Word: connect
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...Liberals have failed to tie Watergate to the rest of Nixonism to avoid implicating men dear to the Eastern establishment. If we connect Watergate to Nixon's foreign policy, and his attitudes toward Congress and the two-party system, we must ask about the roles of men such as Kissinger, Richardson, Weinberger and Schlesinger--to name, for example, a few of the Harvard men in this administration...
Nearly all the town's 341 subscribers said that they relished cranking their telephones to signal the operator, since someone familiar was bound to be at the other end. The six local operators connect subscribers by name as readily as by number, and the 40 seconds or so it takes for them to put through a call constitute, for most of the townspeople, a gossipy interval to be savored rather than speeded up. Each local operator is at once town crier, rumor center and community commissioner of safety. How can a system that depends so deeply on amity...
...investigators that Colson called him last year on May 15, the day Alabama Governor George C. Wallace was shot, and just two weeks before the first Watergate breakin. Hunt said Colson asked him to burglarize the assailant's Milwaukee apartment to see if anything could be found to connect Arthur H. Bremer with leftist causes. Hunt refused on the ground that official investigators already would be examining Bremer's quarters and might catch...
...books will go into the Pusey Library. It will house only overflow--the University Archives, the map collection, the theater collection and about one-million other miscellaneous books--from Widener, Houghton and Lamont. Underground passageways will connect the Pusey Library to the surrounding libraries to make transfer of books easier...
...University budget is a $2.2 million automation plan which Harvard is undertaking. Alarms, electronic security doors similar to Eliot's, closed circuit television for security areas and other types of automated security will all be centralized by a network of computer cables running through the steam tunnels which connect University buildings...