Journal: IT Professional

Volume 6, Issue 6

5 -- 6Sorel Reisman. Teleconferencing and the New Meeting Behavior
8 -- 10Frank Timons. Smarter Storage Technology Ahead in 2010
11 -- 15Terry Bollinger. Software in the Year 2010
16 -- 17Paula Rice. Maintaining Work-Life Balance in 2010
18 -- 20Joseph Williams. IT Education: More Specialized in 2010
28 -- 34Sarah M. Taylor. Information Extraction Tools: Deciphering Human Language
35 -- 42Ashish Arora, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, Rahul Telang. Measuring the Risk-Based Value of IT Security Solutions
43 -- 47Jay Brusse, Michael Sampson. Zinc Whiskers: Hidden Cause of Equipment Failure
49 -- 56Michael Thelander. IT and the 8 Billion Electric Bill
63 -- 64. Resources

Volume 6, Issue 5

8 -- 10Sorel Reisman. Distance Learning versus Being There
12 -- 18William Post. Building Minds, Not Widgets: Technology for the Business of Learning
19 -- 23Colin J. Neill, Ganesh Shanmuganthan. A Web-Enabled Plagiarism Detection Tool
25 -- 29Wes Ames. Understanding Spyware: Risk and Response
32 -- 37William Stallings. IEEE 802.11: Wireless LANs from a to n
38 -- 44Stan Magee, Doug Thiele. Engineering Process Standards: State of the Art and Challenges
47 -- 52Walt Truszkowski, Mike Hinchey, James L. Rash, Christopher Rouff. NASA s Swarm Missions: The Challenge of Building Autonomous Software
53 -- 59Brian A. Malloy, Jeffrey M. Voas. Programming with Assertions: A Prospectus
60 -- 61. Resources
62 -- 64Liang-Jie Zhang, Haifei Li, Herman Lam. Toward a Business Process Grid for Utility Computing

Volume 6, Issue 4

5 -- 7Liang-Jie Zhang, Haifei Li, Herman Lam. Services Computing: Grid Applications for Today
8 -- 9Sorel Reisman. CIOs: The Only Competent University Administrators
10 -- 17Thomas C. Jepsen, Phillip A. Laplante, Joseph Williams, Ken Christensen, Dan Ferrante, J. Morris Chang, Gilbert Miller. Software in the New Millennium: A Virtual Roundtable
19 -- 26Nan Chen, Kai-Kuang Ma. Java s Future: Challenge and Opportunity
28 -- 33Simon Liu, Wei Ma, Dale Schalow, Kevin Spruill. Improving Web Access for Visually Impaired Users
34 -- 39Steve Gilbert. Wearing Two Hats: Analyst-Managers for Small Software Projects
46 -- 50Jeffrey M. Voas, William W. Agresti. Software Quality from a Behavioral Perspective
51 -- 56Murat Erder, Pierre Pureur. Defining Business Requirements Quickly and Accurately
61 -- 64William W. Agresti. CE2IT: Continuous Ethics Enhancement for IT Professionals

Volume 6, Issue 3

8 -- 9Sorel Reisman. Expecting Success Against All Odds
10 -- 16Shyhtsun Felix Wu, Henric Johnson, Arne A. Nilsson. SOLA: Lightweight Security for Access Control in IEEE 802.11
18 -- 24Thomas C. Jepsen. The Basics of Reliable Distributed Storage Networks
26 -- 32Stefano Testa, Wesley Chou. The Distributed Data Center: Front-End Solutions
33 -- 40Paul Herceg, David Madison. Multichannel Customer Contact Management
43 -- 49Linda Ibrahim, Arthur B. Pyster. A Single Model for Process Improvement
51 -- 57Carla Merrill, Diane Feldman. Rethinking the Path to Usability: How to Design What Users Really Want
62 -- 64Bob Lewis. To Learn Team-Building, Ask The Dirty Dozen

Volume 6, Issue 2

4 -- 0Sorel Reisman. Insourcing or Outsourcing? That is the Question
5 -- 6. Letters
10 -- 16John D. Hwang, Simon Liu. Successful CIOs: Pushing the IT Business Value Envelope
18 -- 24Marti Szczur. Delivering Environmental Health Information
34 -- 39Lavanya Ramakrishnan. Securing Next-Generation Grids
40 -- 48Wing Lam, Venky Shankararaman. An Enterprise Integration Methodology
49 -- 55Susan Moore. Managing the Radio Spectrum: Hands-On or Back-Off?
56 -- 58Phillip A. Laplante. Staying Clear of Boiling-Frog Syndrome

Volume 6, Issue 1

4 -- 5Frank Ferrante. From the Editor in Chief: Fresh Perspectives, New Ideas to Start 2004
6 -- 7Sorel Reisman. Higher Education s Role in Job Training
19 -- 23Phillip A. Laplante, Tom Costello, Pawan Singh, Sudi Bindiganavile, Mark Landon. The Who, What, Why, Where, and When of IT Outsourcing
24 -- 29Jeremy J. Blum, Azim Eskandarian. The Threat of Intelligent Collisions
30 -- 36Darren P. Mundy, David W. Chadwick. An XML Alternative for Performance and Security: ASN.1
38 -- 42Jay Liebowitz. Teaching the Importance of Communication in IT
44 -- 50See-Kiong Ng, Limsoon Wong. Accomplishments and Challenges in Bioinformatics
52 -- 57Zhangxi Lin, Gary D. Anderson, T. J. Anderson. Web-Based Services for Real Estate: Model and Implementation
58 -- 60. Resources
61 -- 64Ciro D Urso. Toward a Cooperative Architecture for Delivering Government Services, Part 2