Search Details

Word: plainness (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...woman says she has been reduced to a stateof subsistance on tuna, which is her "only sourceof protein." Her neighbor sympatizes, explainingthat she "basically eat[s] hummus two times aday." All four says they prefer plain fare such asturkey cutlets and chicken breasts "when they'rewell cooked" to more exotic dishes like Beef Pieand South-western Lasagna...

Author: By Surah E Scrogin, | Title: Nutrition Bites Harvard | 3/24/1994 | See Source »

Libby is not indepedently wealthy, and shelives in a modest home in Jamaica Plain. But shehas at least one friend who might have been ableto help back the new company...

Author: By Joe Mathews, | Title: Even Closer Ties Seen Between Cop, Bus Co. | 3/23/1994 | See Source »

...relationship between a TF and his or her student is ambiguous, at best. Sure, TFs are supposed to be your mentors, the people for knowledge, but considering that some TFs are just plain hot, it's no wonder that students start to entertain other, less wholesome attitudes toward them...

Author: By Daniela Bleichmar, | Title: That Obscure Object of Desire: | 3/17/1994 | See Source »

...Morris who choreographed several of the distinctive works that gave the group its early repertory. Morris can usually be counted on to grab an audience right away and never let go. When he errs, it's by going over the top. Mosaic is a rarity for him; it is plain dull...

Author: /time Magazine | Title: DANCE: Thoroughly Modern Misha | 3/14/1994 | See Source »

...existence. The NSA, which gathers intelligence for national security purposes by eavesdropping on overseas phone calls and cables, did everything in its power to make sure nobody had a code that it couldn't break. It kept tight reins on the "keys" used to translate coded text into plain text, prohibiting the export of secret codes under U.S. munitions laws and ensuring that the encryption scheme used by business -- the so-called Digital Encryption Standard -- was weak enough that NSA supercomputers could cut through it like butter...

Author: /time Magazine | Title: Who Should Keep the Keys? | 3/14/1994 | See Source »

Previous | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | Next