By Topic

IT Professional

Issue 1 • Jan.-Feb. 2012

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (4514 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2012, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (270 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • New Perspectives for IT

    Publication Year: 2012, Page(s):2 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (975 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2012, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • The Emergence of China in the Internet Market

    Publication Year: 2012, Page(s):6 - 9
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1488 KB) | HTML iconHTML

    China now has the world's largest Internet population and is a leading player in the Internet market. Learn about the growth of Internet applications and potential business opportunities in China. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is Ethical Behavior Good for Business?

    Publication Year: 2012, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB) | HTML iconHTML

    Is ethical behavior good for business? In pondering this question, consider what "good for business" actually means. Is it just increased profits, or something more? Does being known as an ethical IT professional offer a competitive advantage? Here, Keith Miller critically examines these and related questions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Econ 101 for Cloud Enthusiasts

    Publication Year: 2012, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2388 KB) | HTML iconHTML

    The collection of clouds available to us represents a marketplace, just like any other. How do the rules of economic markets apply to the cloud? And how can we keep this new market in check? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enforcing Multitenancy for Cloud Computing Environments

    Publication Year: 2012, Page(s):16 - 18
    Cited by:  Papers (8)
    Request permission for commercial reuse | PDF file iconPDF (2007 KB) | HTML iconHTML
    Freely Available from IEEE
  • Logical Data Models for Cloud Computing Architectures

    Publication Year: 2012, Page(s):19 - 26
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2871 KB) | HTML iconHTML

    Describing generic logical data models for two existing cloud computing architectures, the author helps develop a common set of architectural requirements to facilitate traceability between evolving business requirements and cloud architecture implementations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud@Home: Toward a Volunteer Cloud

    Publication Year: 2012, Page(s):27 - 31
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2856 KB) | HTML iconHTML

    A new Cloud@Home paradigm aims at merging the benefits of cloud computing-service-oriented interfaces, dynamic service provisioning, and guaranteed QoS-with those of volunteer computing-capitalized idle resources and reduced operational costs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Threat as a Service?: Virtualization's Impact on Cloud Security

    Publication Year: 2012, Page(s):32 - 37
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7223 KB) | HTML iconHTML

    Virtualization is essential to cloud computing, yet its security vulnerabilities in the cloud environment haven't been sufficiently studied. This analysis of cloud security focuses on how virtualization attacks affect different cloud service models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Legacy-System Sustainability: A Systematic Approach

    Publication Year: 2012, Page(s):38 - 43
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4848 KB) | HTML iconHTML

    This article defines a legacy system as an aggregate package of software and hardware solutions whose languages, standards, codes, and technologies belong to a prior generation or era of innovation. By this definition, all technology solutions will ultimately become legacy systems. So IT professionals and managers should prepare to manage legacy systems throughout their careers, and software exper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Demand for Soft Skills in Software Development

    Publication Year: 2012, Page(s):44 - 49
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5308 KB) | HTML iconHTML

    An analysis of 500 advertisements for IT positions focuses on the soft skills mentioned in the ads, revealing which soft skills are in high demand for software development and which ones are neglected despite their importance. Our survey indicates that soft skills are in demand in the software industry, but only to a limited extent. This highlights the lack of understanding of the role that soft s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Technology in a 2.0 World

    Publication Year: 2012, Page(s):50 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5667 KB) | HTML iconHTML

    Technology managers must prepare for a shift in organizational structure and governance as businesses transition to a centralized infrastructure with decentralized business applications and new approaches to innovation, driven by the need for agility, globalization, and new budgeting models. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Valuing IT Human Capital

    Publication Year: 2012, Page(s):58 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    Public and private-sector organizations are interested in attracting and retaining science, technology, engineering, and mathematics (STEM) talent-especially IT talent. This problem is particularly acute for human resources professionals employed in the federal government, where hiring and pay freezes, elongated and ponderous talent acquisition processes, and the inescapable requirements for secur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2012 BizTech Trends and Guidance

    Publication Year: 2012, Page(s):64 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1289 KB) | HTML iconHTML

    Biztech trends should help business and technology executives develop a high level, long-term approach for cap turing opportunities to help their business grow. Most enterprises are terrible at being innovative. Although CIOs must learn how to better capture internal expertise, they must first recognize and differentiate the value of external sources of change and growth. Many pundits confuse "ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Professional Reviewers

    Publication Year: 2012, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (354 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1033 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services