Search Details

Word: esotericisms (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

If Harvard is concerned with discouraging expensive procedures with relatively few real benefits, it should take its own advice and regain its national prominence by boasting the number of lives it saves using reasonable medical practices rather than by advertising advances in the esoteric transplant field. Only then will this...

Author: By Joseph F Kahn, | Title: Practice What You Preach | 12/13/1984 | See Source »

In its Medicine section, TIME has always sought two goals: to report and, perhaps more important, to clarify even the most esoteric technical subjects. In recent years it has run cover stories on medical matters as diverse as the dangers of cholesterol, the health effects of stress and the origin...

Author: /time Magazine | Title: A Letter From The Publisher: Dec. 10, 1984 | 12/10/1984 | See Source »

Still, sometimes the natural is not enough. To render the coinages, puns, obscure allusions and technical vocabulary that abound in Grass's novels, Manheim consulted a series of specialists. Dentists were interviewed for Local Anaesthetic, stonecutters for The Tin Drum and conchologists for From the Diary of a Snail...

Author: /time Magazine | Title: Books: Couriers of the Human Spirit | 11/19/1984 | See Source »

As a result, buyers who do comparison shopping must select their computers on the basis of increasingly esoteric technical specifications. IBM alone sells seven basic variations on its bestselling model, ranging from the low-cost PCjr to the top-of-the-line IBM PC AT. To distinguish between these machines...

Author: /time Magazine | Title: Computers: Bothered and Bewildered | 11/19/1984 | See Source »

There are, however, more esoteric security measures being developed by computer companies. Callback is a recently-devised procedure where the user telephones the computer, the computer compares their number with a list of approved user numbers and calls the user back if the numbers match. User Verification/Encryption is a system...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

Previous | 149 | 150 | 151 | 152 | 153 | 154 | 155 | 156 | 157 | 158 | 159 | 160 | 161 | 162 | 163 | 164 | 165 | 166 | 167 | 168 | 169 | Next