[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 11, Issue 5September 2009
Publisher:
  • IEEE Educational Activities Department
  • 445 Hoes Lane P.O. Box 1331 Piscataway, NJ
  • United States
ISSN:1520-9202
Reflects downloads up to 25 Dec 2024Bibliometrics
Skip Table Of Content Section
opinion
X as a Service, Cloud Computing, and the Need for Good Judgment

Editorial board member Henry Schaffer talks about the spreading "X as a service" phenomenon in the IT arena.

opinion
Guest Editor's Introduction: Ontologies, OWL, and the Semantic Web

The guest editor's introduction to this special issue on ontologies, the Semantic Web, and OWL describes the current state of the field and why the three articles highlighted here help readers explore it in more detail.

research-article
Semantic Web Technologies: Ready for Adoption?

The Semantic Web is one of the fastest developing fields and, as such, under constant examination by scientists and IT professionals. In this article, the authors attempt to provide an assessment of the maturity and adoption level of currently available ...

research-article
Equal Format Databases and Semantic-Relational Encoding

Applying a semantic style to a relational database design leads to a uniform, general-purpose database structure that's independent of the data model. These equal format databases let relational database servers manage any complex data in a standardized ...

research-article
Just What Is an Ontology, Anyway?

This tutorial article describes some definitions of "ontology" as it relates to computer applications and gives an overview of some common ontology-based applications.

research-article
An Integrated Service Model Approach for Enabling SOA

To effectively align business and IT using a service-oriented architecture (SOA), a proposed integrated service model divides service construction into three loosely coupled perspectives according to the service's business logic, interface, and ...

research-article
Trustworthiness in Software Environments

Any complex autonomic or organic computing system should be trustworthy to avoid the risk of losing control of it and to retain confidence that it won't fail. Today's distributed systems include components that are strongly dependent on each other for ...

research-article
Success in National Cyberdefense

This article discusses the concept of cyberspace as it applies to government. Government employees must be "cyberwarriors" and accountable for their actions while using IT, and CIOs and CISOs must be aligned to effectively balance security and access.

research-article
Self-Smart, Part II: Career Smart

This installment of Developing Soft Skills on strategies for being career smart, which consists of the following mantras: "a big fish in a small pond beats the reverse," "hop to a more opportune pond," and "don't polish a sneaker." The aim is to find ...

research-article
Joining the Conversation about IT Ethics

At a recent conference, philosophers and IT professionals discussed many topics that combine technical details about IT and important humans values. IT professionals are encouraged to join the conversation about computer ethics and IT by reading ...

research-article
Surviving Distributed Denial-of-Service Attacks

A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...

research-article
IT Compliance: Aligning Legal and Product Requirements

Laws and regulations increasingly impose requirements on IT business practices and products. A key difficulty in responding to these requirements emerges from the need to translate legal language structures into domain-specific product specifications. ...

research-article
Changing the Publishing Model

Because of the Internet, the traditional publishing industry is experiencing major, devastating social changes, so to survive, publishers must invent new business models. The IEEE Computer Society has the experience, the products, and the services ...

research-article
Certification: Does the Emperor Have Any Clothes?

Too many organizations are requiring certifications in their hiring and vendor selection processes without having any mechanisms in place to ensure those credentials are properly leveraged. This CIO Corner briefly outlines specific problem areas through ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.