Search Details

Word: ashtons (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...CSIA "budges science and public policy," said Assistant Professor Ashton B. Carter, a former research fellow at the CSIA and soon-to-be assistant director "But the bridge has two ends," added Carter, who said the center provides fellowships for both scientists and government experts...

Author: By Jonathan M. Moses, | Title: K-School Science Post Goes to Gov Prof Nye | 6/6/1985 | See Source »

...million in kickbacks from a subcontractor (see box). Veliotis has produced tapes and company documents that he claims reveal a pattern of waste, corruption and cover-up at General Dynamics. In a tape of one talk he had with Lewis, for example, the chairman suggests that Veliotis reassure James Ashton, a discontented Electric Boat executive, that he is still in the running for a promotion in order to keep him from "popping off" about shoddy work at the yard...

Author: /time Magazine | Title: General Dynamics Under Fire | 4/8/1985 | See Source »

Computer buffs have thousands of exotic software packages to choose from, but most of them still use their machines largely for five basic tasks: writing, calculating, drawing graphs, organizing data and sending messages over telephone lines. Until recently, the biggest news in software was the arrival of programs like Ashton-Tate's Framework or Lotus' Symphony and Jazz that can do all five jobs at once. Now, however, programs designed for quite different uses have begun to catch on. Among them...

Author: /time Magazine | Title: Computers: The New Breeds of Software | 3/18/1985 | See Source »

...communicate over telephone lines) can access the majority of computers in the United States. [Its computer security] becoming more and more critical because we're getting our computers all hooked together through local and national networks; its also getting harder and harder because of the increasing number of micros. "Ashton says. Communications and microcomputers are probably the hottest topics [in computer security] right now, says Russell Kay, director of Computer Security Institute (CSI), a 3000-member trade organization for the computer security field. "Micros are proliferating at an incredibly rapid rate," Kay adds...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

...program that controls access to the computer itself. It is here that hardware companies become involved since operating systems are in general designed by the manufacturer. "If you don't have a good security design in your operating system security within the applications can't be well maintained," says Ashton. Nonetheless, security per se is not generally acknowledged to be the responsibility of the manufacturer. "It's not General Motors' responsibility to enforce the speeding law . . . but one can make cars more crash-resistant," says...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

Previous | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | Next