By Topic

IT Professional

Issue 2 • Date Mar.-Apr. 2014

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2014 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (5000 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1149 KB)  
    Freely Available from IEEE
  • Will You Ever Need an Exit Strategy?

    Publication Year: 2014 , Page(s): 4 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (230 KB)  
    Freely Available from IEEE
  • Contextual Mobile Apps: Avoiding the "Big Brother" Fallout

    Publication Year: 2014 , Page(s): 7 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (946 KB)  

    As smartphones and tablets become more integrated into our lives, mobile applications provide an unprecedented opportunity to engage users. One of the more dramatic shifts with mobile apps is the use of contextual information to make them more relevant to the user. This use of contextual information creates unique opportunities as well as risks for government agencies, with the main question being how much user information the government can gather without being perceived as George Orwell's "Big Brother". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masterminds of the Electronic Digital Computer

    Publication Year: 2014 , Page(s): 10 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (856 KB)  

    This installment profiles John Atanasoff, John Mauchly, and John von Neumann--the "fathers of the electronic digital computer". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST: Building a Solid Foundation

    Publication Year: 2014 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | PDF file iconPDF (858 KB)  
    Freely Available from IEEE
  • Test Generation Using Model Checking and Specification Mutation

    Publication Year: 2014 , Page(s): 17 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1280 KB)  

    Although building quality into software is paramount, professionals find that testing is necessary to assure that the system will operate as desired. Developing tests can take significant resources. In 1998, NIST showed how tests can be automatically generated from models using model checkers and specification mutation. This was an early result in what is now a broad area known as "model-based testing." NIST also modified the same technology to measure the coverage of test suites independent of implementation details. This article is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Better Search Engines by Measuring Search Quality

    Publication Year: 2014 , Page(s): 22 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1454 KB)  

    Search engines help users locate information within large stores of content developed for human consumption. For example, users expect Web search engines to direct searchers to websites based on the content of the site rather than the site address, and future video search engines to return video clips based on the actions recorded in the clip rather than filenames and donor tags. Search engines are developed using standard sets of realistic test cases that allow developers to measure the relative effectiveness of alternative approaches. The NIST Text Retrieval Conference (TREC) project has been instrumental in creating the necessary infrastructure to measure the quality of search results for more than 20 years, and has thus helped fuel the recent explosive growth in search-related technologies. This article is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST and Computer Security

    Publication Year: 2014 , Page(s): 31 - 37
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1014 KB)  

    The US National Institute of Standards and Technology's highly visible work in four key areas - cryptographic standards, role-based access control, identification card standards, and security automation - as and continues to shape computer and information security at both national and global levels. This article is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST Contributions to Biometric Technology

    Publication Year: 2014 , Page(s): 38 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1299 KB)  

    NIST has been at the forefront of IT applications to biometrics and identity management for almost 50 years. Early work revolved around developing hardware and software to automate the analysis of fingerprint images and to develop speech-recognition capabilities. As the biometrics industry grew, NIST developed publicly available datasets and testing procedures for evaluating the performance of academic and commercial algorithms and equipment. These efforts have included giving researchers and vendors self-assessment tools to spur innovation. In addition, NIST developed challenges and evaluations using sequestered data with publicly published results. The standardization of data interchange and the development of best-practice guidelines as well as data-quality evaluation tools have been essential in NIST's work to foster reliability, fidelity, and accuracy in biometric data processing. This article is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST Contributions to IT

    Publication Year: 2014 , Page(s): 45 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (444 KB)  

    This Spotlight piece provides an overview of some of the US National Institute of Standards and Technology's contributions to the IT field over the last 70 years. This department is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Cloud Database Systems

    Publication Year: 2014 , Page(s): 50 - 57
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (712 KB)  

    This survey of 15 popular cloud databases provides an overview of each system and its storage platform, license type, and programming language used for writing the source code of the NoSQLs. It also considers important features such as data handling techniques and billing practices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Digital Transformation: Staying Competitive

    Publication Year: 2014 , Page(s): 58 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB)  

    Today's information technologies accelerate the speed at which enterprises make decisions, process information, and collaborate to solve problems, but do they provide a competitive advantage? Only if the organization transforms how it does business--using the same old approaches with new software aren't sufficient. The pace of collaboration, problem solving, innovation, and value creation has been increasing as new enabling tools emerge, resulting in a cycle in which innovation leads to new inventions. For example, the development of knowledge bases presented an innovative way to collaborate, which in turn lead to inventions in many fields. Some might assume that this process creates an advantage, but in reality, almost everyone else is developing these tools at the same time. New capabilities are evolving in the context of an ecosystem of competitors, all of whom are trying to do the same thing. The key is to leverage new tools and approaches faster than others in your industry, creating differentiated value for the customer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hands-On CIO Tackles Healthcare IT

    Publication Year: 2014 , Page(s): 64
    Save to Project icon | Request Permissions | PDF file iconPDF (419 KB)  
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2014 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (169 KB)  
    Freely Available from IEEE
  • IT Security [advertisement]

    Publication Year: 2014 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE

Aims & Scope

IT Professional is a bimonthly publication of the IEEE Computer Society for the developers and managers of enterprise information systems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services