Search Details

Word: methods (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...confirmation of the danger of religion. Harris argues that the abject loyalty of Nazism exhibits many similar traits to organized religion. However, Harris never fully confronts Nazism’s explicit incompatibility with spiritual faith or the fact that it was based on a commitment to science and method much resembling Harris’ own ideal...

Author: By Madeline K.B. Ross, CONTRIBUTING WRITER | Title: BESTSELLER: The End of Faith | 12/13/2006 | See Source »

...average person who runs is not doing themselves any favors by under-training for the marathon,” Wood said. Wood’s study tracked the hearts of 60 marathoners using echocardiography, which produces an image of the heart by means of sound waves. That method, along with blood sample tests, revealed that under-trained marathon runners suffered from a host of abnormalities—including decreased right ventricular function and elevated levels of two enzymes linked to heart stress. These negative symptoms were much less pronounced in those who ran at least 45 miles per week before...

Author: By P. KIRKPATRICK Reardon, CONTRIBUTING WRITER | Title: Untrained Runners Risk Stressing Heart | 12/12/2006 | See Source »

...applied the technique to computer security. But it was not until BioPassword bought the patents from the school in 2002 that keystroke dynamics found its first commercial use. BioPassword's developers harnessed the technology into portable software and began selling it in 2004 as a backup password-protection authentication method for many online sites. Now more than 30 companies, or about half a million users, have signed on. As BioPassword CEO Mark Upson puts it, "For $1 per user annually, you've got online security that can't be sold, lost or replicated...

Author: /time Magazine | Title: Change Agent: Telltale Fingertips | 12/10/2006 | See Source »

...most financial institutions, the new federal rules mean finding a second method to authenticate a user while ensuring that the new system doesn't disrupt business. Fingerprinting and retinal scanning are options, but both require users to have expensive additional equipment. Some credit unions also considered giving members ID tokens, a popular practice for many banks, but this proved cost prohibitive...

Author: /time Magazine | Title: Change Agent: Telltale Fingertips | 12/10/2006 | See Source »

Kumon and other similar teaching methods are the best way to ensure that students practice math skills outside the classroom. Mastery is something that takes time and practice even for some of the most gifted students. The government should focus on ways to fund tutoring through schools or through local organization so that it is available to all students regardless of economic background. Instead of trying to come up with some revolutionary method of teaching math, we should simply learn from what Japan and other foreign countries are doing. Tutoring is best in small doses: not too much to overwhelm...

Author: By Ronald K. Kamdem | Title: Doing Math the Easy Way | 12/8/2006 | See Source »

Previous | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | Next