Search Details

Word: strike (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

Alums recall Kristof as one of the brightest undergraduates on campus—he graduated Phi Beta Kappa in three years and earned a Rhodes Scholarship. But he didn’t strike his peers as the type who would be held up at machine-gunpoint in Beirut and elude rebels chasing him through the jungle in Congo...

Author: By Daniel J. T. Schuker, CRIMSON STAFF WRITER | Title: Nicholas D. Kristof | 6/4/2007 | See Source »

...HOLLOW HUNGER STRIKE...

Author: By The Crimson Staff | Title: The Year in Brief | 6/4/2007 | See Source »

After a nine-day-long hunger strike in May, Stand for Security, a student group founded to protest the treatment of Harvard’s subcontracted security guards, secured a meeting with administrators and a reaffirmation of Harvard’s commitment to worker welfare. The hunger strikers’ goals were laudable—it is vital that Harvard treat its workers, including subcontracted workers, with respect and generosity. We wholeheartedly support Stand for Security’s demands, such as the institution of fair grievance procedures, hiring full-time, instead of part-time, workers when possible...

Author: By The Crimson Staff | Title: The Year in Brief | 6/4/2007 | See Source »

...political feuds over the direction of the national Republican Party today may strike a familiar chord with returning members of the Class...

Author: By Charles R. Melvoin, CRIMSON STAFF WRITER | Title: To Like or Not To Like Ike: HYRC’s Schism | 6/1/2007 | See Source »

...successfully mount an attack. The "tools and instructions are readily available at a low cost," says Oliver Friedrichs, a director at the security response unit of Symantec, a U.S. software firm. Internet chat rooms and bulletin boards can furnish would-be saboteurs with instructions on launching their own strike. And defending against these attacks is tricky. Large corporations can invest in clever hardware that detects odd patterns of requests for its websites and routes away the suspicious ones. Smaller firms, not used to handling huge volumes of traffic and lacking a big budget for security, are more exposed...

Author: /time Magazine | Title: Under Attack, Over the Net | 5/31/2007 | See Source »

Previous | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | Next