Search Details

Word: war (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Bargaining—Intimidation may have taken root, and you find that you are constantly comparing yourself to others. Someone else is always smarter, better, more capable, more creative. You can’t brag to the person sitting next to you at dinner about vaccinating orphans in a war-torn country, because chances are that person discovered the vaccine. I had to accept the fact that I didn’t invent anything, found an NGO, or produce a documentary – but maybe I could fundraise for a charity or write for a newsletter. I tried...

Author: By Meredith C. Baker | Title: Humbled by Harvard | 2/3/2010 | See Source »

Because the war only serves as a backdrop, a plot device which separates the young couple and accelerates the emotional roller coaster of their relationship, the co-stars assert that this narrative of love and loss directly relates to college students...

Author: By Kristie T. La, CRIMSON STAFF WRITER | Title: Love Overcomes War in 'Dear John' | 2/2/2010 | See Source »

Sadly, the album contains a few regrettable missteps. “Holiday” features an appalling non sequitur of a bridge, out of nowhere introducing the story of a girl protesting against the Iraq War by becoming a vegetarian into a song that seemed to be about vacations. There is no real point to the political sidestep, and it sits very awkwardly with the song and the album as a whole. On “California English” the group for some reason chooses to auto-tune Koenig’s voice, with terrible results. Closer...

Author: By Chris R. Kingston, CRIMSON STAFF WRITER | Title: Vampire Weekend | 2/2/2010 | See Source »

...What U.S. officials don't like to acknowledge is that the Pentagon is hard at work developing an offensive cyber capability of its own. In fact, it has even begun using that capability to wage war. Beyond merely shutting down enemy systems, the U.S. military is crafting a witch's brew of stealth, manipulation and falsehoods designed to lure the enemy into believing he is in charge of his forces when in fact they have been secretly enlisted as allies of the U.S. military. And some in Washington fear that there hasn't been sufficient debate over the proper role...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

...concepts that have regulated war forever, such as deterrence and attribution, are slippery or missing in cyberspace. National boundaries don't exist, making moot the question of sovereignty. Asymmetries abound: defenders must defend everything, all the time, while an attacker can prevail by exploiting a single vulnerability. Tracking down the source of cybersabotage, routed like a skipping stone through a series of innocent servers, can be all but impossible. Are the attackers curious teenagers, criminal gangs, a foreign power - or, more likely, a criminal gang sponsored by a foreign power? Deterrence becomes meaningless when the identity of an attacker...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

Previous | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | Next