Search Details

Word: coding (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...weeks U.S. forces had been watching as Taliban and al-Qaeda fighters gathered south of Kabul. Code-named Operation Anaconda, the battle plan aimed at this force was a hammer-and-anvil strategy. Friendly Afghans, assisted by U.S. special forces, would flush the enemy from the north and northwest toward three exits of the Shah-i-Kot valley, where American troops waited. To the south, battle positions Heather and Ginger were divided by a hill christened the Whale, while to the east, battle position Eve guarded escape routes over the high mountains to Pakistan. But after two days of fierce...

Author: /time Magazine | Title: We Put The Capital 'M' In Miracle | 3/18/2002 | See Source »

...officer was dispatched to Currier House to take a report of fraudulent use of a security code...

Author: By Jenifer L. Steinhardt, CRIMSON STAFF WRITER | Title: Police Log | 3/12/2002 | See Source »

...spends more than 90% of its $35 billion annual intelligence budget on spying gadgetry rather than on gathering human intelligence, and most of that money goes not to the CIA but to spy agencies within the Department of Defense, such as the National Security Agency (which does eavesdropping and code breaking) and the National Reconnaissance Office (which flies imagery satellites). The priciest gadgets are not always the ones suited to fighting the terrorist threat. During the past five years, while the U.S. spent billions of dollars to build and launch about half a dozen radar-imaging spy satellites...

Author: /time Magazine | Title: Can We Stop The Next Attack? | 3/11/2002 | See Source »

Here's another example the authors cite: hosting a retirement dinner for the boss at an expensive restaurant, a senior manager was appalled when not one of the young employees bothered to dress up. Although the office dress code is casual, he had assumed employees would know enough to freshen up for the occasion, if only as a sign of respect for their leader...

Author: /time Magazine | Title: Management: Generation Hex? | 3/11/2002 | See Source »

...weeks U.S. forces had been watching as Taliban and al-Qaeda fighters gathered south of Kabul. Code-named Operation Anaconda, the battle plan aimed at this force was a hammer-and-anvil strategy. Friendly Afghans, assisted by U.S. special forces, would flush the enemy from the north and northwest toward three exits of the Shah-i-Kot valley, where American troops waited. To the south, battle positions Heather and Ginger were divided by a hill christened the Whale, while to the east, battle position Eve guarded escape routes over the high mountains to Pakistan. But after two days of fierce...

Author: /time Magazine | Title: Deadly Mission | 3/11/2002 | See Source »

First | Previous | 365 | 366 | 367 | 368 | 369 | 370 | 371 | 372 | 373 | 374 | 375 | 376 | 377 | 378 | 379 | 380 | 381 | 382 | 383 | 384 | 385 | Next | Last