The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2002 vol.4)
pp: 36-39
Published by the IEEE Computer Society












SUBJECT INDEX

A
Application Development

"Bill Kelvie: Making Technology Work for the Mortgage Business," B. Kelvie, May-June 02, pp. 64, 60-63.

"Java Distributed Object Models: An Alternative to Corba?" G. Koutsogiannakis et al., May-June 02, pp. 41-47.

"Technology in the Mortgage Industry: The Fannie Mae Experience," B. Kelvie et al., May-June 02, pp. 27-32.

Architecture

"A Practical Framework for Discussing IT Infrastructure," S. Liu, July-Aug. 02, pp. 14-21.

"Architecture for a Large Healthcare System," R. Mukherji et al., Nov.- Dec. 02, pp. 19-27.

"Less is More with Minimalist Architecture," R. Malan et al., Sept.-Oct. 02, pp. 48, 46-47.

B
Business

"Despite Economic Woes, Companies Still Spending on IT," L.D. Paulson, Jan.-Feb. 02, pp. 10-12.

"Eastman: Managing Transition," J. Hale, Jan.-Feb. 02, pp. 13-14.

"Edward Jones: Using Down Time to Prepare for Future Opportunities," R. Malone, Jan.-Feb. 02, pp. 14-15.

"Ensuring Business Continuity," W. Lam, May-June 02, pp. 19-25.

"How to Future-Proof Your IT Infrastructure," D. Nelson, July-Aug. 02, pp. 22-26.

"Intel: Using an IT Purchasing Model," D. Busch, Jan.-Feb. 02, pp. 16-17.

"Post 9-11 Security: Few Changes, Business as Usual Rules," L. Dailey Paulson, July-Aug. 02, pp. 10-13.

"The Emerging Model of Subscription Computing," D.F. Bantz et al., July-Aug. 02, pp. 27-32.

C
Call Centers

"Blended Call Center Performance Analysis," H.G. Bernett et al., Mar.-Apr. 02, pp. 33-38.

Capacity Planning

"Capacity Planning: An Essential Tool for Managing Web Services," V.A.F. Almeida et al., July-Aug. 02, pp. 33-38.

"Hit-and-Run Tactics Enable Guerrilla Capacity Planning," N.J. Gunther, July-Aug. 02, pp. 40-46.

Careers

"Corporate Rumors and Conspiracy Theories," J.M. Voas, Mar.-Apr. 02, pp. 64, 62-63.

Case Studies

"Java Distributed Object Models: An Alternative to Corba?" G. Koutsogiannakis et al., May-June 02, pp. 41-47.

"Technology in the Mortgage Industry: The Fannie Mae Experience," B. Kelvie et al., May-June 02, pp. 27-32.

Client-Server

"Server-Based Computing Opportunities," A. Volchkov, Mar.-Apr. 02, pp. 18-23.

Continuity Planning

"Ensuring Business Continuity," W. Lam, May-June 02, pp. 19-25.

D
Data Management

"Data Mining for Decision Support," A.C.M. Fong et al., Mar.-Apr. 02, pp. 9-17.

"How to Shrink Holes in Corporate Data Dikes," J.R. Michener et al., Jan.-Feb. 02, pp. 41-48.

"IIT Intranet Mediator: Bringing Data Together on a Corporate Intranet," D.A. Grossman et al., Jan.-Feb. 02, pp. 49-54.

"Storage Administrators: Emerging IT Specialty," S. Lefferdink, July-Aug. 02, pp. 53-55.

Data Mining

"Data Mining for Decision Support," A.C.M. Fong et al., Mar.-Apr. 02, pp. 9-17.

E
E-Commerce

"What Companies Are(n't) Doing about Web Site Assurance," N. Sivasailam et al., May-June 02, pp. 33-40.

I
Industry Focus

"Mortgage Banking: Internet and Integration Are Key," M. Stanford, Mar.-Apr. 02, pp. 47-52.

Information Retrieval

"IIT Intranet Mediator: Bringing Data Together on a Corporate Intranet," D.A. Grossman et al., Jan.-Feb. 02, pp. 49-54.

