Home they
 

Keywords :   


Tag: they

Oklahoma tornado victims astounded at how they survived

2013-05-26 17:10:00| Climate Ark Climate Change & Global Warming Newsfeed

Reuters: Tornado survivors thanked God, sturdy closets and luck in explaining how they lived through the colossal twister that devastated an Oklahoma town and killed 24 people, an astonishingly low toll given the extent of destruction. At least one family took refuge in a bathtub and some people shut themselves in underground shelters built into their houses on Monday when the powerful storm tore through the Oklahoma City suburb of Moore. While rescue workers and body-sniffing dogs sifted through the...

Tags: they oklahoma victims survived

 

Commuters can now make the most of free wireless internet while they wait for their train.

2013-05-22 08:52:43| Wireless - Topix.net

Greater Anglia is aiming to introduce wi-fi to 100 stations across the region, in partnership with network operator The Cloud.

Tags: free they their make

 
 

Fugitive to police on Facebook: Catch me if you can. They do

2013-05-18 20:30:00| CNET News.com

Taunting the police on Facebook has limited benefits -- as one wanted man in the U.K. discovers when it takes police just 12 hours to catch up with him. They leave him a taunting message on Facebook in return. [Read more]    

Tags: you do they police

 

BlackBerry CEO likes tablets, just not as they are

2013-05-14 18:48:08| CNET News.com

BlackBerry CEO Thorsten Heins made some different -- and seemingly conflicting -- comments about the state of tablets. [Read more]    

Tags: they ceo likes blackberry

 

Know thy cyber enemy: Who's attacking and what they want

2013-04-24 12:00:00| InfoWorld: Top News

China and Romania spawned the most cyber attacks last year, according to an in-depth study released this week by Verizon. Notably, whereas Romanian attackers were primarily prowling for financial data to score a big payday, Chinese perpetrators were engaged in espionage, focused on swiping trade secrets and internal data. Much of the responsibility for successful data breaches in 2012, however, can be pinned on IT's long-standing nemesis: single-factor authentication.

Tags: they want enemy cyber

 

Sites : [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] next »