Computer
Magazine
Software Magazine
Network Magazine
Microprocessor Magazine
Top 100 *
100 Digest
Computer Education Magazine
April 1998
I-J-L-M
Computer & Software WWW Magazines
& Journals
A | B | C | D | E | F | G |H
I | J | L | M | N |O | P | S | T | U| V | W
| Magazine | MIPS* | Outline/Quotes | |
|---|---|---|---|
| Industry Standard | Alex Lash | Netscape last week put the finishing touches on its much-anticipated "portal" strategy, announcing a free e-mail service and setting the stage for a protracted battle with Yahoo and a handful of other aspiring Net brands. The contracts between Netscape and the search engines expire on April 30, and the companies are in the midst of complex negotiations over just how they might be renewed. Mike Homer, the veteran Netscape marketing VP who recently took the reins of the company's Netcenter Web unit, says Netscape expects its forthcoming search engine to displace Yahoo, Infoseek, Excite and Lycos from their dominant positions on the Netscape Search page. Yahoo CEO Jeff Mallett downplays Homer's claims, saying he has "yet to see what the Netscape search program will look like." |
|
| InfoWorld | Deborah RadcliffDon't get blown away |
Being prepared for vindictive employees can avert a security disaster.The danger within. Internal employees - not outside hackers - can be a time bomb waiting to blow. Omega Engineering learned firsthand the dangers of the disgruntled employee after a timed virus, known as a logic bomb, wiped out all of its research, development, and production programs in one fell swoop. (The tape backup also was destroyed.) In January, charges were filed against 31-year-old Timothy Lloyd, an Omega programmer, for placing the bomb on the network, which detonated 10 days after his termination. Omega's costs will likely exceed $10 million as engineers and designers rewrite designs and recode programs in what Jim Ferguson, an Omega representative, says will be "an ongoing process for several years." ... |
|
| Information Week | Deborah
Kerr Hacker Stoppers? |
Intrusion-detection (ID) tools are a $65 million industry that will grow as large as the firewall market, which reached about $255 million in 1997, according to the Hurwitz Group. Touted as network burglar alarms, ID systems are programmed to watch for predefined attack "signatures," or predefined bytecode trails of prespecified hacks. IDs also send out real-time alerts of suspicious goings-on inside the network | |
| Internet World | Aaron Weiss The Art of Debugging |
The primary goal of debugging techniques is to reveal the inner workings of your program code. The solution to 90 percent of programming problems is simply a matter of pinpointing the exact problem itself. Typically, we debug programs by adding or removing code from the original version, which can help expose its workings. Our hope is that this exposure will reveal the flaw, and that once known, the flaw is probably easy to fix. |
|
| Institute (IEEE) | DAVID OSTFELDNew morality on 'electronic theft' could swell the ranks of U.S. felons |
The bond between the entertainment industry, the software distribution industry and large publishers has led to a series of laws (and more to come, if the U.S. Congress is so inclined this term) that has translated commercial liability into criminal acts. This series of acts and bills goes far beyond piracy, levying penalties in terms of years in jail for relatively minor actions which could easily happen on anyone's computer in the course of a few days. ...A large segment of our population, if the bills pass, will be felons who just haven't been found, tried and jailed. | |
| Inter@ctive Week | Joe McGarvey Chips Link Enterprises To Future |
...the vast majority of remote access and networking gear is constructed of programmable computer chips that enable enterprises to enhance and upgrade hardware without purchasing new equipment. These programmable bits of silicon, the most prominent being digital signal processors (DSPs), are the tools that make it possible for equipment makers to deliver next-generation technology for today's hardware.... DSPs are especially popular in modems and wireless communications devices, such as cellular phones, because they are designed to handle the compute-intensive task of converting analog signals into digital information, |
|
| Internet | Veronica
Smith Internet2 -- Building the Next Backbone |
Internet2 has been publicized in different lights, which means there is still lots of confusion about the project's internal goals and its ultimate purpose. Promising to provide access and transfer rates up to 1,000 times faster than those available today, the project is deserving of attention, but don't expect to be cruising at such high speeds just yet. Currently confined to academia, government research centers and a handful of nonprofit organizations, the new network is separate from the mainstream Internet. As far as access goes, however, Internet2 is not considered a "separate" network. The most significant distinction that can made at this point is that Internet2 will not replace the current Internet. The hope is that the developments and discoveries that emerge from continuing work on the Internet2 project will eventually find their way into all kinds of networks, including the Internet. |
