Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IT Professional

Issue 3 • May-June 2001

Filter Results

Displaying Results 1 - 21 of 21
  • IEEE 802.11: moving closer to practical wireless LANs

    Publication Year: 2001, Page(s):17 - 23
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    Although the IEEE 802.11 standard has been around since 1997, work continues to make it more adaptable to the demand for higher data rates and true wireless flexibility. Until recently, few organizations used wireless LANs because they cost too much, their data rates were too low, they posed occupational safety problems because of concerns about the health effects of electromagnetic radiation, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Got WAP? [Book Review]

    Publication Year: 2001, Page(s): 53
    Request permission for commercial reuse | PDF file iconPDF (168 KB) | HTML iconHTML
    Freely Available from IEEE
  • Building up your SAN [Book Review]

    Publication Year: 2001, Page(s): 54
    Request permission for commercial reuse | PDF file iconPDF (230 KB) | HTML iconHTML
    Freely Available from IEEE
  • Taking care of VPN business [Book Review]

    Publication Year: 2001, Page(s): 54
    Request permission for commercial reuse | PDF file iconPDF (230 KB) | HTML iconHTML
    Freely Available from IEEE
  • Stopping the tower of babble [Book Review]

    Publication Year: 2001, Page(s): 55
    Request permission for commercial reuse | PDF file iconPDF (175 KB) | HTML iconHTML
    Freely Available from IEEE
  • Network design help [Book Review]

    Publication Year: 2001, Page(s): 55
    Request permission for commercial reuse | PDF file iconPDF (175 KB) | HTML iconHTML
    Freely Available from IEEE
  • Making your network airtight [Book Review]

    Publication Year: 2001, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • Exposing the hackers [Book Review]

    Publication Year: 2001, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • The battle for encryption [Book Review]

    Publication Year: 2001, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Intruder alert! [Book Review]

    Publication Year: 2001, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keep it simple on the web [Book Review]

    Publication Year: 2001, Page(s): 58
    Request permission for commercial reuse | PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • Web design with the user in mind [Book Review]

    Publication Year: 2001, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (180 KB) | HTML iconHTML
    Freely Available from IEEE
  • The how-to of IIS4 [Book Review]

    Publication Year: 2001, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (180 KB) | HTML iconHTML
    Freely Available from IEEE
  • Speeding Up CRM [Book Review]

    Publication Year: 2001, Page(s): 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (257 KB) | HTML iconHTML
    Freely Available from IEEE
  • Myths about outsourcing to application service providers

    Publication Year: 2001, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Which applications are organizations outsourcing to ASPs? What did they hope to gain? And what are the critical success factors for organizations using ASPs? To assess these issues we cosponsored a study to assess organizational attitudes and adoption metrics for ASPs. Our survey garnered 256 usable responses from businesses regarding their use of ASPs. The study indicated that a significant numbe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sizing up today's lightweight software processes

    Publication Year: 2001, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    There is a buzz about the new lightweight software development processes. These processes are certainly capable of creating successful software systems faster. As a software developer, which one should you choose for your project? Indeed, today's software development processes bring interesting dynamics to the projects to which developers apply them. But should process drive the project or should ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing Web-enabled call center technologies

    Publication Year: 2001, Page(s):24 - 30
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    E-commerce's explosive growth has seen corporate Web sites mature from electronic versions of glossy brochures to full-service storefronts. To support this new environment, companies are providing real-time customer service to their Web customers. Despite this tremendous e-commerce growth, many people remain reluctant to complete a Web transaction without first talking to a live agent. Corporation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A planning framework far implementing virtual private networks

    Publication Year: 2001, Page(s):41 - 44
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    Because there is no single virtual private network (VPN) solution, it's critical to have a planning framework to ensure successful deployment. A VPN is virtual in that it has no corresponding physical network but rather shares physical circuits with other traffic. A VPN is private in that it isolates Internet traffic with routing and secures if with encryption. The use of “private” and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless messaging: ready to take center stage in the US?

    Publication Year: 2001
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    After the initial hype, WAP, the wireless application protocol, aka the Wireless Internet, has disappointed many users. In the US, the wireless powers-that-be continue to look for wireless data service offerings to compete with voice as a revenue generator. Wireless messaging services have yet to take hold in the US, despite their success in Japan and Europe; the author gives some reasons why View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Getting started with IT asset management

    Publication Year: 2001, Page(s):37 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Asset management is a combination of tools and processes that proactively manage a company's entire asset base from a cost, contractual, support, and inventory viewpoint. This definition stems from the basics of a company's business functions; several common threads lead to a fundamental definition. At the root of business you find a basic equation: assets+people=profits. Since this equation under... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The consultancy approach to aligning business and IT

    Publication Year: 2001, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Some see a decentralized consultancy approach to IT as a way to be more responsive to business needs. The relationship between IT and business is seemingly an age-old problem, but new thinking, changes in organizational structures, and new business mandates may finally align these seemingly disparate partners. New ways for IT to be structured within the enterprise include deploying staff within a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services