Word: protectant
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
...just before the Great Depression, and it marks a regression in this nation’s attempt to form a new, open global economy. While economists and academics in the United States proclaim the benefits of free trade, the Bush administration has cast aside their views in order to protect America’s inefficient steel industry from foreign competition...
...years when I’m at a cocktail party, I want to sound educated.’” Jane says she felt comfortable venting because she didn’t suspect Ashley would find the diary. The infinite size of cyberspace was supposed to protect her. “This was one diary on a site with tens of thousands of them,” she says. “It wasn’t like it said ‘[Jane’s] diary about [Ashley].’ I really never thought she?...
Hamburg has hired only 250 new police officers, a fraction of Schill's promised 2,000. The new cops will take two-and-a-half years to complete their training. Hamburg has also added 250 security guards, who will be assigned to protect buildings such as the American consulate, freeing up another 250 police to work against crime. The city did find an innovative way of forcing drug addicts out of the main train station. In addition to deploying more police patrols, the station now plays endless repeats of Vivaldi at high volume to drive people away...
...crimes, and most will agree that guilty men and women should be punished to the fullest extent of the law. However, uncorroborated, decades-old accusations alone should not result in removal of a priest’s ability to practice. The Archdiocese says that these measures are designed to protect minors from potential abhorrent behavior. While one would fully expect that those deemed a significant risk following a full investigation be removed and quickly defrocked, it is difficult to imagine that the claims of one alleged victim who, as he admits, does not intend to press criminal or civil charges...
...It’s important for us to keep our servers as secure as possible to protect both user information and the integrity of the system,” Davis said...