Sentences with phrase «not as an attack»

I hope you will take this not as me attacking your views but as me honestly attempting to better understand a particular viewpoint that has baffled me for years.
Better to read this not as an attack on managers, controllers and professionals but as a guide to the listening that must go on if healing is to occur.
United aren't as attacking as they used to be.
Amavi isn't as attacking as Moreno.
At the very moment when a student might be gearing up to react to the teacher's comments as a threat, a sign of the teacher's personal disapproval or bias, the Post-it gave the student an alternative frame through which to view those comments — not as an attack, in other words, but as a vote of confidence that the student was capable of high - quality work.
«At the very moment when a student might be gearing up to react to the teacher's comments as a threat, a sign of the teacher's personal disapproval or bias, the Post-it gave the student an alternative frame through which to view those comments — not as an attack, in other words, but as a vote of confidence,» writes Tough.
I mean this question not as an attack but genuinely put.

Not exact matches

Members of the Trump administration walked out of the White House Correspondents» Dinner Saturday night during a performance by standup comic Michelle Wolf, who attacked the administration's relationship to the truth as well as the past behavior of the president, who did not attend the event for the second year in a row.
Important factors that could cause actual results to differ materially from those reflected in such forward - looking statements and that should be considered in evaluating our outlook include, but are not limited to, the following: 1) our ability to continue to grow our business and execute our growth strategy, including the timing, execution, and profitability of new and maturing programs; 2) our ability to perform our obligations under our new and maturing commercial, business aircraft, and military development programs, and the related recurring production; 3) our ability to accurately estimate and manage performance, cost, and revenue under our contracts, including our ability to achieve certain cost reductions with respect to the B787 program; 4) margin pressures and the potential for additional forward losses on new and maturing programs; 5) our ability to accommodate, and the cost of accommodating, announced increases in the build rates of certain aircraft; 6) the effect on aircraft demand and build rates of changing customer preferences for business aircraft, including the effect of global economic conditions on the business aircraft market and expanding conflicts or political unrest in the Middle East or Asia; 7) customer cancellations or deferrals as a result of global economic uncertainty or otherwise; 8) the effect of economic conditions in the industries and markets in which we operate in the U.S. and globally and any changes therein, including fluctuations in foreign currency exchange rates; 9) the success and timely execution of key milestones such as the receipt of necessary regulatory approvals, including our ability to obtain in a timely fashion any required regulatory or other third party approvals for the consummation of our announced acquisition of Asco, and customer adherence to their announced schedules; 10) our ability to successfully negotiate, or re-negotiate, future pricing under our supply agreements with Boeing and our other customers; 11) our ability to enter into profitable supply arrangements with additional customers; 12) the ability of all parties to satisfy their performance requirements under existing supply contracts with our two major customers, Boeing and Airbus, and other customers, and the risk of nonpayment by such customers; 13) any adverse impact on Boeing's and Airbus» production of aircraft resulting from cancellations, deferrals, or reduced orders by their customers or from labor disputes, domestic or international hostilities, or acts of terrorism; 14) any adverse impact on the demand for air travel or our operations from the outbreak of diseases or epidemic or pandemic outbreaks; 15) our ability to avoid or recover from cyber-based or other security attacks, information technology failures, or other disruptions; 16) returns on pension plan assets and the impact of future discount rate changes on pension obligations; 17) our ability to borrow additional funds or refinance debt, including our ability to obtain the debt to finance the purchase price for our announced acquisition of Asco on favorable terms or at all; 18) competition from commercial aerospace original equipment manufacturers and other aerostructures suppliers; 19) the effect of governmental laws, such as U.S. export control laws and U.S. and foreign anti-bribery laws such as the Foreign Corrupt Practices Act and the United Kingdom Bribery Act, and environmental laws and agency regulations, both in the U.S. and abroad; 20) the effect of changes in tax law, such as the effect of The Tax Cuts and Jobs Act (the «TCJA») that was enacted on December 22, 2017, and changes to the interpretations of or guidance related thereto, and the