By Topic

IT Professional

Issue 5 • Sept.-Oct. 2013

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2013, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (576 KB)
    Freely Available from IEEE
  • Engineering the Success of Software Development

    Publication Year: 2013, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (222 KB) | HTML iconHTML
    Freely Available from IEEE
  • Who's Afraid of Big Data?

    Publication Year: 2013, Page(s):6 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Recently, there has been a great deal of news in the international media pertaining to various disclosures that governments--the US government, in particular--are collecting vast amounts of information from diverse sources in the interest of counterterrorism. Telephone information is being recorded in unprecedented volumes, and surface mail is being scanned. Furthermore, the movement of vehicles c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Apps in Africa

    Publication Year: 2013, Page(s):8 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1413 KB) | HTML iconHTML

    African software developers are creating and embracing mobile technologies, cloud com-puting, and social media to address their needs in many areas, including banking, informa-tion gathering, farming, healthcare, and education and training. However, in developing such apps, software developers face harsh realities in Africa in terms of the mobile phones and services people can afford and limitatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoiding Accidental Data Loss

    Publication Year: 2013, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB) | HTML iconHTML

    Does your organization have systematic procedures to remove sensitive data from obsolete equipment, or do you use a somewhat ad hoc process for the cleanup and disposal of old gear? Careless disposal of data storage hardware has led to costly and embarrassing incidents for organizations that discovered too late that their control over media sanitization was inadequate. The guidelines presented her... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational Business Intelligence: Processing Mixed Workloads

    Publication Year: 2013, Page(s):16 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4067 KB) | HTML iconHTML

    Modern business applications have operational business intelligence features that require processing analytical queries and business transactions together at the same time and on the same data. This results in mixed workloads, which are a big challenge for current database management systems. Cloud computing fosters the development of data management systems optimized for specific application scen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Process-Mining Techniques

    Publication Year: 2013, Page(s):22 - 30
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3290 KB) | HTML iconHTML

    Semi-structured processes are data-driven, human-centric, flexible processes whose execution between instances can vary dramatically. Due to their unpredictability and data-driven nature, it's becoming increasingly important to mine traces of events collected from these processes. This enables the extraction of mined process models that could help users handle new process instances. Process-mining... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal Medical Monitoring System: Addressing Interoperability

    Publication Year: 2013, Page(s):31 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6381 KB) | HTML iconHTML

    This study proposes a new two-in-one medical monitoring system that lets medical devices transmit vital sign data to an application host device on a network. The medical monitoring system is based on international standards, providing an interoperable platform. On this platform, personal healthcare systems use a Bluetooth Health Device Profile interface to exchange measurement data that's complian... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Smart Healthcare Systems Framework

    Publication Year: 2013, Page(s):38 - 45
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3083 KB) | HTML iconHTML

    A cost-effective and sustainable healthcare information system relies on the ability to collect, process, and transform healthcare data into information, knowledge, and action. However, in implementing such systems, healthcare providers face many complex and unique challenges. This article proposes a systematic framework for conceptualizing data-driven and mobile- and cloud-enabled smart healthcar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Market-Driven Software Ecosystem

    Publication Year: 2013, Page(s):46 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1481 KB) | HTML iconHTML

    The success of a software product depends not only on the quality of the functions it provides but also on the success of its interdependent hardware, software, and other players within its ecosystem. The software ecosystem studied thus far has largely ignored the importance of the market, which is the ecosystem's energy source. The market affects all players in the ecosystem, determining whether ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STEM's Grand Challenge: Reviving Applied Mathematics

    Publication Year: 2013, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (835 KB) | HTML iconHTML

    Math readiness presents a real challenge for both K-12 and college-level education. It affects mathematically intensive science, technology, engineering, and mathematics (STEM) fields of endeavor and threatens our readiness to invent and adapt. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Frameworks

    Publication Year: 2013, Page(s): 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3609 KB) | HTML iconHTML

    This article is a collection of papers collected from the nonprofits that run three critical frameworks in use by IT organizations around the globe–the Project Management Institute, Capability Maturity Model Integration, and the Innovation Value Institute. These papers outline the current state and future direction of these organizations and their frameworks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services