Search Details

Word: protected (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

Passed in 1914, the measure requires the state to pay laborers on public jobs--such as construction or snow removal--the same wages as private contractors would. Passed to protect immigrant workers from exploitation, the law requires the state to pay the same rates that union workers earn. The federal government has a similar law, enacted...

Author: NO WRITER ATTRIBUTED | Title: Question 2 Would End State Wage Guarantee | 9/27/1988 | See Source »

...these three viruses was amplified by two groups with a vested interest in making the threat sound as dramatic as possible. On one side are the computer-security specialists, a small group of consultants who make $100 an hour or more by telling corporate computer users how to protect their machines from catastrophic failure. On the other is the computer press, a collection of highly competitive weekly tabloids that have seized on the story like pit bulls, covering every outbreak with breathless copy and splashy headlines...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

Meanwhile, entrepreneurs eager to profit from the epidemic have rushed to market with all sorts of programs designed to protect against viruses. In , advertising that frightens more than it informs, they flog products with names like Flu Shot +, Vaccinate, Data Physician, Disk Defender, Antidote, Virus RX, Viru-Safe and Retro-V. "Do computer viruses really exist? You bet they do!" screams a press release for Disk Watcher 2.0, a product that supposedly prevents virus attacks. Another program, VirALARM, boasts a telling feature: it instructs an IBM PC's internal speaker to alert users to the presence of a viral intruder...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

Like a biological vaccination, a vaccine program is a preventive measure -- an attempt to protect an uninfected disk from invasion by an uninvited program. Most software vaccines take advantage of the fact that computer viruses usually hide themselves in one of a few locations within the machine's control software. A typical vaccine will surround those memory locations with the equivalent of a burglar alarm. If something tries to alter the contents of one of those cells, the vaccine program is supposed to stop everything and alert the operator. But because there are so many different viral strains out there...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

...will be worth watching in the year ahead, as he attempts to protect his vision of a green, Edenic pageant against the clamoring demands of diverse actors, producers, stagehands and unruly spectators. Even those who are indifferent to sports may have a greater stake in Giamatti's struggle than they realize. The central question hinges on whether collective celebrations should reflect or ennoble their societies. Reflection, these days, means augmented, intensified doses of behavior already lamentably available on the streets: rudeness, insensitivity, the steady thrum of flash-point violence. Bart thinks he has an older, better idea: orderly, considerate crowds...

Author: /time Magazine | Title: A. BARTLETT GIAMATTI: Egghead At the Plate | 9/26/1988 | See Source »

Previous | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | Next