default search action
IT Professional, Volume 6
Volume 6, Number 1, January-February 2004
- Frank Ferrante:
From the Editor in Chief: Fresh Perspectives, New Ideas to Start 2004. 4-5 - Sorel Reisman:
Higher Education's Role in Job Training. 6-7 - Siva Namasivayam:
Profiting from Business Process Outsourcing. 12-18 - Phillip A. Laplante, Tom Costello, Pawan Singh, Sudi Bindiganavile, Mark Landon:
The Who, What, Why, Where, and When of IT Outsourcing. 19-23 - Jeremy J. Blum, Azim Eskandarian:
The Threat of Intelligent Collisions. 24-29 - Darren P. Mundy, David W. Chadwick:
An XML Alternative for Performance and Security: ASN.1. 30-36 - Jay Liebowitz:
Teaching the Importance of Communication in IT. 38-42 - See-Kiong Ng, Limsoon Wong:
Accomplishments and Challenges in Bioinformatics. 44-50 - Zhangxi Lin, Gary D. Anderson, T. J. Anderson:
Web-Based Services for Real Estate: Model and Implementation. 52-57 - Resources. 58-60
- Ciro D'Urso:
Toward a Cooperative Architecture for Delivering Government Services, Part 2. 61-64
Volume 6, Number 2, March-April 2004
- Sorel Reisman:
Insourcing or Outsourcing? That is the Question. 4 - Letters. 5-6
- John D. Hwang, Simon Liu:
Successful CIOs: Pushing the IT Business Value Envelope. 10-16 - Marti Szczur:
Delivering Environmental Health Information. 18-24 - Grid Computing 101: What's All the Fuss About? 25-33
- Lavanya Ramakrishnan:
Securing Next-Generation Grids. 34-39 - Wing Lam, Venky Shankararaman:
An Enterprise Integration Methodology. 40-48 - Susan Moore:
Managing the Radio Spectrum: Hands-On or Back-Off? 49-55 - Phillip A. Laplante:
Staying Clear of Boiling-Frog Syndrome. 56-58 - Resources. 59-63
- Ryan A. MacMichael:
Cleaning Up the Clutter: Why Web Standards Matter. 62-64
Volume 6, Number 3, May-June 2004
- Sorel Reisman:
Expecting Success Against All Odds. 8-9 - Shyhtsun Felix Wu, Henric Johnson, Arne A. Nilsson:
SOLA: Lightweight Security for Access Control in IEEE 802.11. 10-16 - Thomas C. Jepsen:
The Basics of Reliable Distributed Storage Networks. 18-24 - Stefano Testa, Wesley Chou:
The Distributed Data Center: Front-End Solutions. 26-32 - Paul Herceg, David Madison:
Multichannel Customer Contact Management. 33-40 - Linda Ibrahim, Arthur B. Pyster:
A Single Model for Process Improvement. 43-49 - Carla Merrill, Diane Feldman:
Rethinking the Path to Usability: How to Design What Users Really Want. 51-57 - Resources. 60-61
- Bob Lewis:
To Learn Team-Building, Ask The Dirty Dozen. 62-64
Volume 6, Number 4, July 2004
- Liang-Jie Zhang, Haifei Li, Herman Lam:
Services Computing: Grid Applications for Today. 5-7 - Sorel Reisman:
CIOs: The Only Competent University Administrators. 8-9 - Thomas C. Jepsen, Phillip A. Laplante, Joseph Williams, Ken Christensen, Dan Ferrante, J. Morris Chang, Gilbert Miller:
Software in the New Millennium: A Virtual Roundtable. 10-17 - Nan Chen, Kai-Kuang Ma:
Java's Future: Challenge and Opportunity. 19-26 - Simon Liu, Wei Ma, Dale Schalow, Kevin Spruill:
Improving Web Access for Visually Impaired Users. 28-33 - Steve Gilbert:
Wearing Two Hats: Analyst-Managers for Small Software Projects. 34-39 - Ray Ashman:
Project Estimation: A Simple Use-Case-Based Model. 40-44 - Jeffrey M. Voas, William W. Agresti:
Software Quality from a Behavioral Perspective. 46-50 - Murat Erder, Pierre Pureur:
Defining Business Requirements Quickly and Accurately. 51-56 - Resources. 58-60
- William W. Agresti:
CE2IT: Continuous Ethics Enhancement for IT Professionals. 61-64
Volume 6, Number 5, September-October 2004
- Sorel Reisman:
Distance Learning versus Being There. 8-10 - Effective Leadership: Best from a Distance? 11
- William Post:
Building Minds, Not Widgets: Technology for the Business of Learning. 12-18 - Colin J. Neill, Ganesh Shanmuganthan:
A Web-Enabled Plagiarism Detection Tool. 19-23 - Wes Ames:
Understanding Spyware: Risk and Response. 25-29 - William Stallings:
IEEE 802.11: Wireless LANs from a to n. 32-37 - Stan Magee, Doug Thiele:
Engineering Process Standards: State of the Art and Challenges. 38-44 - Walt Truszkowski, Mike Hinchey, James L. Rash, Christopher A. Rouff:
NASA's Swarm Missions: The Challenge of Building Autonomous Software. 47-52 - Brian A. Malloy, Jeffrey M. Voas:
Programming with Assertions: A Prospectus. 53-59 - Resources. 60-61
- Liang-Jie Zhang, Haifei Li, Herman Lam:
Toward a Business Process Grid for Utility Computing. 62-64
Volume 6, Number 6, November-December 2004
- Sorel Reisman:
Teleconferencing and the New Meeting Behavior. 5-6 - Frank Timons:
Smarter Storage Technology Ahead in 2010. 8-10 - Terry Bollinger:
Software in the Year 2010. 11-15 - Paula Rice:
Maintaining Work-Life Balance in 2010. 16-17 - Joseph Williams:
IT Education: More Specialized in 2010. 18-20 - Heather McCallum-Bayliss:
Identity Resolution in a Global Environment. 21-26 - Sarah M. Taylor:
Information Extraction Tools: Deciphering Human Language. 28-34 - Ashish Arora, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, Rahul Telang:
Measuring the Risk-Based Value of IT Security Solutions. 35-42 - Jay Brusse, Michael Sampson:
Zinc Whiskers: Hidden Cause of Equipment Failure. 43-47 - Michael Thelander:
IT and the $8 Billion Electric Bill. 49-56 - Resources. 63-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.