Search Details

Word: packetizing (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

What distinguishes this T-shirt moment from other high points in the evolution of the fashion staple is that tees need no longer be relegated to weekends, sport a logo or come in a packet of three. The latest versions are well tailored (often blended with Lycra), range in color from pastel pink to peacock blue, and boast sleeves and necklines the people at Hanes have probably never even considered. And needless to say, they don't cost $3.95. Women are buying them in bulk, for $25 to $60 apiece, to wear for work by day and more formal occasions...

Author: /time Magazine | Title: Blue Collar No More | 5/8/2000 | See Source »

...just MP3 files, and such services would be difficult to shut down because they would not rely, as does Napster, on a central server for searches. However, if carried to its conclusion, the spirit in which the lawsuit was filed would make universities into electronic gatekeepers, watching each packet of data sent across the network and monitoring students' activities online for fear of being held legally responsible for any of their misdeeds...

Author: By The CRIMSON Staff, | Title: Metallica Suit Lacks Merit | 4/25/2000 | See Source »

...Ross then prints out the electronic form, attaches it to the receipts and NERF form. She tracks down the hypothetical foreign-student-book-buyer, who must sign the NERF form, makes a photocopy of the whole packet, and brings it to the chemistry department's business office for approval...

Author: By Tova A. Serkin and Michael L. Shenkman, CRIMSON STAFF WRITERSS | Title: In the Trenches: A Staffer Struggles with ADAPT | 3/21/2000 | See Source »

Galluccio's appointments for the city council's numerous committees were made public last night in the council's agenda packet...

Author: By Imtiyaz H. Delawala, CRIMSON STAFF WRITER | Title: Mayor Galluccio Leads First Cambridge City Council Meeting | 3/7/2000 | See Source »

...terms of my release permitted me to do so, I'd tell the people running the sites that were hit three things, all of which they may have done by now: 1) use a network-monitoring tool to analyze the packets being sent to determine their source, purpose and destination; 2) place your machines on different subnetworks of the larger network in order to present multiple defenses; and 3) install software tools that use packet filtering on the router or fire wall to reject any packets from known sources of denial-of-service traffic...

Author: /time Magazine | Title: The World's Most Hunted Hacker | 2/21/2000 | See Source »

Previous | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | Next