Search For:

Displaying 1-50 out of 89 total
Certainty through Uncertainty?
Found in: Computer
By Phil Laplante, George Hurlburt, Keith Miller, Jeffrey Voas
Issue Date:February 2011
pp. 79-81
Uncertainty is a sensible defensive tactic in certain software systems, but we must ensure that randomness doesn't make us victims of our own ingenuity.
 
A 'Crystal Ball' for Software Liability
Found in: Computer
By Jeffrey Voas, Gary McGraw, Lora Kassab, Larry Voas
Issue Date:June 1997
pp. 29-36
<p>Software developers are living in a liability grace period, but it won't last. To adequately insure themselves against potential liability, developers need tools to identify worst-case scenarios and help them quantify the risks associated with a p...
 
Software Testing: What Goes Around Comes Around
Found in: IT Professional
By Jeffrey Voas,Keith W. Miller
Issue Date:May 2012
pp. 4-5
Today's technology gurus understand little about software testing&#x2014;a fundamental software engineering pillar that presents many challenges. Furthermore, what role will testing play in the new worlds of mobile apps?
 
The Internet of Things: A Reality Check
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas,Keith W. Miller
Issue Date:May 2012
pp. 56-59
Today, a new Internet player is rowing more important: things&#x2014;that is, inanimate objects that can be programmed to communicate, sense, and interact with other things. But will an increasingly fragile ecosystem be able to sustain the amount of po...
 
Storytelling: From Cave Art to Digital Media
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas
Issue Date:September 2011
pp. 4-7
Pictorial histories on cave walls constitute the earliest forms of preserved prehuman and early-human communications, representing the essence of the storyteller's art. As civilizations grew, so did the iconic nature of storytelling, yet we're no different...
 
Timing Matters: Tackling Intractable Problems
Found in: IT Professional
By George F. Hurlburt, Jeffrey Voas
Issue Date:May 2011
pp. 4-6
<p>Taken collectively, Neil Armstrong's trip to the moon is a case study of applying the right solutions to the right problems at the right time. Unfortunately, untimely solutions are rather common, such as the invention of the field effect transisto...
 
Mobile Applications: The Fifth Cycle
Found in: IT Professional
By George Hurlburt, Jeffrey Voas, Keith W. Miller
Issue Date:November 2010
pp. 56-60
<p>The world is poised for a 5th cycle of computer capability, this time focused on the burgeoning phenomena of mobile computing. This era might even render the laptop obsolete. Using forecasts from various organizations, the authors project the futu...
 
Free and Open Source Software
Found in: IT Professional
By Keith W. Miller, Jeffrey Voas, Tom Costello
Issue Date:November 2010
pp. 14-16
<p>Historically, free and open source software (FOSS) has been a movement widely thought to be outside the mainstream of commercial software. But now, corporate entities are big players in FOSS. This introduction looks at how FOSS got to where it is ...
 
Ethics and the Cloud
Found in: IT Professional
By Keith W. Miller, Jeffrey Voas
Issue Date:September 2010
pp. 4-5
<p>Cloud computing is an idea that's rapidly evolving. Still, the amount of money and attention devoted to this topic makes it seems sensible to discuss how ethicists view the kinds of changes in computing that are being called
 
One in a Baker?s Dozen: Debugging Debugging
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Jeffrey Voas, Keith Miller
Issue Date:November 2007
pp. 75-81
<p>In [14], Voas outlined 13 major software engineering issues needing further research: (1) what is software quality? (2) what are the economic benefits behind existing software engineering techniques?, (3) does process improvement matter?, (4) can ...
 
A Baker's Dozen: 13 Software Engineering Challenges
Found in: IT Professional
By Jeffrey Voas
Issue Date:March 2007
pp. 48-53
Thirteen challenges facing the software engineering research and practitioner community, and hints on what to do about them.
 
Software Quality from a Behavioral Perspective
Found in: IT Professional
By Jeffrey Voas, William W. Agresti
Issue Date:July 2004
pp. 46-50
Software quality is evolving beyond static assessment to include behavioral attributes, such as availability and maintainability.
 
Composing Software Component
Found in: IEEE Software
By Jeffrey Voas
Issue Date:July 2001
pp. 16-17
No summary available.
 
Fault Tolerance
Found in: IEEE Software
By Jeffrey Voas
Issue Date:July 2001
pp. 54-57
No summary available.
 
Faster, Better, and Cheaper
Found in: IEEE Software
By Jeffrey Voas
Issue Date:May 2001
pp. 96-97
No summary available.
 
Can Aspect-Oriented Programming Lead to More Reliable Software?
Found in: IEEE Software
By John Viega, Jeffrey Voas
Issue Date:November 2000
pp. 19-21
No summary available.
 
Can Chaotic Methods Improve Software Quality Predictions?
Found in: IEEE Software
By Jeffrey Voas
Issue Date:September 2000
pp. 20-22
No summary available.
 
Will the Real Operational Profile Please Stand Up?
Found in: IEEE Software
By Jeffrey Voas
Issue Date:March 2000
pp. 87-89
No summary available.
 
