By Topic

IT Professional

Issue 3 • Date May-June 2005

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2005 , Page(s): c1
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1682 KB)  

    Presents the front cover/table of contents for this issue of the periodical. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Table of contents

    Publication Year: 2005 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1088 KB)  
    Freely Available from IEEE
  • [Mast head]

    Publication Year: 2005 , Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • Spike in phishing and malware a danger to IT

    Publication Year: 2005
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (624 KB)  

    Security firms are reporting that IT departments must be careful of increased threats to corporate networks and data from phishing and malware attacks. There are 33 million unique phishing messages every week, according to Dave Cole, director of security product management at Symantec Security Response. He says this plus an increase in the distribution of malware designed to steal confidential inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • No quick fix for spam

    Publication Year: 2005 , Page(s): 11 - 14
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    Spam can result in corporate losses, the two biggest of which are lost employee productivity and consumed IT resources. It can also result in the introduction of inappropriate content on the network, such as malware or pornography offers. Spam can be as much as 90 percent of incoming corporate e-mail. Three distinct approaches toward spam blocking have emerged in enterprises: software, hardware ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality IT education strikes out

    Publication Year: 2005 , Page(s): 16 - 17
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    The next crop of university-trained IT graduates knows even less about the basics than their predecessors. Many CS and IT majors dropped out of college with partially completed degrees, taking their semi-formed educations into the IT industry, earning more than the professors they left behind. Without a solid foundational education in CS and IT principles, it is virtually impossible for curriculum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Welcome to convergence: surviving the next platform change [Internet protocol]

    Publication Year: 2005 , Page(s): 18 - 25
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1080 KB) |  | HTML iconHTML  

    This article discusses the convergence of three components into an infrastructure based on the Internet protocol: voice, data, and wireless. In simple form, the converged Internet protocol (IP) platform has the three layers. At the bottom is the IP networks layer, which focuses on the secure, reliable, and efficient movement of bits using a variety of wireline and wireless networks residing in use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID: a technical overview and its application to the enterprise

    Publication Year: 2005 , Page(s): 27 - 33
    Cited by:  Papers (120)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (696 KB) |  | HTML iconHTML  

    Radio frequency identification (RFID) offers tantalizing benefits for supply chain management, inventory control, and many other applications. Only recently, however, has the convergence of lower cost and increased capabilities made businesses take a hard look at what RFID can do for them. This article offers an RFID tutorial that answers the following questions: i) what is RFID, and how does it w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless in Africa: insights into mobile markets

    Publication Year: 2005 , Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    The explosive growth of mobile telephony in Africa offers insights into the differences in deploying new technologies in underdeveloped countries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hosted contact centers: an emerging solution

    Publication Year: 2005 , Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (384 KB) |  | HTML iconHTML  

    As IP-based contact center technologies mature, hosted providers will be able to sell a full set of multimedia features to small, medium, and large contact centers. Users will be able to converge these IP-based services with other customer-facing functions to provide a unified service to their customers. The positive total cost of ownership for hosted services will make a compelling case for many ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The changing role of the CIO: why IT still matters

    Publication Year: 2005 , Page(s): 45 - 49
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    A group of CIOs dispute the view that "spend less, do not lead, manage risk" is becoming the new IT mantra. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2005 Editorial Calendar

    Publication Year: 2005 , Page(s): 53
    Save to Project icon | Request Permissions | PDF file iconPDF (636 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2005 , Page(s): 54
    Save to Project icon | Request Permissions | PDF file iconPDF (65 KB)  
    Freely Available from IEEE
  • Resources

    Publication Year: 2005 , Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (752 KB) |  | HTML iconHTML  

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser/Product Index

    Publication Year: 2005 , Page(s): 60
    Save to Project icon | Request Permissions | PDF file iconPDF (57 KB)  
    Freely Available from IEEE
  • Securing e-mail with identity-based encryption

    Publication Year: 2005 , Page(s): 64, 61 - 63
    Cited by:  Papers (2)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (704 KB) |  | HTML iconHTML  

    People might feel more comfortable encrypting business and personal e-mails if it took less effort. IBE (identity-based encryption) can transfer this overhead away from users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services