By Topic

IT Professional

Issue 1 • Jan.-Feb. 2017

Filter Results

Displaying Results 1 - 17 of 17
  • Front Cover 
  • Front Cover

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2017, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE
  • From the Editors 
  • IT Pro 2017: A Look Ahead

    Publication Year: 2017, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (191 KB) | HTML iconHTML
    Freely Available from IEEE
  • IT Trends 
  • Superintelligence: Myth or Pressing Reality?

    Publication Year: 2017, Page(s):6 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (570 KB) | HTML iconHTML

    Some project that rapidly advancing artificial intelligence (AI) will endow technology with a "superintelligence" that will surpass human intelligence within the next quarter century. This has sparked fears that humankind could become subservient to its robots, or that unchecked AI development might ultimately annihilate humanity. The author examines the concept of superintelligence, defines diffe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications Networking 
  • Technologies for 5G Networks: Challenges and Opportunities

    Publication Year: 2017, Page(s):12 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (682 KB) | HTML iconHTML

    Mobile data traffic has grown substantially owing to the widespread use of data-hungry devices such as smart handsets and laptops. This has encouraged researchers and system designers to develop more efficient network designs. The authors review the technologies that can support speeds of multiple Gbps for future fifth-generation (5G) networks. They examine the many challenges, problems, and quest... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Computing 
  • Mobile DNUN: Danger Notification and User Navigation

    Publication Year: 2017, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (859 KB) | HTML iconHTML

    Today's mobile applications are playing a key role in the IT world, encompassing various fields such as sports, entertainment, health and sciences, and games. This article describes the Danger Notification and User Navigation (DNUN) application, which works in conjunction with a geolocation system to save and navigate to an object's location for immediate or later use from anywhere on Earth. It no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT in Healthcare 
  • IT-Enabled Support for Anesthesia Preoperative Evaluation Clinics

    Publication Year: 2017, Page(s):27 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (837 KB) | HTML iconHTML

    In hospitals, the anesthesia preoperative evaluation clinic helps physicians and patients estimate the risks of scheduled surgical procedures and prepare better plans. Information systems can support these assessments, but most such systems in hospitals focus primarily on displaying and storing patient records. The authors use a three-tier architecture to develop a computerized clinical procedure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data 
  • Big Data Processing Stacks

    Publication Year: 2017, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    After roughly a decade of dominance by the Hadoop framework in the Big Data processing world, we are witnessing the emergence of various stacks that have been enhanced with domain-specific, optimized, and vertically focused Big Data processing features. The author analyzes in detail the capabilities of various Big Data processing stacks and provides insights and guidelines about the latest ongoing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering 
  • Open Source Software Adoption: Lessons from Linux in Munich

    Publication Year: 2017, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    It took 10 years for the city of Munich to migrate 15,000 PCs from Windows to the Linux operating system. Was it worth it? This article focuses on how to effectively cope with open source software (OSS) adoption in an organizational context. Based on the Linux in Munich case, the authors present challenges and risks for IT decision makers and propose recommendations for evaluating and calculating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Management 
  • How to Become a Strategist CIO

    Publication Year: 2017, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    The strategist CIO is one type of top information system or IT executive. Strategists can exploit the use of information systems and technologies by participating in business strategy formulation. Scholars and practitioners have described the strategist CIO as the ideal type for today's organizations and globalized challenges, but little information exists on how to become a strategist CIO. This a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT in Emerging Markets 
  • User Experience in Service Design: A Case Study from Algeria

    Publication Year: 2017, Page(s):56 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The design of crisis management services is crucial for emerging countries such as Algeria. It must take into account the experiences of diverse stakeholders. The authors investigate user experience (UX) practices from a service design perspective and describe a case study from Algeria exploring UX-driven service design for crisis management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing IT 
  • VPKI Hits the Highway: Secure Communication for the Connected Vehicle Program

    Publication Year: 2017, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (965 KB) | HTML iconHTML

    This article presents a condensed account of the 10-year effort to develop and deploy vehicular public-key infrastructure (VPKI) as a security infrastructure for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) intelligent transportations systems (ITS). The author discusses the ways in which government, industry, and academia have converged to bring the promise of vehicular networks as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Analytics 
  • The Evolving Role of the CDO

    Publication Year: 2017, Page(s):64 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    To achieve digital transformation, organizations must gain control of the avalanche of data that is generated by supplier, customer, and employee interactions. This complex data environment has led enterprises to realize that new leadership is needed to take on responsibility for data and information value. The chief data officer (CDO) role has arisen to fill this need. The author examines this re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT and Future Employment 
  • IT and Future Unemployment: Part 2

    Publication Year: 2017, Page(s):70 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    There are several possible relationships between long-term, automation-caused unemployment and short-term, offshoring-caused unemployment. The author describes some of these relationships, examines the connection between unemployment and the presidential election of 2016, and looks at two recent interviews that express concern about automation-caused unemployment and discuss a remedy for it. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Call for Papers

    Publication Year: 2017, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Back Covers 
  • TechIgnite

    Publication Year: 2017, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services