By Topic

IT Professional

Issue 1 • Date Jan.-Feb. 1999

Filter Results

Displaying Results 1 - 11 of 11
  • Mobilizing for Y2K: A status report

    Publication Year: 1999, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Andy Grove takes a close look at networking

    Publication Year: 1999, Page(s):80 - 79
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting next generation Internet applications today

    Publication Year: 1999, Page(s):29 - 34
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Want to multicast real time applications over IPv4 without upgrading? Two protocols can help right now. New protocols are a response to the growing variety and volume of traffic on the Internet and intranets. The developers of IPv6 specifically refer to supporting a future in which low-power, handheld devices may tap into the Internet, as may refrigerators, soda machines, and electric meters. They... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advancing IT into the 21st century

    Publication Year: 1999, Page(s):76 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB)

    The progress of IT in the US is the direct result of federal investments. Advances in information technology will provide the basis for much of the world's economic growth as we head into the next century (2000). During the past five years (1994-9), production in computers, semiconductors, and communications equipment quadrupled at a time when total industrial production grew by 28 percent. In the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When models collide: lessons from software systems analysis

    Publication Year: 1999, Page(s):49 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Sooner or later, the assumptions people make about what a system should do will conflict. Here's how to recognize it before it's too late. Systems analysis is rapidly coming of age. Many projects have successfully used a new approach called MBASE (Model-Based System Architecting and Software Engineering). The MBASE approach integrates the four common development models (success, product, process, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Basic intrusion protection: the first line of defense

    Publication Year: 1999, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB)

    Making your system safe is no cinch, but here's a guide to getting started. The article examines various system security methods, including: identification and authentication techniques; firewalls; audit trails; and automated intrusion detection systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Help for cyberterrorism: Y2K's silver lining

    Publication Year: 1999, Page(s):74 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    We have seen numerous concerted efforts to deal with worldwide problems that potentially affected everyone, such as world wars and health hazards. We are now witnessing a different kind of global mobilization to conquer the Y2K problem. To remedy the Y2K problem, IT departments throughout the world have had to direct enormous resources to perform an in-depth analysis of their computers. We have in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The cold realities of software insurance

    Publication Year: 1999, Page(s):71 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Is your company scrambling to assess its legal and financial vulnerability from online transactions or the Y2K problem? If so, you should know that insurance companies are now tentatively dipping into the waters of software liability. Amidst predictions of huge corporate liabilities and despite reports to the contrary, insurers are offering some coverage. Often, however, the coverage either does n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ins and outs of IT outsourcing

    Publication Year: 1999, Page(s):11 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Many IT managers are struggling with the question of whether and how to outsource various functions. Businesses of all sizes are seriously considering shifting some IT assets to a third party. In today's fast-paced IT environment, technology and skill sets change very quickly. In reality, IT managers have no choice but to prepare for a future that includes outsourcing. IT staff have long been pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A big-picture look at enterprise architectures

    Publication Year: 1999, Page(s):35 - 42
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    It makes sense to plan the growth of your information systems. But many attempts to create a road map start at the wrong level. Ensuring a consistent, coherent vision to direct the evolution of the enterprise's information systems is difficult enough with a development framework. Without one, it's impossible. The concepts we outline are just a task list in the work to establish an enterprise archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community task forces help mitigate Y2K risks

    Publication Year: 1999, Page(s):73 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    Several aspects of the Y2K problem are coming into focus. First, not all of the problems will be corrected in all the mission-critical systems. Second, failures could impact commerce, government services, power, communications, transportation, the economy, and other areas. Third, there is a growing concern that Y2K failures may cause havoc in our personal lives. Undoubtedly, millennium anxieties w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services