Computer Magazine Software Magazine Network Magazine
Top 100 Mag
Computer & Software WWW Magazines & Journals
"In the beginning was the WORD..."
A | B | C |D | E | F | G |H | I | J | L | M | N |O | P | S | T | U| V | W
|Australian Personal Computer
|... the Digital Library will continue to offer its search and bibliographic database resources to all visitors, for free.
|Cost for Web advertising pretty much follow the conventional approach of charging by CPM, or cost per thousand impressions. So buying 100,000 impressions(so that your ad will be displayed 100,000 times) with CPM of $20 costs $2,000
|John Montgomery Crash-Proof Tools
|There's a variety of tools that can help you avoid crashes and recover from them a little more gracefully. Here are four...
|Illegal copies cost company
|... engineering firm, agreed to pay the Busienss Software Alliance $140,000, replace any unlicensed software with legal copies, ... When contacted by BSA after a call to BSA's anti-piracy hotline, the firm conducted its own audit and found illegal copies of software from Adobe, Autodesk,....
So You Think You Want to Be a
....Do you just pick up the phone? Do you answer an employment ad? Could you get a referral? Who do you talk to? And, how do you negotiate rates? By the hour, by the day, per project? What will you guarantee? How about GST, income tax, overtime? Do you register a company name, or incorporate? What if they don't like your work? What if you quote them a fixed price and you discover a terrible problem you can't fix. What are your liabilities if you mess up their system? What if you don't finish on time? ...
|CAPT Dan Galik, USN
Defense in Depth: Security for Network-Centric Warfare
... a "widespread and potentially harmful attack" on seven Air Force and four Navy information technology (IT) sites had been detected. ... the focus of most of the attacks was domain name servers (DNSs)... corrupting the translation tables of a Domain Name Server can cut off or hijack communication channels ...While perfect security is a myth that cannot be achieved, there is much that can be done ...
A recent unique design collaboratorium has inspired Canadian media intellectual Derrick de Kerckhove to define the conditions which might give rise to, or manage the process of, collective intelligence amongst a group of people. The resulting "12-point plan" could be a radical new approach to creativity by committee.
INTERVIEW: Presidential advisor Ira C. Magaziner explains the Clinton administration's hands-off approach to the development of Internet commerce... Magaziner, a Rhode Island native and graduate of Brown University, met Clinton when both were Rhodes Scholars at Oxford University in the 1960s: "We believe that Internet commerce is going to profoundly change our economy for the better, that it may well have the same impact that the Industrial Revolution had a couple of centuries ago"
1. Be sensitive to customers with older systems...10. Do not
use bells and whistles just because you can...27. Think through keywords
clearly. Imagine how a customer would look for your service or product if they didn't know
your company or Web site name...40. Include the full URL
so that people know the address of the resource from a paper copy of your
page...45. Listen to the 24-
Totally PC? Assessing Computer Impacts
..Under the best conditions, paper has held up for a thousand years. Electronic disks appear far more vulnerable. So will we always want a paper backup? ...
|Handheld PCs are totally inadequate for production work, but they're fine if you want to keep appointments, contact information, and to-do lists on hand. These functions are built into Windows CE along with Microsoft's Pocket Excel, Pocket Word, and Pocket PowerPoint. HPCs also allow email, faxing, and Web browsing
|Computer Gaming World
|Loyd Case Who's Going to Have the Best Gaming CPU?
|Do Non-Intel CPU Makers Have the Hot Hand in 1998?
Del Toro Test Yourself
It's not the size of your brain that matters, but how it performs under testing. See
how you measure up. Benchmark your personality, temperament, IQ, purity, career
compatibility, and more!
New York Times
|John F. Manser
Court Rules Against `Cyber Pirate'
SAN FRANCISCO -- Panavision Inc. won a major victory against ``cyber piracy'' when an appeals court ruled an Illinois man couldn't register Panavision's name as an Internet address, then try to sell it back to the company.
|Computer Paper Canada's largest monthly computer magazine
|New technologies make everyone a potential magnate...
|Computer Reseller News
|Barbara Darrow & Charlotte Dunlap
Unnamed competitors to Microsoft Corp.
have circulated a list of proposed remedies to reel in the Redmond, Wash. based
software giant.The remedies include a suggestion that Microsoft's
|Computer Retail Week
|Roger C. Lanctot
|It's easy to dump on sales associates, and Lord knows we do plenty of it ourselves. But we all depend on them and their ability to make sense out of nonsense. In a climate of declining average retail prices and margins, these foot soldiers ...
