Word: shut
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...help educate younger generations about the mistakes of the past. That said, Fong may ask for funding to help preserve the Angel Island immigration station, dilapidated after decades of neglect. To complicate matters, the station is located within a state park that, along with several others, may be shut down to help balance California's budget shortfall...
When the Polaroid film factory in the Dutch town of Enschede shut down in June 2008, it seemed to signal the end for one of the most ingenious and iconic innovations of the 20th century. Almost 60 years after American inventor Edwin H. Land sold the first Model 95 of his new instant-picture camera in Boston in November 1948, the troubled Polaroid Corp. halted its cassette-film production for good. Demand was still relatively high - the plant churned out 30 million cassettes in 2007 and 24 million in the first half of 2008 - but the plant...
...ultimately self-destructive. Iran has both forced foreign journalists out of the country and attempted to shut down the work of Iranian journalists. In the long run, this will have a very corrosive effect on the Iranian government...
...Washington, even as she was aiding Zelaya's cause last week, Clinton sat down for an interview with Globovisión, an intensely anti-Chávez Venezuelan news network that backed a failed 2002 coup attempt against him. Asked about Chávez's recent threats to shut down Globovisión, Clinton said that suppressing opposition media is "not a way to run a democracy." That set off the Chávez government, which issued a statement calling Clinton's remarks "aggressive" and "disrespectful...
Then there's the nature of the attacks: crude and essentially harmless. Cyberexperts call them denial-of-service (DOS) attacks, because they do no more harm than slow down or temporarily shut down networks. No sensitive government network was affected: the hackers (or lone hacker, since this could easily be the work of one person) only went after unrestricted, so-called public-facing sites. The assumption among some cyberexperts is that such unsophisticated attacks must come from an unsophisticated source...