Search Details

Word: correctives (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...RAPE of two women last weekend at the Business School brings to light the security problems that students and employees face. The chief security problem seems to be a lack of communication. The aims of the University's escort system, for example, are correct, but the University should step up its campaign to inform students of its protective services. The University, while continuing to emphasize its campaign to lock doors and protect property, must also begin a program--as a newly-formed student group suggests--based on attack prevention, and a counseling service for victims of attack, including a hotline...

Author: NO WRITER ATTRIBUTED | Title: Improving Security | 4/22/1980 | See Source »

...important uses, such as vital transportation or petrochemical production. This is the unavoidable step needed to establish correct energy prices and the basis for sound economic growth...

Author: /time Magazine | Title: Business: Capitalism: Is It Working...? Of Course, but... | 4/21/1980 | See Source »

...obvious that Dean didn't want to be seen with me if he could avoid it. His attitude meant I was hot. We walked into the park and sat down. Turning to Dean I said: "Am I correct in assuming that you're the damage control action officer for this problem...

Author: /time Magazine | Title: Special Section: Watergate's Sphinx Speaks | 4/21/1980 | See Source »

...Nixon's Chief of Staff] called me to the White House and told me that the original submissions from the electronic surveillance were unsatisfactory. I assumed he was speaking for Haldeman, so I repeated what McCord had told me of the technical problem and that we intended to correct it by going back in shortly...

Author: /time Magazine | Title: Special Section: Watergate's Sphinx Speaks | 4/21/1980 | See Source »

...thief perform his electronic wizardry? After opening his account at Bank B under a fictitious name, he taps into the correct transmission line. For a specialist, says Robert Jacobson, a Manhattan expert on high-technology fraud, this is as easy as tapping a telephone circuit. The thief then routes the transmissions between his bank and Bank A through a microcomputer programmed to calculate what additional amounts will result in the same code numbers as those in the genuine messages. When instructions come through to the thief s bank for a transfer of funds, the computer quickly adds an order that...

Author: /time Magazine | Title: Science: A New Way to STK Up Banks | 4/21/1980 | See Source »

Previous | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | Next