Computer MagazineSoftware MagazineNetwork MagazineMicroprocessor Magazine
View from Internet Valley -- Software Magazine Computer Journal Networks Magazines Software Internet Magazines WWW Magazines Computer Journals Web Software Magazines Top Magazines
Computer Science Magazine Top 100 * 100 Digest Computer Education Magazine

April 1998

Top 100

I-J-L-M

Computer & Software WWW Magazines & Journals


Top 100*100 Digest


A | B | C | D | E | F | G |H Arrow Right I | J | L | M | N |O | P | S | T | U| V | W

I

Magazine MIPS* Outline/Quotes
Industry Standard Alex Lash

Do You Netscape?

Not Quite Yet

Netscape last week put the finishing touches on its much-anticipated "portal" strategy, announcing a free e-mail service and setting the stage for a protracted battle with Yahoo and a handful of other aspiring Net brands. The contracts between Netscape and the search engines expire on April 30, and the companies are in the midst of complex negotiations over just how they might be renewed. Mike Homer, the veteran Netscape marketing VP who recently took the reins of the company's Netcenter Web unit, says Netscape expects its forthcoming search engine to displace Yahoo, Infoseek, Excite and Lycos from their dominant positions on the Netscape Search page. Yahoo CEO Jeff Mallett downplays Homer's claims, saying he has "yet to see what the Netscape search program will look like."

InfoWorld

Deborah Radcliff

Don't get blown away

Being prepared for vindictive employees can avert a security disaster.The danger within.  Internal employees - not outside hackers - can be a time bomb waiting to blow. Omega Engineering learned firsthand the dangers of the disgruntled employee after a timed virus, known as a logic bomb, wiped out all of its research, development, and production programs in one fell swoop. (The tape backup also was destroyed.) In January, charges were filed against 31-year-old Timothy Lloyd, an Omega programmer, for placing the bomb on the network, which detonated 10 days after his termination. Omega's costs will likely exceed $10 million as engineers and designers rewrite designs and recode programs in what Jim Ferguson, an Omega representative, says will be "an ongoing process for several years." ...

Information Week Deborah Kerr

Hacker Stoppers?

Intrusion-detection (ID) tools are a $65 million industry that will grow as large as the firewall market, which reached about $255 million in 1997, according to the Hurwitz Group. Touted as network burglar alarms, ID systems are programmed to watch for predefined attack "signatures," or predefined bytecode trails of prespecified hacks. IDs also send out real-time alerts of suspicious goings-on inside the network

Internet World Aaron Weiss

The Art of Debugging

The primary goal of debugging techniques is to reveal the inner workings of your program code. The solution to 90 percent of programming problems is simply a matter of pinpointing the exact problem itself. Typically, we debug programs by adding or removing code from the original version, which can help expose its workings. Our hope is that this exposure will reveal the flaw, and that once known, the flaw is probably easy to fix.

Institute (IEEE) DAVID OSTFELD

New morality on 'electronic theft'
could swell the ranks of U.S. felons

The bond between the entertainment industry, the software distribution industry and large publishers has led to a series of laws (and more to come, if the U.S. Congress is so inclined this term) that has translated commercial liability into criminal acts. This series of acts and bills goes far beyond piracy, levying penalties in terms of years in jail for relatively minor actions which could easily happen on anyone's computer in the course of a few days. ...A large segment of our population, if the bills pass, will be felons who just haven't been found, tried and jailed.

Inter@ctive Week Joe McGarvey

Chips Link Enterprises To Future

...the vast majority of remote access and networking gear is constructed of programmable computer chips that enable enterprises to enhance and upgrade hardware without purchasing new equipment. These programmable bits of silicon, the most prominent being digital signal processors (DSPs), are the tools that make it possible for equipment makers to deliver next-generation technology for today's hardware.... DSPs are especially popular in modems and wireless communications devices, such as cellular phones, because they are designed to handle the compute-intensive task of converting analog signals into digital information,

Internet

Week

Veronica Smith Internet2 -- Building the Next Backbone

Internet2 has been publicized in different lights, which means there is still lots of confusion about the project's internal goals and its ultimate purpose. Promising to provide access and transfer rates up to 1,000 times faster than those available today, the project is deserving of attention, but don't expect to be cruising at such high speeds just yet. Currently confined to academia, government research centers and a handful of nonprofit organizations, the new network is separate from the mainstream Internet. As far as access goes, however, Internet2 is not considered a "separate" network. The most significant distinction that can made at this point is that Internet2 will not replace the current Internet. The hope is that the developments and discoveries that emerge from continuing work on the Internet2 project will eventually find their way into all kinds of networks, including the Internet.