Intellectual Property

"Strategy for an Internet-Age Approach to Protecting IPRs," T.B. Fowler, Sept.-Oct. 02, pp. 30-35.

"Technology's Changing Role in Intellectual Property Rights," T.B. Fowler, Mar.-Apr. 02, pp. 39-44.

IT Infrastructure

"A Practical Framework for Discussing IT Infrastructure," S. Liu, July-Aug. 02, pp. 14-21.

"How to Future-Proof Your IT Infrastructure," D. Nelson, July-Aug. 02, pp. 22-26.

"Information Resources Management: New Era, New Rules," J.D. Hwang, Nov.-Dec. 02, pp. 9-17.

"The Emerging Model of Subscription Computing," D.F. Bantz et al., July-Aug. 02, pp. 27-32.

J
JXTA

"Secure Peer-to-Peer Networking: The JXTA Example," W. Yeager et al., Mar.-Apr. 02, pp. 53-57.

K
Knowledge Management

"On-Demand KM: A Two-Tier Architecture," B. Lewis, Jan.-Feb. 02, pp. 27-33.

"Practical Issues in Knowledge Management," J. Williams, Jan.-Feb. 02, pp. 35-39.

"Using Connect and Collect to Achieve the KM Endgame," D. Weidner, Jan.-Feb. 02, pp. 18-24.

L
Law

"Technical, Legal, and Societal Challenges to Automated Attack Traceback," S.C. Lee et al., May-June 02, pp. 12-18.

"What Companies Are(n't) Doing about Web Site Assurance," N. Sivasailam et al., May-June 02, pp. 33-40.

N
Networking

"Inside SSL: Accelerating Secure Transactions," W. Chou, Sept.-Oct. 02, pp. 37-41.

"Inside SSL: The Secure Sockets Layer Protocol," W. Chou, July-Aug. 02, pp. 47-52.

"Secure Peer-to-Peer Networking: The JXTA Example," W. Yeager et al., Mar.-Apr. 02, pp. 53-57.

"Server-Based Computing Opportunities," A. Volchkov, Mar.-Apr. 02, pp. 18-23.

P
Privacy

"Addressing New Security and Privacy Challenges," A.K. Ghosh, May-June 02, pp. 10-11.

"Maintaining Privacy in an Online World," A.K. Ghosh, Sept.-Oct. 02, pp. 24-28.

"Technical, Legal, and Societal Challenges to Automated Attack Traceback," S.C. Lee et al., May-June 02, pp. 12-18.

Project Management

"Information Resources Management: New Era, New Rules," J.D. Hwang, Nov.-Dec. 02, pp. 9-17.

S
Security

"Addressing New Security and Privacy Challenges," A.K. Ghosh, May-June 02, pp. 10-11.

"How to Shrink Holes in Corporate Data Dikes," J.R. Michener et al., Jan.-Feb. 02, pp. 41-48.

"Inside SSL: Accelerating Secure Transactions," W. Chou, Sept.-Oct. 02, pp. 37-41.

"Inside SSL: The Secure Sockets Layer Protocol," W. Chou, July-Aug. 02, pp. 47-52.

"Opening Eyes: Building Company-Wide IT Security Awareness," M. McGovern, May-June 02, pp. 52-54.

"Starting a New Year: Bringing IT Back on Track," F.E. Ferrante, Jan.-Feb. 02, pp. 4-5.

"Technical, Legal, and Societal Challenges to Automated Attack Traceback," S.C. Lee et al., May-June 02, pp. 12-18.

Server-Based Computing

"Server-Based Computing Opportunities," A. Volchkov, Mar.-Apr. 02, pp. 18-23.

Software Development

"50 Years of Software: Key Principles for Quality," J.A. Whittaker et al., Nov.-Dec. 02, pp. 28-35.

"Extreme Programming: It's Worth a Look," A. English, May-June 02, pp. 48-50.

"Managing Software Projects with Business-Based Requirements," F. McGovern, Sept.-Oct. 02, pp. 18-23.

