Search Details

Word: servers (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

When they built the FAS IT server, they said she was unsinkable. She was the fastest anyone had ever seen, the most powerful. Her reputation preceded her, and she attracted the attention of the rich and the powerful, all of whom were eager to send e-mails and attempt to unlock the mysteries of navigating her enigmatic interface. She was a true triumph—in fact, she seemed to almost symbolize man’s capabilities, and his capacity to break free of the puny constraints of nature...

Author: By The Crimson Staff | Title: My <3 Will Go On | 2/6/2008 | See Source »

...that cursed day! Who could have known what sort of inauspiciousness Friday’s rain was heralding? Indeed, no one could have known—or did know, until afterwards. Because our very informant—the server itself—was fighting the battle of a lifetime: a battle against the elements. For at approximately 4:00 PM this past Friday, 1 February, one of the two UPS (Uninterruptible Power Supply) systems in the Science Center data center failed “catastrophically” as a result of a short circuit, which culminated in a fire...

Author: By The Crimson Staff | Title: My <3 Will Go On | 2/6/2008 | See Source »

...require prior notice to the student. Only the Ad Board and Student-Faculty Judicial Committee would be able to request access for pending disciplinary proceedings and students would be allowed to appeal. The data accessible to administrators consists primarily of e-mails, but also includes items saved on the server, according to Faculty of Arts and Sciences Client Technology Adviser Noah S. Selsby ’95. “Snapshots” of users’ information are saved for two weeks and then recycled; e-mail kept in the inbox is saved even if it was sent more...

Author: By Sophie M. Alexander, CRIMSON STAFF WRITER | Title: E-Privacy Rule Could Change | 1/9/2008 | See Source »

...successful graduate of this system. He earned $4,000 in prize money from hacker competitions, enough to make him worthy of a glowing profile in Sichuan University's campus newspaper. Tan told the paper that he was at his happiest "when he succeeds in gaining control of a server" and described a highly organized selection and training process that aspiring cybermilitiamen (no cyberwomen, apparently) undertake. The story details the links between the hackers and the military. "On July 25, 2005," it said, "Sichuan Military Command Communication Department located [Tan] through personal information published online and instructed him to participate...

Author: /time Magazine | Title: Enemies at The Firewall | 12/6/2007 | See Source »

...enforcement agencies. Duke subsequently launched an investigation of the security breach and committed itself to safeguarding confidential data. “We are in the process of analyzing the Web site to remove any unauthorized coding or material, and we’ve moved everything off of the Web server,” Vaughn said. “We’re also doing a longer-term investigation, making sure we’re doing everything we can to protect information and follow the policies we have in place.” Jeffrey S. Bramson ’08 said...

Author: By Alexandra perloff-giles, CONTRIBUTING WRITER | Title: Security Breached On Duke Law Site | 12/6/2007 | See Source »

Previous | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | Next