Similar Articles |
|
PC Magazine February 15, 2006 |
Bits & Bites v25n4 The U.S. Department of Defense has unveiled plans to develop a lie detector, called Remote Personnel Assessment, that can detect falsehoods or signs of stress without the person being evaluated knowing about the test. |
PC Magazine November 30, 2004 Peter Suciu |
Evil Genius Any run-of-the-mill secret agent can save the world, but to achieve global domination, it takes an Evil Genius. |
Financial Planning April 1, 2006 Keith Marks |
Compliance Tips: Dinner and Broken Promises Now investment firms seek to address risk, meet regulatory expectations, and avoid the next big scandal by monitoring communications. |
AskMen.com |
Men's Shirts - Under $50 We're going to let you in on a secret that's not so secret, because we've said it here before: You don't need to spend a lot to look good. |
Chemistry World September 8, 2011 Harriet Brewerton |
Colourful toxin detection Scientists in Canada have developed a simple chemical detector that could be used to detect airborne neurotoxic organophosphorus chemical warfare agents. |
Food Engineering February 1, 2009 |
Bulk Flow Metal Detector Designed for dry processing applications, Safeline's Gravity FlowSD metal detector can detect ferrous, non-ferrous and stainless steel contaminants in high-volume, free-flowing powders and granular products. |
Insurance & Technology July 11, 2008 Karen Pauli |
Integrated Agency Management Systems Key to Improving Agent Performance and Efficiency Agents want fully integrated systems that offer a single entry of data, a single view of the customer, and mobile and real-time functionalities. |
Financial Advisor January 2008 |
Letters to the Editor Self-help book The Secret... |
Entrepreneur June 2007 Marc Diener |
Top Secret Confidential data should be handled with care. |
National Defense October 2006 Robert H. Williams |
High-Speed Imaging Advance Offers Fast Retrieval Adding "brains" to high-speed cameras is permitting industrial and military users to rapidly detect product defects or ephemeral targets of opportunity on the battlefield. |
InternetNews January 13, 2005 Jim Wagner |
T-Mobile Investigating Alleged Hacker The Secret Service has joined T-Mobile to find out the damage caused by a network breach. |