Search Details

Word: stoles (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...Bilotti stole the ball four times for the Crimson, but the offense was unable to turn those breaks into goals...

Author: By Megha Parekh, CRIMSON STAFF WRITER | Title: M. Water Polo Struggles at MIT Invitational | 9/12/2005 | See Source »

...Superdome has had a lousy track record as a refuge since it was first used in 1998 during Hurricane Georges. The place wasn't prepared for the 14,000 people who showed up there: in the chaos, people stole some $8,000 worth of barstools and artificial plants and did about $46,000 in damage. Seven years later, the city had still not stockpiled enough generator fuel, food and other supplies to handle the job. Over the years city officials have stressed that they didn't want to make it too comfortable at the Superdome since it was safer...

Author: /time Magazine | Title: 4 Places Where the System Broke Down | 9/11/2005 | See Source »

...Pingsha Dong, originally from Dalian, was transplanted for re-education into the hinterland, where the schools reduced the curriculum to communist rote. Before he left, his father told him that no matter what the risk, "you need to learn." So, after 16 hours in the field each day, Dong stole away at night with a kerosene lamp to pore over two math and physics books his father had salvaged for him. Eventually the authorities caught on to Dong's reading, but since he disguised his books to resemble Mao's Little Red Book, they praised his party fervor. That reputation...

Author: /time Magazine | Title: Figuring the Future: Numbers Made Real | 9/4/2005 | See Source »

...most pervasive cyberespionage threats that U.S. computer networks have ever faced. TIME has obtained documents showing that since 2003, the hackers, eager to access American know-how, have compromised secure networks ranging from the Redstone Arsenal military base to NASA to the World Bank. In one case, the hackers stole flight-planning software from the Army. So far, the files they have vacuumed up are not classified secrets, but many are sensitive and subject to strict export-control laws, which means they are strategically important enough to require U.S. government licenses for foreign...

Author: /time Magazine | Title: The Invasion of the Chinese Cyberspies | 8/29/2005 | See Source »

...next week's magazine, available at Time.com on Sunday and on the newsstands Monday, TIME presents the Titan Rain investigation in depth - what they stole, how they stole it, and what the United States is doing to stop them...

Author: /time Magazine | Title: Inside the Chinese Hack Attack | 8/25/2005 | See Source »

Previous | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | Next