Search Details

Word: harmless (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...conservative opponents of health reform have found a new threat: home nurse visits to low-income parents. "We are setting up a situation where Obama will be invading parent's [sic] homes and taking away their children," one columnist warned on RightWingNews.com. That something as harmless as home nurse visits has become a target of conservative ire is surprising because of its longstanding popularity with both Republican and Democratic lawmakers. But health reform advocates are scratching their heads at the attacks for another reason: funding for home nurse visits was largely included in health reform legislation to accommodate social conservatives...

Author: /time Magazine | Title: Will Home Nurse Visits Survive Health-Care Reform? | 8/15/2009 | See Source »

Annoying, yes, but harmless, right? Not to hear their critics tell it. Hipsters manage to attract a loathing unique in its intensity. Critics have described the loosely defined group as smug, full of contradictions and, ultimately, the dead end of Western civilization...

Author: /time Magazine | Title: Hipsters | 7/29/2009 | See Source »

...looked for the street vendor; he was a harmless looking middle-aged Pakistani gentleman. “Someone should tell him,” I thought. “Someone should tell him this is not okay.” It’s embarrassing; it should be tucked behind dozens of Roman Holiday calendars. Let’s sell the tourists black-and-white photos of Audrey Hepburn and Gregory Peck eating gelato, not images of Mussolini inspiring false and dangerous notions of Italian greatness through racism...

Author: By Sofia E. Groopman | Title: In Search of Italy’s Glory Days | 7/15/2009 | See Source »

Then there's the nature of the attacks: crude and essentially harmless. Cyberexperts call them denial-of-service (DOS) attacks, because they do no more harm than slow down or temporarily shut down networks. No sensitive government network was affected: the hackers (or lone hacker, since this could easily be the work of one person) only went after unrestricted, so-called public-facing sites. The assumption among some cyberexperts is that such unsophisticated attacks must come from an unsophisticated source...

Author: /time Magazine | Title: Is North Korea Behind the Cyberattacks? | 7/10/2009 | See Source »

...kind of nuts for the job: ice-water nerves and a go-it-alone bravado to match his ninja expertise. Finding a string nearly buried in street rubble, he lifts it and finds it's attached to half a dozen bombs. Blithely he snaps a wire, making the devices harmless. Piece of cake, six slices...

Author: /time Magazine | Title: The Hurt Locker: Iraq, With Thrills | 7/6/2009 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next