By Topic

IT Professional

Issue 4 • Date July-Aug. 2004

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (574 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Services computing: grid applications for today

    Publication Year: 2004, Page(s):5 - 7
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    The coming generation of Internet applications promises to incorporate a distinctly different view of software, one based on services. Services computing is the evolution of Internet computing toward a services-oriented architecture. By service oriented, we mean that business will purchase functionality in chunks. Rather than buying software for permanent in-house installation, companies will buy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CIOs: the only competent university administrators

    Publication Year: 2004, Page(s):8 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    Some interesting differences between the folks who become college and university vice presidents and the CIO equivalents who run IT infrastructures at universities. It is probably worth noting that higher-education institutions, especially public ones, have greatly different goals than private-sector organizations: Simply stated, private companies are in business to make money, and public educatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software in the new millennium: a virtual roundtable

    Publication Year: 2004, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    What will software look like in the future? To answer this question, we conducted a survey of our editorial and industrial advisory boards, as well as a few outsiders. We constructed a set of 13 questions that we thought reflected the original query. We then circulated these questions to our boards, with a request to respond to the questions, or be extend them with additional are questions as appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Java's futures: challenge and opportunity

    Publication Year: 2004, Page(s):19 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Although Java's successful timing might have begun as an accident, Java has earned its market share by being adaptable enough to find its way into new areas. The question some are asking is, can it continue its success on the server side and become competitive on the client side? Ironically, Java's current critical battle is in the arena where it has been the most successful: server-side applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Web access for visually impaired users

    Publication Year: 2004, Page(s):28 - 33
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Technology advances and the continuing convergence of computing and telecommunications have made an unprecedented amount of information available to the public. For many people with disabilities, however, accessibility issues limit the impact of such widespread availability. Of the many types of disabilities-mobility, hearing, and learning impairments, for example-vision impairments are most perva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wearing two hats: analyst-managers for small software projects

    Publication Year: 2004, Page(s):34 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    With the evolution of software development, companies have changed their project methodology and are asking IT employees to evolve with them. The business analyst talks to users, ironing out the details of what they wanted and balancing that wish list against what an IT system could economically or practically deliver. The business analyst also ensures that users develop business processes to supp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project estimation: a simple use-case-based model

    Publication Year: 2004, Page(s):40 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Software development estimates are inaccurate and overly optimistic estimates are major contributors to project failure, despite the fact that every completed project is a rich source of information about performance and estimation. Modern development processes promote risk management, the realization of architecture first, the decomposition of the project into iterations, and the assignment of re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2004, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software quality from a behavioral perspective

    Publication Year: 2004, Page(s):46 - 50
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The challenge facing software quality research is to produce a metric that will guide developers in choosing techniques to achieve the desired product quality. "Quality" comprises some set of key behavioral attributes: reliability, performance, fault tolerance, safety, security, availability, testability, and maintainability. Software quality is thus a function of these combined attributes plus an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining business requirements quickly and accurately

    Publication Year: 2004, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB) | HTML iconHTML

    A critical task in an enterprise IT architecture project is to identify and understand key business requirements to ensure that the planned IT systems will fully support and evolve with the business. This article illustrates a more effective approach: leveraging the combined power of value chain, which captures the static business view, and use cases, which animate the business model. In this way,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resources

    Publication Year: 2004, Page(s):58 - 60
    Request permission for commercial reuse | PDF file iconPDF (376 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CE2IT: continuous ethics enhancement for IT professionals

    Publication Year: 2004
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    As IT moves into more mission-critical processes, the possibility for ethical dilemmas with far-reaching consequences increases. This article presents "Continuous Ethics Enhancement for IT Professionals" (CE2IT), a personal framework that responds to an IT professional's need for guidance in ethical decision-making. It is designed to "see to it" that IT professionals integrate ethics into their pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services