| Magazine | MIPS* | Outline/Quotes/Comments |
|---|---|---|
| JavaWorld | Bill Venners Keep focused! Designing fields and methods |
This installment of the Design Techniques column shows how some fundamental software design techniques, like avoiding special data values and minimizing method coupling, apply to Java. |
| Java Pro | James W. Cooper Javatecture |
One of the most interesting developments in the past few years has been the cataloguing and discussion of Design Patterns. ... design patterns are not cutesy computer-science abstractions, but catalogs of useful, tested ways to write effective OO programs. .. One type of pattern often seen in OO programs is the Factory pattern or class... |
| Magazine | MIPS* | Outline/Quotes |
|---|---|---|
| LAN Magazine | Anita Karvé Remote Access: Old Concerns, New Challenges |
With telecommuting and mobile computing on the rise, remote access to the corporate network is an increasingly critical business and technology objective. Users who travel or work from home require a certain level of access to perform their jobs effectively, and the key challenge for IT managers is to provide the appropriate level of access without compromising network security. Security has been a concern ever since remote control software was the primary method of remote access. But with the advent of new remote access technologiesin particular, Internet-based remote accessthis concern has become paramount ... |
| LAN Times | Brian Riggs | ... Years ago, the National Science Foundation granted Network Solutions a sole-source contract to administer Internet domains such as .com. ... the federal government is expected to open DNS registration to worldwide competition (see "International authorities to manage domain names" )... A new set of generic top-level domain (gTLD) names will be available from a competing array of registrars. These domains include .firm, .shop, .web, .arts, .info, .nom, and .rec, which the Internet Council of Registrars (CORE) and the gTLD Memorandum of Understanding Policy Advisory Body officially approved in November... |
| Magazine | MIPS* | Outline/Quotes/Comments |
|---|---|---|
| MacAddict | The celebrity appeal of Steve Jobs, AppleMasters on tour, and more on your favorite ex-execs. |
|
| Mac Week | Christina Follmann Life after Quicken |
Software analyst Chris LeTocq of Dataquest, a San Jose, Calif., division of Gartner Group Inc., said, "This is probably the right thing for them to do. I think they are sort of looking at some marketplace reality here." |
| Macworld | Henry Bortman | Surefire Strategies to Survive and Thrive in a Windows World |
| Microprocessor Report | Linley Gwennap Intel Locks Out |
The difference between a market share of 90% and 100% may seem small, but that last narrow slice is what separates power from absolute power. Intel's vast share of the CPU and chip-set markets has given it great power, but the company is now angling to completely eradicate competition in the merchant chip-set market. That monopoly power is already leading to abuses against PC vendors--a situation that is likely to hurt Intel itself in the long run. |
| Microsoft Internet Magazine | Clay Hathorn | In the Information Age there seem to be a lot of people proficient in the online world -- trafficking in e-mail, manipulating data, pointing and clicking up a storm -- without understanding some of the basic tenets of interactive computing. |
| Mobilis | Marty Mankins | Sadly, this is nothing new. This has happened to all brands of PDAs, including those from companies such as Atari, HP, Casio, Sharp, and others. All have followed the trend of dumping palmtop and PDA models before their time, presumably to move on to newer models that meet current market demands. Fortunately, all is not lost. In this article, I'll talk (Marty Mankins) about older PDAs and how to make greater use of them in your life. In fact, I'll even argue that yesterday's hot PDA may offer even better value that some of today's overpriced gizmos. |
| Music & Computers | Craig Anderton's Soundcard Installation Tips | ... Music & Computers contributor Craig Anderton discovered the following technique for safely installing the little silicon spatulas. It's also a good way to create a clean music operating system. |
* MIPS - Most Interesting Page of Site
A | B | C D | E | F | G |H | I | J | L | M
N |O | P | S | T | U| V | W
Top 100 Mag's Back Issues
Additions, suggestions, questions: Contact us
Copyright ©1995-1998 Internet Valley, Inc.All rights reserved