Search Details

Word: surrounds (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...main violations surround potential transfer Vincent Askew and recruiting violations which occured during his 10-day stay at Kansas in the summer of 1986. Askew was considering transfering from Memphis St. at the time. Apparently, several people involved with the Jayhawks--Brown included--loaned $1400 to Askew. If he couldn't pay back the loans, Askew had been expected to work for the money. But the Kansas group wasn't worried about getting the money back...

Author: By M.d. Stankiewicz, | Title: Hey Larry Brown, We Deserve Better | 11/3/1988 | See Source »

...would move into the Oval Office comfortable in the knowledge that he believed in Bush's policies, something Bentsen could not do in that debate. But Quayle said nothing of the kind. He instead repeated a preprogrammed answer about his experience and his familiarity with those who would surround Bush. In doing so, Quayle proved again that he was a Bush mistake, though not the disaster critics suggested, and possibly trainable for better things...

Author: /time Magazine | Title: The Presidency: Dumb Question, Worse Answer | 10/17/1988 | See Source »

...three have spent many years searching for unifying principles in the patterns of information that surround us. For Fredkin, the lifelong rationalist, the universe itself is the vast expression of many iterations of simple but powerful ordering rules. Wilson, filled since childhood with a love for the natural world, has investigated how communication permits the evolution of complex animal societies, bound together by the exchange of information. Boulding's deep religious convictions and pacifism have led him to find a way for nations to someday interact without violence, based on networks of shared values and mutual interests...

Author: By Charles N.W. Keckler, | Title: In the Country of the Blind... | 10/15/1988 | See Source »

...vaccine program is a preventive measure -- an attempt to protect an uninfected disk from invasion by an uninvited program. Most software vaccines take advantage of the fact that computer viruses usually hide themselves in one of a few locations within the machine's control software. A typical vaccine will surround those memory locations with the equivalent of a burglar alarm. If something tries to alter the contents of one of those cells, the vaccine program is supposed to stop everything and alert the operator. But because there are so many different viral strains out there, vaccines are often ineffective...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

...place is oddly uncongested. Here is not just another high-rising Asian metropolis, like Hong Kong or Singapore or Taipei, but a compact and manageable place of little lanes and neighborhood stores, of tree-lined streets given a sense of space and rough lyricism by the granite hills that surround them. Nature is more in evidence here than Industry: to go from one downtown hotel to another, one drives around the side of Namsan (South Mountain...

Author: /time Magazine | Title: Olympics: Anarchy By the Numbers | 9/19/1988 | See Source »

Previous | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | 138 | 139 | 140 | Next