Search Details

Word: coded (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...popularity of buyouts has received an added boost from the U.S. tax code, which permits investors to deduct the interest on their debts. That makes heavy borrowing attractive, since debtors can use IOUs as tax shelters and thus charge part of their cost to Uncle Sam. "Our tax laws clearly encourage this kind of activity," says Yale's Malkiel...

Author: /time Magazine | Title: The Popular Game Of Going Private | 4/18/2005 | See Source »

...boom days are now coming back in the form of nightmares. In the good times, no one paid much attention to the fact that the gulf countries lack the legal structures for modern finance. Only Bahrain and Kuwait have well-developed commercial laws, but neither has a banking code. The United Arab Emirates is only now introducing a bankruptcy...

Author: /time Magazine | Title: Gulf of Woes: Banks decline and fall | 4/18/2005 | See Source »

Buyers of land hire their own designers, who must adhere to the town code concerning height, the pitch of the roof, the size and configuration of porches. Yet the rules change sensibly from neighborhood to neighborhood. On north-south avenues, for instance, large front yards are required, thus leaving ocean views unobstructed even from points well inland; the same homeowners, however, must erect streetside picket fences to provide pedestrians a reassuring sense of scale and enclosure. Along Seaside's widest boulevard, the guidelines will produce grand houses with verandas...

Author: /time Magazine | Title: Design: Building a Down-Home Utopia | 4/18/2005 | See Source »

Both of these destructive miniprograms occupy only a few hundred bytes of memory and are therefore virtually invisible among the millions of lines of code contained in a large computer. Worse still, they are ominously easy to create. Says Security Consultant Ian Murphy, 28: "Any decent programmer can write a virus in six hours. A novice can write one in 20 hours with assistance and 30 hours without assistance." The perpetrators are frequently disaffected engineers and computer technicians. Says Security Consultant Sanford Sherizen of Natick, Mass.: "A lot of people grew up in data processing, spent years holding computers together...

Author: /time Magazine | Title: Computers: A Threat from Malicious Software | 4/18/2005 | See Source »

...operation, arrested and held without bail, her electronic admirers sprang to her defense. Planning their strategy in nationwide PARTI conferences, they sent telegrams to the judge, and are now raising money for Worthington's legal defense. In Colorado Springs, David Hughes, alerting fellow networkers to a proposed zoning-code change that would have made it more difficult for them to work at home, stirred up so much opposition to the measure that it was modified to suit their needs by the city planning commission...

Author: /time Magazine | Title: Computers: Here Come the Networkers | 4/18/2005 | See Source »

Previous | 238 | 239 | 240 | 241 | 242 | 243 | 244 | 245 | 246 | 247 | 248 | 249 | 250 | 251 | 252 | 253 | 254 | 255 | 256 | 257 | 258 | Next