Search Details

Word: using (lookup in dictionary) (lookup stats)
Dates: during 2000-2000
Sort By: most recent first (reverse)


Usage:

...with every class, the quality depends on the teaching, and too many professors use co-taught classes as a forum for their own personal debates rather than for a teaching experience. As Williamson admits, "There's good teaching and there's bad teaching." Courses where the team-teaching experience becomes more of ego trip than a class may attract students, but they do not ultimately add anything to a liberal arts education...

Author: By Meredith B. Osborn, | Title: Editorial Notebook: Are Two Heads Better Than One? | 2/10/2000 | See Source »

...Bandwidth use has been growing steadily over the past year… it's a steep climb," says Manager of Network Engineering and Planning Leo Donnelly...

Author: By Christopher J. Yip, CONTRIBUTING WRITER | Title: Faster Access, Roaming Ethernet Slated in Harvard's Technology Blueprint | 2/9/2000 | See Source »

...Angeles Times reporter Sam Fulwood will head a study group focusing on how the use of race issues by the media affects politics and public policy...

Author: By Imtiyaz H. Delawala, CRIMSON STAFF WRITER | Title: IOP Fellows Introduced at Forum | 2/9/2000 | See Source »

...raid - the movement's civil aviation minister Akhtar Mohammad Mansoor called Monday for British forces to storm the Afghan plane. "The British may be reluctant to storm the plane with so many women and children on board," says TIME correspondent William Dowell. "They're more likely to simply use boredom as a weapon, waiting out the crisis and letting the hijackers tire and then later offering them...

Author: /time Magazine | Title: Taliban Faces New Role as Hijacking Victim | 2/9/2000 | See Source »

...perpetrators send so much data so quickly? Apparently, the most recent assaults are not typical denial of service pranks, which generally are sent from only one or two computers at a time. "These people scan the Internet for vulnerable systems, and they hack into those systems, and then use hundreds of those computers, remotely, to send the attack," says McClure...

Author: /time Magazine | Title: Classic Hackers Decry Heavy-Handed Upstarts | 2/9/2000 | See Source »

First | Previous | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | 403 | Next | Last