Search Details

Word: commands (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Government-owned network that connects some 20,000 computers handling scientific research and unclassified military work. While Speer used fairly standard techniques for cracking passwords, he showed uncommon persistence. He attacked some 450 different computers and gained access to more than 30. Victims ranged from the Navy Coastal Systems Command in Panama City, Fla., to the Buckner Army Base in Okinawa...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

Escorted by a small flotilla that included a Greek navy torpedo boat and two coast guard vessels, the champion cyclist kept in constant radio contact with the M.I.T. command crew. He advised them of his physical condition every 15 minutes, and they reported changes in wind velocity and direction. At about 11 a.m., just 30 ft. off the beach at Santorini, a strong head wind buffeted Kanellopoulos as he tried to land. First the tail broke off and then the wing. Next thing the pilot-athlete knew, he was swimming toward shore, where an enthusiastic mob surged forward to greet...

Author: /time Magazine | Title: Science: On The Wings of Mythology | 5/2/1988 | See Source »

...Pentagon's community of Christian Fundamentalists complained that his group was not sufficiently "Christ centered." Winchester, a devout Roman Catholic, sat down with his adversaries. He convinced them that the group would bring people closer to God and agreed to remain under the chaplain's chain of command. Since then, he has begun offering monthly stress-reduction workshops and has conducted a special meditation program for employees of the Defense Intelligence Agency...

Author: /time Magazine | Title: Peace Shield At the Pentagon, a new SDI | 4/25/1988 | See Source »

...chips achieve their performance breakthroughs? In a word: RISC, for reduced instruction set computer. RISC is not a new technology, but a fresh approach to computing that challenges 25 years of semiconductor design. It focuses on a computer's most basic commands: the instructions that are embedded, or hard-wired, into the silicon circuitry of the machine's central processing unit. The first computers made do with a handful of primitive commands, such as LOAD, ADD and STORE, which programmers combined to perform complex tasks. Lacking a command to multiply 6 times 5, for example, they had to instruct their...

Author: /time Magazine | Title: Technology: The Next Major Battleground | 4/25/1988 | See Source »

...taking of Flight 422 raises tensions and tempers throughout the Middle East. -- Abu Jihad, Yasser Arafat' s second in command, is murdered in Tunis. -- An interview with Israeli Prime Minister Yitzhak Shamir. -- Four nations sign an accord securing the withdrawal of Soviet troops from Afghanistan, but peace remains an elusive prospect...

Author: /time Magazine | Title: Time Magazine Contents Page | 4/25/1988 | See Source »

First | Previous | 725 | 726 | 727 | 728 | 729 | 730 | 731 | 732 | 733 | 734 | 735 | 736 | 737 | 738 | 739 | 740 | 741 | 742 | 743 | 744 | 745 | Next | Last