A New Generation of Software Quality Conferences
Found in: IEEE Software
By Jeffrey Voas
Issue Date:January 2000
pp. 22-23
No summary available.
 
Software Quality's Eight Greatest Myths
Found in: IEEE Software
By Jeffrey Voas
Issue Date:September 1999
pp. 118-120
No summary available.
 
Certifying Software for High-Assurance Environments
Found in: IEEE Software
By Jeffrey Voas
Issue Date:July 1999
pp. 48-54
<p>Not all software systems are created equal or alike, particularly with the increase in COTS and reusable components. Jeffrey Voas proposes a strategy for certifying software in specific operational environments.</p>
 
What's at Stake in DOJ versus Microsoft
Found in: IT Professional
By Kenneth E. Liu, Daniel B. Hassett, Jeffrey Voas
Issue Date:July 1999
pp. 73-76
<p>The issues at stake in the US DOJ's case against Microsoft could have far-reaching consequences for the IT industry.</p>
 
A US Government-Regulated Software Industry
Found in: IEEE Software
By Jeffrey Voas
Issue Date:May 1999
pp. 94-95
No summary available.
 
Untested Software Threatens Infrastructures
Found in: IEEE Software
By Jeffrey Voas
Issue Date:March 1999
pp. 89-90
No summary available.
 
Protecting against What? The Achilles Heel of Information Assurance
Found in: IEEE Software
By Jeffrey Voas
Issue Date:January 1999
pp. 28-29
No summary available.
 
STEM's Grand Challenge: Reviving Applied Mathematics
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas
Issue Date:September 2013
pp. 51-55
Math readiness presents a real challenge for both K-12 and college-level education. It affects mathematically intensive science, technology, engineering, and mathematics (STEM) fields of endeavor and threatens our readiness to invent and adapt.
 
STEM's Grand Challenge: Reviving Applied Mathematics
Found in: IT Professional
By George F. Hurlburt,Jeffrey Voas
Issue Date:September 2013
pp. 51-55
Math readiness presents a real challenge for both K-12 and college-level education. It affects mathematically intensive science, technology, engineering, and mathematics (STEM) fields of endeavor and threatens our readiness to invent and adapt.
 
Cloud Computing
Found in: IT Professional
By Irena Bojanova,Jia Zhang,Jeffrey Voas
Issue Date:March 2013
pp. 12-14
Cloud computing is no longer on the horizon; it has become the next logical step for the IT industry. It's the new strategic weapon in enterprise computing and the new norm in every sector of society. Businesses, educational institutions, governments, comm...
 
Beyond the Cloud: Cyberphysical Systems
Found in: IT Professional
By George Hurlburt,Jeffrey Voas
Issue Date:March 2013
pp. 2-4
Although clouds don't freely interact with fellow or competitor clouds today, this is likely to change, leading to larger networks of collaborative, autonomously operating clouds, each optimized for specific services. As this happens, we'll need a framewor...
 
Who Owns What? The Social Media Quagmire
Found in: IT Professional
By Keith W. Miller,Jeffrey Voas
Issue Date:November 2012
pp. 4-5
The assumption that participating in social media means abandoning privacy and security is an example of a somewhat false dichotomy&#x0097;"no security and privacy" on the one hand and "no information sharing" on the other. In reali...
 
BYOD: Security and Privacy Considerations
Found in: IT Professional
By Keith W. Miller,Jeffrey Voas,George F. Hurlburt
Issue Date:September 2012
pp. 53-55
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies and individuals involved, or thinking about getting involv...
 
The Mobile Software App Takeover
Found in: IEEE Software
By Jeffrey Voas,J. Bret Michael,Michiel van Genuchten
Issue Date:July 2012
pp. 25-27
Smartphones aren't very &#x201C;smart&#x201D; without the software apps that give them their usability and versatility. Apps, like all software, need some degree of guidance, regulation, and measurement to ensure a user is receiving proper function...
 
A Matter of Policy
Found in: IT Professional
By David Ferraiolo,Jeffrey Voas,George F. Hurlburt
Issue Date:March 2012
pp. 4-7
To many, system policy is a statement posted on a website indicating intention to protect personal data. In reality, policy is much broader, and its enforcement far more consequential. What if policy-derived rule sets could be rigorously defined and automa...
 
NASA Contributions to IT
Found in: IT Professional
By Tom Costello,Phillip A. Laplante,Jeffrey Voas
Issue Date:March 2012
pp. 2-3
Many beneficial technologies in computing and information processing have emerged over the more than 60 years since the creation of NASA. These technologies have profoundly affected civilian and military computing and IT applications. This issue celebrates...
 
Building Security into Off-the-Shelf Smartphones
Found in: Computer
By Angelos Stavrou,Jeffrey Voas,Tom Karygiannis,Steve Quirolgico
Issue Date:February 2012
pp. 82-84
Quantifying mobile application functionality and enforcing a finer-grained permission model would identify and thus thwart a wide range of malware.
 
