Search Details

Word: southernization (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...more confrontational words [in this part of the country]," says Cecil Gardner, a rancher on the Utah side of the valley, "than 'We're going to take your water.'" But there should be ample water to go around, counters a composed Patricia Mulroy, general manager of the Southern Nevada Water Authority, adding, "Where else exactly would they like...

Author: /time Magazine | Title: Western Water Wars | 8/28/2005 | See Source »

Even if Las Vegas had not come calling, Great Basin water holes would be in trouble. Across the region, drought, agricultural diversions and overgrazing have done measurable damage, and there are examples in Snake Valley. "We're worried about southern Nevada because we know what we're doing to ourselves," says rancher Dean Baker. "And that's just a drop in the bucket compared to what they're talking about...

Author: /time Magazine | Title: Western Water Wars | 8/28/2005 | See Source »

...Jean-Luc Rabenel, head chef of France's only organic Michelin-rated restaurant, La Chassagnette, who has more gardeners working for him than kitchen staff. "I'm the son of a farmer, the earth is my passion," says Rabanel in his restaurant, which lies just outside Arles in southern France, "and I'm going back to my roots." His kitchen uses vegetables, plants and aromatic herbs cultivated in the restaurant's 21/2-hectare garden...

Author: /time Magazine | Title: Local Fare | 8/28/2005 | See Source »

Hackers breaking into official U.S. networks are not just using Chinese systems as a launch pad, but are based in China, sources tell TIME. Their story: Sometime on November 1st, 2004, hackers sat down at computers in southern China and set off once again on their daily hunt for U.S. secrets. Since 2003 the group had been conducting wide-ranging assaults on U.S. government targets to steal sensitive information, part of a massive cyberespionage ring that U.S. investigators have codenamed Titan Rain. On this particular night, the hackers' quarry was military data, and they were armed with a new weapon...

Author: /time Magazine | Title: Inside the Chinese Hack Attack | 8/25/2005 | See Source »

...What happened? As the day wore on, it seemed there were agreements on the role of Islam and Kurdish autonomy, but federalism remained a sticking point. The Sunni Arabs refused to accept the principle of a southern federal region as demanded by the head of SCIRI, a religious Shi'ite party with ties to Iran. So the Shi'ite and Kurdish delegates stopped including the Sunnis in talks. "In the last two days, there have been no general meetings including everybody," said Kurdish committee member Mahmoud Othman. Instead, he said, the negotiations were held between "interested parties," which usually included...

Author: /time Magazine | Title: Iraq's Constitution: Where They Stand | 8/23/2005 | See Source »

First | Previous | 525 | 526 | 527 | 528 | 529 | 530 | 531 | 532 | 533 | 534 | 535 | 536 | 537 | 538 | 539 | 540 | 541 | 542 | 543 | 544 | 545 | Next | Last