Search Details

Word: tracee (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...political duty of enlightenment," says curator Eleonora De Saavedra. So the sordid or brutal realities the painters pick as their themes are never depicted too vividly or destructively: "The language of the paintings is not one of violence or debate," explains Saavedra. "It's color, light, a trace, a document of the hand [that made it], of the soul, of the individual...

Author: /time Magazine | Title: Afghan Women Painters On Show | 8/21/2008 | See Source »

...thing, a group of people have access to the anthrax at any given lab. "What you can do with all those forensic techniques is trace the anthrax to a lab, but you can't trace it to a person," says Meryl Nass, a Maine doctor who studies the anthrax vaccine and was a professional acquaintance of Ivins for more than 15 years. What's more, Nass adds, the link is not accurate with 100% certainty. "You can't convict someone with that evidence...

Author: /time Magazine | Title: How Solid Is the Anthrax Evidence? | 8/5/2008 | See Source »

...rings going back tens of thousands of years. Oxygen isotopes trapped in the ice core can tell you what the temperature was in a given year; trapped air bubbles can reveal how much carbon dioxide and other gases were in the atmosphere at a particular time. You can even trace impurities that were in the air during the Roman Empire to a specific lead mine in Spain, according to J.P. Steffensen, one of NEEM's field leaders...

Author: /time Magazine | Title: In Greenland, a Memoir of the Earth | 8/2/2008 | See Source »

...safety of Navy ships, stole documents and passwords, triggered the shutdown of a 2000-terminal Washington network, deleted critical files and caused a total of $700,000 worth of damage. For his part, McKinnon admits to being a regular cyber-intruder, but has claimed he was searching for some trace of an alien energy technology he believed the U.S. government had discovered and reverse-engineered but was keeping secret in order to keep oil prices high. He also says he was caught because he used his own email address to register his software and that he was smoking...

Author: /time Magazine | Title: Hack Attack | 7/31/2008 | See Source »

...this was a convincing performance and one which obviously required no prompting, let alone coercion, from her husband." Robertson said that the court would see in due course how the couple "worked a complex web of transactions between various bank accounts, making the finances all the more difficult to trace." For Mrs. Darwin's defense to succeed, Mr Robertson said that she must prove that her husband was present at the time each fraudulent offense was committed and show that her husband's pressure was so great that "she was impelled to act in a way against her own will...

Author: /time Magazine | Title: Canoe Man's Wife Stands Trial | 7/15/2008 | See Source »

Previous | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | Next