network to tap into potential funding sources and political opportunities for students...

Author: By Stephanie B. Garlock, CRIMSON STAFF WRITER | Title: Harvard Dems Create Service Group | 2/3/2010 | See Source »

...right, five pounds of whoopie pie. The creators of the dessert, Isamax Snacks, make a product called the Jumbo Wicked Whoopie. It's supposed to feed up to 12 people, perfect for a decent Super Bowl Party, and apparently Isamax Snacks' Wicked Whoopies have garnered praise from the Food Network, Good Morning America, and Rachel...

Author: By Naveen N. Srivatsa, CRIMSON STAFF WRITER | Title: A Sweet Super Sunday | 2/3/2010 | See Source »

After his most recent trip to Islamabad, I asked Gates how he could consider Pakistani officials who support Haqqani's network as allies. "It's frustrating," he said, then went quiet. I suggested that his silence said a lot. (See pictures of Gen. Stanley McChrystal in Afghanistan...

Author: /time Magazine | Title: What Is Robert Gates Really Fighting For? | 2/3/2010 | See Source »

...Force wants the ability to burrow into any computer system anywhere in the world "completely undetected." It wants to slip computer code into a potential foe's computer and let it sit there for years, "maintaining a 'low and slow' gathering paradigm" to thwart detection. Clandestinely exploring such networks, the Dominant Cyber Offensive Engagement program's goal is to "stealthily exfiltrate information" in hopes it might "discover information with previously unknown existence." The U.S. cyberwarriors' goal: "complete functional capabilities" of an enemy's computer network - from U.S. military keyboards. The Army is developing "techniques that capture and identify data traversing...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

Previous | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | Next