By Topic

IT Professional

Issue 1 • Date Jan.-Feb. 2001

Filter Results

Displaying Results 1 - 8 of 8
  • SOAP cleans up interoperability problems on the Web

    Publication Year: 2001, Page(s):52 - 55
    Cited by:  Papers (8)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB)

    The Simple Object Access Protocol (SOAP) simplifies information exchange across a variety of platforms because it is not tied to any specific object model. SOAP offers interoperability across a wide variety of platforms. It enables interoperability by providing a generalized specification for invoking methods on objects and components using standard hypertext transfer protocol (HTTP) calls and Ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tuning up the search engine

    Publication Year: 2001, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4667 KB) | HTML iconHTML

    Advances in Internet search engine technology may not help you blast Klingons into outer space, but they should help you find them more quickly on the Web. The whole arena for Internet searching has become rather interesting. Search engines appear poised to make some serious breakthroughs in relevancy ranging and personalization that promise to increase the accuracy and reliability of search. On t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Looking back at struggles, looking ahead to opportunities [e-commerce]

    Publication Year: 2001, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    At the beginning of 2000, people expected to see an explosion in business-to-business (B2B) e-commerce. Although B2B's allure drove many to launch initiatives, moving from a B2B vision to reality proved far more difficult than most companies realized View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical guide to biometric security technology

    Publication Year: 2001, Page(s):27 - 32
    Cited by:  Papers (32)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    As organizations search for more secure authentication methods for user access, e-commerce. and other security applications, biometrics is gaining increasing attention. But should your company use biometrics? And, if so, which ones should you use and how do you choose them? There is no one best biometric technology. Different applications require different biometrics. To select the right biometric... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enterprise computing with Jini technology

    Publication Year: 2001, Page(s):33 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    You may think of Jini technology from Sun Microsystems as software for networking embedded systems-machines that contain a microprocessor and do a specific task. But more specifically, Jini software gives network devices self-configuration and self-management capabilities; it lets devices communicate immediately on a network without human intervention. These networks are also self-healing in that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revisiting single sign-on: a pragmatic approach in a new context

    Publication Year: 2001, Page(s):39 - 45
    Cited by:  Papers (9)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    Single sign-on is a solution that lets users authenticate themselves once and access different applications without reauthentication. SSO assists users through all the procedures required to access heterogeneous applications. Using applications becomes easier, technical-assistance costs go down, and security improves. However, getting the most of the solution requires understanding related domains... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measures for e-business value assessment

    Publication Year: 2001, Page(s):47 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    Companies are investing heavily to leverage the Internet and transform their traditional businesses into e-businesses. Senior managers are increasingly under pressure to justify e-business costs. Do these investments pay off? And if so, how can a company make sure they keep paying off? Managers in successful companies struggle to articulate where benefits come from, and those without success striv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • If disaster strikes, can your business rise from the ashes?

    Publication Year: 2001, Page(s):57 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    The article explains how and why planning your insurance coverage wisely can help you prepare for computer disasters. Although most people hear about disaster planning time and again, it's only when disaster hits that they fully recognize how important it is to be prepared. Your agent can help you find the right insurance company so you can start preparing today. It is a given that finding time to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services