IT Professional

Issue 3 • May-June 2004

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (916 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (637 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Expecting success against all odds

    Publication Year: 2004, Page(s):8 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    There is an early indication of a trend toward jobs returning to the US. There are many pros and cons of this possible trend, if indeed it is one. But a significant drawback, and one unlikely to be debated, is how mentally and emotionally unprepared the US workforce might be for these types of employment "opportunities". As examples illustrate, this lack of preparedness begins in high school. US h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOLA: lightweight security for access control in IEEE 802.11

    Publication Year: 2004, Page(s):10 - 16
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1008 KB) | HTML iconHTML

    The IEEE 802.11 wireless standard provides little support for secure access control. As a result, access control in IEEE 802.11 on a per packet basis requires a new and robust identity authentication protocol. The SOLA (Statistical One-Bit Lightweight Authentication) protocol is well suited in a wireless constrained environment because this protocol's communication overhead is extremely low: only ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The basics of reliable distributed storage networks

    Publication Year: 2004, Page(s):18 - 24
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Because of storage protocols that operate over extended distances, various distributed storage applications that improve the efficiency and reliability of data storage are now possible. Distributed storage applications improve efficiency by allowing any network server to transparently consolidate and access data stored in multiple physical locations. Remote backup and mirroring improve the system'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The distributed data center: front-end solutions

    Publication Year: 2004, Page(s):26 - 32
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    The need to provide reliable data availability has always driven data center design. Redundant storage systems and backup mechanisms are essential for enterprises to provide 24/7 data access. Using a redundant array of independent disks (RAID) and data server clusters helps prevent catastrophic data loss. However, redundancy within the data center itself represents only a partial solution. Althoug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multichannel customer contact management

    Publication Year: 2004, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1760 KB) | HTML iconHTML

    Looks at how an effective contact center design can reduce the overall service time and the number of end points with which a customer communicates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A single model for process improvement

    Publication Year: 2004, Page(s):43 - 49
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The FAA has spent many years evaluating and combining models and methods to establish and monitor IT process improvement. In 1997, it released the integrated Capability Maturity Model (iCMM), which blended three of the Capability Maturity Models - software, systems engineering, and software acquisition - developed by Carnegie Mellon University's Software Engineering Institute. iCMM version 2, rele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2004, Page(s): 50
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rethinking the path to usability: how to design what users really want

    Publication Year: 2004, Page(s):51 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    As the software market grows more competitive, companies with difficult-to-use products face higher customer support costs as they attempt to rework user interfaces to fix usability problems. It is time that software designers tried reversing the direction - get user requirements, design the user interaction with the product's features, and then code the features - to produce software from the use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisers/Product Index

    Publication Year: 2004, Page(s): 59
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resources

    Publication Year: 2004, Page(s):60 - 61
    Request permission for commercial reuse | PDF file iconPDF (336 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • To learn team-building, ask the dirty dozen

    Publication Year: 2004, Page(s):62 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    Turning a collection of individuals into a team is hard work. It requires patience, expertise, judgment, and will. Since it combines goal-creation and alignment with effective delivery, it is probably the most important function of leadership. The article looks at how groups can't become teams unless their members are interdependent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services