Computer Magazines Software Journals Network Magazines Microprocessor Journals
View from Internet Valley -- Software Magazine Computer Journal Networks Magazines
Software Internet Magazines WWW Magazines Computer Journals Web Software
Magazines Top Magazines
Computer Science Magazines Top 100 * 100 Digest Computer Education Magazines

March 1999
Top 100 Mag: D-E-F-G

Top 100*100 Digest Computer & Software
WWW Magazines & Journals

Editor's iView: Featured Author

bruno_100.jpg (7134 bytes)

Lee Bruno
Data Communications Magazine

Secure Messaging: How Safe Are Your Business Secrets?
Companies have come to rely on e-mail as an everyday communication tool, but too many leave their business secrets vulnerable to prying eyes and the whims of disgruntled employees. While there's no guarantee that the use of encryption and authentication will completely safeguard a business' e-mail system, secure messaging systems, server and groupware packages offer some protection. Bruno compares and contrasts the options available. [more]

A | B | CArrow Right
 D | E | F | G | I | J | L | M | N | O | P | R | S | T | U | V | W | Y | Z

D

Magazine

March 99
Web Influence Rank

Internet Valley Benchmark
I V B*

MIPS**

Outline/Quotes

D-Lib Program 43

1.40

Barbara McFadden Allen

Using Collaboration to Advance High Technology Initiatives

What would happen if a dozen independent, successful, competing corporations aligned themselves to leverage the strengths of each in order to enhance and strengthen each individual corporation? What would happen if they organized teams of experts from each of their corporations to address common concerns, build on areas of expertise, and identify short and long term goals for enhancing the ability of the individual corporations to better serve their primary customer base? Doubtless such pre-competitive cooperation would result in advances for each entity, as the group built upon the strengths and successes of the individuals.
Data Communications Magazine 41

1.55

Lee Bruno

Secure Messaging: How Safe Are Your Business Secrets?

These days business depends on e-mail, but e-mail systems can't depend on any protection. But there's a way to keep those business secrets safe. More than a dozen vendors are shipping secure messaging systems, server and groupware packages that make use of encryption and authentication to make sure the mail gets through - safe from prying eyes and mischievous minds.
Data Management Review 74

0.24

Sam Gallucci

SFA Systems: Managing the Behavior and Cultural Changes

Companies have continued to miss the mark in their quest for successful sales force automation (SFA) implementations. Industry statistics put successful SFA implementations at less than 30 percent. The reason: companies and system integrators overlook the most critical success factor -- the user.
Datamation 21

3.77

Paul Strauss

Four Steps to More Effective Network Services

As the 20th century ends, most organizations find themselves involved, one way or another, in upgrading or extensively revising their computer networks. Chances are, this trend will continue for at least the first decade of the coming century. This will be a time of tremendous opportunity for creating networked applications that can save or make organizations millions of dollars. It will also be a time of turmoil, in which firms can easily mismanage their networks and waste much more of their network budgets than they could have expected.
Dr. Dobb's Journal 36

1.75

Ron Klatchko

Dynamically Reconfigurable Servers

With the advent of the Web, it is more important than ever to have systems that run continuously. It is always business hours somewhere in the world; there is no good time to bring down servers for maintenance. Over the life of the server, it may be necessary to import new data and code. ... It is relatively easy to implement servers that can import new modules and data at run time. This dynamically reconfigurable server is implemented in Python, a portable, interpreted, extensible object-oriented programming language.

 

E

Magazine

March 99
Web Influence Rank

Internet Valley Benchmark
I V B*

MIPS**

Outline/Quotes

Ed. - Editorial comments

EDN Access 62

0.44

Warren Webb

Squeeze Watts From Your Embedded Design

An efficient, low-power design not only slashes the energy your embedded system consumes, but also reduces the energy drain on the environment. As a bonus, you get a superior product at a lower cost.
EE Times 54

0.65

Robert Bellinger

Where Are the Jobs? In a Word, 'Everywhere'

The college hiring scene for engineering students is booming: Companies are swamping engineering deans with requests for interviews with junior and senior EEs, computer engineers, computer scientists and other technical graduates. Dartmouth extended its usual one-day engineering career day to three. EEs, CS and CE candidates sift through 10 interview requests, multiple offers and dream locations.
Embedded Systems Programming 55

0.59

R.C. Lacovara

Scheduling a Real-Time Program

If you’re doing manual scheduling of a mission-critical real-time program, you need a good way to obtain information from the system during run time. Here's a methodology that requires few system resources and little effort to set up.
Entropy Gradient Reversals 92

0.08

RageBoy

Terms of Service

Some of the material on the Entropy Gradient Reversals website and mailing list is unsuitable for children under the age of 18, especially those raised by paranoid schizophrenic anal retentives lacking any sense of humor. Such persons should log off now and think seriously about seeking professional guidance. By viewing these pages, you agree to have 10% of your annual wages automatically routed to our Swiss bank account #4590239L for disposition as we see fit. Any and all views expressed by the author or authors of these pages are strictly their own and none of your goddam business.

