Search Details

Word: hole (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...sextant is permeable, the investigators place the object in a container filled with neon, then later examine the item with a mass spectrometer to see if neon has entered it. If the object proves snug, its carbon dioxide is analyzed. Such an operation may require drilling a small hole through the antique object, but surprisingly, museum curators have not protested. Says Ogard: "Most have said it's fine as long as it's not in an obvious place...

Author: /time Magazine | Title: Air Inapparent | 4/18/2005 | See Source »

...Truman, Nehru, William Faulkner, Thomas Mann and Ezra Pound. He caught them with an economy that satisfies the requirements of design and psychology in the same camera angle, as when he found the egg-shaped perimeter of Nikita Khrushchev's head sweeping to a comic climax in the dark hole of his open mouth...

Author: /time Magazine | Title: Photography: Images of a Dark Century | 4/18/2005 | See Source »

...tries haltingly to talk his way out of this mess, he is rescued by Ichimonji, an older and evidently much wealthier man. This patron takes the young foreigner under his protection and guides him through an evening of serious drinking at a succession of night spots, culminating at a hole in the wall where a pretty barmaid agrees to dance naked for just the two of them. The student hears the term mizu-shobai for the first time and later learns what it means: the water trade, the fly-by-night world of bars, baths and brothels to which Ichimonji...

Author: /time Magazine | Title: Books: Rising Sun and Shady Nights | 4/18/2005 | See Source »

Programs called "worms" are capable of altering a system's fundamental operations or shutting it down entirely. They delete specific portions of a computer's memory, thus creating a hole of missing information. Another type of software demon, called a "virus," instructs the host machine to summon its stored files. Each time the machine does so, the program copies itself onto the software. The computer's memory can soon turn into a mass of confusion...

Author: /time Magazine | Title: Computers: A Threat from Malicious Software | 4/18/2005 | See Source »

...with some 1.5 million acre-feet of water (one acre-foot is the amount needed to inundate one acre to the level of a foot and is roughly the quantity used annually by a family of four). Babbitt, who is fond of calling CAP his state's "last water hole," likens the effect of its start-up to the arrival of the first transcontinental railroad in 1882. Says Don Anderson, the project's chief engineer: "Without it, growth in Arizona would have to stop...

Author: /time Magazine | Title: Big Splash in the Arid West | 4/18/2005 | See Source »

Previous | 209 | 210 | 211 | 212 | 213 | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | Next