|Make Your Web Site Mean Business
|...tutorial helps you build brand recognition and boost profits online. Learn who's out there, how much it costs to get their attention, and how to keep them coming back to your site.
|Computer Times Singapore
Three elements key to the development of Singapore as an electronic commerce hub have been proposed by a high-level government committee. The key proposal is a law -- the Electronic Transaction Bill expected to be tabled in June -- which will provide the legal framework governing electronic commerce (EC). The other two pieces are a masterplan for EC promotion and investment here and overseas, and the building up of infrastructural services that will allow EC applications and services to be used by anyone, anywhere in Singapore and abroad.
The Agents' Agents
Intelligent agents are sweeping the World Wide Web. In the typical fashion of the technology acceptance curve, they suddenly seem de rigeur. But the tale of how autonomous software agents have come into the mainstream isn't a Java-like overnight success story...
|George Pajari Don't Count Unix Out
There's no denying the rapid growth of Windows NT in Japan. But the "other network OS," Unix, continues to grow as well - with SCO leading the way.
|Crossroads The ACM Student Magazine
|George Crawford III
A Practical Crash Course in Java 1.1+ Programming and Technology: Part II
The primary purpose of object-oriented design is to prevent promiscuous alteration of encapsulated data. Java provides four methods of controlling access to class members...
Colonizing Virtual Reality
A technology emerges through a process involving broader cultural, linguistic, institutional and technological contexts. One clear illustration of this process can be drawn with the appearance of "virtual reality" in 1989, and the subsequent popularization of the idea through the media. On June 7, 1989 the computer-aided design software company Autodesk and the eclectic computer company VPL announced a new technology called "virtual reality."... In marketing this new technology (which represented a major shift in thinking about the nature of computers), the developers and promoters drew on a range of tropes: VR is shared and objectively present like the physical world, composable like a work of art, and as unlimited and harmless as a dream ...
Social Landscapes vis-a-vis the Space of Flows
Felix Stalder is a PhD student at the University of Toronto, working on the intersection of networks and money. He is also part of the McLuhan Program in Culture and Technology.
Computer Underground Digest
Islands in the Clickstream: Voyagers
The Internet is a vast sea of possibilities, a symbolic representation of our collective consciousness and our collective unconscious. When we explore the Net, we are exploring ourselves. The Net is a swirl ofinvisible currents. We learn to surf swells of meaning that surge back andforth like the sea. We learn to follow currents of information, feeling theswells interact in subtle and complex ways. We become voyagers in the sea of information in which we are immersed, plunging through high seas inoutrigger canoes. We make our own tangled starmaps that represent andremember for us how to find our way home.There is ultimately only ourselves to know. When we try to understand everything, we do not understand anything at all, observed Shunryu Suzuki. But when we understand ourselves, we understand everything.The Internet is not so much a set of skills as it is a culture. Guided bymentors, learning like wolves to hunt together, we learn how to hang in the medium. The images on our monitors are icons, windows disclosing possibilities far beyond our home planet. Inner and outer space alike are explored by tele-robotic sensory extensions, revealing the medium in whichwe have always been swimming. Consciousness is the sea, and the sea is all around us. The secrets that we think are lost are simply waiting to be found: Supra-rational modes of knowing. Connection and community of suchdepth and complexity that we grow giddy with delight. A network in which weare both nurtured and fulfilled, each node of the web a reflecting facetlike one of Indra's jewels, reflecting each of the others and the totalityof the whole...
Without a court order, search warrant,or Senior Chief McVeigh's consent - and with more than a hint ofsubterfuge - the Navy got AOL cough up McVeigh's real name, linkinghim to the AOL profile... U.S. District Judge StanleySporkin permanently blocked McVeigh's discharge, calling the Navy'sactions a "search and destroy" mission against the sailor. In ablistering opinion, Judge Sporkin took the Navy to task for violating"the very essence of Don't Ask, Don't Tell, Don't Pursue." Then he let the other shoe drop. In using the Internet to snoopon McVeigh, the Navy violated electronic privacy laws...
* MIPS - Most Interesting Page of Site
A | B | C D | E | F | G |H | I | J | L | M | N |O | P | S | T | U| V | W
go to Back Issues of the Top 100 Mag
Additions, suggestions, questions: Contact us
go to of page.
Copyright ©1995-1998 Internet Valley, Inc.All rights reserved