By Topic

IT Professional

Issue 2 • Date Mar.-Apr. 2014

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2014, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (5000 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1149 KB)
    Freely Available from IEEE
  • Will You Ever Need an Exit Strategy?

    Publication Year: 2014, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (230 KB) | HTML iconHTML
    Freely Available from IEEE
  • Contextual Mobile Apps: Avoiding the "Big Brother" Fallout

    Publication Year: 2014, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (946 KB) | HTML iconHTML

    As smartphones and tablets become more integrated into our lives, mobile applications provide an unprecedented opportunity to engage users. One of the more dramatic shifts with mobile apps is the use of contextual information to make them more relevant to the user. This use of contextual information creates unique opportunities as well as risks for government agencies, with the main question being... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Masterminds of the Electronic Digital Computer

    Publication Year: 2014, Page(s):10 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    This installment profiles John Atanasoff, John Mauchly, and John von Neumann--the "fathers of the electronic digital computer". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST: Building a Solid Foundation

    Publication Year: 2014, Page(s):13 - 16
    Request permission for commercial reuse | PDF file iconPDF (858 KB) | HTML iconHTML
    Freely Available from IEEE
  • Test Generation Using Model Checking and Specification Mutation

    Publication Year: 2014, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1280 KB) | HTML iconHTML

    Although building quality into software is paramount, professionals find that testing is necessary to assure that the system will operate as desired. Developing tests can take significant resources. In 1998, NIST showed how tests can be automatically generated from models using model checkers and specification mutation. This was an early result in what is now a broad area known as "model-based tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Better Search Engines by Measuring Search Quality

    Publication Year: 2014, Page(s):22 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1454 KB) | HTML iconHTML

    Search engines help users locate information within large stores of content developed for human consumption. For example, users expect Web search engines to direct searchers to websites based on the content of the site rather than the site address, and future video search engines to return video clips based on the actions recorded in the clip rather than filenames and donor tags. Search engines ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST and Computer Security

    Publication Year: 2014, Page(s):31 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1014 KB) | HTML iconHTML

    The US National Institute of Standards and Technology's highly visible work in four key areas - cryptographic standards, role-based access control, identification card standards, and security automation - as and continues to shape computer and information security at both national and global levels. This article is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST Contributions to Biometric Technology

    Publication Year: 2014, Page(s):38 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1299 KB) | HTML iconHTML

    NIST has been at the forefront of IT applications to biometrics and identity management for almost 50 years. Early work revolved around developing hardware and software to automate the analysis of fingerprint images and to develop speech-recognition capabilities. As the biometrics industry grew, NIST developed publicly available datasets and testing procedures for evaluating the performance of aca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NIST Contributions to IT

    Publication Year: 2014, Page(s):45 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    This Spotlight piece provides an overview of some of the US National Institute of Standards and Technology's contributions to the IT field over the last 70 years. This department is part of a special issue on NIST contributions to IT. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Cloud Database Systems

    Publication Year: 2014, Page(s):50 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    This survey of 15 popular cloud databases provides an overview of each system and its storage platform, license type, and programming language used for writing the source code of the NoSQLs. It also considers important features such as data handling techniques and billing practices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Digital Transformation: Staying Competitive

    Publication Year: 2014, Page(s):58 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Today's information technologies accelerate the speed at which enterprises make decisions, process information, and collaborate to solve problems, but do they provide a competitive advantage? Only if the organization transforms how it does business--using the same old approaches with new software aren't sufficient. The pace of collaboration, problem solving, innovation, and value creation has been... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hands-On CIO Tackles Healthcare IT

    Publication Year: 2014, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (419 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2014, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • IT Security [advertisement]

    Publication Year: 2014, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services