By Topic

IT Professional

Issue 5 • Date Sept.-Oct. 2012

Filter Results

Displaying Results 1 - 17 of 17
  • Front Cover

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (233 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2012, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (488 KB)
    Freely Available from IEEE
  • Digital Business Strategies and the Duality of IT

    Publication Year: 2012, Page(s):2 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (856 KB) | HTML iconHTML
    Freely Available from IEEE
  • Cloud Computing in India

    Publication Year: 2012, Page(s):5 - 8
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1075 KB) | HTML iconHTML

    Cloud computing is still in its infancy in India, but as economic and institutional factors improve, it could greatly accelerate India's digitization and transform how cell phones are used. If industry and the government can develop products that meet local needs and address issues such as low bandwidth and security concerns, the cloud might serve as an important catalyst in driving economic and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The New Mobile Computing Landscape

    Publication Year: 2012, Page(s):9 - 11
    Request permission for commercial reuse | PDF file iconPDF (1008 KB) | HTML iconHTML
    Freely Available from IEEE
  • Mobile Multimedia Applications: Delivery Technologies

    Publication Year: 2012, Page(s):12 - 21
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3767 KB) | HTML iconHTML

    This overview of mobile multimedia applications discusses deployment and distribution issues, focusing on video and audio-visual services. The authors also look at cloud computing and outline future directions for advanced audio-visual and multimedia services delivery on mobile devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deploying Mobile Data Services: An Australian Case Study

    Publication Year: 2012, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2817 KB) | HTML iconHTML

    Based on the motivations of six Australian organizations, the authors propose an analytical model to help decision makers identify the complex relationships between their internal goals and targeted users when deploying mobile data services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Addressing Security and Privacy Risks in Mobile Applications

    Publication Year: 2012, Page(s):28 - 33
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2836 KB) | HTML iconHTML

    Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation. Insecure mobile applications can cause serious information security and data privacy issues and can have severe repercussions on users and organizations alike. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 4G Wireless Networks

    Publication Year: 2012, Page(s):34 - 39
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2329 KB) | HTML iconHTML

    4G wireless networks are receiving a lot of attention from researchers, wireless carriers, device manufacturers, and mobile users. This survey compares the original vision with current 4G offerings and considers future prospects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile and Wireless Communication: Space Weather Threats, Forecasts, and Risk Management

    Publication Year: 2012, Page(s):40 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2992 KB) | HTML iconHTML

    Adverse space weather can pose high risks to mobile and wireless communications. Space weather forecasts can help manage the risks. This article presents three space weather forecast models that satisfy different user needs and operational constraints. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Justice Informatics: Improving Knowledge Discovery for the Justice System

    Publication Year: 2012, Page(s):47 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3159 KB) | HTML iconHTML

    A deeper connection between the field of informatics and the justice system could empower lawyers and judges as they explore documentary evidence with enhanced knowledge-discovery tools and techniques. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BYOD: Security and Privacy Considerations

    Publication Year: 2012, Page(s):53 - 55
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (669 KB) | HTML iconHTML

    Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies and individuals involved, or thinking about getting involved with BYOD should think carefully about the risks as well as the rewards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Elusive Technology ROI

    Publication Year: 2012, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1314 KB) | HTML iconHTML

    Why is it so hard to measure the ROI on technology? How might we make some sense of the controversy surrounding IT's value? Should we let our vendors tell us what the ROI of a new technology might be at our company? Do we have all of the facts to make a legitimate prediction of ROI prior to undertaking a project, or does the ROI analysis require making a lot of "glass-half-full" conjectures? Infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Are You Communicating?

    Publication Year: 2012, Page(s):60 - 61
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    Nonverbal communication is critical when conveying a message; body language is just as important as your tone of voice. Learn about gestures, posture, facial expressions, and eye contact, so you carry yourself with confidence and can effectively read your audience and respond accordingly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Business Continuity: Beyond Disaster Recovery

    Publication Year: 2012, Page(s): 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (1023 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead

    Publication Year: 2012, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (427 KB)
    Freely Available from IEEE
  • Computing Now Expanded Website [Advertisement]

    Publication Year: 2012, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (1225 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services