Server Room Quotes

We've searched our database for all the quotes and captions related to Server Room. Here they are! All 26 of them:

We can also discuss how I might cost Mom the entire election because I'm a one-man bisexual wrecking ball who exposed the vulnerability of the White House private email server." "You think?' his dad says. "Nah. Come on. I don't think this election is gonna hinge on an email server." Alex arches a brow. "You sure about that?" "Listen, maybe if Richards had more time to sow those seeds of doubt, but I don't think we're there. Maybe if it were 2016. Maybe if this weren't an America that already elected a woman to the highest office once. Maybe if I weren't sitting in a room with the three assholes responsible for electing the first openly gay man to the Senate in US history." Alex whoops and Luna inclines his head and raises his beer. "But, nah. Is it gonna be a pain in your mom's ass for the second term? Shit, yeah. But she'll handle it.
Casey McQuiston (Red, White & Royal Blue)
An enormous urn of coffee was being put to use by both cops and servers. One of her own uniforms was helping himself to a tray of fancy finger food and another was already hitting the dessert cart. It only took her presence to have the room falling into stillness, and silence. "Officers, if you can manage to tear yourselves away from the all-you-can-eat buffet, take posts outside the doors of both kitchen exits. As cause of death has not yet been officially called, I'll remind you that you're stuffing evidence in your faces. If necessary, I'll have you both cut open so that evidence can be removed.
J.D. Robb (Reunion in Death (In Death, #14))
They went around the room telling stories about how they'd gotten here. No two were exactly the same, but there was always a certain family resemblance. Somebody went looking for a lost ball in an alley, or a stray goat in a drainage ditch, or fallowed an inexplicable extra cable in the high school computer room which led to a server closet that had never been there before.
Lev Grossman (The Magicians (The Magicians, #1))
There was a noise coming from up ahead. Not footsteps, thank God, but the low hum of computer fans and of air-conditioning working overtime. You hear server rooms before you see them.
Ruth Ware (Zero Days)
Really? I love this place. We draw more power in this room than the average small town in Maryland. The spinning servers down there actually generate enough friction to reduce our heating bill by forty percent in the winter.” He spread his arms and smiled. “See? Even the NSA is going green!
Andrew Warren (Red Phoenix (Thomas Caine #2))
Like most people, when I look back, the family house is held in time, or rather it is now outside of time, because it exists so clearly and it does not change, and it can only be entered through a door in the mind. I like it that pre-industrial societies, and religious cultures still, now, distinguish between two kinds of time – linear time, that is also cyclical because history repeats itself, even as it seems to progress, and real time, which is not subject to the clock or the calendar, and is where the soul used to live. This real time is reversible and redeemable. It is why, in religious rites of all kinds, something that happened once is re-enacted – Passover, Christmas, Easter, or, in the pagan record, Midsummer and the dying of the god. As we participate in the ritual, we step outside of linear time and enter real time. Time is only truly locked when we live in a mechanised world. Then we turn into clock-watchers and time-servers. Like the rest of life, time becomes uniform and standardised. When I left home at sixteen I bought a small rug. It was my roll-up world. Whatever room, whatever temporary place I had, I unrolled the rug. It was a map of myself. Invisible to others, but held in the rug, were all the places I had stayed – for a few weeks, for a few months. On the first night anywhere new I liked to lie in bed and look at the rug to remind myself that I had what I needed even though what I had was so little. Sometimes you have to live in precarious and temporary places. Unsuitable places. Wrong places. Sometimes the safe place won’t help you. Why did I leave home when I was sixteen? It was one of those important choices that will change the rest of your life. When I look back it feels like I was at the borders of common sense, and the sensible thing to do would have been to keep quiet, keep going, learn to lie better and leave later. I have noticed that doing the sensible thing is only a good idea when the decision is quite small. For the life-changing things, you must risk it. And here is the shock – when you risk it, when you do the right thing, when you arrive at the borders of common sense and cross into unknown territory, leaving behind you all the familiar smells and lights, then you do not experience great joy and huge energy. You are unhappy. Things get worse. It is a time of mourning. Loss. Fear. We bullet ourselves through with questions. And then we feel shot and wounded. And then all the cowards come out and say, ‘See, I told you so.’ In fact, they told you nothing.
