By Topic

IT Professional

Issue 5 • Date Sept.-Oct. 2005

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (803 KB)
    Freely Available from IEEE
  • 2006 Editorial Calendar

    Publication Year: 2005, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (728 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (711 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2005, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Hurricane Katrina reveals strengths of emerging technologies

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Wireless broadband has filled the communication gap for rescue workers before the return of land- and cellular-based technologies. These high-speed Internet connections are carrying voice and data for crews working in New Orleans and the Biloxi-Gulfport areas hardest hit by Hurricane Katrina. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming with Python

    Publication Year: 2005, Page(s):10 - 16
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Python is a powerful, easy-to-learn programming language based on traditional languages but better suited to current operating systems, networks, and hardware. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RxNorm: prescription for electronic drug information exchange

    Publication Year: 2005, Page(s):17 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Commercial drug information systems follow a variety of naming conventions. A smooth electronic exchange of the information in these systems - not only between organizations but even within a single organization - is crucial in assuring patient safety. This exchange requires a standardized nomenclature. To meet this need, the National Library of Medicine (NLM) created RxNorm, a standardized nomenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Great Wall syndrome [workplace information security]

    Publication Year: 2005, Page(s):25 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB) | HTML iconHTML

    A 2004 survey of Fortune 100 companies by the Ponemon Institute found that insiders were responsible for roughly 70 percent of reported security breaches (Reardon, 2005). BBC News, quoting another survey by data forensics from Ibas, stated that 70 percent of staff surveyed have stolen key information from the workplace, that 72 percent of these offenders had no ethical issues with helping themselv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sense-and-respond grids for adaptive enterprises

    Publication Year: 2005, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB) | HTML iconHTML

    In today's competitive climate, enterprises must strive for maximum responsiveness and adaptive capability to stay abreast of complex interactions among customers, suppliers, manufacturers, markets, and other elements of their businesses. For several years, firms have used the sense-and-respond paradigm for monitoring and managing business solutions. Called S&R for short, this method, as populariz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scenario management from reactivity to proactivity

    Publication Year: 2005, Page(s):42 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    Scenarios have a far greater potential to help organizations boost preparedness, manage multiple systems, and anticipate the consequences of their actions. In the IT world, project managers react to rather than proactively counter new developments. In other areas of system development (such as education, training, and development) and system maintenance, scenario use is nearly nonexistent. When ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unauthorized copying of software: what is wrong with the nonexclusive argument?

    Publication Year: 2005, Page(s):49 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Although unauthorized copying of software is regarded as illegal in more and more countries, ordinary computer users continue to intermittently engage in the practice. The issue of whether unauthorized copying of computer software is morally justified and additionally, whether developers and software companies can truly own software, has become increasingly relevant in the era of information socie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resources

    Publication Year: 2005, Page(s):52 - 56
    Request permission for commercial reuse | PDF file iconPDF (656 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer Society Information

    Publication Year: 2005, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2006 IEEE Computer Society Professional Membership/Subscription Application

    Publication Year: 2005, Page(s):59 - 60
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser/Product Index

    Publication Year: 2005, Page(s): 61
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keeping technology at bay in the classroom [technology invasion]

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    A New York Times article cited research that compared the types of issues facing teachers today with those of 50 or 60 years ago. The article concluded that today's teachers have to deal with a much less kinder and gentler group of students than in the past, probably a reflection of the less kind, less gentle society in which we live. For the most part, these types of problems are not yet overwhel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services