By Topic

IT Professional

Issue 5 • Date Sept.-Oct. 2009

Filter Results

Displaying Results 1 - 23 of 23
  • Front Cover

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1321 KB)
    Freely Available from IEEE
  • Computing Now advertisement

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (9114 KB)
    Freely Available from IEEE
  • IT Professional masthead

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1792 KB)
    Freely Available from IEEE
  • X as a Service, Cloud Computing, and the Need for Good Judgment

    Publication Year: 2009, Page(s):4 - 5
    Cited by:  Papers (17)  |  Patents (1)
    Request permission for commercial reuse | PDF file iconPDF (221 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editor's Introduction: Ontologies, OWL, and the Semantic Web

    Publication Year: 2009, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (1423 KB) | HTML iconHTML
    Freely Available from IEEE
  • Semantic Web Technologies: Ready for Adoption?

    Publication Year: 2009, Page(s):8 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2960 KB) | HTML iconHTML

    A review of semantic Web use in the EU shows that its related technologies are finding their way into real-world applications. Rather than being a fashionable research issue, the semantic Web is slowly but surely becoming a reality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equal Format Databases and Semantic-Relational Encoding

    Publication Year: 2009, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2219 KB) | HTML iconHTML

    Equal format databases let relational database servers manage complex data in a standardized way, with the flexibility previously reserved for XML systems. Equal format containers are also scalable and improve the ability to merge and integrate databases. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Just What Is an Ontology, Anyway?

    Publication Year: 2009, Page(s):22 - 27
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1770 KB) | HTML iconHTML

    This tutorial article describes some definitions of "ontology" as it relates to computer applications and gives an overview of some common ontology-based applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Service Model Approach for Enabling SOA

    Publication Year: 2009, Page(s):28 - 33
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (930 KB) | HTML iconHTML

    To effectively align business and IT using a service-oriented architecture (SOA), a proposed integrated service model divides service construction into three loosely coupled perspectives according to the service's business logic, interface, and implementation. The resulting hierarchical model and associated methodology can help software architects more effectively and efficiently design and develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information

    Publication Year: 2009, Page(s): 34
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Trustworthiness in Software Environments

    Publication Year: 2009, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2734 KB) | HTML iconHTML

    This article examines several approaches to establishing and monitoring system trustworthiness. In particular, we explore health monitoring, string kernels, available commercial tools, design considerations, and the semantic exploitation of environmental artifacts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Professional Call for Papers: IT Asset Management

    Publication Year: 2009, Page(s): 41
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Success in National Cyberdefense

    Publication Year: 2009, Page(s):42 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    This article discusses the concept of cyberspace as it applies to government. Government employees must be "cyberwarriors" and accountable for their actions while using IT, and CIOs and CISOs must be aligned to effectively balance security and access. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Smart, Part II: Career Smart

    Publication Year: 2009, Page(s):44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    In the last issue, the author described how to be self-smart, with an emphasis on being work smart. In this issue, we focus on being career smart, which consists of the following mantras: "a big fish in a small pond beats the reverse," "hop to a more opportune pond," and "don't polish a sneaker." The aim is to find organizations and specialties in which your strength gives you the opportunity to j... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joining the Conversation about IT Ethics

    Publication Year: 2009, Page(s):48 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (894 KB) | HTML iconHTML

    IT Professional is a publication for practitioners, and proudly so. In this department, we often talk about the practical side of ethics issues, including advice on how professionals can recognize, analyze, and make judgments on challenging questions about right, wrong, and computing. But in this issue's installment, the author takes a somewhat broader view, starting with an examination of ethical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Surviving Distributed Denial-of-Service Attacks

    Publication Year: 2009, Page(s):51 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    Business organizations and government agencies that depend on an Internet presence but operate without effective DDoS protection mechanisms put their operations at unacceptable risk. Unfortunately, the varieties of DDoS attacks, the incomplete information we have about them, the difficulty of large-scale testing, and the need for a distributed response at many points make defending against DDoS at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Compliance: Aligning Legal and Product Requirements

    Publication Year: 2009, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    Laws and regulations increasingly impose requirements on IT business practices and products to achieve societal goals such as privacy, safety and accessibility. To meet these requirements, companies integrate their product development with an organizational infrastructure for managing compliance risks. The emphasis has often been on compliance with specific regulations, such as the 1996 Health Ins... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Careers.computer.org advertisement

    Publication Year: 2009, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (780 KB)
    Freely Available from IEEE
  • Changing the Publishing Model

    Publication Year: 2009, Page(s):60 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    The publishing industry is experiencing major social changes. Time magazine and The Los Angeles Times, to name just two publications, have highlighted these changes as characterized by a public that has developed both a preference for receiving information online and an expectation that this content be available for free. For information creators and providers such as the IEEE Computer Society (CS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certification: Does the Emperor Have Any Clothes?

    Publication Year: 2009, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Over the last couple years, I've seen a vast increase in the number of requests for proposals (RFPs) and job postings that require certifications or credentialing at both the individual and organizational levels. These range from certifications on specific tools and technologies to broadbased methodology competencies. In an ever-escalating pattern, they're being abused by all parties concerned. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CS Press advertisement

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1338 KB)
    Freely Available from IEEE
  • CiSE advertisement

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (2128 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services