By Topic

IT Professional

Issue 1 • Date Jan.-Feb. 2010

Filter Results

Displaying Results 1 - 18 of 18
  • Front Cover

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2248 KB)
    Freely Available from IEEE
  • IT Professional Call for Papers: Cloud Computing

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • IT Professional Masthead

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (197 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2394 KB)
    Freely Available from IEEE
  • The IT Professional Outlook: Where Do We Go from Here?

    Publication Year: 2010, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (220 KB) | HTML iconHTML
    Freely Available from IEEE
  • Making Sense of Software Development and Personality Types

    Publication Year: 2010, Page(s):6 - 13
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2599 KB) | HTML iconHTML

    It's common sense to state that the production of any software product involves a human element, at least to some extent. We all have different personality traits, and the way we perceive, plan, and execute any activity is influenced by these characteristics. Typically, software development is a product of teamwork, involving several people performing various tasks. The success and failure of soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anatomy of the Information Security Workforce

    Publication Year: 2010, Page(s):14 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1306 KB) | HTML iconHTML

    Survey results indicate that the information security workforce, one of the fastest growing subgroups in IT, is a unique professional niche with distinctive task responsibilities, job market conditions, and training needs. Given the demand for the information security workforce, this paper offers useful insight to various stakeholders, including prospective information security professionals, empl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Women in Cybersecurity: A Study of Career Advancement

    Publication Year: 2010, Page(s):24 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (899 KB) | HTML iconHTML

    Although cybersec├é┬┐rity is a critical IT area, women continue to be underrepresented among its ranks. This first study of female cybersecurity professionals examines the required skills, existing challenges, and key success factors for women in the field.As our results show, addressing the needs of women at the beginning of their careers-starting at educational institutions-is crucial to their suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Event Monitoring and Service in a Flat World Benefits and Challenges

    Publication Year: 2010, Page(s):32 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (759 KB) | HTML iconHTML

    Event monitoring is a critical component in managing IT infrastructure and business operation. Yet, like other IT services, monitoring services face challenges and high expectations in a globally integrated IT environment. Such services offer a telling example that shows both potential and limitation for global IT services, as well as the gaps between expectation and reality and how they might be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Unified Messaging

    Publication Year: 2010, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2934 KB) | HTML iconHTML

    The proliferation of messaging systems presents users with a challenging task: how to effectively use and manage many separate messaging systems. Unified messaging provides simplified management of different messaging systems through a single, unified interface. With unified messaging, you need only remember who you wish to communicate with; unified messaging will help you choose the appropriate m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Information Services Architecture Model Based on Data Processing Stages

    Publication Year: 2010, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (929 KB) | HTML iconHTML

    The author's simple model for an information services architecture is intended as a common frame of reference for both business and technical practitioners and groups various aspects of computing into four distinct layers based on data processing stages. These layers cover data life-cycle states from the time data is generated, stored, and analyzed, to when it's delivered and used. The model incor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • It's Not Nice to Fool Humans

    Publication Year: 2010, Page(s):51 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    This paper is about the computer that pool people into thinking they're interacting with human. Because IT professional will be the people who design, develop, and deploy these computers, it seems sensible to explore the ethical ramifications of such machines in IT professional. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Predictions, 2010

    Publication Year: 2010, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    As is traditional this time of year, Phillip A. Laplante prognosticates on the state of IT for next year and reflects on his last set of predictions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requiring Strong Credentials: What's Taking So Long?

    Publication Year: 2010, Page(s):57 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    Individuals can already purchase digital certificates through the General Services Administration's (GSA's) Access Certificates for Electronic Services (ACES) program or through VeriSign, Thawte, and the like. Federal employees, contractors, and Web servers could have their digital certificates issued through the Federal PKI Common Policy program. In other words, the complete solution is in place ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Staff Smart, Part 1: Motivation

    Publication Year: 2010, Page(s):61 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    If you're a manager, for the most part, you can only be as capable and productive as your staff. It thus behooves you to develop skills to make your staff as capable and as productive as they can reasonably be. How do you do this? It depends to a large extent on your skills in recruiting, your artistry in motivating, and your knack in delegating. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CIOs Can Drive Change to a New Strategic Role

    Publication Year: 2010, Page(s): 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    CIOs of the future have to do more than react to change: they need to become more efficient at connecting themselves to the source of change and managing it for tangible business improvement. This article outlines seven steps CIOs can follow potentially drive their careers to a strategic role. The initial four steps outline a process to better locate and manage change in their organization. If don... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Professional Call for Papers

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • IT Professional 2010 Editorial Calendar

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services