By Topic

IT Professional

Issue 2 • Date March-April 2013

Filter Results

Displaying Results 1 - 17 of 17
  • Front Cover

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2043 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2013, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (622 KB)
    Freely Available from IEEE
  • Beyond the Cloud: Cyberphysical Systems

    Publication Year: 2013, Page(s):2 - 4
    Request permission for commercial reuse | PDF file iconPDF (991 KB) | HTML iconHTML
    Freely Available from IEEE
  • Government Risk Management Lags behind Vendor Practices

    Publication Year: 2013, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (785 KB) | HTML iconHTML

    Current US law and government IT policy take a limited a view of the potential conflicts between existing government information privacy and security standards and actual vendor data collection practices. As a result, procurement requirements lack appropriate risk-management and enforcement mechanisms. Given the proliferation of data collection practices in Internet services companies, government ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical Records and Software Trust

    Publication Year: 2013, Page(s):8 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    The rapidly growing use of medical software raises many ethical and privacy issues. This column builds on a previous IT Ethics column, which presented a model of trust focused around software. The authors map out different trust relationships that exist between stakeholders in medical record automation to master the trust issues in this complex sociotechnical system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud Computing

    Publication Year: 2013, Page(s):12 - 14
    Cited by:  Papers (6)
    Request permission for commercial reuse | PDF file iconPDF (775 KB) | HTML iconHTML
    Freely Available from IEEE
  • Solar-Powered Cloud Computing Datacenters

    Publication Year: 2013, Page(s):15 - 21
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2270 KB) | HTML iconHTML

    In the developing world, reliable and affordable electricity isn't always available, presenting challenges for the Western "bigger is better" datacenter model. A small-scale, cloud computing datacenter, however, could leverage recent technological breakthroughs to instead rely on solar energy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Insecurity of Cloud Utility Models

    Publication Year: 2013, Page(s):22 - 27
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2335 KB) | HTML iconHTML

    Cloud-based services are vulnerable to attacks that seek to exploit the pay-as-you-go pricing model. A botnet could perform fraudulent resource consumption (FRC) by consuming the bandwidth of Web-based services, thereby increasing the cloud consumer's financial burden. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Efficient Virtual Machine Consolidation

    Publication Year: 2013, Page(s):28 - 34
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2290 KB) | HTML iconHTML

    A novel approach to virtual machine (VM) consolidation, based on energy-efficient storage migration and live VM migration, is implemented using Eucalyptus, an open source clone of the Amazon Elastic Compute Cloud. Several experiments demonstrate the potential energy savings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Model Checking to Evaluate Live Migrations

    Publication Year: 2013, Page(s):36 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2335 KB) | HTML iconHTML

    Server virtualization technologies and their live migration function support more efficient use of computing resources in cloud datacenters. However, many management operations for virtual machines can be evoked simultaneously in large-scale systems. What happens if many live migrations are executed simultaneously? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Certified Biometrics Professional Advertisement

    Publication Year: 2013, Page(s): 35
    Request permission for commercial reuse | PDF file iconPDF (1091 KB)
    Freely Available from IEEE
  • A Digital Signature Architecture for Web Apps

    Publication Year: 2013, Page(s):42 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3104 KB)

    This digital signature architecture provides browser-agnostic, client-side signature components and generic server-side signature validation components to help integrate signatures into Web applications. The authors also discuss ways to extend HTML syntax to support signatures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Micropreneurs: The Rise of the MicroISV

    Publication Year: 2013, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2769 KB) | HTML iconHTML

    Micro Independent Software Vendors (microISVs) are small software businesses operated by entrepreneurs who build and sell shrink-wrapped, noncustom software. The microISV Research Alliance at Auburn University conducted a survey, identifying challenges associated with building and operating such businesses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Courses for the Masses?

    Publication Year: 2013, Page(s):57 - 59
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB) | HTML iconHTML

    Massively open online courses (MOOCs) promise free, high-quality, university-course content to anyone with Internet access, but in reality, they're no substitute for credit-bearing university courses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changing Jobs

    Publication Year: 2013, Page(s):60 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (785 KB) | HTML iconHTML

    You've decided to change jobs but aren't sure how to proceed. This is this first in a series of three articles to help you on that path. This first installment addresses the job search, application process, and interview. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Is IT Still Broken?

    Publication Year: 2013, Page(s): 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (877 KB) | HTML iconHTML

    Why hasn't IT delivered the promises envisioned 20 years ago? Some likely culprits include uninformed business management teams, poor project and portfolio management, low participation from business executives and sponsors on IT-enabled business projects, and an ill-prepared multigenerational workforce. The authors examine these four potential problem areas and highlight solutions for improvement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masthead

    Publication Year: 2013, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (438 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services