Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00 AM-7:30 PM ET.
We apologize for the inconvenience.
By Topic

IT Professional

Issue 3 • May-June 2010

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1482 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (814 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (895 KB)
    Freely Available from IEEE
  • Supporting a Mobile Workforce

    Publication Year: 2010, Page(s):4 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (262 KB) | HTML iconHTML
    Freely Available from IEEE
  • Responsibility in Engineering: Victor Paschkis vs. Wernher von Braun

    Publication Year: 2010, Page(s):6 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (290 KB) | HTML iconHTML
    Freely Available from IEEE
  • Marketing Smart

    Publication Year: 2010, Page(s):8 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (503 KB) | HTML iconHTML

    This paper is consist of some marketing skills, comprising the aspects of good marketing and poor marketing. This also contains a professional aspect of an individual in terms of good marketing skills. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Common Sense for Your Network

    Publication Year: 2010, Page(s):11 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (890 KB) | HTML iconHTML

    Modern IT managers need to focus on commonsense network security concepts. A primary goal of information security is to limit data access to only authorized individuals.To control network access and properly assign workstations to the proper domain, each port in the enterprise need to be controlled. Another commonsense security concept that organizations have tried to adopt is a password policy. G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Computing in the Context of Calm Technology

    Publication Year: 2010, Page(s):14 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1821 KB) | HTML iconHTML

    The articles offer tips for implementing three functionalities to achieve a calm mobile environment. Calm mobile computing is more about the environment and is more user-centric than either Web-based or grid computing. The applications, to a large extent, guide the middleware and networking issues. The three functionalities discussed are pervasive computing, ambient intelligence and miniaturizatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MORF: A Mobile Health-Monitoring Platform

    Publication Year: 2010, Page(s):18 - 25
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2034 KB) | HTML iconHTML

    The Mobile Ontology-based Reasoning and Feedback (MORF) health-monitoring system seamlessly integrates vital data from various health sensors to identify a patient's health status. The system can then take appropriate measures for timely support. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiMAX or LTE: Who will Lead the Broadband Mobile Internet?

    Publication Year: 2010, Page(s):26 - 32
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1754 KB) | HTML iconHTML

    Two main technologies are competing for the International Mobile Telecommunications (IMT)-Advanced initiative: WiMAX and LTE. This comparison reviews their development and deployment and provides an outlook on their adoption as 4G technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Computing 
  • The Enterprise Mobile Applications Development Framework

    Publication Year: 2010, Page(s):33 - 39
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2057 KB) | HTML iconHTML

    Enterprises face several challenges in deploying mobile applications, emanating from features such as location independence, contextualization, and personalization. The six-layer enterprise mobile applications development framework offers a systematic and comprehensive solution to mobile application development and maintenance. The taxonomy of enterprise mobile application are mobile broadcast, mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cell Phones as Mobile Computing Devices

    Publication Year: 2010, Page(s):40 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1229 KB) | HTML iconHTML

    Increases in the computational power of mobile processors, improvements in mobile operating systems, and the popularity of mobile broadband make cell phones the best candidate for sophisticated mobile computing devices. Learn about potential applications and their corresponding challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effectively Defining "Shall Not" Requirements

    Publication Year: 2010, Page(s):46 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    The authors review how to define a set of "negative requirements," or hazards, starting with elicitation and discovery of shall-not requirements through system integration and testing using a process called hazard mining. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovation: There Is Something New Under the Sun

    Publication Year: 2010, Page(s):54 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    In today's business environment, organizations must innovate or die. Companies that can't adapt quickly aren't able to keep up with all of the changes that are occurring. Powerful forces such as advancing technology, global economies, and political instability produce an environment in which change rather than stability is the norm. Successful IT leaders understand this. They provide the change le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Another Ode to Paranoia

    Publication Year: 2010, Page(s):57 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    The nonprofit Bipartisan Policy Center recently conducted Cyber ShockWave, a series of simulated cyberattacks to role play the US government's response scenarios. The simulations included an attack on US cell phone networks and power grids and a scripted series of cascading crises. Former high-level government officials played the roles of senior administration and national security officials in r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 2010, Page(s): 60
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Status Quo—The Silent Killer

    Publication Year: 2010, Page(s):61 - 64
    Request permission for commercial reuse | PDF file iconPDF (655 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (720 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services