Ed. - With a disclaimer like that, how can you go wrong?

F

Magazine

March 99
Web Influence Rank

Internet Valley Benchmark
I V B*

MIPS**

Outline/Quotes

Fairfax Information Technology:
Sydney Morning Herald
34

1.80

Nathan Cochrane

Beware of the Slashdot Effect

The Slashdot Effect. It's not a new disaster film, although for some system administrators it is causing a few sleepless nights. And if your Web server just keeled over, or you cannot work out why your site recorded more traffic in an hour than it usually does in a year, chances are you have already experienced it.
Family PC 26

2.47

Robin Raskin

Stacking the Deck For E-Commerce

Don't get me wrong, although I am getting relatively addicted to shopping online, that doesn't mean I want my neighborhood turned into a graveyard of boarded-up stores. That's the risk we take if we let the Internet honchos with self-serving agendas set the tone for e-commerce in this country.
Federal Computer Week 25

2.63

Daniel Verton

DOD, Intell Community Study Web Access

The Defense Department is planning a new round of World Wide Web site security reviews in light of continuing concerns that the large volume of information available to the public on the Internet poses a significant risk to DOD operations, a senior DOD official said today.
FEED 28

2.23

Erik Davis

Larry Wall: Divine Invention

Larry Wall, a linguist and self-effacing polymath, is the creator of the popular and ubiquitous Perl programming language. (Perl stands for "Practical Extraction and Report Language" or, if Wall is in the mood, "Pathologically Eclectic Rubbish Lister.") Created over ten years ago with contributions and critiques of volunteer hackers, Perl is widely considered the "duct-tape" that holds the Internet together.
Fontsite 83

0.11


The Rules of Typography: Part VIII
Increase line spacing to improve readability in body text: Line spacing, also called "leading" because printers used to insert thin strips of lead between lines of type to add space, is very important not only for readability but also for appearance.

G

Magazine

March 99
Web Influence Rank

Internet Valley Benchmark
I V B*

MIPS**

Outline/Quotes

Government Computer
Canada
97

0.05

Thomas B. Riley

Privacy - The Internet and Beyond

Citizens of the Internet in the United States and Canada are growing impatient with the lack of secure environments. Surveys show that, in the U.S. in particular, users want government intervention to ensure security and confidentiality on the Net. In Canada, the frustration is being assuaged as the federal government has brought in Bill C-54, which will enact a set of rules for the protection of personal information in the private sector, as well as facilitate the legal environment for the use of digital signatures. The importance of the privacy aspects of this bill is it extends these rights not just to cyberspace but to all records, no matter their form.
Government Technology Magazine 57

0.58

Tod Newcombe

Private Solutions for Public Commerce

Transacting business over the Internet is barely under way in state and local government, but already a number of private-sector services are cropping up that offer "end-to-end" solutions. Most of these privatization efforts have been concentrated in the business-to-business field of electronic commerce.

* IVB: The Internet Valley Benchmark (IVB) compares a company's zone of Web influence to that of its peers and across industries through the use of a standard value. The set level for the IVB is the current zone of Web influence for Internet Valley. Why Internet Valley Benchmark ?

Internet Valley was founded and coined the term Web Influence in 1995.
IV became the first company to provide the online community with full-scale Web Influence related services.
In May 1996, Internet Valley published the first Web Influence list, rating the Top 100 Online Computer Magazines. Since that time, Internet Valley has continued to develop the hyperlink mechanics-based methods and technology to monitor and evaluate the current level of Web Influence. The basic subjects of this research have been the fastest growing sectors of iBusiness. All this time, Internet Valley has provided to the leading members of the Internet community reliable data, trends and statistics.

Leading members of the IT community voiced their opinions regarding Internet Valley's 3-year effort to research Web Influence trends:
    - Matthew Rothenberg, director of online content at MacWeek.Com, joint venture of ZDNet and IDG, "We are thrilled by the results of the study..." January 5, 1999
    - IBM e-commerce director Scott Gannon: "I think your research is really proven right on.  I think you're focused on the right thing..." January 28, 1999

** MIPS - Most Interesting Page of Site

go toTopof the page of page.
A | B | C | D | E | F | G | Arrow Right I | J | L | M | N | O | P | R | S | T | U | V | W | Y | Z

Top 100 Mag's Back Issues

Additions, suggestions, questions: Contact us

 Internet Valley

Copyright (c) 1995-1999 Internet Valley, Inc.All rights reserved