By Topic

IT Professional

Issue 5 • Date Sep/Oct 2002

Filter Results

Displaying Results 1 - 6 of 6
  • Less is more with minimalist architecture

    Publication Year: 2002 , Page(s): 48, 46 - 47
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (371 KB) |  | HTML iconHTML  

    Architecture and governance bring an element of control that can rub people the wrong way. Architectural decisions should be focused where the payoff is highest to maximize the likelihood of success. The minimalist approach to architecture involves sorting out the highest-priority architectural requirements, and then doing the least you possibly can to achieve them! That is, keep the architecture ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategy for an Internet-age approach to protecting IPRs

    Publication Year: 2002 , Page(s): 30 - 35
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (313 KB) |  | HTML iconHTML  

    Protecting intellectual property in the Internet age requires out-of-the-box thinking. Attempts to stuff IP protection into the old model, based on high legal and technological barriers, are doomed to failure. The old model primarily thwarted corporate-level piracy; today, individual piracy (on a very large scale) is the greatest threat to intellectual property rights (IPRs). Business models based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining privacy in a online world

    Publication Year: 2002 , Page(s): 24 - 28
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (610 KB) |  | HTML iconHTML  

    As long as the government does not regulate online privacy policies, market forces will largely dictate the practices of most businesses. If the market values data collection highly, then data collection will be here to stay. Businesses that do not monitor their data collection practices or violate privacy policies risk serious repercussions from an unforgiving public. Companies continue to face c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventive risk management software for software projects

    Publication Year: 2002 , Page(s): 9 - 15
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (567 KB) |  | HTML iconHTML  

    Preventive risk management is based on relatively flexible development practices. The idea is to identify potential steps in development and deployment that can delay the project or cause it to fail and devise strategies that will mitigate the risk should it materialize. Unlike prescriptive risk management, in which the team identifies risks only when they occur and attempts to mitigate them only ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing software projects with business-based requirements

    Publication Year: 2002 , Page(s): 18 - 23
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (509 KB) |  | HTML iconHTML  

    For many organizations that are neither software product companies nor system integrators, the expense and cultural change required for full process rollout can be prohibitive. Proponents of agile processes/methods (such as extreme programming) suggest that these "lightweight" approaches are extremely effective. I would agree that there are many powerful aspects within these approaches. I suggest,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside SSL: accelerating secure transactions

    Publication Year: 2002 , Page(s): 37 - 41
    Cited by:  Papers (5)  |  Patents (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1020 KB) |  | HTML iconHTML  

    By defining a protocol that supplies Web clients and servers with cryptographic parameters, the Secure Sockets Layer protocol enables the safe exchange of sensitive data, a crucial aspect of any e-business. The protocol's sticking point is that encrypting and decrypting data requires a tremendous amount of CPU processing power. The burden is especially apparent on the server side, because multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services