By Topic

IT Professional

Issue 3 • Date May-June 2004

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (916 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (637 KB)  
    Freely Available from IEEE
  • Masthead

    Page(s): 7
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • Expecting success against all odds

    Page(s): 8 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB)  

    There is an early indication of a trend toward jobs returning to the US. There are many pros and cons of this possible trend, if indeed it is one. But a significant drawback, and one unlikely to be debated, is how mentally and emotionally unprepared the US workforce might be for these types of employment "opportunities". As examples illustrate, this lack of preparedness begins in high school. US high school students often predict they will turn in great performances in international mathematics competitions. Instead, they finish very much lower than their competitors, with scores that are average at best and often even below average. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOLA: lightweight security for access control in IEEE 802.11

    Page(s): 10 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1008 KB)  

    The IEEE 802.11 wireless standard provides little support for secure access control. As a result, access control in IEEE 802.11 on a per packet basis requires a new and robust identity authentication protocol. The SOLA (Statistical One-Bit Lightweight Authentication) protocol is well suited in a wireless constrained environment because this protocol's communication overhead is extremely low: only one bit. Furthermore, SOLA fulfills the requirements of being secure, useful, cheap, and robust. The synchronization algorithm performs very well. SOLA also makes it easy to develop a framework to detect and respond to, for instance, denial-of-service attacks or an adversary who tries to guess the identity authentication bit for successive packets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The basics of reliable distributed storage networks

    Page(s): 18 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (320 KB)  

    Because of storage protocols that operate over extended distances, various distributed storage applications that improve the efficiency and reliability of data storage are now possible. Distributed storage applications improve efficiency by allowing any network server to transparently consolidate and access data stored in multiple physical locations. Remote backup and mirroring improve the system's reliability by copying critical data. These processes improve efficiency by eliminating backup downtime and manual backup operations. Business continuity and disaster recovery capabilities enable enterprises to recover quickly and transparently from system failure or data loss. Storage protocols and gateway devices enable rapid and transparent data transfer between mainframe applications and open-systems applications. NAS applications provide shared file access for clients using standard LAN-based technology, and can integrate with SAN architectures to provide truly distributed network capabilities. All these distributed storage network applications enable IT managers to improve data availability and reliability while minimizing management overhead and costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The distributed data center: front-end solutions

    Page(s): 26 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (584 KB)  

    The need to provide reliable data availability has always driven data center design. Redundant storage systems and backup mechanisms are essential for enterprises to provide 24/7 data access. Using a redundant array of independent disks (RAID) and data server clusters helps prevent catastrophic data loss. However, redundancy within the data center itself represents only a partial solution. Although backup mechanisms preserve data, you have a high-availability solution only if redundancy also protects against a network failure between the center and the outside world. A distributed data center provides such a solution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multichannel customer contact management

    Page(s): 33 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1760 KB)  

    Looks at how an effective contact center design can reduce the overall service time and the number of end points with which a customer communicates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A single model for process improvement

    Page(s): 43 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (256 KB)  

    The FAA has spent many years evaluating and combining models and methods to establish and monitor IT process improvement. In 1997, it released the integrated Capability Maturity Model (iCMM), which blended three of the Capability Maturity Models - software, systems engineering, and software acquisition - developed by Carnegie Mellon University's Software Engineering Institute. iCMM version 2, released in 2001, updated and expanded version 1's set of engineering disciplines to better accommodate the IT processes associated with the agency's air-traffic-control business, as well as IT system deployment, transition, operation, maintenance, and retirement. It also included some processes that govern IT, such as leadership, strategic planning, and investment decision-making. With this breadth of coverage, we believe the iCMM is the most comprehensive model available for improving the performance of an organization that relies on complex IT systems to provide services. The iCMM also has a flexible structure that lets organizations use it to benchmark processes from other process improvement models in terms of either maturity or capability level. Finally, the model offers various appraisal methods so that organizations can understand current practice in relation to iCMM's best practices or measure process performance characteristics. Lessons have come from many years of iCMM application at FAA, and many have broad application to the IT community. Overall, using one model to cover processes that span many disciplines has clear advantages. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Page(s): 50
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking the path to usability: how to design what users really want

    Page(s): 51 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (568 KB)  

    As the software market grows more competitive, companies with difficult-to-use products face higher customer support costs as they attempt to rework user interfaces to fix usability problems. It is time that software designers tried reversing the direction - get user requirements, design the user interaction with the product's features, and then code the features - to produce software from the user's perspective and logic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisers/Product Index

    Page(s): 59
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resources

    Page(s): 60 - 61
    Save to Project icon | Request Permissions | PDF file iconPDF (336 KB)  
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To learn team-building, ask the dirty dozen

    Page(s): 62 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (304 KB)  

    Turning a collection of individuals into a team is hard work. It requires patience, expertise, judgment, and will. Since it combines goal-creation and alignment with effective delivery, it is probably the most important function of leadership. The article looks at how groups can't become teams unless their members are interdependent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services