By Topic

IT Professional

Issue 5 • Date Sept.-Oct. 2013

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (190 KB)  
    Freely Available from IEEE
  • Masthead

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (167 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (576 KB)  
    Freely Available from IEEE
  • Engineering the Success of Software Development

    Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (222 KB)  
    Freely Available from IEEE
  • Who's Afraid of Big Data?

    Page(s): 6 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (282 KB)  

    Recently, there has been a great deal of news in the international media pertaining to various disclosures that governments--the US government, in particular--are collecting vast amounts of information from diverse sources in the interest of counterterrorism. Telephone information is being recorded in unprecedented volumes, and surface mail is being scanned. Furthermore, the movement of vehicles can be tracked by toll transponders, GPS, black boxes, and imaging devices. What's even more disturbing is that much of this information is probably being kept for later analysis. Using Google technology, this information can be indexed and mined for all kinds of transgressions, beyond scanning for terrorist-threat indicators or conducting forensic analysis of terrorist acts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Apps in Africa

    Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1413 KB)  

    African software developers are creating and embracing mobile technologies, cloud com-puting, and social media to address their needs in many areas, including banking, informa-tion gathering, farming, healthcare, and education and training. However, in developing such apps, software developers face harsh realities in Africa in terms of the mobile phones and services people can afford and limitations in bandwidth, coverage, and electric power. Learn how developers are overcoming such limitations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoiding Accidental Data Loss

    Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (779 KB)  

    Does your organization have systematic procedures to remove sensitive data from obsolete equipment, or do you use a somewhat ad hoc process for the cleanup and disposal of old gear? Careless disposal of data storage hardware has led to costly and embarrassing incidents for organizations that discovered too late that their control over media sanitization was inadequate. The guidelines presented here will help organizations review their sanitization procedures and develop a more sound process if needed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational Business Intelligence: Processing Mixed Workloads

    Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4067 KB)  

    Modern business applications have operational business intelligence features that require processing analytical queries and business transactions together at the same time and on the same data. This results in mixed workloads, which are a big challenge for current database management systems. Cloud computing fosters the development of data management systems optimized for specific application scenarios. The authors propose an architecture for software-as-a-service business applications that helps process these mixed workloads with a special-purpose main-memory database system, while meeting strict service-level objectives with stringent response-time and throughput guarantees. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Process-Mining Techniques

    Page(s): 22 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3290 KB)  

    Semi-structured processes are data-driven, human-centric, flexible processes whose execution between instances can vary dramatically. Due to their unpredictability and data-driven nature, it's becoming increasingly important to mine traces of events collected from these processes. This enables the extraction of mined process models that could help users handle new process instances. Process-mining techniques can help facilitate this goal, but it can be daunting for users new to process-aware analytics to sift through the literature and available software to determine which process-mining algorithm to use. The authors compare five process-mining algorithms and present a decision tree to help readers determine which mining algorithm to use for a specific problem. Semi-structured processes, however, present challenges that these mining techniques don't address. So, the authors also identify three key characteristics of semi-structured processes and the mining challenges they present, highlighting a selection of emerging mining approaches that can address these challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal Medical Monitoring System: Addressing Interoperability

    Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6381 KB)  

    This study proposes a new two-in-one medical monitoring system that lets medical devices transmit vital sign data to an application host device on a network. The medical monitoring system is based on international standards, providing an interoperable platform. On this platform, personal healthcare systems use a Bluetooth Health Device Profile interface to exchange measurement data that's compliant with the data exchange protocol ISO/IEEE 11073-20601 and with the data device specifications of the ISO/IEEE 11073-104zz series of standards. The medical monitoring system is the first dual-meter device providing both blood glucose and blood pressure measurements certified by Continua Health Alliance, an international organization. This medical monitoring system meets conformance requirements as well as basic interoperability requirements with other Continua certified devices. Using the system, users can measure their vital signs, blood pressure, and blood glucose and transmit the data to any Continua application host device without an interoperability problem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Smart Healthcare Systems Framework

    Page(s): 38 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3083 KB)  

    A cost-effective and sustainable healthcare information system relies on the ability to collect, process, and transform healthcare data into information, knowledge, and action. However, in implementing such systems, healthcare providers face many complex and unique challenges. This article proposes a systematic framework for conceptualizing data-driven and mobile- and cloud-enabled smart healthcare systems. With adoption of smart healthcare systems, healthcare organizations can provide cost-effective quality healthcare services with less IT set-up costs and reduced risk. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Market-Driven Software Ecosystem

    Page(s): 46 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1481 KB)  

    The success of a software product depends not only on the quality of the functions it provides but also on the success of its interdependent hardware, software, and other players within its ecosystem. The software ecosystem studied thus far has largely ignored the importance of the market, which is the ecosystem's energy source. The market affects all players in the ecosystem, determining whether the software product can succeed. The author analyzes this market-driven software ecosystem in both the open source and mobile computing communities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STEM's Grand Challenge: Reviving Applied Mathematics

    Page(s): 51 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (835 KB)  

    Math readiness presents a real challenge for both K-12 and college-level education. It affects mathematically intensive science, technology, engineering, and mathematics (STEM) fields of endeavor and threatens our readiness to invent and adapt. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Frameworks

    Page(s): 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3609 KB)  

    This article is a collection of papers collected from the nonprofits that run three critical frameworks in use by IT organizations around the globe–the Project Management Institute, Capability Maturity Model Integration, and the Innovation Value Institute. These papers outline the current state and future direction of these organizations and their frameworks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services