Sentences with phrase «potentially useful method»

With that my goal, I managed to end up at Delphion's Gallery of Obscure Patents, where I found the potentially useful method and apparatus for directing a stream of pressurized fluid at a location -LSB-...]
With that my goal, I managed to end up at Delphion's Gallery of Obscure Patents, where I found the potentially useful method and apparatus for directing a stream of pressurized fluid at a location forward of a wheel to improve the traction of the same and the absolutely irrelevant sun shield for automobiles, but no shovel.

Not exact matches

If you are able to buy a property under market value (usually because it needs substantial rehab work), once you do the rehab work (and I don't mean «you» personally — you'd actually need to have it done by a licensed contractor under the terms of a 203k loan), you potentially get not only higher rents, but also the option to refinance the mortgage after the rehab is done (and once you've satisfied any owner - occupancy or seasoning requirements from the lender), which can be especially useful if you want to purchase additional rental properties (something sometimes referred to as the «BRRR method», for «Buy, Rehab, Rent, Refinance).
Purpose: This clinical trial is being done to investigate whether small particles called nanoporhphyrins can be used to better visualize tumors during surgery and potentially to see if they will be a useful method to deliver drugs into brain tumors for treatment.
Previous analyses of Coppermine and Thelon ring - width data, in combination with ring width data from 2 other sites in the western NWT (R. Wilson unpublished report, 2005; D'Arrigo et al., 2006) revealed that the Regional Curve Standardization (RCS) method, a potentially useful technique for retaining centennial - scale climatic trends in tree rings (Briffa et al., 1992; Cook et al., 1995; Esper et al., 2002), did not appear to preserve any additional low - frequency information at these sites when compared to more traditional techniques.
That's why this is such a useful method of protection, but it's also why a firmware password could potentially be a problem.
We used multiple methods of identification (i.e., listserv survey, review of the literature, and collective expertise) to decrease this possibility, but potentially relevant and useful measures were likely to be overlooked if used infrequently.
a b c d e f g h i j k l m n o p q r s t u v w x y z