Company's ability to accurately calculate and estimate the effect of such changes; 21) any reduction in our credit ratings; 22) our dependence on our suppliers, as well as the cost and availability of raw materials and purchased components; 23) our ability to recruit and retain a critical mass of highly - skilled employees and our relationships with the unions representing many of our employees; 24) spending by the U.S. and other governments on defense; 25) the possibility that our cash flows and our credit facility may not be adequate for our additional capital needs or for payment of interest on, and principal of, our indebtedness; 26) our exposure under our revolving credit facility to higher interest payments should interest rates increase substantially; 27) the effectiveness of any interest rate hedging programs; 28) the effectiveness of our internal control over financial reporting; 29) the outcome or impact of ongoing or future litigation, claims, and regulatory actions; 30) exposure to potential product liability and warranty claims; 31) our ability to effectively assess, manage and integrate acquisitions that we pursue, including our ability to successfully integrate the Asco business and generate synergies and other cost savings; 32) our ability to consummate our announced acquisition of Asco in a timely matter while avoiding any unexpected costs, charges, expenses, adverse changes to business relationships and other business disruptions for ourselves and Asco as a result of the acquisition; 33) our ability to continue selling certain receivables through our supplier financing program; 34) the risks of doing business internationally, including fluctuations in foreign current exchange rates, impositions of tariffs or embargoes, compliance with foreign laws, and domestic and foreign government policies; and 35) our ability to complete the proposed accelerated stock repurchase plan, among other things.
It's not known whether criminals have been able to carry out such attacks as neither Meltdown nor Spectre leave any traces in log files.
Bezos and Trump are not on good terms, as Trump has repeatedly attacked Bezos - owned Amazon and The Washington Post.
Democratic Sen. Jeanne Shaheen and Republican Sen. James Risch say they've been told that the administration isn't considering what some describe as «bloody nose» approach — meaning a military attack intended to demonstrate U.S. resolve but not lead to war.
The requests for Vine are not surprising, as the video streaming service has become an increasingly popular tool for documenting protests, the aftermath of terrorism attacks, and other current events.
One explanation offered by officials suggests that Russia could just be infiltrating systems as leverage in a coordinated attack down the road — that is, theft may not be the main goal, according to the Times.
Investigators have also not ruled out that the attacks could have been racially motivated, as both people killed by the explosions were African - American, and the woman who was injured by the third attack was Hispanic, according to police.
The majority of business hacking attacks don't make the headlines but they can be just as devastating to both the business and the customer alike.
Between 75 % and 80 % of all malicious attacks come from within an organization, not from an external threat, making it all the more necessary to use ethical hacking services such as security auditing and penetration testing to evaluate your IT infrastructure thoroughly.
Policies that would more effectively attack speculation, such as subjecting home sales to capital - gains taxes, don't even appear to be on the table.
But the wise CEO will quickly embrace the accusation as an opportunity to enhance the company's reputation, not just survive the attack.
«If it's described as an attack on the economy, it suggests that there's not a discussion about what might need to change in terms of monetary and fiscal policy,» he said.
If this is the case, it is best not to engage in an equally attacking tone, as it only fuel the fire behind the grievance.
The coming changes, disruptions, and new technology solutions as well as the changing demands of your clients and customers are not simply head - on challenges - they're lateral attacks, competitive entries from adjacent markets, and newly - enabled ways of doing business that never existed before.
As such, it can't be used to attack routers, but hackers can still eavesdrop on traffic, making it particularly dangerous for corporations.
«What we do know is that the total number of Russian troops on Belarusian territory is not expected to exceed 3,000 personnel,» Gorenburg wrote, and «the likelihood of this exercise serving as cover for some larger nefarious aim, whether it is an attack on Ukraine or Lithuania or a stealth occupation of Belarus, is practically zero.»
The two conservative senators this week expressed deep concern that MacManus was too close to Clinton during her tenure, doesn't share Trump's «America First» agenda and other conservative foreign - policy goals, and, as one of Clinton's closest advisers, was deeply involved in the State Department's initial response to the Benghazi attack.
