By Topic

IT Professional

Issue 5 • Sep/Oct 2002

Filter Results

Displaying Results 1 - 6 of 6
  • Maintaining privacy in a online world

    Publication Year: 2002, Page(s):24 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    As long as the government does not regulate online privacy policies, market forces will largely dictate the practices of most businesses. If the market values data collection highly, then data collection will be here to stay. Businesses that do not monitor their data collection practices or violate privacy policies risk serious repercussions from an unforgiving public. Companies continue to face c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing software projects with business-based requirements

    Publication Year: 2002, Page(s):18 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    For many organizations that are neither software product companies nor system integrators, the expense and cultural change required for full process rollout can be prohibitive. Proponents of agile processes/methods (such as extreme programming) suggest that these "lightweight" approaches are extremely effective. I would agree that there are many powerful aspects within these approaches. I suggest,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inside SSL: accelerating secure transactions

    Publication Year: 2002, Page(s):37 - 41
    Cited by:  Papers (6)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1020 KB) | HTML iconHTML

    By defining a protocol that supplies Web clients and servers with cryptographic parameters, the Secure Sockets Layer protocol enables the safe exchange of sensitive data, a crucial aspect of any e-business. The protocol's sticking point is that encrypting and decrypting data requires a tremendous amount of CPU processing power. The burden is especially apparent on the server side, because multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventive risk management software for software projects

    Publication Year: 2002, Page(s):9 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    Preventive risk management is based on relatively flexible development practices. The idea is to identify potential steps in development and deployment that can delay the project or cause it to fail and devise strategies that will mitigate the risk should it materialize. Unlike prescriptive risk management, in which the team identifies risks only when they occur and attempts to mitigate them only ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategy for an Internet-age approach to protecting IPRs

    Publication Year: 2002, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Protecting intellectual property in the Internet age requires out-of-the-box thinking. Attempts to stuff IP protection into the old model, based on high legal and technological barriers, are doomed to failure. The old model primarily thwarted corporate-level piracy; today, individual piracy (on a very large scale) is the greatest threat to intellectual property rights (IPRs). Business models based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Less is more with minimalist architecture

    Publication Year: 2002, Page(s):48, 46 - 47
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Architecture and governance bring an element of control that can rub people the wrong way. Architectural decisions should be focused where the payoff is highest to maximize the likelihood of success. The minimalist approach to architecture involves sorting out the highest-priority architectural requirements, and then doing the least you possibly can to achieve them! That is, keep the architecture ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services