Search Details

Word: let (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

After refusing to let an immigration officer read her e-mails, Ismail was told she would never be allowed to enter the country. Ismail was then taken to a detainment room in a separate part of the airport, where she was held the next day. When she asked to call her family and Amara, Ismail was repeatedly told to wait...

Author: By ZOE A. Y. WEINBERG, CRIMSON STAFF WRITER | Title: Law School In Discussion Regarding Deportation of HLS Student | 2/3/2010 | See Source »

...Watson’s fiancé—both of whom receive only minimal screen-time in the two hour film. McAdams and Reilly give strong performances that could easily have been explored more extensively, but it’s hard to argue with the choice to let the relationship between Holmes and Watson take center stage...

Author: By Yair Rosenberg, CRIMSON STAFF WRITER | Title: Sherlock Holmes | 2/2/2010 | See Source »

Additionally, Harvard defensive lapses played significant roles in a couple of BC goals. On the Eagles’ second goal, the Crimson let an unmarked skater casually attack the goal from the wing. On the game’s third goal, a poor pass in the defensive zone and a slip by junior goaltender Kyle Richter left BC with an open...

Author: By Jake I. Fisher, CRIMSON STAFF WRITER | Title: Harvard Lacks Spark In Loss | 2/2/2010 | See Source »

...Force wants the ability to burrow into any computer system anywhere in the world "completely undetected." It wants to slip computer code into a potential foe's computer and let it sit there for years, "maintaining a 'low and slow' gathering paradigm" to thwart detection. Clandestinely exploring such networks, the Dominant Cyber Offensive Engagement program's goal is to "stealthily exfiltrate information" in hopes it might "discover information with previously unknown existence." The U.S. cyberwarriors' goal: "complete functional capabilities" of an enemy's computer network - from U.S. military keyboards. The Army is developing "techniques that capture and identify data traversing...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

...Anwar, for his part, has always maintained his innocence. "It is a sad day for the country. Let's hope justice will prevail," Anwar said as he entered the packed courtroom on Tuesday morning with his wife Wan Azizah Wan Ismail and key political allies, including the venerated Muslim cleric Nik Aziz Nik Mat. In January, Anwar took his case to the people, holding rallies around the country where he claimed that the new sodomy charges had been trumped up to stop him from running for Prime Minister in the upcoming general election, an accusation the government denies. Though plenty...

Author: /time Magazine | Title: Will Sodomy Charges End Malaysia's Opposition? | 2/2/2010 | See Source »

Previous | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | 91 | 92 | 93 | 94 | 95 | Next