By Topic

IT Professional

Issue 4 • Date July-Aug. 2008

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2008 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (830 KB)  
    Freely Available from IEEE
  • IEEE Computer Society Career Center [advertisement]

    Publication Year: 2008 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (510 KB)  
    Freely Available from IEEE
  • IT Professional [Masthead]

    Publication Year: 2008 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (913 KB)  
    Freely Available from IEEE
  • Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are?

    Publication Year: 2008 , Page(s): 4 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (219 KB) |  | HTML iconHTML  

    Job titles and functions shift quickly in the IT world, but some broad classifications can be useful for identifying what people do and how they view themselves. In some ways, the category of "IT professional" is the most broadly encompassing, but many people identify more closely with subspecialties such as "software engineer" or "computer scientist." View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2008 , Page(s): 7 - 9
    Save to Project icon | Request Permissions | PDF file iconPDF (185 KB)  
    Freely Available from IEEE
  • Resources

    Publication Year: 2008 , Page(s): 10 - 12
    Save to Project icon | Request Permissions | PDF file iconPDF (325 KB)  
    Freely Available from IEEE
  • Build Your Career [advertisement]

    Publication Year: 2008 , Page(s): 13
    Save to Project icon | Request Permissions | PDF file iconPDF (971 KB)  
    Freely Available from IEEE
  • Managing Risk Propagation in Extended Enterprise Networks

    Publication Year: 2008 , Page(s): 14 - 19
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (818 KB) |  | HTML iconHTML  

    The weakest link in an information supply chain can lead to increased vulnerability for all partners in the network. Examining and controlling risk propagation from the network and supply-chain perspectives has become vital to overall network security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Discovery: Identifying and Mitigating Security Risks during Litigation

    Publication Year: 2008 , Page(s): 20 - 25
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (826 KB) |  | HTML iconHTML  

    When producing electronically stored information (ESI) in response to lawsuits, businesses face several security risks as well as legal requirements they must satisfy. Customized document management programs and e-discovery policies are key tools in protecting against inadvertent disclosure as well as meeting business and legal needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ArchiSafe: Legally Compliant Electronic Storage

    Publication Year: 2008 , Page(s): 26 - 33
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (5172 KB) |  | HTML iconHTML  

    Traditional data backup and storage processes have targeted speed, efficiency, and disaster recovery. Various governmental regulations now impose additional requirements that demand sophisticated archival management, including the ability to preserve documents' long-term authenticity and availability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalizing Service-Oriented Architectures

    Publication Year: 2008 , Page(s): 34 - 38
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (735 KB) |  | HTML iconHTML  

    Service-oriented architecture (SOA) is defined as a paradigm for organizing and using distributed capabilities that might be under the control of different ownership domains. SOA is also known as a methodology for achieving application interoperability and reuse of IT assets in distributed computing environments characterized as transformable by the visibility, interaction, and effect dimensions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Process Tailoring to Manage Software Development Challenges

    Publication Year: 2008 , Page(s): 39 - 45
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (616 KB) |  | HTML iconHTML  

    To ensure high-quality software processes and leverage best practices, project managers strive to tailor standard processes such as the rational unified process or those developed within their own organizations. Software process tailoring is the activity of tuning a process to meet the needs of a specific project. Despite the critical role that tailoring software processes plays in ensuring projec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effectively Managing Proposal Development in the IT Services World

    Publication Year: 2008 , Page(s): 46 - 52
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (496 KB) |  | HTML iconHTML  

    This best-practices framework is designed to help managers develop successful IT services proposals in today's challenging and highly competitive globalized environment. Outsourcing is attractive because it lets companies save costs, focus on core competencies, gain access to specialized expertise, increase profits, and tackle competitive pressures. From the IT service providers' perspective, this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Information and Advertiser Index

    Publication Year: 2008 , Page(s): 53
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB)  
    Freely Available from IEEE
  • The Ingredients of Successful IT Management and Governance

    Publication Year: 2008 , Page(s): 54 - 55
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (861 KB) |  | HTML iconHTML  

    Successful employees are the foundation of successful companies, but what blend of experiences and backgrounds are required to help promote such a positive experience? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbiosis and Software Evolvability

    Publication Year: 2008 , Page(s): 56 - 62
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (692 KB) |  | HTML iconHTML  

    As software systems become more pervasive and complex and - at the same time - expensive and difficult to maintain, the R&D community has turned to biological systems to find mechanisms that support system integrity and robustness. In both biology and software development, evolvability has become a research area in its own right. To improve software evolvability, many researchers have studied ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Email Refresher: Defending against the Slow Slide toward Inefficiency

    Publication Year: 2008 , Page(s): 64
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (395 KB) |  | HTML iconHTML  

    Email has become the dominant form of communication in the business world and far beyond. Yet, without conscious attention to how to use it effectively, this powerful tool can undermine efficiency and ultimately prove harmful to bottom-line needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Publication Year: 2008 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (1941 KB)  
    Freely Available from IEEE
  • Corporate Network Security advertisement

    Publication Year: 2008 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (303 KB)  
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services