By Topic

IT Professional

Issue 4 • Date July-Aug. 2009

Filter Results

Displaying Results 1 - 20 of 20
  • Front Cover

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (976 KB)
    Freely Available from IEEE
  • IEEE Computer Society Membership advertisement

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1032 KB)
    Freely Available from IEEE
  • IT Professional Masthead

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1592 KB)
    Freely Available from IEEE
  • Paranoid? Who Says I'm Paranoid?

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1303 KB) | HTML iconHTML
    Freely Available from IEEE
  • Automating Mashups for Next-Generation Enterprise Portals

    Publication Year: 2009, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    The increasing number of resources available through portals establish a need to tailor information to individual needs and situations. Mashups are tools for dynamically integrating independent applications. For portals, what is needed are means to automatically create personalized mashups that optimally fit a user's information needs in a given situation. At the core of our approach are different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Data Center Design

    Publication Year: 2009, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (671 KB) | HTML iconHTML
    Freely Available from IEEE
  • Return on Infrastructure, the New ROI

    Publication Year: 2009, Page(s):12 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (506 KB) | HTML iconHTML

    IT executives frequently must be able to communicate value in real economic terms, characterizing how technology infrastructure financially benefits the business relative to the company's financial performance objectives. A new financial metric-return on infrastructure employed (ROIE)-recognizes IT as both an asset and a service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multiple-Criteria Approach to Ranking Computer Operating Systems

    Publication Year: 2009, Page(s):17 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB) | HTML iconHTML

    To select an operating system, an organization must consider several essential characteristics during its initial evaluation process. The analytic hierarchy process (AHP) offers an appropriate solution; the author illustrates it with a realistic case study in which an organization evaluates and ranks Windows XP, Linux, and Mac OS X 10.4. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing the WAN between Branch Offices and the Data Center

    Publication Year: 2009, Page(s):24 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB) | HTML iconHTML

    WAN optimization/acceleration devices can minimize the number of transactions across a WAN and enhance the end-user experience at the branch. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greener PCs for the Enterprise

    Publication Year: 2009, Page(s):28 - 37
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (919 KB) | HTML iconHTML

    PC energy use is a growing cost to enterprises, with most machines remaining fully powered on, even while idle, for most of the time. The Network Connectivity Proxy maintains network presence for PCs but lets them sleep while idle, thus saving energy and reducing total cost of ownership. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Social Recommender Systems

    Publication Year: 2009, Page(s):38 - 44
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4220 KB) | HTML iconHTML

    Recommender systems play a significant role in reducing information overload for people visiting online sites, but their accuracy could be improved by using data from online social networks and electronic communication tools. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pavlov's Bugs: Matching Repair Policies with Rewards

    Publication Year: 2009, Page(s):45 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1377 KB) | HTML iconHTML

    Software maintenance engineers devote a significant amount of work to repairing user-identified errors. But user, maintainer, and manager perceptions of an error's importance can vary, and bug-repair assignment policies can adversely affect those perceptions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and/or Security: Take Your Pick

    Publication Year: 2009, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    The concepts of privacy and security are distinct, but they're often considered synonymously when applied to computational systems. This article explores the conceptual differences between computational privacy and security and suggests four mutually exclusive models that define four different fundamental approaches to privacy and security during design. It's crucial that developers make a conscio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When Sensitive IT Information Crosses Borders

    Publication Year: 2009, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    The seizure of information-bearing devices at the US border generates ethical challenges for organizations and their employees as well as government agencies and their employees. Organizations and government agencies can reduce the problems associated with these seizures by following specific policies and procedures. On one hand, agencies enforcing policies that might involve legal but proprietary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-Smart, Part I: Work Smart

    Publication Year: 2009, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    The topic of this installment of the Developing Soft Skills series is how to be self-smart, which really involves two subtopics, being work smart and being career smart. In this issue, we'll focus on being work smart by discussing the following three mantras: perfect is the enemy of the good; when things go wrong, blame yourself; and overconfidence is a deal breaker. The common thread here is to f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Sociey Information

    Publication Year: 2009, Page(s): 63
    Request permission for commercial reuse | PDF file iconPDF (516 KB)
    Freely Available from IEEE
  • A Business Case for IT Investments

    Publication Year: 2009, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    The US federal government is making strides in its adoption of a new model for assessing IT assets. This new model could inform capital asset selection for years to come. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Micro Call for Papers

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (616 KB)
    Freely Available from IEEE
  • Computing Now advertisement

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (9098 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services