Search Details

Word: fas (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...product is a very exciting intellectual program which will present our students with a nationally unrivalled combination of first-class scholars from the FAS and the KSG with whom to study political science and social policy," said department chair Roderick MacFarquhar, who is also Williams professor of history and political science...

Author: By Tara L. Colon, CRIMSON STAFF WRITER | Title: Faculty Council Hears Proposal For Joint FAS, Kennedy School PhD. | 1/8/1999 | See Source »

Students admitted to the program will go through a joint admissions process. First they must complete the regular admissions process for the sociology or government department. In a second phase, an interdisciplinary committee of Kennedy School and FAS faculty will admit the student into the social policy program...

Author: By Tara L. Colon, CRIMSON STAFF WRITER | Title: Faculty Council Hears Proposal For Joint FAS, Kennedy School PhD. | 1/8/1999 | See Source »

Cynthia Langille, Yard Operations and Access Control Systems Coordinator for FAS Physical Resources, says that in Houses with more recently-installed card readers, switching to universal access simply means making technical changes to an already existant system rather than adding equipment...

Author: By Sasha A. Haines-stiles, CRIMSON STAFF WRITERS | Title: The ID Card: What Happens When You Swipe? | 1/6/1999 | See Source »

Julie Hassel, special assistant to the administrative dean within FAS, says similar steps are being taken to alleviate safety concerns within dorm rooms as well, where most students do most of their typing...

Author: By Neeraj K. Gupta, CRIMSON STAFF WRITER | Title: HASCS Equalizes House Resources | 12/14/1998 | See Source »

...Changing your password is one of the most important things you can do to maintain the security of your own FAS e-mail account," Osterberg says. "Each insecure individual account is a weak link in the chain, which may allow a malicious outside user to gain access to our system. By doing what we can to maintain the security of the individual accounts, we increase the overall security of the system as a whole...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | Next