Word: transitioning
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...when it is focused on tax cuts and a possible war with Iraq. The states are being left to deal with their crises pretty much alone, but they plan to share their burdens in any way possible. One area ripe for cuts is state aid to municipalities and local transit authorities, so the crises are going to spill into how often your trash gets collected and when the bus runs...
...organizations that offer academic tutoring and lessons in everything from painting to ballet, in addition to support groups where foster children can bond with each other. And DSS is always happy to accept an extra package of diapers or formula, two of the details that are frequently forgotten in transit. A call down to the DSS will connect you with any of these programs...
...trade agreement takes effect in 2004. It's not clear if the U.S. gum lobby pushed for the change, or if Singapore is just tired of being an international punchline. Restrictions have been in effect since 1992, after pranksters started wedging wads into subway doors, gumming up the public transit system. The Lion City isn't going soft. Using a public toilet without flushing still carries a $284 fine. Drive into Malaysia with a tank of gas less than three-quarters full: $1,136. Walk around your house naked: another $1,136. So for now, Singaporeans...
...Filipinos need no reminding that they are squarely in the sights of Jemaah Islamiah (JI), and the presence of U.S. troops may have made the archipelago an even more tempting target. A year ago, an explosion rocked the Metro Railway Transit, killing 22 and injuring hundreds of others. The attack was carried out by Indonesian Fathur Rohman al-Ghozi, a self-confessed JI member with links to the Philippines' two major Islamic guerrilla groups, the MILF and the Abu Sayyaf. After his January capture in Manila, al-Ghozi said he carried out the bombings on the orders of JI operations...
Data-security companies are working on protecting every level of the data chain, from authenticating users to demonstrating when a communication has been tampered with in transit (a task that a sealed envelope performs with an elegant simplicity difficult to achieve in cyberspace). Though email encryption seems the most obvious use, its market, according to IDC, will probably be flat, because there are adequate options, like the program PGP (short for "pretty good privacy"), available free at web.mit.edu/network/pgp.html Instead, the main drivers of growth stand to come in the areas of database and wireless security...