By Topic

IT Professional

Issue 6 • Date Nov.-Dec. 2010

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2010 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (553 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (817 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2010 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (119 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2010 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1066 KB)  
    Freely Available from IEEE
  • What is Your Digital Business Strategy?

    Publication Year: 2010 , Page(s): 4 - 6
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | PDF file iconPDF (592 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Ethical Analysis in the Cloud

    Publication Year: 2010 , Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1520 KB) |  | HTML iconHTML  

    People have been studying and practicing applied ethics for thousands of years. It seems sensible to exploit that work, particularly ideas that have gained importance over time. Here, I present three important ideas from applied ethics both to illustrate the use of applied ethics methods and to provoke some thinking among IT professionals about the ethical implications of cloud computing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Where in the World Is Carmen Sandiego (and Is She a Software Engineer)?

    Publication Year: 2010 , Page(s): 10 - 13
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1182 KB) |  | HTML iconHTML  

    Recent conversations pertaining to licensure of software engineers in the US and offshoring had me thinking about Carmen again. I wondered how well she would have fared if her secret agent cover was as a software guru. Would she be able to pass as a software engineer in several different countries-for example, in the US, India, Malaysia, Argentina, and Ireland? Are there differences in how software engineering is practiced in different cultures that are so profound that even a super spy, expert at mimicry and disguise, couldn't fool her colleagues? The answers to these questions have important implications for the transnational practice of software engineering, for outsourcing and offshoring policy and strategy, and even for national security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Free and Open Source Software

    Publication Year: 2010 , Page(s): 14 - 16
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2158 KB) |  | HTML iconHTML  

    In this paper, free and open source software are discussed. Open source is an intellectual property destroyer. Nothing could be worse than this for the software business and the intellectual-property business. Microsoft has an official open source presence on the Web (www.microsoft.com/opensource), and in July 2010, Jean Paoli, the General Manager for Interoperability Strategy at Microsoft, delivered a keynote address at the O'Reilly Open Source Convention. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Source Software Considerations for Law Enforcement

    Publication Year: 2010 , Page(s): 18 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (823 KB) |  | HTML iconHTML  

    Can law enforcement agencies leverage open source to benefit the communities they serve? In some areas, recommending open source solutions is easy. In others, the arguments for open source solutions are less clear. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Free/Open Services

    Publication Year: 2010 , Page(s): 24 - 30
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (573 KB) |  | HTML iconHTML  

    A novel concept of free/open services adopts the principles of the free/ open source software approach and adapts them for service-oriented computing to enhance the widespread use of services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community Source Software in Higher Education

    Publication Year: 2010 , Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (616 KB) |  | HTML iconHTML  

    This case study shows how the University of Delaware adopted Sakai, a community source system for higher education. It discusses the major challenges of community source adoption and presents the key success factors for overcoming them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Open Source for Enterprise Geographic Information Systems

    Publication Year: 2010 , Page(s): 38 - 45
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1342 KB) |  | HTML iconHTML  

    Enterprises can benefit from an open source geographic information system architecture, but understanding the nature of GIS data and the functions of each open source component is crucial to implementation success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Healthcare 2.0

    Publication Year: 2010 , Page(s): 46 - 51
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (960 KB) |  | HTML iconHTML  

    Recent hardware and software developments have paved the way for exploiting Web 2.0 in healthcare. This survey reviews these developments and the related security risks and considers how Enterprise 2.0 can help. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time Smart

    Publication Year: 2010 , Page(s): 52 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (918 KB) |  | HTML iconHTML  

    Those who "invest" and "spend" their time wisely will have greater success than those who haven't learned this valuable skill. Find out how to effectively manage your time to maximize the return on your investment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Applications: The Fifth Cycle

    Publication Year: 2010 , Page(s): 56 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (516 KB) |  | HTML iconHTML  

    The world is poised for a fifth cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing. This technology will become an important aspect of how we react as enlightened citizens to increasingly pressing global issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Management Framework for IT

    Publication Year: 2010 , Page(s): 61 - 64
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (505 KB) |  | HTML iconHTML  

    As organizations continue to turn to IT to define and improve the value of IT to the mission, the Innovation Value Institute's IT Capability Maturity Framework (IT-CMF) should be considered. This model examines far more than IT's technical readiness by evaluating and measuring IT's ability to support the business as well as determine how well IT runs as a business. The IT-CMF considers differences in industry type and mission, thereby avoiding the "one size fits all" or "perfect is best" syndrome of other capability models. Well funded, well organized, and supported by top players in the IT industry, the IT-CMF shows all signs of being the industry standard for IT readiness and maturity measurement and improvement. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement - Back cover]

    Publication Year: 2010 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (105 KB)  
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2010 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (150 KB)  
    Freely Available from IEEE

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services