The current and former chief executives of credit bureau Equifax, which disclosed in September that a data breach affected as many as 145.5 million U.S. consumers, said they did not know who was responsible for the attack.
«The computer incidents investigation team, headed by Mr. Stoyanov, hasn't had any U.S. projects, as the unit primarily investigates cyber attacks on Russian companies,» the company told Reuters by email.
The higher figure does not affect the estimated number of federal employees who had their sensitive information, such as social security numbers and SF - 86 security clearance forms, compromised in the attacks, OPM said in its news release.
Hoping your business will not be the victim of a data breach or hack is bad enough but just as naive and dangerous is believing your security plan is so tight you will never be attacked.
If you don't have a plan in place to prevent and respond to such an attack, you're already behind — but it's also a great time to refresh your plan and make sure things are as secure as possible.
However, our noses don't always get it right, and sometimes our body mistakes harmless things as an attack.
You will spend most of your time convincing the Idea Investor that you and your team are the right people to attack the problem (as they don't have a strong relationship with you or the team).
Your phone is not as important as your life, and if someone is willing to attack you to take yours (which I'd be willing to bet doesn't happen as often as people just swiping it from your hand or purse), it would probably be best to let this violent person have the phone and walk away with your well - being intact.
And if you back up information but store the duplicated materials onsite or in an adjacent building, as some downtown Manhattan businesses did before the terrorist attacks of September 2001, you won't be any better off in a disaster that affects an entire region.
While the organization began dealing with the repercussions of the attack immediately, remediation did not take place until now as «acting too quickly could have caused more data to be compromised,» David Partenheimer, a USPS spokesperson, told the Washington Post.
Pariser insists that the series will still highlight Upworthy's founding ethos: To feature news items that may not be «easy to fall in love with,» (such as the September 11th attacks,) but which are still vital for younger readers to consume and understand.
Rob Ford, defended at every turn by his brother Doug, was prepared to regularly lie about his addictions, to abuse his oath of office, to associate with criminal elements, to dismiss his racist and misogynistic comments as the new normal, and to attack and bully those with the courage to confront him — as if they, not he, were at fault for his transgressions.
Watch out for: The person who holds up big data as a solution to a problem, but can't offer a plan of attack.
As for the Apple malware, the security firm did not say how many people appear to have been impacted, but it said that those who upgraded their operating systems to the latest versions seemed to be safe from the variant of the attack that creates draft emails.
Not long ago, bots were mainly thought of as an IT or somewhat esoteric business problem — the main culprits behind web scraping, brute force attacks, competitive data mining, account hijacking, unauthorized vulnerability scans, spam, and click fraud.
Unlike the US's strike in April 2017, the latest one did not target Syrian jets or airfields — though the earlier attack apparently had little impact, as Syrian jets took off from the damaged airfield within 24 hours and reports of chemical warfare persisted.
It is best not to use social media as a way to attack others.
On October 24, he subsequently said that it was «a troll,» and was «to be used as a bait by a friend so the attack wouldn't fall back on him.»
And those other workers, by the way, were already unionized, making it a sneak attack not just on the employer, but a rival union as well.
When a competitor is so much stronger than you as to have the clear advantage, it's not the time to attack and put yourself on its radar.
But recently, as Bernie Sanders has upped his rhetorical attacks against Wall Street, and Clinton's perceived ties to it, Clinton has started to sound like she wouldn't nominate a Wall Streeter either.
Pinker's extensively researched thesis is that global violence has decreased throughout human history, as wrong as that may feel given the 24 - hour news cycle that came into being not long after two world wars and matured during an age of regular terrorist attacks and mass shootings.
The time to discuss the appropriate scope of the president's authority is now, not in the aftermath of a catastrophic attack on the nation, as Holder suggests.
He didn't attack that meetings week directly, but the slog suddenly grew much more productive as execs started using it to focus on more pressing initiatives.
Bannon, who has referred to the press as «the opposition party,» also warned that the administration's attacks on the media were not likely to soften, but instead would «only get worse.»
a b c d e f g h i j k l m n o p q r s t u v w x y z