Jeanette Winterson
A slave in serving dress presented Kestrel with wine, then led the way to an open solarium with a low fountain and hothouse flowers. Musicians played discreetly behind an ebony screen as guests greeted each other, some chatting where they stood, others retreating for quiet conversations on the stone benches lining the fountain. Kestrel turned to face Arin. His eyes were dazed with anger, his hands clenched. “Arin,” she began, concerned, but his gaze flicked away and settled on some point across the room. “Your friends are here,” he said. She followed his line of sight to see Jess and Ronan laughing at something Benix had said. “Dismiss me,” Arin said. “What?” she said, though in fact he was the only escort in the room. The slaves who threaded through the crowd were servers, and Irex’s. “Join your friends. I don’t want to stay here anymore. Send me to the kitchens.” She took a breath, then nodded. He spun on his heel and was gone. She felt instantly alone. She hadn’t expected this. But when she asked herself what she had expected, she had a foolish image of her and Arin sitting on a bench together. Kestrel looked up at the glass roof, a pyramid of purple sky. She saw the sharp cut of the moon, and remembered Enai saying that it was best to recognize the things one cannot change. She crossed the room to greet her friends.
Marie Rutkoski (The Winner's Curse (The Winner's Trilogy, #1))
Until now. You and I are a mis-Match, Ellie, because I hacked into your servers to manipulate our results.” “Rubbish,” Ellie said, secretly balking at the notion. She folded her arms indignantly. “Our servers are more secure than almost every major international company across the world. We receive so many hacking attempts, yet no one gets in. We have the best software and team money can buy to protect us against people like you.” “You’re right about some of that. But what your system didn’t take into account was your own vanity. Do you remember receiving an email some time ago with the subject ‘Businesswoman of the Year Award’? You couldn’t help but open it.” Ellie vaguely remembered reading the email as it had been sent to her private account, which only a few people had knowledge of. “Attached to it was a link you clicked on and that opened to nothing, didn’t it?” Matthew continued. “Well, it wasn’t nothing to me, because your click released a tiny, undetectable piece of tailor-made malware that allowed me to remotely access your network and work my way around your files. Everything you had access to, I had access to. Then I simply replicated my strand of DNA to mirror image yours, sat back and waited for you to get in touch. That’s why I came for a job interview, to learn a little more about the programming and systems you use. Please thank your head of personnel for leaving me alone in the room for a few moments with her laptop while she searched for a working camera to take my head shot. That was a huge help in accessing your network. Oh, and tell her to frisk interviewees for lens deflectors next time—they’re pocket-sized gadgets that render digital cameras useless.
John Marrs (The One)
The thing about Web companies is there's always something severely fucked-up. There is always an outage, always lost data, always compromised customer information, always a server going offline. You work with these clugey internal tools and patch together work-arounds to compensate for the half-assed, rushed development, and after a while the fucked-upness of the whole enterprise becomes the status quo. VPs insecure that they're not as in touch as they need to be with conditions on the ground insert themselves into projects midstream and you get serious scope creep. You present to the world this image that you're a buttoned-down tech company with everything in its right place but once you're on the other side of the firewall it looks like triage time in an emergency room, 24/7. Systems break down, laptops go into the blue screen of death, developers miskey a line of code, error messages appear that mean absolutely nothing. The instantaneousness with which you can fix stuff creates a culture that works by the seat of its pants. I swear the whole Web was built by virtue of developers fixing one mistake after another, constantly forced to compensate for the bugginess of their code.
Ryan Boudinot (Blueprints of the Afterlife)
The party spills over with guests, from the ballroom to the front lawn. It’s nighttime, but the house is lit up, bright as the sun. All around me diamonds glitter. We’ve reached that tipping point where everyone is sloshed enough to smile, but not so much they start to slur. There’s almost too many people, almost too much alcohol. Almost too much wealth in one room. It reminds me of Icarus, with his wings of feather and wax. If Icarus had a five-hundred-person guest list for his graduation party. It reminds me of flying too close to the sun. I snag a flute of champagne from one of the servers, who pretends not to see. The bubbles tickle my nose as I take a detour through the kitchen. Rosita stands at the stove, stirring her world-famous jambalaya in a large cast iron pot. The spices pull me close. I reach for a spoon. “Is it ready yet?” She slaps my hand away. “You’ll ruin your pretty dress. It’ll be ready when it’s ready.” We have caterers who make food for all our events, but since this is my graduation party, Rosita agreed to make my favorite dish. She’s going to spoon some onto little puff pastry cups and call it a canape. I try to pout, but everything is too perfect for that. Only one thing is missing from this picture. I give her a kiss on the cheek. “Thanks, Rosita. Have you seen Daddy?” “Where he always is, most likely.” That’s what I’m afraid of. Then I’m through the swinging door that leads into the private side of the house. I pass Gerty, our event planner, who’s muttering about guests who aren’t on the invite list. I head up the familiar oak staircase, breathing in the scent of our house. There’s something so comforting about it. I’m going to miss everything when I leave for college. At the top of the stairs, I hear men’s voices. That isn’t unusual. I’m around the corner from Daddy’s offic
