dblp: IT Professional, Volume 9 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



- > Home > Journals > IT Professional
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 9, Number 1, January/February 2007

Bob Lewis:
Guest Editor's Introduction: A Glimpse at the Future of Enterprise Search. 12-13
David L. Bean:
How Advances in Search Combine Databases, Sentence Diagramming, and "Just the Facts". 14-19
Frederick Knabe, Daniel Tunkelang:
Enterprise Information Access and the User Experience. 21-28
Stephen Buxton:
Beyond Search: Content Applications. 29-35
Stephen Tong, Joseph Williams:
Are You Prepared for Daylight Saving Time 2007? 36-41
Michael McShea:
Communicating IT's Value in a Modern Business Climate. 42-45
G. Reza Djavanshir, William W. Agresti:
IT Consulting: Communication Skills Are Key. 46
Colin J. Neill:
Will Commercialization of Open Source Drive the Volunteers Away? 51-53
Patrick C. K. Hung, Qing Li
, Don Sparrow:
Next-Generation Enterprise Computing: Beyond EDOC 2006. 54-55
Sorel Reisman
:
Slaying the Academia Beast [The Ivory Tower]. 64
Volume 9, Number 2, March/April 2007

Wesley Chou, Linda Wilbanks, Shawkang Wu:
Guest Editors' Introduction: Managing Cybersecurity. 9
Wayne Jones, Al Gallo:
A Process-Based Approach to Handling Risks. 10-15
Wesley Chou:
Cybersecurity Costs: Balancing Blanket Security with Real-World Practicality. 16-20
Larry D. Bisel:
The Role of SSL in Cybersecutiry. 22-25
Rakesh Tandon:
The Role of Solution Architects in Systems Integration. 26-33
Neil Hamlett
:
IT Outsourcing Impacts on Enterprise Architecture. 34-40
Lan Cao, Balasubramaniam Ramesh
:
Agile Software Development: Ad Hoc Practices or Sound Principles? 41-47
Jeffrey M. Voas:
A Baker's Dozen: 13 Software Engineering Challenges. 48-53
Linda Wilbanks:
Cybersecurity: Welcome to My World. 61-64
Volume 9, Number 3, May/June 2007

Liang-Jie Zhang
, Sally Ericksen, Jaideep Roy:
Guest Editors' Introduction: A Web 2.0 Tune-Up. 9
Ali Arsanjani, Liang-Jie Zhang
, Michael Ellis, Abdul Allam, Kishore Channabasavaiah:
S3: A Service-Oriented Reference Architecture. 10-17
Yann Le Blevec, Chirine Ghedira
, Djamal Benslimane, Xavier Delatte:
Service-Oriented Computing: Bringing Business Systems to the Web. 19-24
Lihui Lei, Zhenhua Duan:
Integrating AJAX and Web Services for Cooperative Image Editing. 25-29
Wail M. Omar, Ali Dhia K. Abbas, A. Taleb-Bendiab:
SOAW2 for Managing the Web 2.0 Framework. 30-35
Christoph Schroth, Till Janner:
Web 2.0 and SOA: Converging Concepts Enabling the Internet of Services. 36-41
Stacie Petter
, Lars Mathiassen, Vijay K. Vaishnavi:
Five Keys to Project Knowledge Sharing. 42-46
Matthew M. Hinkle:
Software Quality, Metrics, Process Improvement, and CMMI: An Interview with Dick Fairley. 47-51
Jeffrey M. Voas, Phillip A. Laplante:
The Services Paradigm: Who Can You Trust? 58-61
Jared T. Howerton:
Service-Oriented Architecture and Web 2.0. 62-64
Volume 9, Number 4, July/August 2007

Alessio Gaspar, Sarah Langevin, William D. Armitage:
Virtualization Technologies in the Undergraduate IT Curriculum. 10-17
Luis Servin, Till Dörges:
Network Situational Assessment and Automatic Policy Change. 18-23
G. Reza Djavanshir, Reza Khorramshahgol:
Key Process Areas in Systems Integration. 24-27
Phillip A. Laplante, Anthony Gold, Thomas Costello:
Open Source Software: Is It Worth Converting? 28-33
San Murugesan
:
Understanding Web 2.0. 34-41
Xuan Shi:
Semantic Web Services: An Unfulfilled Promise. 42-45
Keri Schreiner:
Unified Messaging: Will It Finally Meet Its Promise? 56-60
Linda Wilbanks:
The Impact of Personally Identifiable Information. 62-64
Volume 9, Number 5, September/October 2007

Phillip A. Laplante, William W. Agresti, G. Reza Djavanshir:
Guest Editors' Introduction: IT Quality Enhancement and Process Improvement. 10-11
Rupert A. Hayles Jr.:
Planning and Executing IT Strategy. 12-18
Scott E. Donaldson, Stanley G. Siegel:
Enriching Your Project Planning: Tying Risk Assessment to Resource Estimation. 20-27
Martin J. Fischer, Denise M. Bevilacqua Masi, Patrick V. McGregor:
Efficient Integrated Services in an Enterprise Network. 28-35
Hanifa Shah, Mohamed El Kourdi:
Frameworks forEnterprise Architecture. 36-41
Wesley Chou:
Strategies to Keep Your VoIP Network Secure. 42-46
Sorel Reisman:
Fast-Tracking Content: The Dramatic Evolution of Intellectual Property. 58-60
Linda Wilbanks:
Strategic Thinking, Practical Dreaming. 62-63
Volume 9, Number 6, November/December 2007

Upkar Varshney:
Supporting Group-Oriented Mobile Services Transactions. 10-15
Simon Liu:
Enabling Electronic Healthcare Information Exchange. 17-23
Nir Kshetri:
Increasing Returns and the Diffusion of Linux in China. 24-29
Han van Loon:
A Management Methodology to Reduce Risk and Improve Quality. 30-35
Simon Liu, Larry Holt, Bruce Cheng:
A Practical Vulnerability Assessment Program. 36-42
Ilya V. Yakovlev:
Web 2.0: Is It Evolutionary or Revolutionary? 43-45
Roberto Rivera:
Am I Doing Architecture or Design Work? 46-48
Keri Schreiner:
The Bridge and Beyond: Business Analysis Extends Its Role and Reach. 50-54
Linda Wilbanks:
Passing out IT Toys. 62-63

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:








