X as a Service, Cloud Computing, and the Need for Good Judgment
Editorial board member Henry Schaffer talks about the spreading "X as a service" phenomenon in the IT arena.
Guest Editor's Introduction: Ontologies, OWL, and the Semantic Web
The guest editor's introduction to this special issue on ontologies, the Semantic Web, and OWL describes the current state of the field and why the three articles highlighted here help readers explore it in more detail.
Semantic Web Technologies: Ready for Adoption?
The Semantic Web is one of the fastest developing fields and, as such, under constant examination by scientists and IT professionals. In this article, the authors attempt to provide an assessment of the maturity and adoption level of currently available ...
Equal Format Databases and Semantic-Relational Encoding
Applying a semantic style to a relational database design leads to a uniform, general-purpose database structure that's independent of the data model. These equal format databases let relational database servers manage any complex data in a standardized ...
Just What Is an Ontology, Anyway?
This tutorial article describes some definitions of "ontology" as it relates to computer applications and gives an overview of some common ontology-based applications.
An Integrated Service Model Approach for Enabling SOA
To effectively align business and IT using a service-oriented architecture (SOA), a proposed integrated service model divides service construction into three loosely coupled perspectives according to the service's business logic, interface, and ...
Trustworthiness in Software Environments
Any complex autonomic or organic computing system should be trustworthy to avoid the risk of losing control of it and to retain confidence that it won't fail. Today's distributed systems include components that are strongly dependent on each other for ...
Success in National Cyberdefense
This article discusses the concept of cyberspace as it applies to government. Government employees must be "cyberwarriors" and accountable for their actions while using IT, and CIOs and CISOs must be aligned to effectively balance security and access.
Self-Smart, Part II: Career Smart
This installment of Developing Soft Skills on strategies for being career smart, which consists of the following mantras: "a big fish in a small pond beats the reverse," "hop to a more opportune pond," and "don't polish a sneaker." The aim is to find ...
Joining the Conversation about IT Ethics
At a recent conference, philosophers and IT professionals discussed many topics that combine technical details about IT and important humans values. IT professionals are encouraged to join the conversation about computer ethics and IT by reading ...
Surviving Distributed Denial-of-Service Attacks
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The ...
IT Compliance: Aligning Legal and Product Requirements
Laws and regulations increasingly impose requirements on IT business practices and products. A key difficulty in responding to these requirements emerges from the need to translate legal language structures into domain-specific product specifications. ...
Changing the Publishing Model
Because of the Internet, the traditional publishing industry is experiencing major, devastating social changes, so to survive, publishers must invent new business models. The IEEE Computer Society has the experience, the products, and the services ...
Certification: Does the Emperor Have Any Clothes?
Too many organizations are requiring certifications in their hiring and vendor selection processes without having any mechanisms in place to ensure those credentials are properly leveraged. This CIO Corner briefly outlines specific problem areas through ...