By Topic

IT Professional

Issue 2 • Date March-April 2011

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2408 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2011, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2515 KB)
    Freely Available from IEEE
  • Exciting Real-Time Location Applications

    Publication Year: 2011, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (1996 KB) | HTML iconHTML
    Freely Available from IEEE
  • Thoughts on Higher Education and Scientific Research

    Publication Year: 2011, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB) | HTML iconHTML

    The notion of a "tipping point" isn't new, al though the concept has relevance in differing ways. Academia seems to be at a tipping point, whereby the steady state of disciplinary specialization is about to give way to an interdisciplinary, collaborative approach to knowledge acquisition. To understand this particular tipping point, it must first appreciate the various emergent viewpoints associat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Other Duties as Assigned?

    Publication Year: 2011, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (795 KB) | HTML iconHTML

    The paper states that as you move from job to job, often within the same company, the areas of responsibility become blurred. This is a problem, and how you handle it can affect your career. When you accept a position, you usually receive a job description that, at a very high level, outlines your major duties. However, some statements can be vague, such as "manage software development projects" o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Location Systems and RFID

    Publication Year: 2011, Page(s):12 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (2788 KB) | HTML iconHTML
    Freely Available from IEEE
  • Real-Time Services for Special Education

    Publication Year: 2011, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2804 KB) | HTML iconHTML

    Novel use of RFID in six real-time systems at a special education school in Taiwan helps teachers and administrators monitor the campus and students, provide more guided training, and keep parents informed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mutual Authentication Protocol for RFID

    Publication Year: 2011, Page(s):20 - 24
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2353 KB) | HTML iconHTML

    Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID-Based Guide Gives Museum Visitors More Freedom

    Publication Year: 2011, Page(s):25 - 29
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3181 KB) | HTML iconHTML

    An interactive museum-guide system exploits RFID and handheld computers to let museum visitors better explore exhibition objects. The system uses both high-frequency and ultrahigh-frequency RFID technologies to achieve a kind of two-way communication. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-Based Intelligent Software Exploits Near-Field Communication

    Publication Year: 2011, Page(s):30 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3870 KB) | HTML iconHTML

    Using a mobile device with embedded near-field communication, an agent-based software intelligence framework can make various applications in a pervasive computing environment more personalized, dynamic, and intelligent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Location Systems for Hospital Emergency Response

    Publication Year: 2011, Page(s):37 - 43
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3658 KB) | HTML iconHTML

    Real-time location systems can help hospitals execute a coordinated response during a disaster. However, before implementing an RTLS in such a setting, management must consider the various technologies and the associated benefits, drawbacks, and challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interruption Management: A Review and Implications for IT Professionals

    Publication Year: 2011, Page(s):44 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1694 KB) | HTML iconHTML

    Leaders are often interrupted when making decisions and must be adept at recovering quickly. A review of interruption management highlights implications for IT professionals and offers recommendations for minimizing the negative effects of interruptions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web-Based Billing System Exploits Mature and Emerging Technology

    Publication Year: 2011, Page(s):49 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2158 KB) | HTML iconHTML

    Combining REST and Ajax with the traditional model-view-controller software architecture and using emerging technologies in software development, such as object relational modeling and Python, results in a successful new Web-based billing system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Green IT: The Next Five Years

    Publication Year: 2011, Page(s):56 - 59
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1249 KB) | HTML iconHTML

    According to the Smart 2020 report, green IT could save 7.8 gigatonnes of carbon dioxide equivalent in 2012 (that's 15 percent of all greenhouse gas emissions). In exploring green IT practices and their impact, three different time frames emerge, revealing current and future trends for this growing field. Those time frames were discussed further in this paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Entrepreneurship in Africa

    Publication Year: 2011, Page(s):60 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1336 KB) | HTML iconHTML

    Until recently, most online services could only be accessed using desktop or notebook computers. Today, more services are designed for mobile phone access, impacting developing countries where desktop computers remain a luxury but mobile phones are ubiquitous. Africa, in particular, has the highest growth rate of mobile phones, presenting opportunities not only to create locally relevant mobile se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT without Hardware

    Publication Year: 2011, Page(s):63 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1093 KB) | HTML iconHTML

    Five years from now, some mid-size businesses might be functioning without any company-owned IT hardware. Although this might initially be true for only a small subset of industries and firms, others will find themselves some where on the continuum between "only company assets" and "no company assets," with the trend heading toward fewer corporate devices. As a CIO, the author asks what will the I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement - Back cover]

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (860 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services