By Topic

IT Professional

Issue 4 • Date July-Aug. 2007

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2007 , Page(s): c1
    Request Permissions | PDF file iconPDF (368 KB)  
    Freely Available from IEEE
  • SD Best Practices Conference Information [advertisement]

    Publication Year: 2007 , Page(s): c2
    Request Permissions | PDF file iconPDF (353 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2007 , Page(s): 1
    Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2007 , Page(s): 2 - 3
    Request Permissions | PDF file iconPDF (1390 KB)  
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2007 , Page(s): 4 - 9
    Request Permissions | PDF file iconPDF (2226 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Virtualization Technologies in the Undergraduate IT Curriculum

    Publication Year: 2007 , Page(s): 10 - 17
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (484 KB) |  | HTML iconHTML  

    A Linux-based virtualization solution for IT courses leverages an open source approach for a low-cost, scalable cluster. The tool is suited for student home use for OS and networking lab assignments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Situational Assessment and Automatic Policy Change

    Publication Year: 2007 , Page(s): 18 - 23
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1048 KB) |  | HTML iconHTML  

    The Policy-based Security Tools and Framework (Positif) project assesses a network's current security situation and takes actions to maintain it in optimal conditions, using input from devices scattered throughout the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Key Process Areas in Systems Integration

    Publication Year: 2007 , Page(s): 24 - 27
    Request Permissions | Click to expandAbstract | PDF file iconPDF (527 KB) |  | HTML iconHTML  

    This paper present a survey of systems integrations experts in industry and academia that highlights the key process areas of systems integration as well as their importance ratings. Based on the results, several observations are also presented about the importance rankings of these key process areas and what they might imply. If the key process areas were well defined and standardized within the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Source Software: Is It Worth Converting?

    Publication Year: 2007 , Page(s): 28 - 33
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1172 KB) |  | HTML iconHTML  

    Open source software use is amassing a long list of benefits, among them higher software quality. Enterprises that are still discouraged by the task of converting existing software might find that modernization building blocks can make that task easier. Adapting or converting to OSS need not be overwhelming, if the organization considers the entire modernization plan, considers what various applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Web 2.0

    Publication Year: 2007 , Page(s): 34 - 41
    Cited by:  Papers (54)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    Web 2.0, the second phase in the Web's evolution, is attracting the attention of IT professionals, businesses, and Web users. Web 2.0 is also called the wisdom Web, people-centric Web, participative Web, and read/write Web. Web 2.0 harnesses the Web in a more interactive and collaborative manner, emphasizing peers' social interaction and collective intelligence, and presents new opportunities for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Web Services: An Unfulfilled Promise

    Publication Year: 2007 , Page(s): 42 - 45
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (173 KB) |  | HTML iconHTML  

    Work on realizing semantic Web services has yet to take a holistic perspective. To regain the proper focus, architecture designers must reverse engineer service requirements and adjust the infrastructure accordingly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invitation to Join IEEE Computer Society

    Publication Year: 2007 , Page(s): 46
    Request Permissions | PDF file iconPDF (225 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Membership Forms

    Publication Year: 2007 , Page(s): 47 - 48
    Request Permissions | PDF file iconPDF (389 KB)  
    Freely Available from IEEE
  • Resources

    Publication Year: 2007 , Page(s): 49 - 54
    Request Permissions | PDF file iconPDF (485 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Call For Papers

    Publication Year: 2007 , Page(s): 55
    Request Permissions | PDF file iconPDF (1533 KB)  
    Freely Available from IEEE
  • Unified Messaging: Will It Finally Meet Its Promise?

    Publication Year: 2007 , Page(s): 56 - 60
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1031 KB) |  | HTML iconHTML  

    Nearly a decade later, improved technology has eased the tedium for users, and hopes are high among supporters that unified messaging (UM) will finally sweep the IT world. There are several reasons for the elevated optimism surrounding UM's potential uptake. Chief among them is the increasing buzz around unified communications (UC), which uses UM as a foundational tool in its real-time, presence-e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertiser/Product Index

    Publication Year: 2007 , Page(s): 61
    Request Permissions | PDF file iconPDF (51 KB)  
    Freely Available from IEEE
  • The Impact of Personally Identifiable Information

    Publication Year: 2007 , Page(s): 62 - 64
    Request Permissions | Click to expandAbstract | PDF file iconPDF (860 KB) |  | HTML iconHTML  

    As CIO and IT managers, we need to start looking outside the box to prevent the loss of personally identifiable information (PII). This means looking beyond hardware and software solutions to the personnel solutions that might result in an improved quality of life, with less work outside the office. Personal information can include your financial data, your medical data, and, basically, your virtu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Digital Library

    Publication Year: 2007 , Page(s): c3
    Request Permissions | PDF file iconPDF (254 KB)  
    Freely Available from IEEE
  • IT Security World Conference 2007 Information

    Publication Year: 2007 , Page(s): c4
    Request Permissions | PDF file iconPDF (468 KB)  
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services