By Topic

IT Professional

Issue 1 • Date Jan.-Feb. 2013

Filter Results

Displaying Results 1 - 17 of 17
  • Front Cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (4952 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (861 KB)
    Freely Available from IEEE
  • Exploring the Future of Computing

    Publication Year: 2013, Page(s):2 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (892 KB) | HTML iconHTML Multimedia Media
    Freely Available from IEEE
  • Lessons Learned from Hurricane Sandy: Maintaining Service during a Disaster

    Publication Year: 2013, Page(s):4 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2077 KB) | HTML iconHTML

    Security is often thought of primarily as protecting data from prying eyes—that is, ensuring confidentiality. But data integrity and availability are no less essential. In this issue, George Sherwood gives us a fascinating account of keeping business systems running through a major disaster. The lessons learned apply beyond natural disasters, though, and readers can find many ideas to k... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overview of Anomaly Detection

    Publication Year: 2013, Page(s):8 - 11
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT in the Chinese Healthcare Industry

    Publication Year: 2013, Page(s):12 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1330 KB) | HTML iconHTML

    China is leveraging the cloud and mobile computing to enable doctors and other healthcare professionals to collaborate, share information, and more easily access reports, scans, EMRs, lab reports, prescriptions, and medical histories. China is also garnering government support and help from various foreign companies. Here, the author reviews some of these efforts as he examine the current state an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fostering Green IT [Guest editors' introduction]

    Publication Year: 2013, Page(s):16 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (2699 KB) | HTML iconHTML
    Freely Available from IEEE
  • Enabling Green IT through Energy-Aware Software

    Publication Year: 2013, Page(s):19 - 27
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5415 KB) | HTML iconHTML

    Software behavior can significantly affect computer energy efficiency in everything from small devices up to servers in data centers. However, there are multiple techniques that software developers can use to reduce the energy consumption of drivers and applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Green Software Development Life Cycle for Cloud Computing

    Publication Year: 2013, Page(s):28 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6288 KB) | HTML iconHTML

    Cloud computing's recent proliferation has received attention from green crusaders hoping to mitigate the carbon footprint of large datacenters and IT infrastructures, but what about the software? A new framework for a greener cloud focuses on energy-efficient software development. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The US Government's Evolving Role in IT Energy Management

    Publication Year: 2013, Page(s):36 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5076 KB) | HTML iconHTML

    This review of the government's role in supporting green initiatives explores how US federal, state, and local energy-related regulatory approaches, policies, and incentives encourage firms to take the lead in conserving energy and reducing their carbon footprint. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating Green Awareness Using IT: The Case of Hong Kong

    Publication Year: 2013, Page(s):44 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7508 KB) | HTML iconHTML

    Creating green awareness through educational programs is crucial to the success of sustainable development. Several initiatives in Hong Kong use cloud technologies, online interactive games, competitions, and physical equipment to raise green awareness among high school students. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Holistic Impact-Assessment Framework for Green ICT

    Publication Year: 2013, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5657 KB) | HTML iconHTML

    A new impact-assessment framework evaluates the economic and environmental effects of information and communications technology (ICT), attempting to link such effects to policies, standards, and industrial strategies. The framework is tested on a project for cooperative and self-growing energy-aware networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Data to Decisions: A Value Chain for Big Data

    Publication Year: 2013, Page(s):57 - 59
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    With exponential growth in data, enterprises must act to make the most of the vast data landscape-to thoughtfully apply multiple technologies, carefully select key data for specific investigations, and innovatively tailor large integrated datasets to support specific queries and analyses. All these actions will flow from a data value chain-a framework to manage data holistically from capture to de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethical Dilemmas in the Workplace

    Publication Year: 2013, Page(s):60 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB) | HTML iconHTML

    Throughout our careers, there are times when we must consider whether a certain course of action is ethical. Often, the choice is easy—if you see money left out on someone's desk, you know you shouldn't take it. But there are also gray areas in which you can easily justify your behavior—but that doesn't make it ethical. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2013 Trends and Strategies

    Publication Year: 2013, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (838 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead

    Publication Year: 2013, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (429 KB)
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2013, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services