IT Professional

Issue 2 • Mar/Apr 2001

Filter Results

Displaying Results 1 - 10 of 10
  • XML schema language: taking XML to the next level

    Publication Year: 2001, Page(s):37 - 40
    Cited by:  Papers (13)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (256 KB) | HTML iconHTML

    Schemas add data typing and inheritance features, giving XML the sophistication required to create enterprise-class business applications. The XML schema language describes the legal structure, content, and constraints of XML documents. The XML schema language provides the necessary framework for creating XML documents by specifying the valid structure, constraints, and data types for the various ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Package-oriented software engineering: a generic architecture

    Publication Year: 2001, Page(s):29 - 36
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (692 KB) | HTML iconHTML

    New methodologies and better techniques are the rule in software engineering, and users of large and complex methodologies benefit greatly from specialized software support tools. However, developing such tools is both difficult and expensive, because developers must implement a lot of functionality in a short time. A promising solution is component-based software development, in particular packag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing e-commerce systems: a practical guide

    Publication Year: 2001, Page(s):19 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB) | HTML iconHTML

    Testing has a crucial role in the overall development process. Given unlimited time and resources, you could test a system to exhaustion. However, most projects operate within fixed budgets and time scales, so project managers need a systematic and cost-effective approach to testing that maximizes test confidence. This article provides a quick and practical introduction to testing medium- to large... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical storage management: leveraging new capabilities

    Publication Year: 2001, Page(s):53 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (244 KB)

    E-commerce has created new problems in data management as mission-critical data swells a business' database into the terabytes. IT shops must efficiently manage data and still provide a rock-solid system with guaranteed 24/7 access. Finding a way to effectively fulfil this mission requires rethinking traditional data management methods. Among the many tools already available, hierarchical storage ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging e-business and added trust: keys to e-business growth

    Publication Year: 2001, Page(s):41 - 45
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (264 KB) | HTML iconHTML

    Systems based on a proper public-key infrastructure (PKI) architecture offer the missing trust and interoperability necessary for e-commerce expansion. As the number of services available to users continues to increase, so will the need to maintain the user's identity in a secured, trusted manner. The user name and password concept has worked thus far but lacks the portability and scalability that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protecting your most valuable asset: intellectual property

    Publication Year: 2001, Page(s):11 - 17
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (344 KB) | HTML iconHTML

    As a company grows, protecting its intellectual property could be key to its valuation. We present some basics about trademarks, patents, copyrights, and contracts. Building an organization, managing and motivating people, and finding customers and investors are all difficult and important. But the most important thing you could do for your new-economy company is to protect your intellectual prope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The pitfalls of managing a superstar

    Publication Year: 2001, Page(s):65 - 67
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (152 KB) | HTML iconHTML

    The author gives advice on how to deal with superstar employees. He has never found any literature on the matter (although some may exist), and he is frustrated that more isn't written about this problem. So he has opted to take on the issue directly, present his experiences, and hopefully provide some insight to managers so they won't make the same management mistakes he has made. He entered into... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nontechnical hurdles to implementing effective security policies

    Publication Year: 2001, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (332 KB) | HTML iconHTML

    There are no secure sites on the Internet, only vigilant ones. The main hurdle to adequate security is not the lack of security technology, tools, and products, but undereducated network administrators, corporate managers, and users. While attackers constantly are coming up with new ways to defeat improved security protection, the truth is that sophisticated attacks usually are unnecessary. A larg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoiding the CNN moment

    Publication Year: 2001, Page(s):72, 68 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (312 KB) | HTML iconHTML

    The CNN Moment is that agonizing disaster where the dot-com infrastructure fails and its architectural shortcomings end up as a lead story on CNN's financial news. As everyone battles to restore the operational integrity of the site, the hapless company combats angry customers, disappointed analysts, falling stock prices, reduced earnings, lawsuits, and a plethora of other ills that can damage the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the road to OC-768 [optical carrier]

    Publication Year: 2001, Page(s):46 - 48
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB) | HTML iconHTML

    Optical fiber promises higher data rates, but first it must get around a few hurdles presented by physics. Optical networking's capacity is increasing in response to Web surfing, images attached to e-mail, and the development of remote-collaboration applications. All these applications consume significant amounts of bandwidth. Optical networking uses two basic methods to increase an optical fiber'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services