By Topic

IT Professional

Issue 1 • Date Jan.-Feb. 2011

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2011 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (484 KB)  
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2011 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (116 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (143 KB)  
    Freely Available from IEEE
  • Contents

    Publication Year: 2011 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (938 KB)  
    Freely Available from IEEE
  • IT Professional in 2011

    Publication Year: 2011 , Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (498 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • The Rise of Emerging Markets: Opportunities and Challenges for IT

    Publication Year: 2011 , Page(s): 6 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (791 KB) |  | HTML iconHTML  

    Emerging markets-nations in the process of rapid growth and industrialization, including China, India, Brazil, Russia (the BRIC countries), South Africa, South Korea, the Philippines, and Mexico-have been attracting much attention in recent years, and for good reason. They represent two-thirds of the world's population, generate over 20 percent of the world's gross domestic product, and are restru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Security: The Security Content Automation Protocol

    Publication Year: 2011 , Page(s): 9 - 11
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (479 KB) |  | HTML iconHTML  

    Managing information systems security is an expensive and challenging task. Many different and complex software components- including firmware, operating systems, and applications-must be configured securely, patched when needed, and continuously monitored for security. Most organizations have an extensive set of security requirements. For commercial firms, such requirements are established throug... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the Cybersecurity Workforce

    Publication Year: 2011 , Page(s): 12 - 15
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (590 KB) |  | HTML iconHTML  

    Cybersecurity, by its very nature, is people-both defenders and attackers- engaged in a contest playing out on a field of information systems and technology. Just as in any contest of this kind, success lies in identifying talent and continually developing and conditioning teams of professionals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT for a Greener Planet [Guest editors' introduction]

    Publication Year: 2011 , Page(s): 16 - 18
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (531 KB) |  | HTML iconHTML  

    An increased awareness of the harmful effects of greenhouse gas (GHG) emissions, new stringent environmental legislation, concerns about electronic waste disposal practices, and corporate image concerns are pushing businesses and individuals to go green. IT has fundamentally altered our work and life and improved our productivity, economy, and social well-being. Going forward, IT now has a new rol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Next Wave of Sustainable IT

    Publication Year: 2011 , Page(s): 19 - 25
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (825 KB) |  | HTML iconHTML  

    Sustainable IT is developing into a discipline that's focused on the long-term importance of IT as a source of market-based innovative solutions to address societal problems. Increasingly, how companies impact society through their economic, environmental, and social actions defines their risks and opportunities, differentiates their products, and impacts their growth potential. The SITS framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing Green IT Initiatives Using the Balanced Scorecard

    Publication Year: 2011 , Page(s): 26 - 32
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (928 KB) |  | HTML iconHTML  

    By expanding the balanced scorecard to incorporate sυstainability perspectives, the authors analyze current green IT initiatives to explore how IT can contribute to enterprise-wide sustainability performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Capability Maturity Framework for Sustainable Information and Communication Technology

    Publication Year: 2011 , Page(s): 33 - 40
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1545 KB) |  | HTML iconHTML  

    Researchers estimate that information and communication technology (ICT) is responsible for at least 2 percent of global greenhouse gas (GHG) emissions. Furthermore, in any individual business, ICT is responsible for a much higher percentage of that business's GHG footprint. Yet researchers also estimate that ICT can provide business solutions to reduce its GHG footprint fivefold. However, because... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Green Potential of RFID Projects: A Case-Based Analysis

    Publication Year: 2011 , Page(s): 41 - 47
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (931 KB) |  | HTML iconHTML  

    RFID has been a popular technology in the areas of supply-chain management, asset tracking, and manufacturing. In general, research related to RFID's potential contributions fall under technological, applications-related, or policy and security issues. However, there's little discussion in the extant literature on the environmentally responsible management of RFID. Traditionally, information and c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Greening the Internet: Measuring Web Power Consumption

    Publication Year: 2011 , Page(s): 48 - 53
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1041 KB) |  | HTML iconHTML  

    This evaluation of end-user PCs browsing the Web - and loading Flash plug-ins - measures power consumption by considering the hardware platform, operating system, browser, and website. It also reveals the unnecessary power expenditures of tabbed browsing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three Strategies for Green IT

    Publication Year: 2011 , Page(s): 54 - 57
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (809 KB) |  | HTML iconHTML  

    An investigation of green IT in 14 Danish companies identifies three strategies: storefront focuses on external presentation, tuning involves simple changes for improved efficiency, and redesign reinvents the company to leverage green IT's potential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Reviews

    Publication Year: 2011 , Page(s): 58 - 60
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (674 KB) |  | HTML iconHTML  

    One of the worst aspects of a manager's job is writing performance reviews. It's easy to review the top performers, just tell them that they're doing great and give them their well-deserved bonuses. But what about the middle performers or those who need improvement? How does an effective manager write and discuss a review that will encourage improvement? The paper states that employee self assessm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2011 IT Tech and Strategy Trends

    Publication Year: 2011 , Page(s): 64 - 63
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (684 KB) |  | HTML iconHTML  

    It's the time of year when everyone starts releasing their "top 10" lists. Most of these lists are very technology or tool centric and can be more visionary than practical. Few organizations face all of the items on such lists, and many items don't remain relevant for more than a couple of years-then they're either subsumed into the larger IT portfolio or they disappear into the annals of IT histo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Thanks to IT Pro Reviewers

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (980 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (159 KB)  
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services