Search Details

Word: breaches (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Between 1836 and 1914, the U.S. lacked a central bank; Morgan stepped boldly, sometimes magnificently, into that breach. When gold reserves backing the country's legal tender dipped perilously low in 1895, he masterminded a bond issue in New York and London that replenished the gold stock--one of many acts he performed that preserved America's credit abroad and evinced a new financial maturity that won the confidence of foreign investors...

Author: /time Magazine | Title: Blessed Barons | 12/7/1998 | See Source »

...their underwear at three in the morning, sleep in our rooms, brush their teeth in our sinks, even shower in our bathrooms (and don't even think they aren't using our shampoo). We at Dartboard urge all upstanding Harvard men and women: Do not tolerate this breach of community! Gong them out the door, back to their real rooms, where they belong...

Author: NO WRITER ATTRIBUTED | Title: DARTBOARD | 12/4/1998 | See Source »

...could one day run without the need for an expensive operating system like Windows. To head off that threat, Microsoft licensed Java from Sun in 1995 and used it to create its own "polluted"--or incompatible--version, which discouraged software developers from using the original Sun program. Sun cried breach of contract, and a lawsuit followed. Now Judge Ronald Whyte has handed Redmond a February deadline to stop shipping Java technology--currently included in Windows 98, Internet Explorer and even the humble Microsoft Office suite--without first getting Sun's seal of approval...

Author: /time Magazine | Title: Sun Pours Java All Over Bill | 11/30/1998 | See Source »

...nature of the Internet, it'ssometimes difficult to precisely pinpoint theoriginal attacker. It's very early in the processright now to know exactly where it will lead.Obviously, in a situation like this, the primarygoal is to stop the security breach, and theninvestigate," he said...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

This past week's security breach is not thefirst such incident at Harvard...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

Previous | 99 | 100 | 101 | 102 | 103 | 104 | 105 | 106 | 107 | 108 | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | Next