Word: network
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...another routine night for Shawn Carpenter. After a long day analyzing computer-network security for Sandia National Laboratories, where much of the U.S. nuclear arsenal is designed, Carpenter, 36, retreated to his ranch house in the hills overlooking Albuquerque, N.M., for a quick dinner and an early bedtime. He set his alarm for 2 a.m. Waking in the dark, he took a thermos of coffee and a pack of Nicorette gum to the cluster of computer terminals in his home office. As he had almost every night for the previous four months, he worked at his secret volunteer job until...
USER-GENERATED One of the fastest-growing search techniques is tagging, a grassroots phenomenon whereby users label websites with descriptive tags, building a network of knowledge dubbed folksonomy--a taxonomy of knowledge organized by ordinary folk. Yahoo! was quick to spot this trend, and in March bought Flickr, a photo website organized with a communal tagging model. Bradley Horowitz, Yahoo!'s technology director, says the company wants to apply search across all its user-created content. The tagline? "Better search through people...
Naguib Sawiris likes to think of himself as a Middle Eastern Richard Branson. Last year the Egyptian entrepreneur started Iraq's first mobile-phone network. After just six months, his company, Orascom Telecom, already had more than half a million subscribers, earning $95 million before taxes and interest. Like Branson, Sawiris is a music lover--he calls himself a "party animal"--and has a taste for risky ventures...
...take a lot of risks, but calculated risks." Now Sawiris stands on the edge of his biggest gamble, and it's not in an unstable country. This month he closed a massive $15.6 billion deal with the Italian utility Enel to acquire a 62% stake in its mobile-phone network, Wind. Sawiris borrowed more than $12 billion...
...This was a scanner program that "primed the pump," according to a former government network analyst who has helped track Titan Rain, by searching vast military networks for single computers with vulnerabilities that the attackers could exploit later. As with many of their tools, this was a simple program, but one that had been cleverly modified to fit their needs, and then used with ruthless efficiency against a vast array of U.S. networks. After performing the scans, the source says, it's a virtual certainty that the attackers returned within a day or two and, as they had on dozens...