By Topic

IT Professional

Issue 2 • Date March-April 2002

Filter Results

Displaying Results 1 - 14 of 14
  • Cryptography for the network [Book Review]

    Publication Year: 2002, Page(s): 58
    Request permission for commercial reuse | PDF file iconPDF (487 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keeping the network safe [Book Review]

    Publication Year: 2002, Page(s): 58
    Request permission for commercial reuse | PDF file iconPDF (487 KB) | HTML iconHTML
    Freely Available from IEEE
  • Form follows web function [Book Review]

    Publication Year: 2002, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (483 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cascading sheets explained [Book Review]

    Publication Year: 2002, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (483 KB) | HTML iconHTML
    Freely Available from IEEE
  • Blanket web design coverage [Book Review]

    Publication Year: 2002, Page(s): 60
    Request permission for commercial reuse | PDF file iconPDF (578 KB) | HTML iconHTML
    Freely Available from IEEE
  • System engineering point of view [Book Review]

    Publication Year: 2002, Page(s): 60
    Request permission for commercial reuse | PDF file iconPDF (578 KB) | HTML iconHTML
    Freely Available from IEEE
  • Corporate rumors and conspiracy theories

    Publication Year: 2002, Page(s):64 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    Rumors are analogous to wildfire. The longer they burn, the more they burn. If you are a manager understand that the sooner you pour water onto a fire, the sooner it will extinguish. Companies are like forests that have not had rain for years: Fires will ignite no matter what. Create open communication channels via which subordinates can bring their concerns to you first without broadcasting them ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server-based computing opportunities

    Publication Year: 2002, Page(s):18 - 23
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1550 KB) | HTML iconHTML

    There is a middle ground between an immediate Web-based, thin-client solution and traditional client-server. This hybrid solution runs traditional client applications on terminal servers that transmit only the screen image to the remote user, reducing network traffic, avoiding installation of client software on a remote workstation, and facilitating administration and deployment. Server-based comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology's changing role in intellectual property rights

    Publication Year: 2002, Page(s):39 - 44
    Cited by:  Patents (38)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Technological barriers are declining as a means to protect intellectual property, and this change is emerging as the greatest threat to intellectual property rights (IPRs). In particular, the Internet and digital storage methods are radically lowering the technological barriers and consequently forcing changes in the way providers distribute content, especially entertainment. Such a major change w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data mining for decision support

    Publication Year: 2002, Page(s):9 - 17
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4333 KB) | HTML iconHTML

    As companies seek to automate more of their processes, they are finding that decision support requires a significantly different data management approach than day-to-day operations. Online transaction processing applications simply automate data processing, which is sufficient to handle day-to-day operations. The paper considers a seven-step process which combines online analytical processing, dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blended call center performance analysis

    Publication Year: 2002, Page(s):33 - 38
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (811 KB) | HTML iconHTML

    The performance analysis of blended PSTN and IP call centers is likely to be in demand in the near future as the technology for these centers develops further. The authors did not find an analysis for a system of this type in the literature. The development of a user-friendly and portable tool based on their analysis methodology should be useful to organizations that have implemented, or are consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure peer-to-peer networking: the JXTA example

    Publication Year: 2002, Page(s):53 - 57
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1028 KB) | HTML iconHTML

    The JXTA framework's key benefit is its ability to provide security via well-understood, trusted approaches. Likewise, JXTA's transport protocol independence lets applications avoid the security breaches imposed by gateways or other network infrastructure. Project JXTA has now completed J2SE and J2ME MIDP implementations.The latter is for small-footprint devices like mobile phones. A C implementat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The dangers of using software metrics to (mis)manage

    Publication Year: 2002, Page(s):24 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1221 KB) | HTML iconHTML

    Measurement can enhance or doom software projects. Experts say it pays to spend time on people issues. The paper considers the reasons why measurement programs fail and looks at the characteristics of highly successful measurement programs View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mortgage banking: Internet and integration are key

    Publication Year: 2002, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB) | HTML iconHTML

    Several business models have survived in the mortgage banking industry, but not without considerable trial and error. Online mortgage lending, automated underwriting systems, and Web-enabled servicing are changing the market, as companies scramble to outdo each other in customer relationship management (CRM). The paper considers how savvy companies are working with online lending and Web-enabled s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services