By Topic

IT Professional

Issue 6 • Date Nov.-Dec. 2002

Filter Results

Displaying Results 1 - 6 of 6
  • Subject index

    Publication Year: 2002, Page(s):36 - 38
    Request permission for commercial reuse | PDF file iconPDF (424 KB)
    Freely Available from IEEE
  • Author Index

    Publication Year: 2002, Page(s):38 - 39
    Request permission for commercial reuse | PDF file iconPDF (403 KB)
    Freely Available from IEEE
  • 50 years of software: key principles for quality

    Publication Year: 2002, Page(s):28 - 35
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1840 KB) | HTML iconHTML

    Software quality is no better today than it was decades ago. In some cases, it's worse. A look at the past may help us change the future for the better. Although a complete catalog of the past 50 years would be impossible in this short article, we give a decade-by-decade synopsis of software development theory and practice, focusing particularly on attitudes and trends that have shaped current sof... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture for a large healthcare information system

    Publication Year: 2002, Page(s):19 - 27
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (786 KB) | HTML iconHTML

    We developed one of the three major components of an enterprise architecture, the operational architecture, for the US Department of Defense's Military Health Systems (MHS). The MHS is an enormous operation: its electronic patient record (the Composite Healthcare System) in conjunction with other supporting systems, creates, updates, and accesses medical records for many millions of Department of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information resources management: new era, new rules

    Publication Year: 2002, Page(s):9 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB) | HTML iconHTML

    CIOs must think strategically and formulate business strategies, build business relationships, and deeply understand the organization's culture-all on Internet time. With this broader job description and accelerated schedule has come a large set of risks, some of which have little to do with the technology. Ironically, the structured world of traditional IRM can help mitigate these risks, but the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing for wireless LAN security. 2

    Publication Year: 2002, Page(s):48, 44 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    I examine technology for addressing the numerous security concerns raised in the first article. Unhappily, there are few easy answers-WLANs are still inherently insecure. However, more choices are now available to manage WLAN security. Key to understanding these choices are security deployment architectures, the technologies they rely on, and effective security management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services