Search Details

Word: code (lookup in dictionary) (lookup stats)
Dates: during 1990-1990
Sort By: most recent first (reverse)


Usage:

...affair seemed both a throwback to the cold war and an illustration of growing openness in the Soviet Union. Rarely have the Soviets acknowledged that a secret agent has so seriously compromised their security. Pravda disclosed that Donald F. -- code-named "Top Hat" by his American patrons, who say he worked for Soviet military intelligence -- passed on diplomatic codes, nuclear-weapons doctrine, civil-defense blueprints and plans for coping with chemical and biological warfare. It was not clear when Top Hat was apprehended or whether he has been executed...

Author: /time Magazine | Title: Espionage Top Hat | 1/29/1990 | See Source »

According to U.S. officials, Top Hat and another Soviet, code-named "Fedora," first offered their services to the FBI in the early 1960s, when both were attached to the Soviet mission to the U.N. in New York City. Despite suspicions that the two were "dangles," double agents actually working for the Soviets, Top Hat went on to spy for the Americans in posts in Burma, India and the Soviet Union. When in 1978 it became clear to the U.S. that Fedora probably was a fraud, doubts about Top Hat's authenticity resurfaced...

Author: /time Magazine | Title: Espionage Top Hat | 1/29/1990 | See Source »

...once. Software, always the skittish part of any system, can also be made more dependable by imposing the kind of discipline on programmers that engineering standards impose on, say, bridge designers. A program like AT&T's faulty switching system, however, which can contain a million lines of code, is more complex than any bridge. "Standards have not been developed," says Donn Parker, a senior management consultant at SRI International. "Software is not predictable...

Author: /time Magazine | Title: Ghost in The Machine | 1/29/1990 | See Source »

...when I found myself shoved aside with the wives of the people who I had intended to meet. I feared spending spend the whole evening idly discussing hors d'oevres or powdering my nose. The chatter, however, turned out to be far from idle. Washington wives follow a secret code of behavior that transcends the traditional hierarchy of big business for the men and chit-chat for the women...

Author: By Beth L. Pinsker, | Title: Playing Powder-Puff Politics | 1/22/1990 | See Source »

...shock waves from an A-bomb to compact the hydrogen and ignite the H-bomb. Teller adapted Ulam's design, using the energy of the A-bomb's radiation rather than the force of its shock waves to achieve the necessary compression. It was a bomb of this design, code named Mike, that exploded on Nov. 1, 1952, on the Pacific island of Elugelab. The island, one mile in diameter, disappeared...

Author: /time Magazine | Title: History: The Master Spy Who Failed | 1/15/1990 | See Source »

First | Previous | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | Next | Last