Most of you have been where I am tonight. The crash site of unrequited love. You ask yourself, How did I get here What was it about Was it her smile Was it the way she crossed her legs, the turn of her ankle, the poignant vulnerability of her slender wrists What are these elusive and ephemeral things that ignite passion in the human heart That's an age old question. It's perfect food for thought on a bright midsummer's night.
food age human passion thought heart smile bright perfect night question things vulnerability crossed poignant unrequited love unrequitedlove legs
When we were children, we used to think that when we were grown-up we would no longer be vulnerable. But to grow up is to accept vulnerability.. To be alive is to be vulnerable.
children grow vulnerable alive vulnerability accept
Unless Americans come to realize that they are not stronger in the world because they have the bomb but weaker because of their vulnerability to atomic attack, they are not likely to conduct their policy at Lake Success [the United Nations] or in the
success world pride vulnerability americans realize conduct americaandamericans
The most human thing we have to do in life is is to learn to speak our honest convictions and feelings and live with the consequences. This is the first requirment of love, and it makes us vulnerable to other people who may ridicule us. But our vulnerability is the only thing we can give to other people.
life people live human humanity feelings learn vulnerable convictions speak honest vulnerability consequences ridicule love thing give
No one ever kills himself for the love of a woman, but because love - any love - reveals us in our nakedness, our misery, our vulnerability, our nothingness.
woman misery vulnerability nothingness love
One does not kill oneself for love of a woman, but because love - any love - reveals us in our nakedness, our misery, our vulnerability, our nothingness
woman misery vulnerability nothingness love kill
We knew about this vulnerability a month before the worm emerged,.. If companies knew to scan even their perimeter machines, they could easily have seen this vulnerability and applied this patch and not be affected. I think what we're going to see is a new awareness around this and, as a result, new emphasis on planned vulnerability scanning so they have a fixed process.
process awareness patch vulnerability result machines
Microsoft's vulnerability to the PC market reaffirms our belief that Microsoft's continued success depends on its ability to transition itself from a desktop software company to an enterprise solution vendor.
belief ability success enterprise market company solution vulnerability software
It provides a framework to look at every device in the enterprise that has a vulnerability.
enterprise vulnerability
Given Mozilla's open and transparent approach, we are very detailed on how we publish our vulnerability reports, and we list each vulnerability separately. Other vendors don't. Other vendors often combine multiple vulnerabilities, for instance, into one security bulletin.
security open vulnerability
They're working on the fly, and messing around with the [Perl] code to change the types of data it goes after. They're always looking for the latest vulnerability, which makes it difficult to tackle.
change data difficult vulnerability fly working code
We see fundamental security and reliability issues built into these electronic machines. The point is, that if there is a vulnerability to hackers, the only way to assure that the numbers come out right is to be able to do a recount that's dependent upon a paper trail.
numbers security reliability issues vulnerability paper machines
We're working day and night on development of a cumulative security update for Internet Explorer that addresses the vulnerability.
internet security night development day vulnerability working
GTA is a household name in much of Europe. They consistently handle sensitive customer data, and they've recognized the value of securing the most vigilant vulnerability management solution available to protect that data -- Citadel's Hercules. We look forward to furthering this important customer's success in enhancing the security of its systems.
management success data security europe solution forward vulnerability systems important sensitive protect
We see this expanded involvement with the government marketplace as a strong affirmation of the importance of a comprehensive vulnerability management solution, particularly when dealing with mission-critical information. We are honored to serve this important customer, and look forward to furthering this customer's success in enhancing the security of its systems.
management information government success security strong affirmation serve solution forward importance vulnerability systems important
I hypothesize that the Katrina event has made people think pretty seriously about infrastructure and its vulnerability.
people vulnerability made pretty
Active exploitation of this issue has been, and continues to be, observed. A primitive instant messenger worm has been observed that employs this vulnerability as a propagation vector. Additionally, there are reports that exploits for this issue are getting spammed to e-mail addresses. It is believed that exploitation of this issue will continue to increase.
exploitation vulnerability active
We haven't done anything to reduce our vulnerability. I hate to think of the next hurricane season.
hate vulnerability
We have an incredibly big, flexible economy, and we've gotten very good at ring-fencing problems. But energy prices -- especially if gas goes back up to a gallon -- are an obvious vulnerability that would be difficult to compartmentalize.
problems good energy difficult economy vulnerability big
A full-fledged recovery pretty much depends on the U.S. Market. Japan's high-tech shares rose on the back of their U.S. Counterparts last year, so their vulnerability to losses on the Nasdaq is inevitable.
market vulnerability rose recovery pretty
The results of the cocaine self-administration study along with our previous work demonstrating enduring effects of neonatal isolation in female rats point to the possibility that women with early life stress experience may be at increased risk of initiating and maintaining drug addiction. The fact that early isolation enhances responding for food in female rats, but not male rats, may provide an insight into the role of early life stress on gender differences in vulnerability to develop eating disorders.
women gender results food life work experience differences stress risk insight possibility study addiction female male isolation eating early fact vulnerability
I believe life has become more stressful for young, growing children. Kids are growing up in a much more stressed environment. These are multiple gene disorders and, like diabetes, not everyone with the gene gets diabetes. But if they have the genetic vulnerability to become depressed or anxious or obsessive compulsive, it will express itself in the kind of social pressure cooker we are putting our children in.
environment life children kind growing kids pressure young vulnerability social express
It's a security vulnerability and therefore needs to be dealt with.
security vulnerability
We encourage anyone who has any security issues to bring them to our attention. Following the good protocol in vulnerability management, we will fix it. Security is an ongoing issue that we will always monitor relentlessly and carefully.
management security good attention encourage issues vulnerability
Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users. The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file.
work media open vulnerability code
Showing 1 to 25 of 130 results
You must log in to post a comment.
There are no comments yet.