"Preventive Risk Management for Software Projects," S. Murthi, Sept.-Oct. 02, pp. 9-15.

"Seven Tips for Keeping Software Development Projects Healthy," F. Hurley, July-Aug. 02, pp. 64, 60-63.

"The Dangers of Using Software Metrics to (Mis)Manage," C.A. Dekkers et al., Mar.-Apr. 02, pp. 24-30.

SSL

"Inside SSL: Accelerating Secure Transactions," W. Chou, Sept.-Oct. 02, pp. 37-41.

"Inside SSL: The Secure Sockets Layer Protocol," W. Chou, July-Aug. 02, pp. 47-52.

System Development

"Architecture for a Large Healthcare System," R. Mukherji et al., Nov.-Dec. 02, pp. 19-27.

"A Practical Framework for Discussing IT Infrastructure," S. Liu, July-Aug. 02, pp. 14-21.

"Bill Kelvie: Making Technology Work for the Mortgage Business," B. Kelvie, May-June 02, pp. 64, 60-63.

"Java Distributed Object Models: An Alternative to Corba?" G. Koutsogiannakis et al., May-June 02, pp. 41-47.

System Integration

"Architecture for a Large Healthcare System," R. Mukherji et al., Nov.-Dec. 02, pp. 19-27.

"Bill Kelvie: Making Technology Work for the Mortgage Business," B. Kelvie, May-June 02, pp. 64, 60-63.

"Java Distributed Object Models: An Alternative to Corba?" G. Koutsogiannakis et al., May-June 02, pp. 41-47.

"Secure Peer-to-Peer Networking: The JXTA Example," W. Yeager et al., Mar.-Apr. 02, pp. 53-57.

T
Trends

"Post 9-11 Security: Few Changes, Business as Usual Rules," L. Dailey Paulson, July-Aug. 02, pp. 10-13.

"Starting a New Year: Bringing IT Back on Track," F.E. Ferrante, Jan.-Feb. 02, pp. 4-5.

V
VoXML

"Putting Voice into Wireless Communications," W. Srisa-an et al., Jan.-Feb. 02, pp. 62-64.

W
Web

"Capacity Planning: An Essential Tool for Managing Web Services," V.A.F. Almeida et al., July-Aug. 02, pp. 33-38.

"IIT Intranet Mediator: Bringing Data Together on a Corporate Intranet," D.A. Grossman et al., Jan.-Feb. 02, pp. 49-54.

"Maintaining Privacy in an Online World," A.K. Ghosh, Sept.-Oct. 02, pp. 24-28.

"What Companies Are(n't) Doing about Web Site Assurance," N. Sivasailam et al., May-June 02, pp. 33-40.

Wireless

"Providing for Wireless LAN Security, Part 2," J. Williams, Nov.-Dec. 02, pp. 48, 44-47.

"Putting Voice into Wireless Communications," W. Srisa-an et al., Jan.-Feb. 02, pp. 62-64.













AUTHOR INDEX

A

Almeida, Virgilio,and Daniel A. Menascé, "Capacity Planning: An Essential Tool for Managing Web Services," July-Aug. 02, pp. 33-38.

B

Bantz, David,Ajay Mohindra, and Dennis G. Shea, "The Emerging Model of Subscription Computing," July-Aug. 02, pp. 27-32.

Beitzel, Steve M.,see Grossman, D.A., Jan.-Feb. 02, pp. 49-54.

Bernett, Howard,Martin J. Fischer, and Denise M. Bevilacqua Masi, "Blended Call Center Performance Analysis," Mar.-Apr. 02, pp. 33-38.

Bredemeyer, Dana,see Malan, R., Sept.-Oct. 02, pp. 48, 46-47.

Busch, Doug,"Intel: Using an IT Purchasing Model," Jan.-Feb. 02, pp. 16-17.

C

Chang, J. Morris,see Koutsogiannakis, G., May-June 02, pp. 41-47.

Chang, J. Morris,see Srisa-an, W., Jan.-Feb. 02, pp. 62-64.

