Search For:

Displaying 1-15 out of 15 total
Web 2.0 Social Media: A Commercialization Conundrum
Found in: IT Professional
By George F. Hurlburt
Issue Date:November 2012
pp. 6-8
Web 2.0, the Social Web, offers unparalleled opportunities for people to network and collaborate. The advent of Web 2.0 as a commerce engine, however, brings unique challenges to the lofty purposes upon which social networks were created. Facebook's disast...
 
The Internet of Things: A Reality Check
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas,Keith W. Miller
Issue Date:May 2012
pp. 56-59
Today, a new Internet player is rowing more important: things—that is, inanimate objects that can be programmed to communicate, sense, and interact with other things. But will an increasingly fragile ecosystem be able to sustain the amount of po...
 
Storytelling: From Cave Art to Digital Media
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas
Issue Date:September 2011
pp. 4-7
Pictorial histories on cave walls constitute the earliest forms of preserved prehuman and early-human communications, representing the essence of the storyteller's art. As civilizations grew, so did the iconic nature of storytelling, yet we're no different...
 
Timing Matters: Tackling Intractable Problems
Found in: IT Professional
By George F. Hurlburt, Jeffrey Voas
Issue Date:May 2011
pp. 4-6
<p>Taken collectively, Neil Armstrong's trip to the moon is a case study of applying the right solutions to the right problems at the right time. Unfortunately, untimely solutions are rather common, such as the invention of the field effect transisto...
 
Trustworthiness in Software Environments
Found in: IT Professional
By John Harauz, Jeffrey Voas, George F. Hurlburt
Issue Date:September 2009
pp. 35-40
Any complex autonomic or organic computing system should be trustworthy to avoid the risk of losing control of it and to retain confidence that it won't fail. Today's distributed systems include components that are strongly dependent on each other for thei...
 
STEM's Grand Challenge: Reviving Applied Mathematics
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas
Issue Date:September 2013
pp. 51-55
Math readiness presents a real challenge for both K-12 and college-level education. It affects mathematically intensive science, technology, engineering, and mathematics (STEM) fields of endeavor and threatens our readiness to invent and adapt.
 
STEM's Grand Challenge: Reviving Applied Mathematics
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas
Issue Date:September 2013
pp. 51-55
Math readiness presents a real challenge for both K-12 and college-level education. It affects mathematically intensive science, technology, engineering, and mathematics (STEM) fields of endeavor and threatens our readiness to invent and adapt.
 
BYOD: Security and Privacy Considerations
Found in: IT Professional
By Keith W. Miller,Jeffrey Voas,George F. Hurlburt
Issue Date:September 2012
pp. 53-55
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies and individuals involved, or thinking about getting involv...
 
A Matter of Policy
Found in: IT Professional
By David Ferraiolo,Jeffrey Voas,George F. Hurlburt
Issue Date:March 2012
pp. 4-7
To many, system policy is a statement posted on a website indicating intention to protect personal data. In reality, policy is much broader, and its enforcement far more consequential. What if policy-derived rule sets could be rigorously defined and automa...
 
Systems Engineering as a Literate Behavior
Found in: IT Professional
By George F. Hurlburt
Issue Date:July 2010
pp. 12-17
<p>The recent emphasis on concepts dealing with knowledge management brings an interesting paradox to bear. Networked system federations reinforce growing globalization and nonlinear relationships. Given this, there's a mandate to move away from stat...
 
Privacy and/or Security: Take Your Pick
Found in: IT Professional
By George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day
Issue Date:July 2009
pp. 52-55
The concepts of privacy and security are distinct, but they're often considered synonymously when applied to computational systems. This article explores the conceptual differences between computational privacy and security and suggests four mutually exclu...
 
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008
Found in: IT Professional
By George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas
Issue Date:January 2009
pp. 14-19
The unprecedented financial market volatility of 2008 has profound implications. Although there is plenty of
 
Development Of The Warfighting Architecture Requirements (War) Tool
Found in: Object-Oriented Real-Time Dependable Systems, IEEE International Workshop on
By George F. Hurlburt
Issue Date:February 2005
pp. 97-104
<p>The Warfighting Architecture Requirements (WAR) tool extends the Department of Defense Architectural Framework (DODAF) to fill warfighting voids. It builds warfighting scenarios and documents Joint Capabilities Integration and Development System (...
 
Bitcoin: Benefit or Curse?
Found in: IT Professional
By George F. Hurlburt,Irena Bojanova
Issue Date:May 2014
pp. 10-15
The new world of mobile devices offers reasonable likelihood that virtual currency will prevail on a global scale. Currently, the bitcoin crypto-currency model appears to be a forerunner. Bitcoin, a highly disruptive technology, has both supporters and det...
 
Complexity Theory: A New Paradigm for Software Integration
Found in: IT Professional
By George F. Hurlburt
Issue Date:May 2013
pp. 26-31
Software integration testing has always been problematic, and current methods are becoming even less practical given today's networked software components. As the need for a more holistic approach grows, complexity theory presents opportunities for better ...
 
 1