• The most basic of traits (for example, the redness of a tomato) can depend on a complicated network of several sequences of genetic code.

    FORBES: Putting Evolution to Work

  • And if you have lots of Java on a legacy network, you want to preserve that code while getting the benefits of those new computer architectures.

    FORBES: Typesafe's 300% Growth Targets $6 Billion Java Market

  • Some 4.9 million viewers tuned in to see old and new cast members coexist in the posh Beverly Hills ZIP code, leading the fledging network to a rare full-night victory among adults aged 18 to 34, according to preliminary Nielsen results.

    FORBES: Magazine Article

  • Rick Marshall who oversees Vista Expertise Network trained some of the hospital staff to code via Skype.

    FORBES: Open Source Electronic Health Records: A Cost Solution For Hospitals

  • Lore allows teachers to control exactly who is in the network (by issuing a class-membership code) and to see how they are using it.

    ECONOMIST: Disruptive innovation in the lecture theatre

  • To join the network, recruitment agents will have to accept a code of practice and get regular training.

    ECONOMIST: Internationalising American universities

  • In 2010 a Malaysian man pleaded guilty to adding "malicious code" to the Fed's network via one of its regional banks.

    BBC: Federal Reserve

  • Blaster was designed to exploit a known loophole in Microsoft's code that allows the worm to spread through network connections, rather than e-mail.

    ECONOMIST: Target: Microsoft | The

  • Some are mighty empires: at United Technologies, for example, Pat Gnazzo presides over an international network of 160 business-ethics officers who distribute a code of ethics, in 24 languages, to people who work for this defence and engineering giant all round the world.

    ECONOMIST: Doing well by doing good

  • Although there have been malicious bots around for some time instant messaging, security firm IMLogic believes that this is the first time someone has tried to use bot code to help spread a worm around an IM network by pretending to be a legitimate user.

    BBC: Hand on keyboard

  • It is signature based which means it relies on a massive collection of snippets of text and code that researchers have discovered over the years are associated with unwanted network traffic, be it worms, port scans, or intrusions.

    FORBES: DHS Deploying Wrong Weapons In Cyberwar

  • Marco Antonio de Carvalho, 25, actor, Film student and assistant director for GNT (TV network), was among the curious passers-by who entered the QR Code that redirects to the campaign site on the web and gives access to videos featuring Brazilian performers Rodrigo Santoro, Alice Braga and MV Bill.

    UNESCO: Social and Human Sciences

  • With multiple manufacturers and their own UI layers, over a number of handset variants, all tweaked by each network (who may then add their own applications into the mix), even after the code is changed an upgrade is not a simple process.

    FORBES: Android Lags Behind Apple As iOS6 Adoption Shows The Benefit Of A Tight Ecosystem

  • It lets a user specify between three and five pals on the social network (no more, no less) who can be counted on to pass along a special code if the user somehow gets locked out of his or her account.

    CNN: Mark Milian,

  • CenterPoint's network was engineered by ibm and runs on open-source software, meaning anybody can access the underlying code to develop new products to ride on the communications system CenterPoint is building.

    FORBES: Magazine Article

  • If it transfers a chunk of numbers to another area code, as it did with the Bronx, the new 646 code would not be needed, but the scheme would not create much extra space on the network.

    ECONOMIST: The sexiest code on earth

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定