Skye Warren (The Pawn (Endgame, #1))
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
Some of these bots are already arriving in 2021 in more primitive forms. Recently, when I was in quarantine at home in Beijing, all of my e-commerce packages and food were delivered by a robot in my apartment complex. The package would be placed on a sturdy, wheeled creature resembling R2-D2. It could wirelessly summon the elevator, navigate autonomously to my door, and then call my phone to announce its arrival, so I could take the package, after which it would return to reception. Fully autonomous door-to-door delivery vans are also being tested in Silicon Valley. By 2041, end-to-end delivery should be pervasive, with autonomous forklifts moving items in the warehouse, drones and autonomous vehicles delivering the boxes to the apartment complex, and the R2-D2 bot delivering the package to each home. Similarly, some restaurants now use robotic waiters to reduce human contact. These are not humanoid robots, but autonomous trays-on-wheels that deliver your order to your table. Robot servers today are both gimmicks and safety measures, but tomorrow they may be a normal part of table service for many restaurants, apart from the highest-end establishments or places that cater to tourists, where the human service is integral to the restaurant’s charm. Robots can be used in hotels (to clean and to deliver laundry, suitcases, and room service), offices (as receptionists, guards, and cleaning staff), stores (to clean floors and organize shelves), and information outlets (to answer questions and give directions at airports, hotels, and offices). In-home robots will go beyond the Roomba. Robots can wash dishes (not like a dishwasher, but as an autonomous machine in which you can pile all the greasy pots, utensils, and plates without removing leftover food, with all of them emerging cleaned, disinfected, dried, and organized). Robots can cook—not like a humanoid chef, but like an automated food processor connected to a self-cooking pot. Ingredients go in and the cooked dish comes out. All of these technology components exist now—and will be fine-tuned and integrated in the decade to come. So be patient. Wait for robotics to be perfected and for costs to go down. The commercial and subsequently personal applications will follow. By 2041, it’s not far-fetched to say that you may be living a lot more like the Jetsons!
Kai-Fu Lee (AI 2041: Ten Visions for Our Future)
If computers are readily accessible, and they have a floppy disk or CD drive, you might also consider fitting locks to floppy and CD drives, or (in extreme cases) removing the floppy and CD drives from the computers altogether. If the server or control room Stations have unused USB ports, they should be disabled to prevent memory sticks or other uncontrolled devices from being connected to the system. Such devices may be used to introduce virus or other malware. You should also consider disabling or physically protecting the power button to prevent unauthorized use.
Anonymous
Just last year, Mrs. Clinton claimed that as secretary of state she didn’t carry a work phone. It was too cumbersome and inconvenient for her to carry two phones. She didn’t have room for them. Then we learned she carried an iPhone and BlackBerry, neither government issued nor encrypted. Then we learned she carried an iPad and an iPad mini. But she claimed she didn’t do email. Then we learned she had email—on a private server. But then she claimed her email was for personal correspondence, yoga, and wedding planning. Then we learned her email contained government business as well—lots of it. Listen, nobody transmits classified material on the Internet! Nobody! You transmit classified material via a closed-circuit, in-house intranet or even physically via courier. You can’t even photocopy classified data except on a machine specially designed for hush-hush material, and even then you still require permission from whatever agency and issuer the document originated. So the only way for that material to be transmitted over an email is for her or someone in her office to dictate, Photoshop, or white-out the classified material in question, to remove any letterhead, or to duplicate the material by rewriting it in an email. Government email accounts are never allowed to accept emails from nongovernment email accounts. We’re supposed to delete them right away. Exceptions exist for communications with private contractors, but those exceptions are built into the system. I repeat: To duplicate classified material without permission or to send it over an unsecured channel is completely illegal. That’s why every government agency employs burn bags, safes, and special folders for anything marked Confidential, Secret, and Top Secret. People have lost their careers and gone to jail for far less. Yet Hillary Clinton transmitted classified material by the figurative ton. No one else can operate like that in government. But she takes her normal shortcuts and continues to lie about it. There is no greater example of double standards in leadership than First Lady, Senator, and Secretary of State Hillary Clinton. Is it too inconvenient or cumbersome for her to follow the same rules that agents in the field have to follow? Maybe it would make morale too high? Clinton’s behavior harkens to the old motto: “The beatings will continue until morale improves.
