Search Details

Word: backup (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Scalise used his complete roster against HolyCross, as all 32 players who suited up saw someaction. Backup goalie Bob Lapsley entered the gamein the fourth quarter to relieve Bergmann--hisfirst action in more than five games--and earnedcredit for a save...

Author: By Joseph Kaufman, | Title: Laxmen Stop Crusaders, 18-3 | 5/4/1987 | See Source »

Designated hitter Ellen Cox, outfielder Elizabeth Wald and backup infielders Brita Lind and Nancy Colbert round out the line...

Author: NO WRITER ATTRIBUTED | Title: Practiced Infield | 4/14/1987 | See Source »

...home Kemp relaxes in his book-lined den with football trophies and framed family photographs crowding the mantle. A giant black satellite dish ! connected to his 20-inch RCA television allows him to watch most of the games of his eldest son Jeff, a backup quarterback for the San Francisco 49ers. He hates the campaign travel, hates being separated from his family...

Author: /time Magazine | Title: Campaign Portrait, Jack Kemp:The Quarterback Of Supply Side | 4/13/1987 | See Source »

Unfortunately, computer users have little in the way of legal protection from such invasions of privacy, especially when they are working on a company- owned system. Recent court actions provide plenty of examples. In one case, the Government used computer backup tapes obtained by the FBI to help prove that a Pratt & Whitney employee was selling sensitive pricing data to a competitor. Lawyers for the employee argued that the FBI had violated his Fourth Amendment rights against unreasonable search by seizing messages from a storage device that constituted his personal "electronic file cabinet." The appeals court disagreed, saying that since...

Author: /time Magazine | Title: Computers: Can A System Keep a Secret? | 4/6/1987 | See Source »

...apply to those using public communications networks like the Source and CompuServe. The Electronic Communication Privacy Act, signed into law last fall, makes it a felony to intercept private messages sent through the networks and stipulates that law- enforcement officials must obtain a search warrant in order to examine backup copies stored in their computers...

Author: /time Magazine | Title: Computers: Can A System Keep a Secret? | 4/6/1987 | See Source »

Previous | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | Next