CS Store Search
Displaying 1-9 out of 9 total
Business Process Management and the Social Web
By Nuno Pereira,David Vera,H. Gilbert Miller
Issue Date:November 2011
Organizations increasingly face complex problems in domains such as case management and claims processing that challenge traditionally static business processes and the IT systems that support them. Users in turn expect instant gratification, rich user exp...
Secure Cyberspace: Answering the Call for Intelligent Action
By H. Gilbert Miller, Richard H. Murphy
Issue Date:May 2009
As information technology permeates all societal layers and its use crosses increasingly national boundaries, information security has become of paramount importance. Understanding what motivates information security is part of the hard work in planning th...
From Data to Decisions: A Value Chain for Big Data
By H. Gilbert Miller,Peter Mork
Issue Date:January 2013
With exponential growth in data, enterprises must act to make the most of the vast data landscape&#x2014;to thoughtfully apply multiple technologies, carefully select key data for specific investigations, and innovatively tailor large integrated da...
Requiring Strong Credentials: What's Taking So Long?
By H. Gilbert Miller, James L. Fisher
Issue Date:January 2010
Both industry and federal agencies are resisting a stronger authentication and authorization infrastructure. The reasons have little to do with available technology and everything to do with users' and system owners' resistance to change. Users think crede...
Toward a User-Centric Digital Ecosystem
By Mile Corrigan,H. Gilbert Miller
Issue Date:July 2011
Digital platforms are transforming into a series of personal companions that are as much an extension of the user as they are a data processing machine. To build a cohesive digital brand that truly connects with and influences users, designers and develope...
Web-Application Security: From Reactive to Proactive
By John R. Maguire, H. Gilbert Miller
Issue Date:July 2010
<p>Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its ...
Cloud Computing: Will Commodity Services Benefit Users Long Term?
By H. Gilbert Miller, John Veiga
Issue Date:November 2009
The attention the IT community has given cloud computing recently rivals that given to American Idol judges by the public. This magazine alone dedicated its March/April 2009 issue and significant other space throughout the year to the topic. The introducti...
Welcome to Convergence: Surviving the Next Platform Change
By H. Gilbert Miller, Henry D. Levine, Sandra N. Bates
Issue Date:May 2005
Voice, data, and Internet on one platform threaten chaos, but those who keep cool and keep moving will make it. <p> Each year, the federal government's largest buyer of telecommunications services--the US General Services Administration?s Federal Tec...
Toward Interoperable First Response
By H. Gilbert Miller, Richard P. Granato, John W. Feuerstein, Louis Ruffino
Issue Date:January 2005
Wireless services that accommodate disparate federal, state, and local systems are key to a coordinated first response to US public-safety threats.
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.