Gary J. Byrne (Crisis of Character: A White House Secret Service Officer Discloses His Firsthand Experience with Hillary, Bill, and How They Operate)
On a Monday evening in March in a “room full of political reporters,” Mrs. Clinton said: “I am all about new beginnings.… So here goes, no more secrecy, no more zone of privacy.” Just four days later, Clinton’s attorney informed Congress that she had deleted all emails on a private server that she used for both personal and official State Department communications while serving as secretary of state, having delivered to the State Department only those that she deemed sufficiently work-related to turn over.
Anonymous
That leaves the category of pasture-raised chickens. It seems they’re living the poultry dream—and, according to Jason, we could be, too. I nod as I take another swallow of beer. I don’t say that it sounds like an enormous amount of work or that we live in arguably one of the harshest climates in the continental United States. Nor do I point out that having spent our entire careers jockeying keyboards to make a living, we are not farmers. So while I don’t exactly tune him out, I become a passive listener. A very passive listener. Poultry isn’t exactly the foreplay talk I was hoping for, so instead I just enjoy the rhythm and cadence of his voice. I hear something about pastured hens for- aging on fresh grasses producing healthier, delicious eggs with less fat and cholesterol, something about the local food movement and its ability to remake America’s food system. I signal the server for a second beer and let it all wash over me with an occasional nod until an utterly un-ignorable statement pulls me out. “This is the kind of farm I want to start.” Now I’m listening. In fact, I’m listening so hard I realize that this particular corner of the restaurant is a convergence point for the piped-in music from two separate rooms, and they’re competing against each other like dueling mariachi bands.
Lucie Amundsen
Blazing bamboo torches lit the way to the tiki hut beside Sarasota Bay at Mote Marine Aquarium. The thatch-roofed pavilion sheltered wooden picnic tables wrapped with raffia skirting and crowned with centerpieces of conch shells filled with sprays of orchids. Potted palms and red hibiscuses had been placed around the perimeter of the outdoor room. The atmosphere was redolent with roasting pork and salt air. "This is ridic!" exclaimed Piper. "We're never leaving." She scooped a watermelon margarita garnished with a paper umbrella from the tray of a passing server. Jack helped himself to a Captain Morgan on the rocks. "To us," he said, raising his glass. Trays of skewered beef teriyaki and sweet-and-sour chicken were passed.
Mary Jane Clark (Footprints in the Sand (Wedding Cake Mystery, #3))
Hugh just dropped off the cheese selection for the week. I thought you'd like to sample?" I perked up immediately. Sampling cheese sounded fun. I was starving. The Hobnobs hadn't been particularly filling. The light, airy dining room was a beehive of activity. Four servers buzzed around, readying tables, wrapping silverware. Outside someone was watering the ornamental cabbages. I sat at a table with Chandice and tasted a half dozen local cheeses. A sharp English cheddar with a bite that lingered just at the hint of your jaw, a creamy goat cheese lavished with a sweet onion chutney. Stuffing the last of a very toothsome local blue cheese into my mouth, I looked around at the happy bustle with satisfaction. This is what I had always dreamed of, this bright hive of positive energy.
Rachel Linden (The Magic of Lemon Drop Pie)
A defective filter permits the “grounds to get mixed up with the coffee.” An ADDer experiences the world as a barrage to his senses—noises, sights and smells rush in without barriers or protection. Normal noise levels can interfere with his ability to hear conversations or maintain a train of thought. Even in a relatively quiet restaurant, background noises compete for attention and interfere with the ability to listen to the server. During a telephone call, the ADDer may snap at a spouse who makes the slightest noise in the room. Unfiltered visual distractions can make shopping a nightmare. The process of scanning the contents of a large department store can be agonizing. The quantity of choices is overwhelming and often creates feelings of intense anxiety and irritation.
Kate Kelly (You Mean I'm Not Lazy, Stupid or Crazy?!: The Classic Self-Help Book for Adults with Attention Deficit Disorder (The Classic Self-Help Book for Adults w/ Attention Deficit Disorder))
Italian restaurants are the stuff romantic dates are made of. Usually. If you think about it, it's a formula that works: a cozy room full of dark, earthy woods; menus that indulge with multiple courses of carbohydrates; plus servers with seductive accents who deliver the food with knowing looks. As they say, that's amore. All of these restaurants define themselves as Tuscan or Northern Italian, which means you can count on them for amazing house-made pastas along with classic meat and fish dishes.
