Search Details

Word: protocolic (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Arnold Schwarzenegger, as bald as Sinead O'Connor and as beautiful as Michelle Pfeiffer. Instead Faulkner was a little bit dumpy, a little bit plain and a little bit whiny (she fought not to have her head shaved). She often looks as if she's pouting when protocol requires that she smile through the insults and be inured to ostracism (a cadet who shook her hand last year was ridiculed mercilessly). She was isolated on campus, guarded by federal marshals after she received death threats. The administration was openly hostile, due back in court on Nov. 6 in another effort...

Author: /time Magazine | Title: THE LOUTS OF DISCIPLINE | 8/28/1995 | See Source »

...first is by making the application available over the Internet, such as the Common Application which is available by file transfer protocol. A student can print the form off the Internet and mail...

Author: By Douglas M. Pravda, | Title: Advent of the On-Line Application | 6/8/1995 | See Source »

Signing up for classes after a shopping period has been the protocol here for as long as anyone at Harvard canremember. [Harvard century...

Author: By Sarah J. Schaffer, | Title: Preregistration: Administrative Boon or Burden? | 5/22/1995 | See Source »

...PROTOCOL OF DEATH IN COMMUNIST regimes has traditionally been as elaborate as those of the empires that preceded them. So when Chen Yun died at 89 last Monday, the citizens of Beijing braced themselves for the usual run of lowered flags, martial music, and long paeans to his revolutionary contributions. After all, Chen ranked second only to Paramount Leader Deng Xiaoping in China's pantheon of post-Mao leaders, and the two were often viewed as fierce rivals...

Author: /time Magazine | Title: TWILIGHT OF THE GODS | 4/24/1995 | See Source »

...http Web technology, which stands for secure hypertext transfer protocol, is regarded as the emerging standard for Web security, and SSL is an alternative security approach which is used in the Netscape browser, he said...

Author: By Douglas M. Pravda, | Title: Cambridge Company Develops Secure Internet Technology | 4/18/1995 | See Source »

Previous | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | Next