By Topic

IT Professional

Issue 3 • Date May-June 2008

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1862 KB)
    Freely Available from IEEE
  • IEEE Computer Society Build Your Career [advertisement]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1704 KB)
    Freely Available from IEEE
  • IT Professional [Masthead]

    Publication Year: 2008, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1856 KB)
    Freely Available from IEEE
  • Tabula Rasa: Pitfalls and Possibilities with Clean Slate Initiatives

    Publication Year: 2008, Page(s):4 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    If an IT system is so so hopelessly and fundamentally flawed that there's no practical way to address its deficiencies one by one, a clean slate initiative might be the only way out of the swamp. The key is to make sure the drivers are sound, the process is retrospective, the solution is robust, and expectations are realistic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2008, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (186 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2008, Page(s): 9
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations

    Publication Year: 2008, Page(s):10 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (1456 KB) | HTML iconHTML
    Freely Available from IEEE
  • Beyond Brute Force: Testing Financial Software

    Publication Year: 2008, Page(s):14 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    Large software development projects that follow formal processes generally divide the work among separate roles on structured teams that tend to employ development staff whose technical expertise is domain-neutral. This is especially true of large outsourcing vendors. Yet, the end users' needs are expressed in the applied domain's specific concepts, terms, and logic. Testing financial software's f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Combinatorial Testing: Beyond Pairwise

    Publication Year: 2008, Page(s):19 - 23
    Cited by:  Papers (38)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (11425 KB) | HTML iconHTML

    With new algorithms and tools, developers can apply high-strength combinatorial testing to detect elusive failures that occur only when multiple components interact. In pairwise testing, all possible pairs of parameter values are covered by at least one test, and good tools are available to generate arrays with the value pairs. In the past few years, advances in covering-array algorithms, integrat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Quality-Driven Web Service Discovery

    Publication Year: 2008, Page(s):24 - 28
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (723 KB) | HTML iconHTML

    Service-oriented architectures follow the find-bind-execute paradigm, in which service providers register their services in public or private registries, which clients use to locate Web services. If a service registry has information on a service that matches a client's criteria, it provides a contract and an access point. Web service discovery is a key component in service-oriented computing. How... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the Dependability of Web Services Integration

    Publication Year: 2008, Page(s):29 - 35
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (759 KB) | HTML iconHTML

    The WS-Mediator framework employs an off-the-shelf mediator architecture and resilience-explicit computing in pursuit of dependable, dynamic Web services integration. Web services and service-oriented architectures (SOAs) represent a new paradigm for building distributed computing applications. Web services offer advantages over conventional distributed computing middleware platforms. Web services... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where Do You Want to Go in Your SOA Adoption Journey?

    Publication Year: 2008, Page(s):36 - 39
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    These days, almost every CIO or IT manager is looking into service-oriented architecture (SOA). Interestingly, adopting SOA isn't the same as deploying a software application, which can be a one-time activity. Rather, it's a journey for an organization over a long period of time - an important detail for everyone involved to understand. Although a few vendors claim that SOA can be quickly and easi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restoring Service after an Unplanned IT Outage

    Publication Year: 2008, Page(s):40 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    An unplanned outage is the unexpected failure of a computer or network hardware system or software application in a business. The combination of hardware, software, network components, and people required to operate a corporate computer or network production environment increases both the environment's complexity and the probability that unplanned outages will occur. Unplanned outages commonly fal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What's in a Name? Distinguishing between SaaS and SOA

    Publication Year: 2008, Page(s):46 - 50
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (659 KB) | HTML iconHTML

    Considerable confusion arises in distinguishing between software as a service (SaaS) and service-oriented architecture (SOA). Zachman's framework can help to try to make sense of the alphabet soup of Web services and utilities that form the basis for both SOA and SaaS. The difference between SaaS and SOA is that the former is a software-delivery model whereas the latter is a software-construction ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From the Office Document Format Battlefield

    Publication Year: 2008, Page(s):51 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (939 KB) | HTML iconHTML

    Recent versions of office suites are using new XML-based formats. OpenOffice.org and GoogleDocs, for example, use the Open Document Format (ODF) and Microsoft Office 2007 uses Office Open XML (OOXML). Both formats have now been accepted as international standards. This article outlines the history of the process that has left us with two functionally similar, but not fully compatible document form... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in Certification and Accreditation

    Publication Year: 2008, Page(s):56 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    As the threat of malicious activity through the Internet increased, the US government began reviewing protection requirements for national and international security systems. Legislation resulting from this review included the Federal Information Security Management Act (FISMA), the Paperwork Reduction Act of 1995, and the Information Technology Management Reform Act of 1996 (also known as the Cli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resources

    Publication Year: 2008, Page(s):60 - 62
    Request permission for commercial reuse | PDF file iconPDF (406 KB)
    Freely Available from IEEE
  • Need to Share vs. Need to Assure

    Publication Year: 2008, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    As a society, we have a tendency to send just about anything electronically these days. From business and personal information to pictures, jokes, and links to Web sites, we assume that the information we send is protected and will be delivered accurately to only the intended recipients. Although we might have corporate policies or personal guidelines about what information is posted, shared, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Membership [advertisement]

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (397 KB)
    Freely Available from IEEE
  • IEEE Computer Society Jobs Board [advertisement]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1862 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services