Mobile-App Addiction: Threat to Security?
Found in: IT Professional
By George Hurlburt,Jeffrey Voas,Keith W. Miller
Issue Date:November 2011
pp. 9-11
Giving individuals this kind of information processing power, along with unprecedented connectivity, might be the single most impressive technical achievement of the 21st century. Nobody knows what the full impact of this transformation will be, but it's c...
 
The Evolution of Ubiquitously Intelligent Computing
Found in: IT Professional
By George Hurlburt,Jeffrey Voas
Issue Date:July 2011
pp. 56-60
This article reviews the history of computing, discussing important theories that have evolved alongside computers. From this historical backdrop, an outlook for fifth-generation computers emerges.
 
Vetting Mobile Apps
Found in: IT Professional
By Steve Quirolgico,Jeffrey Voas,Rick Kuhn
Issue Date:July 2011
pp. 9-11
Billions of copies of apps for mobile devices have been purchased in recent years. With this growth, however, comes an increase in the spread of potentially dangerous security vulnerabilities. Because of an app's low cost and high proliferation, the threat...
 
A Nonlinear Perspective on Higher Education
Found in: Computer
By George Hurlburt,Jeffrey Voas,Keith Miller,Phil Laplante,Bret Michael
Issue Date:December 2010
pp. 90-92
To their detriment, academic institutions are increasingly stove-piped in highly specialized disciplinary fields, often losing touch with emergent social, cultural, and natural realities.
 
In Trust We Trust
Found in: Computer
By Keith W. Miller, Jeffrey Voas, Phil Laplante
Issue Date:October 2010
pp. 85-87
Trust isn't a static property; it must be evaluated perpetually. Can we regain trust? Can the level of trust ever be the same?
 
Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems
Found in: IEEE Security and Privacy
By Ram Chillarege, Jeffrey Voas
Issue Date:September 2010
pp. 12-13
Cyber-physical systems feature a tight combination of a system's computational and physical elements. Understanding how to assess and design trustworthiness into these complex systems of systems remains an unsolved problem. This issue offers insights into ...
 
Trustworthiness in Software Environments
Found in: IT Professional
By John Harauz, Jeffrey Voas, George F. Hurlburt
Issue Date:September 2009
pp. 35-40
Any complex autonomic or organic computing system should be trustworthy to avoid the risk of losing control of it and to retain confidence that it won't fail. Today's distributed systems include components that are strongly dependent on each other for thei...
 
Effectively Defining
Found in: IT Professional
By Jeffrey Voas, Phillip Laplante
Issue Date:May 2010
pp. 46-53
<p>The authors review how to define a set of
 
Cloud Computing: New Wine or Just a New Bottle?
Found in: IT Professional
By Jeffrey Voas, Jia Zhang
Issue Date:March 2009
pp. 15-17
Cloud computing has evolved from previous computing paradigms going back as far to the days of mainframes, but is it really different? Do the explosive new capabilities from cloud computing solve any of the problems left unsolved from three decades ago? Th...
 
The Metaphysics of Software Trust
Found in: IT Professional
By Keith W. Miller, Jeffrey Voas
Issue Date:March 2009
pp. 52-55
This article focuses on the
 
Cyberpandemics: History, Inevitability, Response
Found in: IEEE Security and Privacy
By Bret Michael, Jeffrey Voas, Phil Laplante
Issue Date:January 2009
pp. 63-67
As cyberspace has evolved into a large, dynamic, and tangled web of computing devices, engineers often fail to design in dependability properties—such as stability, robustness, and security—at the system level. Consequently, unintentional and malevolent ac...
 
IT as a Profession: Is Competent Creation the Primary Goal?
Found in: IT Professional
By Keith W. Miller, Jeffrey Voas
Issue Date:November 2008
pp. 15-17
This article introduces four articles on the general theme of IT professionalism that make up this special issue. The authors also critique the assertion by J. Steib that
   
Information Integrity and IT Professionals' Integrity, Intertwined
Found in: IT Professional
By Keith W. Miller, Jeffrey Voas
Issue Date:November 2008
pp. 35-40
When a consumer accesses information, the consumer wants to trust that information. As computer professionals, our reputation with the public depends in large part on how the public perceives the information we deliver—if the public trusts the information,...
 
Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are?
Found in: IT Professional
By Keith W. Miller, Jeffrey Voas
Issue Date:July 2008
pp. 4-6
Job titles and functions shift quickly in the IT world, but some broad classifications can be useful for identifying what people do and how they view themselves. In some ways, the category of
   
What's in a Name? Distinguishing between SaaS and SOA
Found in: IT Professional
By Phillip A. Laplante, Jia Zhang, Jeffrey Voas
Issue Date:May 2008
pp. 46-50
Considerable confusion arises in distinguishing between software as a service (SaaS) and service-oriented architecture (SOA). Zachman's framework can help to try to make sense of the alphabet soup of Web services and utilities that form the basis for both ...
 
 1  2 Next >>