


default search action
IT Professional, Volume 7
Volume 7, Number 1, January-February 2005
- Frank Ferrante:
Welcome to a New Era of IT in 2005. 4-5 - Sorel Reisman:
Plagiarism or Ignorance? You Decide. 7-8 - H. Gilbert Miller, Richard P. Granato, John W. Feuerstein, Louis Ruffino:
Toward Interoperable First Response. 13-20 - William G. Hwang:
Bandwidth on Demand for Deployed-IP Users. 21-26 - Eleanor T. Loiacono, Scott McCoy, William Chin:
Federal Web Site Accessibility for People with Disabilities. 27-31 - Jia Zhang:
Trustworthy Web Services: Actions for Now. 32-36 - Grant A. Jacoby, Luqi:
Intranet Portal Model and Metrics: A Strategic Management Perspective. 37-44 - Samir Chatterjee, Samuel C. Yang:
Managing the Optical Networking Solution: Is Increased Bandwidth Enough to Reduce Delays? 46-50 - Jeanette Nasem Morgan:
A Roadmap of Financial Measures for IT Project ROI. 52-57 - Resources. 58-61
- Phillip A. Laplante:
The Potemkin Village and the Art of Deception. 62-64
Volume 7, Number 2, March-April 2005
- Sorel Reisman:
Can Control and Creativity Coexist? 5-6 - David K. Larson, Keith W. Miller:
Silver Bullets for Little Monsters: Making Software More Trustworthy. 9-13 - Kevin J. Ma:
Web Services: What's Real and What's Not? 14-21 - Naveen N. Kulkarni, Senthil Kumar Kumarasamy Mani, Srinivas Padmanabhuni:
Web Services: E-Commerce Partner Integration. 23-28 - Chen Zhou, Liang-Tien Chia, Bu-Sung Lee:
Semantics in Service Discovery and QoS Measurement. 29-34 - Takahiro Kawamura, Tetsuo Hasegawa, Akihiko Ohsuga, Massimo Paolucci, Katia P. Sycara:
Web Services Lookup: A Matchmaker Experiment. 36-41 - Clark Pope, Khushpreet Kaur:
Is It Human or Computer? Defending E-Commerce with Captchas. 43-49 - Yi Zhang, Xiaoli Liu, Weinong Wang:
Policy Lifecycle Model for Systems Management. 50-54 - Resources. 59-61
- Steve Gilbert:
The Emergence of the System Configurator. 62-64
Volume 7, Number 3, May-June 2005
- News Briefs. 5-9
- Linda Dailey Paulson:
No Quick Fix for Spam. 11-14 - Sorel Reisman:
Quality IT Education Strikes Out. 16-17 - H. Gilbert Miller, Henry D. Levine, Sandra N. Bates:
Welcome to Convergence: Surviving the Next Platform Change. 18-25 - Ron Weinstein:
RFID: A Technical Overview and Its Application to the Enterprise. 27-33 - Cyrille Momo:
Wireless in Africa: Insights into Mobile Markets. 34-38 - Howard G. Bernett:
Hosted Contact Centers: An Emerging Solution. 39-43 - Phillip A. Laplante, Don M. Bain:
The Changing Role of the CIO: Why IT Still Matters. 45-49 - Resources. 55-59
- Noel McCullagh:
Securing E-Mail with Identity-Based Encryption. 61-64
Volume 7, Number 4, July-August 2005
- News Briefs. 5-6
- Linda Dailey Paulson:
Is It Time You Considered VoIP? 7-10 - Linda L. Pistole, A. W. Bragg:
Making IT Outsourcing Work for Smaller Enterprises. 12-17 - James Bret Michael, Steven E. Roberts, Jeffrey M. Voas, Thomas C. Wingfield:
The Role of Policy in Balancing Outsourcing and Homeland Security. 19-23 - Rodney Roberts:
Offshoring: Individual Short-Term Gain versus Collective Long-Term Loss? 25-30 - Mark J. Power, Kevin C. Desouza
, Carlo Bonifazi:
Developing Superior Outsourcing Programs. 32-38 - Norman S. Matloff:
Offshoring: What Can Go Wrong? 39-45 - Frank Ferrante, Ron Hira:
Ron Hira: Managing the Impacts of Offshoring. 47-52 - Resources. 53-57
- Sorel Reisman:
Declining Importance of Books: Get Over It. 64-63
Volume 7, Number 5, September-October 2005
- News Briefs. 5-8
- Greg Lindstrom:
Programming with Python. 10-16 - Simon Liu, Wei Ma, Robin Moore, Vikraman Ganesan, Stuart J. Nelson:
RxNorm: Prescription for Electronic Drug Information Exchange. 17-23 - Michael Thelander:
The Great Wall Syndrome. 25-30 - Jun-Jang Jeng, Lianjun An, Kumar Bhaskaran, Henry Chang, Markus Ettl:
Sense-and-Respond Grids for Adaptive Enterprises. 33-40 - Kevin C. Desouza
:
Scenario Management: From Reactivity to Proactivity. 42-48 - Mikko T. Siponen:
Unauthorized Copying of Software: What is Wrong with the Nonexclusive Argument? 49-51 - Resources. 52-56
- Sorel Reisman:
Keeping Technology at Bay in the Classroom. 64-63
Volume 7, Number 6, November-December 2005
- Frank E. Ferrante:
IT Expanding in New Ways. 5 - News Briefs. 6-9
- Bernadette E. Clemente, Victor J. Pollara:
Mapping the Course, Marking the Trail. 10-15 - Rodney Gleghorn:
Enterprise Application Integration: A Manager's Perspective. 17-23 - Yujong Hwang, Robert A. Leitch:
Balanced Scorecard: Evening the Odds of Successful BPR. 24-30 - G. Reza Djavanshir:
Surveying the Risks and Benefits of IT Outsourcing. 32-37 - Phillip A. Laplante:
Whipping Up Some Gourmet Software. 39-42 - Patrick C. K. Hung, Marten van Sinderen:
2005 EDOC: Meeting the Challenges of Enterprise Computing. 44-45 - Resources. 47-51
- Sorel Reisman:
Higher Education: Who Cares What the Customer Wants? 62-64

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.