Word: web
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
While Gossip Geek continues to chronicle the lives of those they deem campus celebs at Harvard, JuicyCampus—a Web site boasting gossip blogs for 60 colleges, including Harvard—is making waves in New Haven...
Gossip Geek, by contrast, acknowledges on its Web site that it is intended to be “satirical” in nature and will remove any posts if the subject is offended...
...Nablus battalion headquarters of the IDF, the senior officer has a display case with bottles of champagne and wine, each a gift from his superiors, each tagged with the name of a terrorist captured or killed. The Israelis rely on a web of informers for information. Saleh Abdul Jawad, a political science professor at Birzeit University, says Israel has "tens of thousands" of Palestinian informers on its payroll. Some keep tabs on who prays at mosques, while others burrow into militant cells, planting bugs and betraying planned actions to their controllers. "Every small part of Palestinian life is under Shin...
...convincing Casanova at whatever age, even though he has to pull it off without the accent. Harry’s emotional crisis sets off subsequent emotional conflicts that affect each of the four two-faced leading characters. Writer and director Ira Sachs suggests that married life is a web of emotions that makes people deceive their loved ones. The movie itself is a deception, however; marriage, as any gender studies concentrator could tell you, is a contract that binds together people’s lives in more than one way. Sachs, an award-winning director, flattens the complexity of this...
Last month’s hack of a Graduate School of Arts and Sciences (GSAS) Web server may have compromised 10,000 sets of personal information from applicants and students, including 6,600 Social Security numbers and 500 Harvard ID numbers, the University said yesterday. According to the University’s Chief Information Officer Daniel D. Moriarty, when Harvard realized after a preliminary scan of the disseminated information that “the same methods that the hacker used could have exposed other data,” they began cataloguing the rest of the server’s contents...