Search Details

Word: kim (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Kim touted an HCS seminar on computer privacythat was offered last year and will occur againthis year as a way for students to learn moreabout what is public and what...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...Unix was designed to share files andinformation," Kim said. "Not to make it secure...

Author: By Jonathan A. Lewin, | Title: Computer Privacy May Be Jeopardized on 'Net | 2/1/1995 | See Source »

...think [the LaMacchia case] shows that U.S.laws as they stand right now need to be updated totake into account some of the many technologicalissues that are around today," said Eugene E. Kim'96, the former president of the Harvard ComputerSociety...

Author: By Douglas M. Pravda, | Title: MIT Piracy Case Shows Technology Laws Lacking | 2/1/1995 | See Source »

John E. Stafford '96, the current president ofHCS and a Crimson editor, agreed with Kim'sassessment...

Author: By Douglas M. Pravda, | Title: MIT Piracy Case Shows Technology Laws Lacking | 2/1/1995 | See Source »

...would classify all of the above as minorpiracy, and as things that happen all the time,not only at Harvard but everywhere," Kim said. "Ofcourse, minor or not, they are still illegal," headded...

Author: By Douglas M. Pravda, | Title: MIT Piracy Case Shows Technology Laws Lacking | 2/1/1995 | See Source »

Previous | 754 | 755 | 756 | 757 | 758 | 759 | 760 | 761 | 762 | 763 | 764 | 765 | 766 | 767 | 768 | 769 | 770 | 771 | 772 | 773 | 774 | Next