Search Details

Word: protocol (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Justice cut in, asking for a citation. Waxman recovered, mustered an additional 111 words about how it's technologically feasible for Websites to screen users by age, when Justice Sandra Day O'Connor interrupted. "Does that technology require use of something called cgi?" she asked, referring to a complex protocol for changing what users see on a Web page. "It does," agreed Waxman, thereby opening the door to a line of argument in which he found himself suggesting--apparently in all seriousness--that U.S. citizens might have to purchase a government-issued, Maxwell Smart-like "cone of silence" before making...

Author: /time Magazine | Title: @THE SUPREME COURT | 3/31/1997 | See Source »

This is not to recommend that we should rush out to share the traumas of our childhood with the individual sleeping next to us in Ec 10. A culture of over-sensitive narcissists is almost as unfortunate as the present protocol of coldness, distance and barrier-building. Yet how can we expect to get someone in bed with us if we can barely tackle conversation that revolves around subjects other than our job searches or how overworked...

Author: By Gabriel B. Eber, | Title: Stay Away From Me | 3/15/1997 | See Source »

Mitby, who said he did not know what the proper protocol was for referring to Myers, switched and began using "he" for the remainder of the speech...

Author: By Ariel R. Frank, | Title: Council Member Receives Hate Mail | 3/1/1997 | See Source »

...organization is considering instituting IMAP protocol which connects directly to the mail server but downloads only what a user needs, according to Osterberg...

Author: NO WRITER ATTRIBUTED | Title: E-Mail Problems Plague Campus | 12/5/1996 | See Source »

Like letters, network packets also have a form of addressing--after all, the network needs to know where and how to send these packets along their way! Each packet is marked with the IP (Internet Protocol) address of its destination computer, telling the network where the packet needs to go. Your Ethernet address comes in here as well, serving as an identification tag on every packet of data...

Author: NO WRITER ATTRIBUTED | Title: techTalk | 12/2/1996 | See Source »

Previous | 142 | 143 | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | Next