Search Details

Word: play (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Donahue, the collaboration also presents a chance to produce a play of “great imagination” while giving students the invaluable experience of working in a professional dramatic production...

Author: By Anita B. Hofschneider, CRIMSON STAFF WRITER | Title: 'Stairs' Leads Collaborative Effort | 2/2/2010 | See Source »

While college students are dealing with classes and shopping week, the graduate students are understandably more accustomed to the pace and hours of rehearsals. Add to that the physical intensity of the play, and the end result is a mix of exhaustion and excitement...

Author: By Anita B. Hofschneider, CRIMSON STAFF WRITER | Title: 'Stairs' Leads Collaborative Effort | 2/2/2010 | See Source »

...Stairs” is only Rivera’s second play since he began acting in musicals as a junior in high school. It is his first show at Harvard, apart from his involvement in the Freshman Arts Program...

Author: By Anita B. Hofschneider, CRIMSON STAFF WRITER | Title: 'Stairs' Leads Collaborative Effort | 2/2/2010 | See Source »

...Laura Bellamy has just been having a great couple of games,” Buesser said. “Knowing we have a good goaltender allows us to…play more aggressively...

Author: By Christina C. Mcclintock, CRIMSON STAFF WRITER | Title: Harvard Eyes Title Against the Eagles | 2/2/2010 | See Source »

...instantaneous nature of cyberattacks that has rendered defenses against them obsolete. Once an enemy finds a chink in U.S. cyberarmor and opts to exploit it, it will be too late for the U.S. to play defense (it takes 300 milliseconds for a keystroke to travel halfway around the world). Far better to be on the prowl for cybertrouble and - with a few keystrokes or by activating secret codes long ago secreted in a prospective foe's computer system - thwart any attack. Cyberdefense "never works" by itself, says the senior Pentagon officer. "There has to be an element of offense...

Author: /time Magazine | Title: U.S. Cyberwar Strategy: The Pentagon Plans to Attack | 2/2/2010 | See Source »

Previous | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | 242 | Next