Search Details

Word: embedding (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

What about that other long-promised alternative-energy source, solar power? Technology Pioneer Nanosys of Palo Alto, Calif., thinks solar's day in the sun has finally arrived. The firm is developing tiny photovoltaic cells that can be incorporated into the fabric of roofing materials to provide power to homes...

Author: /time Magazine | Title: Energy: More Power To You | 12/15/2003 | See Source »

Smart Dust These computerized motes are still a bit bigger than dust--about the size of a matchbox--but the concept holds: scatter a bunch of these radio-equipped wireless sensors across a battlefield, and they could track troop movements; embed them in a road, and they could deliver a...

Author: /time Magazine | Title: The Next Big Thing | 9/8/2003 | See Source »

...least seven real press vehicles had to brave a hail of bullets. Then, as journalists began to report on the mounting military atrocities against civilians, several reporters-Indonesian and foreign-were interrogated by the police or army, and at least three received death threats. The 54 Indonesian journalists "embedded" with various T.N.I. units fared no better. They arrived in Aceh frightened, partly because they wore military uniforms and were indistinguishable from the troops and partly because their military keepers had told them GAM knew all of their names and intended to assassinate them. Foolishly, I had assumed the presence...

Author: /time Magazine | Title: Dead Silence | 6/2/2003 | See Source »

Still, the outlook is anything but certain, and things can go very badly awry. If much depends on Arab leadership, much also depends on American leadership. With hundreds of thousands of U.S. troops actually occupying an entire Arab country, it is hard for Washington to pretend that it does not...

Author: /time Magazine | Title: A 'Baghdad Spring'? | 5/9/2003 | See Source »

Here's the problem: codes only work if both parties, sender and receiver, have the key--and at some point they have to pass that key between them in an unencoded form. As a result, all conventional cryptosystems are theoretically vulnerable to eavesdropping. Here is the solution: embed the key...

Author: /time Magazine | Title: A Secret In Light: THE CODE WARRIOR | 11/26/2001 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | Next