By Topic

IT Professional

Issue 6 • Date Nov.-Dec. 2006

Filter Results

Displaying Results 1 - 25 of 26
  • [Front cover]

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (2180 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Digital Library

    Publication Year: 2006 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (250 KB)  
    Freely Available from IEEE
  • 2007 Editorial Calendar

    Publication Year: 2006 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (1133 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (2670 KB)  
    Freely Available from IEEE
  • Masthead

    Publication Year: 2006 , Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Problems Solving Skills Amiss

    Publication Year: 2006 , Page(s): 5
    Save to Project icon | Request Permissions | PDF file iconPDF (498 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2006 , Page(s): 6 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (996 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Managing Wireless Health Monitoring for Patients with Disabilities

    Publication Year: 2006 , Page(s): 12 - 16
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1929 KB) |  | HTML iconHTML  

    To support patients' healthcare needs anywhere and anytime, health monitoring systems that use wireless and mobile networks are ideal. These monitoring systems should operate autonomously without patient intervention, which is generally not possible with patients suffering from one or more disabilities. Wireless health monitoring involves measuring and digitizing vital signs; transmitting packets over wireless networks; and delivering medical information to one of more healthcare professionals. To support the healthcare needs of people with disabilities, the monitoring system should transmit both routine vital signs and alerting signals when vital signs cross one or more individualized thresholds. A health monitoring device obtains, samples, and digitizes the vital signs for transmission as network packets. The health-monitoring device can be wearable or handheld device, depending on how difficult it is to use, its portability, and the monitored patient's disability. In addition to vital signs, the device must also monitor skin breakdowns, gait and balance, motor activity, agitation, patient location, cigarette smoke, and the amount of moisture in the patient's skin View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Professional Call for Articles for 2007

    Publication Year: 2006 , Page(s): 17
    Save to Project icon | Request Permissions | PDF file iconPDF (2924 KB)  
    Freely Available from IEEE
  • IEEE ReadyNotes

    Publication Year: 2006 , Page(s): 18
    Save to Project icon | Request Permissions | PDF file iconPDF (418 KB)  
    Freely Available from IEEE
  • Rethinking Network Management Solutions

    Publication Year: 2006 , Page(s): 19 - 23
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    Telecommunication network management solutions need to shift perspective from one of network element management to service management. Operators need a service view of their network, with automatic service-impact correlation. This requires some major changes in the underlying solutions: equipment vendors must improve the supplied management interfaces and network management solutions must implement a higher degree of automation and correlation with a service focus. One obstacle is the lack of models and formalism to describe topology and service structures View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Licensing Models: What's Out There?

    Publication Year: 2006 , Page(s): 24 - 29
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (524 KB) |  | HTML iconHTML  

    Software licensing is changing how organization and individuals purchase and use software. For enterprises that rely on software to maintain a market share, the software licensing model can strongly influence the return on software investment. Yet choosing a model can be daunting, involving considerations from total licenses purchased to the resources available to install and set up licensing systems. Given the recent evolution of software licensing models, enterprises are finding it increasingly important to keep abreast of what's available and to understand how particular models are advantageous or detrimental matches. This article gives an overview of the choices, describes the resources needed to activate or protect software for the various models, and looks at how licensing systems can help enterprises better comply with licensing terms and agreements View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering Online

    Publication Year: 2006 , Page(s): 30
    Save to Project icon | Request Permissions | PDF file iconPDF (6060 KB)  
    Freely Available from IEEE
  • IT Value Management: Creating a Balanced Program

    Publication Year: 2006 , Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    Multidimensional IT valuation approaches are correct for purely financial technique weaknesses by adding dimensions to the value problem. This paper considers three approaches that loosely categorized as multicriteria approaches, strategy frameworks, and portfolio management approaches. These approaches are by no means independent and can complement each other. The paper also presents a summary of popular and representative techniques that fit these three approaches View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Security and Privacy Subscription Information

    Publication Year: 2006 , Page(s): 38
    Save to Project icon | Request Permissions | PDF file iconPDF (2052 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2006 , Page(s): 39
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • The Limitations of Estimation

    Publication Year: 2006 , Page(s): 40 - 45
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (512 KB) |  | HTML iconHTML  

    Estimation is crucial element of software project planning. Hundreds of documented software estimation methodologies, tools, and models exist. Some of the earliest ones estimated the software cost as a percentage of the hardware cost. For most, the output is an estimation of staff effort from a wide variety of inputs. many of the methods use an analytical formula based on cost drivers, which typically are project characteristics such as system size, system domain, complexity, and development methodology. The tools and methodologies are primarily based on data from past projects View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resources

    Publication Year: 2006 , Page(s): 46 - 52
    Save to Project icon | Request Permissions | PDF file iconPDF (1258 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • IEEE ReadyNotes

    Publication Year: 2006 , Page(s): 53
    Save to Project icon | Request Permissions | PDF file iconPDF (599 KB)  
    Freely Available from IEEE
  • IT Professional 2006 Annual Index, Volume 8

    Publication Year: 2006 , Page(s): 54 - 58
    Save to Project icon | Request Permissions | PDF file iconPDF (1259 KB)  
    Freely Available from IEEE
  • Advertiser/Product Index

    Publication Year: 2006 , Page(s): 59
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Membership Information

    Publication Year: 2006 , Page(s): 60
    Save to Project icon | Request Permissions | PDF file iconPDF (5478 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Membership application

    Publication Year: 2006 , Page(s): 61 - 62
    Save to Project icon | Request Permissions | PDF file iconPDF (292 KB)  
    Freely Available from IEEE
  • The Myth of Academic Freedom

    Publication Year: 2006 , Page(s): 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (149 KB) |  | HTML iconHTML  

    This paper argues that there is no such thing as academic freedom. A person who speak out on issues, whether within their institution or in public, risk retaliation by others more powerful than they. And there are many forms of retaliation. Even tenure can't guarantee protection from powerful colleagues. Tenure and academic freedom were originally conceived as a way to provide scholars the freedom to explore and express, without fear of retaliation, unconventional ideas that might challenge existing or preconceived social or scientific philosophies or practices View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Silver Bullet Security Podcast Series [advertisement]

    Publication Year: 2006 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (2632 KB)  
    Freely Available from IEEE

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services