Search Details

Word: modelling (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...result, buyers who do comparison shopping must select their computers on the basis of increasingly esoteric technical specifications. IBM alone sells seven basic variations on its bestselling model, ranging from the low-cost PCjr to the top-of-the-line IBM PC AT. To distinguish between these machines, consumers have to measure memory in kilobytes and disc storage in megabytes. To understand the pros and cons of IBM-compatible computers built by AT&T, Compaq or Hewlett-Packard, they must learn to identify silicon chips by name and measure their speeds in millions of cycles per second...

Author: /time Magazine | Title: Computers: Bothered and Bewildered | 11/19/1984 | See Source »

...stay a cynic, pick up Joel's sunglasses, and say, every now and then, what the... But it cannot. Fantasy cannot be allowed to stay fantasy. (Last summer's Oxford Blues, for all the brashness of Nick (Rob Lowe) could at least keep that line clear. His love, a model spotted by a different lens, purred. "It was a wonderful night, but it was only a night. But we can still be friends." Said a pouting Nick: "You were never my friend. You were my dream...

Author: NO WRITER ATTRIBUTED | Title: Affair to Poor | 11/16/1984 | See Source »

...book allows scientists to have unified concepts about the plant. It's a model that people in field aspire to," says Director of the Harvard University Herberia Donald H. Pfister...

Author: By Christopher J. Georges, | Title: Botanical Beast Or Buddy? | 11/16/1984 | See Source »

...would disagree these days that the Crimson's starting tight end is a model of class...

Author: By Jeffrey A. Zucker, | Title: The class of his class | 11/16/1984 | See Source »

...there are laws that have teeth in them, they can discourage a lot of the [criminal] actions we're talking about," says Ganaghan Prime and other Massachusetts high technology companies have been working with the Lioutenant Governor's Office for the past year deafting what many consultants call model computer crime legislation. Under the proposed law unauthorized users of computer systems would be viewed as electronic trespassers and suffer stiff penalties for violating corporate or individual privacy by unwanted intrusion. Penalties for data theft or electronic manipulation of data would also be increased by the bill...

Author: By Robert M. Neer, | Title: Data of Tap | 11/15/1984 | See Source »

Previous | 195 | 196 | 197 | 198 | 199 | 200 | 201 | 202 | 203 | 204 | 205 | 206 | 207 | 208 | 209 | 210 | 211 | 212 | 213 | 214 | 215 | Next