Word: coded
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
...buildings, rooms and vaults will be controlled by computerized machines that can recognize personal characteristics of people seeking entrance: fingerprints, blood-vessel arrangements in the eye's retina, voice patterns, even typing rhythms. These biometric machines have special sensors that pick up the characteristics, convert them into digital code and compare them with data stored in the computer's memory bank. Unless the information matches up with the characteristics of authorized persons, entrance is denied...
That effort, says Caltech research fellow Richard Wilson, "is analogous to going around and shaking hands with everyone on earth." The resulting string of code letters, according to the 1988 National Research Council report urging adoption of the genome project, would fill a million-page book. Even then, much of the message would be obscure. To decipher it, researchers would need more powerful computer systems to roam the length of the genome, seeking out meaningful patterns and relationships...
...Francisco in January, Energy Department scientists displayed a photograph of a DNA strand magnified a million times by a scanning tunneling microscope. It was the first direct image of the molecule. If sharper images can be made, the scientists suggested, it may be possible to read the genetic code directly. But that day seems very...
...their jobs, and their action grounded all but a handful of the airline's 250 planes. With a dwindling war chest of $200 million, hemorrhaging at a rate of $4 million a day, Eastern was forced to file for protection under the Chapter 11 provisions of the Federal Bankruptcy Code. Lorenzo used the same tactic 5 1/2 years ago to break the unions and reorganize Continental, but this time, under revised bankruptcy laws, he will find the process more arduous...
...would have considerable access. The spy could transmit information to a less closely watched part of the network -- or to an outsider -- without appearing to do so by using what is known as a covert channel. This involves signaling the secret message the agent wants to send in binary code by making minute changes in the speed or the order in which the "bits" of other, entirely innocent messages are transmitted. According to Walker, covert channels have been found that are capable of carrying as much as 1 million bits of information per second. Walker and other experts say they...