By Topic

IT Professional

Issue 6 • Date Nov.-Dec. 2011

Filter Results

Displaying Results 1 - 22 of 22
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3093 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2011, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1947 KB)
    Freely Available from IEEE
  • The Next Big Thing

    Publication Year: 2011, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (665 KB) | HTML iconHTML
    Freely Available from IEEE
  • What We Can Learn from Steve Jobs

    Publication Year: 2011, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (1351 KB) | HTML iconHTML
    Freely Available from IEEE
  • Mobile-App Addiction: Threat to Security?

    Publication Year: 2011, Page(s):9 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1255 KB) | HTML iconHTML

    Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's clear that our embrace of, and reliance on, cheap and easily accessible information presents unprecedented security implications - the enormity o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Courageous Computing

    Publication Year: 2011, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    IT professionals often ask, "If I'm ethically responsible for any errors in the software that I develop, then how can I release any software to the public? After all, I can't be sure that it's perfect." This is a fair question for any computer ethicist. Reviewing the work of the ancient Greek philosopher Aristotle helps find the balance between the pitfalls of cowardice and recklessness when it co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Education for Practitioners

    Publication Year: 2011, Page(s):14 - 15
    Request permission for commercial reuse | PDF file iconPDF (3481 KB) | HTML iconHTML
    Freely Available from IEEE
  • E-Learning for IT Professionals: The UMUC Experience

    Publication Year: 2011, Page(s):16 - 21
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4917 KB) | HTML iconHTML

    IT is rapidly evolving, and IT professionals must continuously upgrade their skills to remain current. E-learning can help by providing continuing education in a convenient manner, as evidenced by academic programs at the University of Maryland University College. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenging the Traditional Graduate Information Systems Program

    Publication Year: 2011, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5302 KB) | HTML iconHTML

    How do you make a graduate program more relevant? Develop a project-based capstone course that combines theoretical knowledge with practical application to offer students - even those enrolled only part-time - a more comprehensive, integrated experience. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Promise of IT: Educating the Federal Government

    Publication Year: 2011, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5029 KB) | HTML iconHTML

    According to former US chief information officer Vivek Kundra, "Information technology should enable government to better serve the American people. But despite spending more than $600 billion on information technology over the past decade, the federal government has achieved little of the productivity improvements that private industry has realized from IT. The problem isn't in the technical trai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Technologist's Tool Set: A CIO's Perspective

    Publication Year: 2011, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5273 KB) | HTML iconHTML

    The CIO of a nationwide real estate company discusses the skill set IT professionals will need to succeed in the years ahead. The technology will change, but analytical, communication, and project management skills will remain essential. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Requirements Risks in IT Projects

    Publication Year: 2011, Page(s):40 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5064 KB) | HTML iconHTML

    IT professionals must navigate an increasingly complex requirements landscape. Presented here is a process for identifying, analyzing, and mitigating requirements risks throughout the project life cycle. The authors illustrate its use in a case study for a mobile presence service. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Integration for Facility Management

    Publication Year: 2011, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4945 KB) | HTML iconHTML

    The administration of a parliamentary institution implemented a Computer-Aided Facility Management system to better manage the institution's real estate. The state-of-the-art CAFM system integrates graphical and alphanumerical data for more efficient property management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role Engineering: Methods and Standards

    Publication Year: 2011, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2054 KB) | HTML iconHTML

    Most of today's large firms use some form of role-based access control (RBAC) to support thousands of users and permission controls. Recognizing the need for some commonality among the various RBAC models, the National Institute of Standards and Technology proposed the NIST Model for RBAC in 2000. NIST is now working to update and enhance this standard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Process Management and the Social Web

    Publication Year: 2011, Page(s):58 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1110 KB) | HTML iconHTML

    Organizations increasingly face complex problems in domains such as case management and claims processing that challenge traditionally static business processes and the IT systems that support them. Users in turn expect instant gratification, rich user experiences, rapid access to information, and constant connectivity through mobile devices. Organizations are increasingly investing time and money... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing Gives Emerging Markets a Lift

    Publication Year: 2011, Page(s):60 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1018 KB) | HTML iconHTML

    Cloud computing represents a paradigm shift, a transition from computing-as-a-product to computing-as-a-service. Instead of buying hardware and software products, which require installation, configuration, and maintenance, cloud computing lets you use applications and computing infrastructures in the cloud as a service, so you pay only for resources used. Clouds thus offer businesses and individua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specialists or Generalists?

    Publication Year: 2011, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1861 KB) | HTML iconHTML

    Recently, there has been a fair amount of press about the increasing drive for specialization in technology hiring. This push to compartmentalize capabilities can be attributed to leaner staffing without a comparable decrease in the number of "urgent" projects. Furthermore, organizations have been doing this for so long now that it's becoming standard practice. Where are the positions for "general... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement - Back cover]

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (984 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (221 KB)
    Freely Available from IEEE
  • Annual Index

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (239 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services