


default search action
IT Professional, Volume 6
Volume 6, Number 1, January-February 2004
- Frank Ferrante:

From the Editor in Chief: Fresh Perspectives, New Ideas to Start 2004. 4-5 - Sorel Reisman:

Higher Education's Role in Job Training. 6-7 - Siva Namasivayam:

Profiting from Business Process Outsourcing. 12-18 - Phillip A. Laplante, Tom Costello, Pawan Singh, Sudi Bindiganavile, Mark Landon:

The Who, What, Why, Where, and When of IT Outsourcing. 19-23 - Jeremy J. Blum

, Azim Eskandarian
:
The Threat of Intelligent Collisions. 24-29 - Darren P. Mundy, David W. Chadwick

:
An XML Alternative for Performance and Security: ASN.1. 30-36 - Jay Liebowitz:

Teaching the Importance of Communication in IT. 38-42 - See-Kiong Ng, Limsoon Wong:

Accomplishments and Challenges in Bioinformatics. 44-50 - Zhangxi Lin, Gary D. Anderson, T. J. Anderson:

Web-Based Services for Real Estate: Model and Implementation. 52-57 - Resources. 58-60

- Ciro D'Urso:

Toward a Cooperative Architecture for Delivering Government Services, Part 2. 61-64
Volume 6, Number 2, March-April 2004
- Sorel Reisman:

Insourcing or Outsourcing? That is the Question. 4 - Letters. 5-6

- John D. Hwang, Simon Liu:

Successful CIOs: Pushing the IT Business Value Envelope. 10-16 - Marti Szczur:

Delivering Environmental Health Information. 18-24 - Grid Computing 101: What's All the Fuss About? 25-33

- Lavanya Ramakrishnan:

Securing Next-Generation Grids. 34-39 - Wing Lam, Venky Shankararaman:

An Enterprise Integration Methodology. 40-48 - Susan Moore:

Managing the Radio Spectrum: Hands-On or Back-Off? 49-55 - Phillip A. Laplante:

Staying Clear of Boiling-Frog Syndrome. 56-58 - Resources. 59-63

- Ryan A. MacMichael:

Cleaning Up the Clutter: Why Web Standards Matter. 62-64
Volume 6, Number 3, May-June 2004
- Sorel Reisman:

Expecting Success Against All Odds. 8-9 - Shyhtsun Felix Wu, Henric Johnson, Arne A. Nilsson:

SOLA: Lightweight Security for Access Control in IEEE 802.11. 10-16 - Thomas C. Jepsen:

The Basics of Reliable Distributed Storage Networks. 18-24 - Stefano Testa, Wesley Chou:

The Distributed Data Center: Front-End Solutions. 26-32 - Paul Herceg, David Madison:

Multichannel Customer Contact Management. 33-40 - Linda Ibrahim, Arthur B. Pyster:

A Single Model for Process Improvement. 43-49 - Carla Merrill, Diane Feldman:

Rethinking the Path to Usability: How to Design What Users Really Want. 51-57 - Resources. 60-61

- Bob Lewis:

To Learn Team-Building, Ask The Dirty Dozen. 62-64
Volume 6, Number 4, July 2004
- Liang-Jie Zhang

, Haifei Li, Herman Lam:
Services Computing: Grid Applications for Today. 5-7 - Sorel Reisman:

CIOs: The Only Competent University Administrators. 8-9 - Thomas C. Jepsen, Phillip A. Laplante, Joseph Williams, Ken Christensen, Dan Ferrante, J. Morris Chang, Gilbert Miller:

Software in the New Millennium: A Virtual Roundtable. 10-17 - Nan Chen, Kai-Kuang Ma:

Java's Future: Challenge and Opportunity. 19-26 - Simon Liu, Wei Ma, Dale Schalow, Kevin Spruill:

Improving Web Access for Visually Impaired Users. 28-33 - Steve Gilbert:

Wearing Two Hats: Analyst-Managers for Small Software Projects. 34-39 - Ray Ashman:

Project Estimation: A Simple Use-Case-Based Model. 40-44 - Jeffrey M. Voas, William W. Agresti:

Software Quality from a Behavioral Perspective. 46-50 - Murat Erder, Pierre Pureur:

Defining Business Requirements Quickly and Accurately. 51-56 - Resources. 58-60

- William W. Agresti:

CE2IT: Continuous Ethics Enhancement for IT Professionals. 61-64
Volume 6, Number 5, September-October 2004
- Sorel Reisman:

Distance Learning versus Being There. 8-10 - Effective Leadership: Best from a Distance? 11

- William Post:

Building Minds, Not Widgets: Technology for the Business of Learning. 12-18 - Colin J. Neill, Ganesh Shanmuganthan:

A Web-Enabled Plagiarism Detection Tool. 19-23 - Wes Ames:

Understanding Spyware: Risk and Response. 25-29 - William Stallings:

IEEE 802.11: Wireless LANs from a to n. 32-37 - Stan Magee, Doug Thiele:

Engineering Process Standards: State of the Art and Challenges. 38-44 - Walt Truszkowski, Mike Hinchey, James L. Rash, Christopher A. Rouff:

NASA's Swarm Missions: The Challenge of Building Autonomous Software. 47-52 - Brian A. Malloy, Jeffrey M. Voas:

Programming with Assertions: A Prospectus. 53-59 - Resources. 60-61

- Liang-Jie Zhang

, Haifei Li, Herman Lam:
Toward a Business Process Grid for Utility Computing. 62-64
Volume 6, Number 6, November-December 2004
- Sorel Reisman:

Teleconferencing and the New Meeting Behavior. 5-6 - Frank Timons:

Smarter Storage Technology Ahead in 2010. 8-10 - Terry Bollinger:

Software in the Year 2010. 11-15 - Paula Rice:

Maintaining Work-Life Balance in 2010. 16-17 - Joseph Williams:

IT Education: More Specialized in 2010. 18-20 - Heather McCallum-Bayliss:

Identity Resolution in a Global Environment. 21-26 - Sarah M. Taylor:

Information Extraction Tools: Deciphering Human Language. 28-34 - Ashish Arora

, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, Rahul Telang
:
Measuring the Risk-Based Value of IT Security Solutions. 35-42 - Jay Brusse, Michael Sampson:

Zinc Whiskers: Hidden Cause of Equipment Failure. 43-47 - Michael Thelander:

IT and the $8 Billion Electric Bill. 49-56 - Resources. 63-64


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