J

Magazine MIPS* Outline/Quotes/Comments
JavaWorld Bill Venners

Keep focused! Designing fields and methods

This installment of the Design Techniques column shows how some fundamental software design techniques, like avoiding special data values and minimizing method coupling, apply to Java.

Java Pro James W. Cooper

Javatecture

Factories for
Making Classes

One of the most interesting developments in the past few years has been the cataloguing and discussion of Design Patterns. ... design patterns are not cutesy computer-science abstractions, but catalogs of useful, tested ways to write effective OO programs. .. One type of pattern often seen in OO programs is the Factory pattern or class...

L

Magazine MIPS* Outline/Quotes
LAN Magazine Anita Karvé

Remote Access: Old Concerns, New Challenges

With telecommuting and mobile computing on the rise, remote access to the corporate network is an increasingly critical business and technology objective. Users who travel or work from home require a certain level of access to perform their jobs effectively, and the key challenge for IT managers is to provide the appropriate level of access without compromising network security. Security has been a concern ever since remote control software was the primary method of remote access. But with the advent of new remote access technologies—in particular, Internet-based remote access—this concern has become paramount ...

LAN Times Brian Riggs

DNS opens up

... Years ago, the National Science Foundation granted Network Solutions a sole-source contract to administer Internet domains such as .com. ... the federal government is expected to open DNS registration to worldwide competition (see "International authorities to manage domain names" )... A new set of generic top-level domain (gTLD) names will be available from a competing array of registrars. These domains include .firm, .shop, .web, .arts, .info, .nom, and .rec, which the Internet Council of Registrars (CORE) and the gTLD Memorandum of Understanding Policy Advisory Body officially approved in November...

M

Magazine MIPS* Outline/Quotes/Comments
MacAddict Celebrity fever!

The celebrity appeal of Steve Jobs, AppleMasters on tour, and more on your favorite ex-execs.

Mac Week Christina Follmann

Life after Quicken

Software analyst Chris LeTocq of Dataquest, a San Jose, Calif., division of Gartner Group Inc., said, "This is probably the right thing for them to do. I think they are sort of looking at some marketplace reality here."

Macworld Henry Bortman

Save Your Mac!

Surefire Strategies to Survive and Thrive in a Windows World
Microprocessor Report Linley Gwennap

Intel Locks Out

P6 Chip-Set Vendors

The difference between a market share of 90% and 100% may seem small, but that last narrow slice is what separates power from absolute power. Intel's vast share of the CPU and chip-set markets has given it great power, but the company is now angling to completely eradicate competition in the merchant chip-set market. That monopoly power is already leading to abuses against PC vendors--a situation that is likely to hurt Intel itself in the long run.

Microsoft Internet   Magazine Clay Hathorn

When Is a Web Not an Internet?

In the Information Age there seem to be a lot of people proficient in the online world -- trafficking in e-mail, manipulating data, pointing and clicking up a storm -- without understanding some of the basic tenets of interactive computing.

Mobilis Marty Mankins
Discontinued, But Not Forgotten

Sadly, this is nothing new. This has happened to all brands of PDAs, including those from companies such as Atari, HP, Casio, Sharp, and others. All have followed the trend of dumping palmtop and PDA models before their time, presumably to move on to newer models that meet current market demands. Fortunately, all is not lost. In this article, I'll talk (Marty Mankins) about older PDAs and how to make greater use of them in your life. In fact, I'll even argue that yesterday's hot PDA may offer even better value that some of today's overpriced gizmos.

Music & Computers Craig Anderton's Soundcard Installation Tips

... Music & Computers contributor Craig Anderton discovered the following technique for safely installing the little silicon spatulas. It's also a good way to create a clean music operating system.


      * MIPS - Most Interesting Page of Site


go to Top of the page of page


A | B | C D | E | F | G |H | I | J | L | M Arrow Right N |O | P | S | T | U| V | W

Top 100 Mag's Back Issues

 Internet Valley

Additions, suggestions, questions: Contact us


Copyright ©1995-1998 Internet Valley, Inc.All rights reserved