Search Details

Word: finger (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...nobody cared much about what would happen at the next click of the cosmic odometer. But today the world runs on computers, and older machines run on jury-rigged versions of COBOL that may well crash or go senile when they hit a double-zero date. So the finger of blame for the approaching crisis should point at Hopper and her COBOL cohorts, right...

Author: /time Magazine | Title: The History And The Hype | 1/18/1999 | See Source »

...admission on the witness stand that he disposed of Fahey's body by stuffing it into a 3-ft. Styrofoam cooler, and then, with the help of his brother, dumped it at sea. (The cooler was later found by fishermen.) Neither did anyone expect him to point the finger at another ex-mistress, Deborah MacIntyre, who, he says, "accidentally" shot Fahey as Capano tried to wrest a gun from her--an action he claims he later covered up by getting rid of the body, which has never been found. MacIntyre denies the entire story. "It's not a whodunit...

Author: /time Magazine | Title: The Case of the Missing Corpse | 1/18/1999 | See Source »

...suggest that "finger" provide only a person's real name, his or her ".plan" file and where the person is logged on only if the person is currently at the terminal. Computer stalking is, unfortunately, not rare. I know at least three students who have felt that someone was keeping track of their movements with commands such as "last," "who" and "finger," but felt that they had insufficient grounds for a formal complaint to the administration. And there is a growing risk as e-mail becomes ever more prevalent that the information found with these seemingly innocuous commands be used...

Author: By Simon J. Dedeo, | Title: A Plea for Privacy | 1/11/1999 | See Source »

...valid and not valid uses are indistinguishable by automatic checks. Please e-mail Harvard Computer Security (security@fas.harvard.edu) and ask them why they haven't followed the lead of many other campuses including Cornell and Brown (which display only a person's address, telephone number and ".plan" file when you finger them) in disabling or altering UNIX commands to protect the privacy of Harvard students. Even if the expectation of privacy in the real world is diminishing every day, let us take a small stand for the antiquated notion that nobody should be able to figure out where...

Author: By Simon J. Dedeo, | Title: A Plea for Privacy | 1/11/1999 | See Source »

Bailey isn't alone in his suspicions that something more than simple market forces is at play. Many farmers have pointed the finger at their Canadian brethren for flooding the market with swine, and are urging tougher import restrictions. Meanwhile, some critics believe that a few dominant corporate hog processors, like IBP or Smithfield, have unfairly profited from the farmers' misfortunes. "This isn't a matter of outmoded hog producers falling victim to the invisible hand of the market," says Senator Tom Harkin of Iowa. "Pork in the grocery store costs the same now as six months ago. An anticompetitive...

Author: /time Magazine | Title: Lean Times on the Farm | 1/11/1999 | See Source »

First | Previous | 278 | 279 | 280 | 281 | 282 | 283 | 284 | 285 | 286 | 287 | 288 | 289 | 290 | 291 | 292 | 293 | 294 | 295 | 296 | 297 | 298 | Next | Last