By Topic

IT Professional

Issue 1 • Date Jan.-Feb. 2009

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1046 KB)
    Freely Available from IEEE
  • info360 [advertisement]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (333 KB)
    Freely Available from IEEE
  • IT Professional [Masthead]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1630 KB)
    Freely Available from IEEE
  • IT Challenges for 2009: Fixing the IT Infrastructure

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (150 KB) | HTML iconHTML
    Freely Available from IEEE
  • News Briefs

    Publication Year: 2009, Page(s):6 - 9
    Request permission for commercial reuse | PDF file iconPDF (259 KB) | HTML iconHTML
    Freely Available from IEEE
  • CS Membership Forms

    Publication Year: 2009, Page(s):10 - 12
    Request permission for commercial reuse | PDF file iconPDF (1039 KB)
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2009, Page(s): 13
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008

    Publication Year: 2009, Page(s):14 - 19
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    History demonstrates that hysteria is optional only in a bear market because the market always recovers given enough time. With people's life savings at stake, however, the influence of panic can't be brushed aside. Market conditions in 2008 are unique in that they're far more volatile and seem to inspire the greatest fear factor in the history of the modern market. Moreover, because of extensive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Build a Smarter Government, Build a Smarter Federal IT Operation

    Publication Year: 2009, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Inspired by President Obama's call for "change we need" to "build a smart federal government," this article offers one man's viewpoint on how to build a better federal IT operation. The core change we need to make is to move from the current culture of long in management and short in IT technical expertise to the paradigm of long in IT technical expertise and short in management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing "Insecure IT"

    Publication Year: 2009, Page(s):24 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (575 KB) | HTML iconHTML

    This article introduces "insecure IT", a new department for IT Professional that will cover security weaknesses in IT systems, ranging from desktops to global e-commerce networks. This regular feature will offer ideas to improve IT security, both by looking at ways it can go wrong as well as by covering good practices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Identity Discovery through Fusion

    Publication Year: 2009, Page(s):27 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1065 KB) | HTML iconHTML

    In a complex, interconnected world, being able to confirm the identity of a person or object is critical. Applications from border control to banking rely on the notion that a system can weed out deception while permitting legitimate access. This trade-off is at the heart of identity discovery. As more scanning technologies become available, data potentially useful to identity discovery is growing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Blog Mining Framework

    Publication Year: 2009, Page(s):36 - 41
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1105 KB) | HTML iconHTML

    New blogs appear every day, and a lot of their content is useful for applications in various domains. The authors propose a framework for mining blogs to gather this information automatically. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Multiple-Touch User Interface Revolution

    Publication Year: 2009, Page(s):42 - 49
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1548 KB) | HTML iconHTML

    Because of their intuitive interaction styles, multiple-touch devices could trigger a revolution in user interfaces. But how can designers advance this technology? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rescuing IT Outsourcing: Strategic Use of Service-Level Agreements

    Publication Year: 2009, Page(s):50 - 58
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    The authors offer practical guidelines for companies to effectively structure service-level agreements (SLAs) for successful IT outsourcing. Specifically, they describe how foundation accords of SLAs are important to operationally oriented outsourcing, whereas change accords nurture relationships intended to achieve strategic benefits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restructuring the IS Curriculum around the Theme of Service Orientation

    Publication Year: 2009, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (789 KB) | HTML iconHTML

    This article proposes restructuring and updating the information systems (IS) course curriculum to reflect current and forthcoming changes in the IS profession caused primarily by the growing popularity of service orientation both in the business and information technology domains. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pushing IT up a Notch: Embracing Technology for the Public and Corporate Good

    Publication Year: 2009, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Embracing technology for the public and corporate good View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Now [advertisement]

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1603 KB)
    Freely Available from IEEE
  • SD West 2009

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (6041 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services