Search Details

Word: servers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...works in a windowless 8-by-8-ft. server closet, like a Web Wizard of Oz ("It gets really hot with the door shut, so meetings have to be short," he says), admits he knows what he's looking for only when he sees it. "You can't really explain why it's funny," he says. "That's part...

Author: /time Magazine | Title: Building a Media Empire Around I Can Has Cheezburger | 8/24/2009 | See Source »

...Northwestern, are lately being joined by Cornell, Georgetown and Temple, to name a few. Google's Apps for Education program has gained significant momentum as student tech demands mount and budgetary pressures strain campus IT departments. Handing the e-mail keys over to Google helps schools avoid costly server upgrades while capitalizing on Web-based e-mail's popularity among students. Eric Weil, managing partner for Student Monitor, a national college-focused market research firm, says the average college student has two or three personal e-mail addresses, and Gmail's popularity among students has doubled over the past...

Author: /time Magazine | Title: Google and Microsoft: The Battle Over College E-Mail | 8/14/2009 | See Source »

...their strengths, computers and cell phones are lousy timekeepers. Most computers carry an on-board clock powered by a separate battery. As the battery drains over time, the computer's timekeeping becomes less accurate. To sidestep this problem, most computers use the Internet to sync with an external server. (Both Microsoft and Apple operate external time servers synced to the atomic clocks carrying the official U.S. time.) But if a computer doesn't have an active Internet connection, or if time-synching is somehow turned off, a computer's clock can run askew. In addition, there's often a short...

Author: /time Magazine | Title: Why Can't My Clocks Keep Time Accurately? | 8/11/2009 | See Source »

DDoS attacks are surprisingly low tech. Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers. It's a brute-force approach - the network of hacker-controlled computers floods the server with requests for data until the server overloads and comes crashing down. Graham Cluley, a computer security expert, likened the attack to "15 fat men trying to get through a revolving door at the same time." The attacks do no lasting damage - user data aren't compromised, and the site isn't down for long. Once...

Author: /time Magazine | Title: How Did Hackers Cripple Twitter? | 8/6/2009 | See Source »

...Arnuk also asserts that co-location gives firms that can afford to do it an unfair advantage, because the exchange is "offering them things that the general investor does not get." (Firms pay for the server space they use: as little as $50,000 a year, but as much as $500,000 a month to co-locate at the NYSE and other exchanges, says Murray White, senior vice president of global technologies at the exchange...

Author: /time Magazine | Title: High-Frequency Trading Grows, Shrouded in Secrecy | 8/5/2009 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | Next