Search Details

Word: maintainable (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

Admissions officers maintain that despite thelarge pool, they can identify students that shouldbe accepted...

Author: By Jason M. Goins, CRIMSON STAFF WRITER | Title: Early Action Admits Increase Again | 12/14/1998 | See Source »

...large group setting, you have to vote onthe basis of your impression of the candidate'sability and not on personal relationships," shesays. "It's impossible to maintain a personalrelationship with the large number of people thatwould vote in a democratic election...

Author: By David S. Stolzar, CRIMSON STAFF WRITER | Title: IOP Members Propose Structural Reforms | 12/14/1998 | See Source »

Monteleoni has to deal with the most under-written part of Frederick Knott's stage play. Because Rote's cold-blooded instincts are reigned in for so much of the play and only occasionally burst into flame, the trick is to maintain consistency without flattening the role (Tarantino, in his Broadway role, completely overplayed the part, turning Rote into a caricature doomed from the outset). Monteleoni makes Rote a smarmy, slinky villain--an interpretation which occasionally becomes awkward but ultimately gels. He explodes in the final scenes with Suzy in the dark, convincing us that he has no mercy...

Author: By Soman S. Chainani, CRIMSON STAFF WRITER | Title: Alone in the 'Dark' | 12/11/1998 | See Source »

Proxies enable institutions like Harvard to maintain a voice in company decisions about ethics without taking a strong stance...

Author: By Jenny E. Heller, CRIMSON STAFF WRITER | Title: Shareholder Responsibility Report Released | 12/11/1998 | See Source »

...Changing your password is one of the most important things you can do to maintain the security of your own FAS e-mail account," Osterberg says. "Each insecure individual account is a weak link in the chain, which may allow a malicious outside user to gain access to our system. By doing what we can to maintain the security of the individual accounts, we increase the overall security of the system as a whole...

Author: By Daniel J. Mahr and Carrie P. Peek, CONTRIBUTING WRITERSS | Title: It's Hip to Hack | 12/8/1998 | See Source »

Previous | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | Next