Chou, Wesley,"Inside SSL: Accelerating Secure Transactions," Sept.-Oct. 02, pp. 37-41.

Chou, Wesley,"Inside SSL: The Secure Sockets Layer Protocol," July-Aug. 02, pp. 47-52.

D

Dekkers, Carol,and Patricia A. McQuaid, "The Dangers of Using Software Metrics to (Mis)Manage," Mar.-Apr. 02, pp. 24-30.

E

Egyhazy, Csaba,see Mukherji, R., Nov.-Dec. 02, pp. 19-27.

English, Arthur,"Extreme Programming: It's Worth a Look," May-June 02, pp. 48-50.

F

Ferrante, Frank,"Starting a New Year: Bringing IT Back on Track," Jan.-Feb. 02, pp. 4-5.

Fischer, Martin J.,see Bernett, H.G., Mar.-Apr. 02, pp. 33-38.

Fong, A.C.M.,S.C. Hui, and G. Jha, "Data Mining for Decision Support," Mar.-Apr. 02, pp. 9-17.

Fowler, Thomas,"Strategy for an Internet-Age Approach to Protecting IPRs," Sept.-Oct. 02, pp. 30-35.

Fowler, Thomas,"Technology's Changing Role in Intellectual Property Rights," Mar.-Apr. 02, pp. 39-44.

Frieder, Ophir,see Grossman, D.A., Jan.-Feb. 02, pp. 49-54.

G

Ghosh, Anup,"Addressing New Security and Privacy Challenges," May-June 02, pp. 10-11.

Ghosh, Anup,"Maintaining Privacy in an Online World," Sept.-Oct. 02, pp. 24-28.

Grossman, David ,et al., "IIT Intranet Mediator: Bringing Data Together on a Corporate Intranet," Jan.-Feb. 02, pp. 49-54.

Gunther, Neil,"Hit-and-Run Tactics Enable Guerrilla Capacity Planning," July-Aug. 02, pp. 40-46.

H

Hale, Jerry,"Eastman: Managing Transition," Jan.-Feb. 02, pp. 13-14.

Hui, S.C.,see Fong, A.C.M., Mar.-Apr. 02, pp. 9-17.

Hurley, Frank,"Seven Tips for Keeping Software Development Projects Healthy," July-Aug. 02, pp. 64, 60-63.

Hwang, John D.,"Information Resources Management: New Era, New Rules," Nov.-Dec. 02, pp. 9-17.

J

Jensen, Eric C.,see Grossman, D.A., Jan.-Feb. 02, pp. 49-54.

Jha, G.,see Fong, A.C.M., Mar.-Apr. 02, pp. 9-17.

Johnson, Marco,see Mukherji, R., Nov.-Dec. 02, pp. 19-27.

K

Kelvie, Bill,"Bill Kelvie: Making Technology Work for the Mortgage Business," May-June 02, pp. 64, 60-63.

Kelvie, Bill,and Michael Kraft, "Technology in the Mortgage Industry: The Fannie Mae Experience," May-June 02, pp. 27-32.

Kim, Dan J.,see Sivasailam, N., May-June 02, pp. 33-40.

Koutsogiannakis, George,and J. Morris Chang, "Java Distributed Object Models: An Alternative to Corba?" May-June 02, pp. 41-47.

Kraft, Michael,see Kelvie, B., May-June 02, pp. 27-32.

L

Lam, Wing,"Ensuring Business Continuity," May-June 02, pp. 19-25.

Lee, Susan,and Clay Shields, "Technical, Legal, and Societal Challenges to Automated Attack Traceback," May-June 02, pp. 12-18.

Lefferdink, Steve,"Storage Administrators: Emerging IT Specialty," July-Aug. 02, pp. 53-55.

Lewis, Bernard,"On-Demand KM: A Two-Tier Architecture," Jan.-Feb. 02, pp. 27-33.

Liu, Simon,"A Practical Framework for Discussing IT Infrastructure," July-Aug. 02, pp. 14-21.