Amy Thomas (Brooklyn in Love: A Delicious Memoir of Food, Family, and Finding Yourself (Mother's Day Gift for New Moms))
The school stank of Lysol, and several times a day they all had to line up and wash their hands. Clean hands save lives was the message being hammered into them. When it came to spreading infection, they were informed, they themselves--school kids--were the biggest culprits. Even if you weren't sick yourself, you could shed germs and make other people sick. Cole was struck by the word shed. The idea that he could shed invisible germs the way Sadie shed dog hairs was awesome to him. He pictured the germs as strands of hair with legs like centipedes, invisible but crawling everywhere. Minibottles of sanitizer were distributed for use when soap and water weren't available. Everyone was supposed to receive a new bottle each day, but the supply ran out quickly--not just at school but all over. Among teachers this actually brought relief, because the white, slightly sticky lotion was so like something else that some kids couldn't resist. Gobs started appearing on chairs, on the backs of girls' jeans, or even in their hair, and one boy caused an uproar by squirting it all over his face. Never Sneeze into Your Hand, read signs posted everywhere. And: Keep Your Hands to Yourself (these signs had actually been there before but now had a double meaning). If you had to sneeze, you should do it into a tissue. If you didn't have a tissue, you should use the crook of your arm. "But that's vomitous," squealed Norris (one of the two whispering blondes). These rules were like a lot of other school rules: nobody paid much attention to them. Some school employees started wearing rubber gloves. Cafeteria servers, who already wore gloves, started wearing surgical masks as well. Cole lost his appetite. He couldn't stop thinking about hospitals. Flesh being cut open, flesh being sewn up. How could you tell if you had the flu? The symptoms were listed on the board in every room: Fever. Aches. Chills. Dry cough. What must you do if you had these symptoms? YOU MUST STAY HOME.
Sigrid Nunez (Salvation City)
When I returned from the triclinium, where the guests were finishing their honey cakes and drinking from jeweled goblets of pear juice, a woman entered the kitchen from a side door. Out of all the surprises I'd had that day, she was the most surprising of all. The vision of her dark eyes, waves of auburn curls, and the sylphlike curve of her hips would haunt me in the days to come. "I came for Apicata's meal," she said. Her voice floated across the room, undulations of sound washing over my skin. This was the woman Aelia had said would come for the tray. Passia. The name glittered in my mind as I made the connection. "Is that it?" She pointed, one long finger tipped with carefully curved, pink-pale nails. I had been standing like a statue, stunned by my close proximity to what I thought might be the physical manifestation of Venus herself. "That's the plate, yes, over there. There." Suddenly I wished she would leave. If not, all would be lost. I wouldn't be able to complete the cena, wouldn't be able to direct the servers, and would end up under the lash as the result of my gloomy failure to live up to Apicius's expectations. Inside my head, I said a prayer to Venus that Passia would go, but in the same breath, I begged the goddess that Passia would remember me, as I knew I would remember every sumptuous detail about the moments she stood before me.
Crystal King (Feast of Sorrow)
But a cybersecurity specialist on their team talked them out of this game plan. She pointed out that it would pose an unacceptable risk of Prometheus breaking out and seizing control of its own destiny. Because they weren’t sure how its goals would evolve during its recursive self-improvement, they had decided to play it safe and go to great lengths to keep Prometheus confined (“boxed”) in ways such that it couldn’t escape onto the internet. For the main Prometheus engine running in their server room, they used physical confinement: there simply was no internet connection, and the only output from Prometheus was in the form of messages and documents it sent to a computer that the Omegas controlled.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
Almost impatiently, Sybil stood by while the gray-eyed man wearing a powdered wig signed the guest book. Her glance shifted to the book. “Welcome, Mr. and Mrs. Sobczak. I expect you’ll enjoy your stay,” Sybil said, and clapped her hands. Two ATU agents, dressed as servers, moved closer. “Ma’am?” one of them—Sybil thought his name was Mike—asked. “Please escort Mr. and Mrs. Sobczak to the dining room.
Cynthia Fridsma (Volume 5: The End Game (Hotel of Death))
Even after seeing the reaction to that first story, I predicted the fever would lift in a week or so, that people would get tired of reading about the intricacies of the Federal Records Act (snooze) and move on. But the story only gained speed. I’d never been a part of anything like it. The standout scandals of 2008 (Jeremiah Wright, Bristol Palin’s teen pregnancy) mostly offended along ideological divides, storms that would eventually pass. But the private server was more like an avalanche, blind outrage that barreled through every newsroom and war room, devouring everything.
Amy Chozick (Chasing Hillary: On the Trail of the First Woman President Who Wasn't)