Search Details

Word: lating (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...legislation passed in Massachusetts permitted Harvard to tap into its most recently endowed funds, which had fallen in value to less than the amount bequeathed by the donor and are considered “underwater.” Though the law’s passage arrived too late to help in last year’s budgeting process, Smith said FAS may tap into those funds this year...

Author: By Noah S. Rayman and Elyssa A. L. Spitzer, CONTRIBUTING WRITERS | Title: Though FAS Slims Down Budget, Work Lies Ahead | 2/3/2010 | See Source »

Stone has been shuffling her power-play units of late, but both units on the ice in the last three games have generated chances and goals...

Author: By Kate Leist, CRIMSON STAFF WRITER | Title: Ryabkina Propels Harvard's Attack | 2/3/2010 | See Source »

...arose in the ’50s and ’60s, some folklorists called the folklore of bluegrass ‘fakelore’ because it was viewed as too commercial and too popular,” O’Connor says. “But until the late ’50s it was known largely as ‘hillbilly music’—in a sense, you can’t get more folky than that. It occupies its own funny segment of the music world...

Author: By Matthew H. Coogan, CRIMSON STAFF WRITER | Title: Bluegrass Educates with Sound of Music | 2/2/2010 | See Source »

...investigate the role of the arts in academic life at Harvard, President Drew Faust commissioned a Task Force on the Arts late in 2007. Just over a year ago the Task Force produced a detailed itinerary for integrating the arts into the university’s curriculum. Although the Task Force Report has had minimal concrete impact thus far, the administration’s open support for the arts has caused a wave of optimism among the student body...

Author: By Marissa A. Glynias and Minji Kim, CRIMSON STAFF WRITERS | Title: A Call to Arts | 2/2/2010 | See Source »

...instantaneous nature of cyberattacks that has rendered defenses against them obsolete. Once an enemy finds a chink in U.S. cyberarmor and opts to exploit it, it will be too late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around the world). Far better to be on the prowl for cybertrouble and - with a few keystrokes or by activating secret codes long ago secreted in a prospective foe's computer system - thwart any attack. Cyberdefense "never works" by itself, says the senior Pentagon officer. "There has to be an element of offense...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

Previous | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | 96 | 97 | 98 | 99 | 100 | 101 | 102 | 103 | Next