Search For:

Displaying 1-9 out of 9 total
Business Process Management and the Social Web
Found in: IT Professional
By Nuno Pereira,David Vera,H. Gilbert Miller
Issue Date:November 2011
pp. 58-59
Organizations increasingly face complex problems in domains such as case management and claims processing that challenge traditionally static business processes and the IT systems that support them. Users in turn expect instant gratification, rich user exp...
Secure Cyberspace: Answering the Call for Intelligent Action
Found in: IT Professional
By H. Gilbert Miller, Richard H. Murphy
Issue Date:May 2009
pp. 60-63
As information technology permeates all societal layers and its use crosses increasingly national boundaries, information security has become of paramount importance. Understanding what motivates information security is part of the hard work in planning th...
From Data to Decisions: A Value Chain for Big Data
Found in: IT Professional
By H. Gilbert Miller,Peter Mork
Issue Date:January 2013
pp. 57-59
With exponential growth in data, enterprises must act to make the most of the vast data landscape—to thoughtfully apply multiple technologies, carefully select key data for specific investigations, and innovatively tailor large integrated da...
Requiring Strong Credentials: What's Taking So Long?
Found in: IT Professional
By H. Gilbert Miller, James L. Fisher
Issue Date:January 2010
pp. 57-60
Both industry and federal agencies are resisting a stronger authentication and authorization infrastructure. The reasons have little to do with available technology and everything to do with users' and system owners' resistance to change. Users think crede...
Toward a User-Centric Digital Ecosystem
Found in: IT Professional
By Mile Corrigan,H. Gilbert Miller
Issue Date:July 2011
pp. 12-15
Digital platforms are transforming into a series of personal companions that are as much an extension of the user as they are a data processing machine. To build a cohesive digital brand that truly connects with and influences users, designers and develope...
Web-Application Security: From Reactive to Proactive
Found in: IT Professional
By John R. Maguire, H. Gilbert Miller
Issue Date:July 2010
pp. 7-9
<p>Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its ...
Cloud Computing: Will Commodity Services Benefit Users Long Term?
Found in: IT Professional
By H. Gilbert Miller, John Veiga
Issue Date:November 2009
pp. 57-59
The attention the IT community has given cloud computing recently rivals that given to American Idol judges by the public. This magazine alone dedicated its March/April 2009 issue and significant other space throughout the year to the topic. The introducti...
Welcome to Convergence: Surviving the Next Platform Change
Found in: IT Professional
By H. Gilbert Miller, Henry D. Levine, Sandra N. Bates
Issue Date:May 2005
pp. 18-25
Voice, data, and Internet on one platform threaten chaos, but those who keep cool and keep moving will make it. <p> Each year, the federal government's largest buyer of telecommunications services--the US General Services Administration?s Federal Tec...
Toward Interoperable First Response
Found in: IT Professional
By H. Gilbert Miller, Richard P. Granato, John W. Feuerstein, Louis Ruffino
Issue Date:January 2005
pp. 13-20
Wireless services that accommodate disparate federal, state, and local systems are key to a coordinated first response to US public-safety threats.