Search Details

Word: toole (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...word is hardly too strong--is most apparent in his structural thought. He has often been called a high-tech architect, but actually, despite the complexity of some of his designs, the buildings don't brandish their technological language as gee-whiz metaphor; they use it as an essential tool of spatial effects and structural needs, always seeking the most elegant and succinct solution. "The idea of high-tech is a bit misleading," Foster says. "Since Stonehenge, architects have always been at the cutting edge of technology. And you can't separate technology from the humanistic and spiritual content...

Author: /time Magazine | Title: Architecture: Norman Foster: Lifting The Spirit | 4/19/1999 | See Source »

Historically, the U.S. has restricted exports of encryption to foreign countries. It is currently illegal to export encryption products beyond a certain strength without giving the government a key, a system known as "key escrow." Encryption has been classified as a type of munitions, a tool of war. The argument was that if terrorists, organized crime networks or other unpleasant people got their hands on powerful encryption software, they could encode their plans in a way that the CIA and the FBI couldn't understand...

Author: By Stephen E. Sachs, | Title: Big Brother Wants a Decoder Ring | 4/14/1999 | See Source »

...function as a teaching tool extends to a national level, too: as part of a project called Journey North, students have planted tulip bulbs in the park. They will watch them grow and compare notes with other students via the Internet, documenting the coming of spring up and down the East Coast...

Author: By Meredith B. Osborn, CRIMSON STAFF WRITER | Title: THE FUTURE OF PUTNAM PARK | 4/14/1999 | See Source »

...saying that serving your country in the armed services is just like being a tool of an armed oppressor. I see the military's job as the exact opposite--protecting the innocent like the Kosovar Albanians," he says...

Author: By Alexis B. Offen, CRIMSON STAFF WRITERS | Title: We ASKED They TOLD | 4/12/1999 | See Source »

...mail account. In Stockholm, computer-science grad Fredrik Bjorck suggested that Melissa's code bore a strong resemblance to the work of a virus writer called VicodinES. When he heard that, Smith says, "I jumped all over it." He went to Vicodin's website and downloaded the virus tool kits he found there. Pulling files apart, he found names embedded in the source code. One of them appeared three times: David L. Smith...

Author: /time Magazine | Title: How They Caught Him | 4/12/1999 | See Source »

Previous | 360 | 361 | 362 | 363 | 364 | 365 | 366 | 367 | 368 | 369 | 370 | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 379 | 380 | Next