Search Details

Word: logged (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Massachusetts passes an open campus police log...

Author: NO WRITER ATTRIBUTED | Title: Campus Crime Timeline | 9/15/2000 | See Source »

Deborah Cohen, a clinical social worker at UHS, says UHS policy is to inform the patient of what the state requires, but emphasizes the mandatory reporting "does not change the confidentiality" and "would not end up in police log," which if seen might make the victim uncomfortable. These reports are used for annual crime statistics...

Author: By Zachary R. Heineman, CRIMSON STAFF WRITER | Title: Rape Reporting Remains a Delicate Balancing Act | 9/15/2000 | See Source »

...Online education includes everything from learning a foreign language to mastering investing to creating a Web page. Courses can be free or cost up to several thousand dollars. Students typically log on from a home computer to receive lecture notes, suggested readings and critiques of their work, and to turn in assignments and participate in a chat-room or message-board discussion. More and more classes are being offered in real-time streaming media, meaning that students log on at a designated time and can see their instructor in live video on their computer...

Author: /time Magazine | Title: Lifelong Learners Going Back to Class Online | 9/9/2000 | See Source »

...powerful special interests. And I learned that if we work together, and we believe in our hearts that our efforts are sound, that we can accomplish great things for the people of this region - and the entire country. So let me be clear, no matter how many miles I log between now and November, I will never forget the people I met this past week along the main stream of America, and let me assure you, Tipper and I, along with the Liebermans, certainly will be counting the days until we can return again...

Author: /time Magazine | Title: In His Own Words: Al Gore Describes His Life Along the Mississippi | 8/22/2000 | See Source »

...sophisticated is the technology? Look at what Corporate Defense Strategies of Maywood, N.J., has on offer. Last year managers at a New York City import-export company suspected it was being robbed by two employees. CDS advised the firm to install Investigator, a software program that could furtively log every single stroke of the suspects' computer keys and send an encrypted e-mail report to CDS. Investigator revealed that the two were deleting orders from the corporate books after they were processed, pocketing the revenues and building their own company from within. The program picked up on their plan...

Author: /time Magazine | Title: Cyberveillance | 8/14/2000 | See Source »

Previous | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | Next