IT Professional, Volume 10
Volume 10, Number 1, January/February 2008
- John Edward Hutchinson, Gerald Kotonya, James Walkerdine, Peter Sawyer, Glen Dobson, Victor Onditi:
Migrating to SOAs by Way of Hybrid Systems. 34-42
Volume 10, Number 2, March/April 2008
- Jader Wallauer, Douglas Dyllon Jeronimo de Macedo, Rafael Andrade, Aldo von Wangenheim:
Building a National Telemedicine Network. 12-17 - Firat Kart, Louise E. Moser, P. Michael Melliar-Smith:
Building a Distributed E-Healthcare System Using SOA. 24-30 - Vladimir Stantchev, Tino Schulz, Trung Dang Hoang, Ilja Ratchinski:
Optimizing Clinical Processes with Position-Sensing. 31-37 - Yang-Ming Zhu, Madhavi Ahuja, Xiangyu Wu, Chris Dauterman, Cheng-Hsiu Chen, Ronald Sukalac, Steven M. Cochoff:
Improving Startup Performance for a Medical Image Viewing Application. 38-45 - Thomas Jepsen, Marsha Jepsen:
Health IT: A Roundtable Discussion with Healthcare Information Technology Executives. 53-55
Volume 10, Number 3, May/June 2008
- Jeffrey M. Voas, Linda Wilbanks:
Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations. 10-13 - Mikhail Kharlamov, Alexey Polovinkin, Ekaterina Kondrateva, Alexey Lobachev:
Beyond Brute Force: Testing Financial Software. 14-18 - Shrikant Mulik, Sushil Ajgaonkar, Kavindra Sharma:
Where Do You Want to Go in Your SOA Adoption Journey? 36-39 - Phillip A. Laplante, Jia Zhang, Jeffrey M. Voas:
What's in a Name? Distinguishing between SaaS and SOA. 46-50
Volume 10, Number 4, July/August 2008
- Keith W. Miller, Jeffrey M. Voas:
Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are? 4-6 - C. Derrick Huang, Ravi S. Behara, Qing Hu:
Managing Risk Propagation in Extended Enterprise Networks. 14-19 - Wolf Zimmer, Thomas Langkabel, Carsten Hentrich:
ArchiSafe: Legally Compliant Electronic Storage. 26-33 - Peng Xu, Balasubramaniam Ramesh:
Using Process Tailoring to Manage Software Development Challenges. 39-45
Volume 10, Number 5, September/October 2008
- Wesley Chou, J. Morris Chang, Shawkang Wu:
Wireless Broadband Technologies: Access, Security, and Applications. 12-14 - I-Horng Jeng, Allen Y. Chang, Yong-Rui Wang:
Plug into the Online Database and Play Mobile Web 2.0. 34-38 - Rogério Atem de Carvalho, Rafael Manhaes Monnerat:
Development Support Tools for Enterprise Resource Planning. 39-45 - Shari Lawrence Pfleeger, Thomas Ciszek:
Choosing a Security Option: The InfoSecure Methodology. 46-52
Volume 10, Number 6, November/December 2008
- Ángel García-Crespo, Ricardo Colomo Palacios, Juan Miguel Gómez Berbís, Edmundo Tovar Caro:
The IT Crowd: Are We Stereotypes? 24-27 - Keith W. Miller, Jeffrey M. Voas:
Information Integrity and IT Professionals' Integrity, Intertwined. 35-40 - James G. Potter, Hsiaosu Hsiung:
Service-Level Agreements: Aligning Performance and Expectations. 41-47 - Upkar Varshney:
Business Models for Mobile Commerce Services: Requirements, Design, and the Future. 48-55