MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Internet

Magazine articles on the state and evolution of the internet.
Old Articles: <Older 11-20 Newer>
Salon.com
September 1, 2000
Charlie Varon & Jim Rosenau
21st Challenge No. 36 Dot what? New top-level domain names for fun, if not profit. A contest to choose new top-level domain names. mark for My Articles 148 similar articles
T.H.E. Journal
September 2000
Sun Microcomputer Systems Unlike desktop computers that require an operating system and applications running locally on the desktop, the low-cost Sun Ray systems' thin client-style configuration allows users instant access to multimedia, applications and information resources from anywhere on the network mark for My Articles 202 similar articles
Information Today
July 3, 2000
Nancy Lambert
Does British Telecom Own Hyperlinks? An investigation of the history behind British Telecom's patent which it claims covers hyperlinks. mark for My Articles 944 similar articles
Salon.com
August 21, 2000
Katharine Mieszkowski
Leggo my data! Web surfers want privacy online, but a new study shows they can't tell a cookie from a Cocoa Puff. mark for My Articles 538 similar articles
Wired
August 2000
Edward Cone
The Revolution Will Be Satirized Garry Trudeau is on a digital roll, reveling in dotcomedy - and chasing vertical eyeballs with his 3-D, full-motion, cross-platform Duke2000 campaign. mark for My Articles
Wired
August 2000
Howard Rheingold
You Got the Power Next comes the payoff. A wave of startups is poised to harvest the network's most wasted resource: your idle CPU cycles. mark for My Articles 65 similar articles
JavaWorld
August 2000
Stephanie Sanborn & Brian Fonseca, InfoWorld
Sun investigates Java security flaw in Netscape browser Sun Microsystems is investigating a security flaw that has popped up involving the use of Java in Netscape's Navigator browser. The bug, known as Brown Orifice (BO), makes use of Netscape's Java implementation to let an unsigned Java applet read and dispense files from a user's computer. mark for My Articles 358 similar articles
Salon.com
August 8, 2000
Katharine Mieszkowski
Are those servers really safe? A study finds that one-third of so-called secure Web sites are actually "dangerously" vulnerable. mark for My Articles 43 similar articles
Fast Company
September 2000
Paul C. Judge
Why the Long Wait? The Internet economy is built on speed. So why does the Internet still feel so slow? David P. Reed, former chief scientist at Lotus Development Corp. and a self-styled "digitalist," is advancing a provocative answer to that pressing question. mark for My Articles 14 similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles 504 similar articles
<Older 11-20 Newer>    Return to current articles.