Lo, Chia-Tien Dan,see Srisa-an, W., Jan.-Feb. 02, pp. 62-64.

M

Malan, Ruth,and Dana Bredemeyer, "Less is More with Minimalist Architecture," Sept.-Oct. 02, pp. 48, 46-47.

Malone, Rich,"Edward Jones: Using Down Time to Prepare for Future Opportunities," Jan.-Feb. 02, pp. 14-15.

Masi, Denise M. Bevilacqua,see see Bernett, H.G., Mar.-Apr. 02, pp. 33-38.

McGovern, Fergal,"Managing Software Projects with Business-Based Requirements," Sept.-Oct. 02, pp. 18-23.

McGovern, Mark,"Opening Eyes: Building Company-Wide IT Security Awareness," May-June 02, pp. 52-54.

McQuaid, Patricia A.,see Dekkers, C.A., Mar.-Apr. 02, pp. 24-30.

Menascé, Daniel A.,see Almeida, V.A.F., July-Aug. 02, pp. 33-38.

Michener, John,and Stephen D. Mohan, "How to Shrink Holes in Corporate Data Dikes," Jan.-Feb. 02, pp. 41-48.

Mohan, Stephen D.,see Michener, J.R., Jan.-Feb. 02, pp. 41-48.

Mohindra, Ajay,see Bantz, D.F., July-Aug. 02, pp. 27-32.

Mukherji, Raj,Csaba Egyhazy, and Marco Johnson, "Architecture for a Large Healthcare System," Nov.-Dec. 02, pp. 19-27.

Murthi, Sanjay,"Preventive Risk Management for Software Projects," Sept.-Oct. 02, pp. 9-15.

N

Nelson, Deborah,"How to Future-Proof Your IT Infrastructure," July-Aug. 02, pp. 22-26.

P

Paulson, Linda Dailey,"Despite Economic Woes, Companies Still Spending on IT," Jan.-Feb. 02, pp. 10-12.

Paulson, Linda Dailey,"Post 9-11 Security: Few Changes, Business as Usual Rules," July-Aug. 02, pp. 10-13.

R

Rao, H. Raghav,see Sivasailam, N., May-June 02, pp. 33-40.

S

Shea, Dennis G.,see Bantz, D.F., July-Aug. 02, pp. 27-32.

Shields, Clay,see Lee, S.C., May-June 02, pp. 12-18.

Sivasailam, Natarajan,Dan J. Kim, and H. Raghav Rao, "What Companies Are(n't) Doing about Web Site Assurance," May-June 02, pp. 33-40.

Srisa-an, Witawas,Chia-Tien Dan Lo, and J. Morris Chang, "Putting Voice into Wireless Communications," Jan.-Feb. 02, pp. 62-64.

Stanford, Monte,"Mortgage Banking: Internet and Integration Are Key," Mar.-Apr. 02, pp. 47-52.

V

Voas, Jeffrey,"Corporate Rumors and Conspiracy Theories," Mar.-Apr. 02, pp. 64, 62-63.

Voas, Jeffrey M.,see Whittaker, J.A., Nov.-Dec. 02, pp. 28-35.

Volchkov, Andrej,"Server-Based Computing Opportunities," Mar.-Apr. 02, pp. 18-23.

W

Weidner, Douglas,"Using Connect and Collect to Achieve the KM Endgame," Jan.-Feb. 02, pp. 18-24.

Whittaker, James A.,and Jeffrey M. Voas, "50 Years of Software: Key Principles for Quality," Nov.-Dec. 02, pp. 28-35.

Williams, Joseph,"Practical Issues in Knowledge Management," Jan.-Feb. 02, pp. 35-39.

Williams, Joseph,see Yeager, W., Mar.-Apr. 02, pp. 53-57.

Williams, Joseph,"Providing for Wireless LAN Security, Part 2," Nov.-Dec. 02, pp. 48, 44-47.

Y

Yeager, William,and Joseph Williams, "Secure Peer-to-Peer Networking: The JXTA Example," Mar.-Apr. 02, pp. 53-57.

18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool