Search For:

Displaying 1-34 out of 34 total
Surviving Distributed Denial-of-Service Attacks
Found in: IT Professional
By Simon Liu
Issue Date:September 2009
pp. 51-53
A series of distributed denial-of-service (DDoS) attacks were launched against computer systems and services in the US and South Korea beginning July 4th. A DDoS attack is an attempt to make a computer service unavailable to its intended users. The mechani...
 
High Performance Networks for the ATLAS Tier-1 @ TRIUMF
Found in: High Performance Computing Systems and Applications, Annual International Symposium on
By Chris Payne, Denice Deatrich, Simon Liu, Steve McDonald, Reda Tafirout, Rodney Walker, Andrew Wong, Michel Vetterli
Issue Date:June 2008
pp. 161-166
Networking at an ATLAS Tier-1 (T1) facility is a demanding aspect which is vital to the overall performance and efficiency of the facility. External connectivity of the??facility to other tiers of the Large Hadron Collider Optical Private Network (LHCOPN) ...
 
Grid Infrastructure and Large Scale Production for ATLAS
Found in: High Performance Computing Systems and Applications, Annual International Symposium on
By Denice Deatrich, Simon Liu, Chris Payne, Reda Tafirout, Rodney Walker, Andrew Wong, Michel Vetterli
Issue Date:June 2008
pp. 172-176
In preparation for the startup of the LHC collider at CERN, the ATLAS collaboration is performing computing challenges of increasing complexity and scale. Monte Carlo production is ongoing with some 10,000 concurrent jobs worldwide, including at Canadian c...
 
Managing Petabyte-Scale Storage for the ATLAS Tier-1 Centre at TRIUMF
Found in: High Performance Computing Systems and Applications, Annual International Symposium on
By Denice Deatrich, Simon Liu, Chris Payne, RĂ©da Tafirout, Rodney Walker, Andrew Wong, Michel Vetterli
Issue Date:June 2008
pp. 167-171
The ATLAS experiment at the Large Hadron Collider (LHC), located in Geneva, will collect 3 to 4 petabytes or PB (10^15 bytes) of data for each year of its operation, when fully commissioned. Secondary data sets resulting from event reconstruction, reproces...
 
Getting the Most from Your Enterprise Architecture
Found in: IT Professional
By Mark Boster, Simon Liu, Rob Thomas
Issue Date:July 2000
pp. 43-50
<p>Failure to grasp what makes an architecture valuable can thwart the best of plans.</p>
 
Engineering the Success of Software Development
Found in: IT Professional
By Simon Liu
Issue Date:September 2013
pp. 4-5
Why are software failure rates so high and the impact so large? What are the main reasons for software failure? The five articles in this issue provide a glimpse of software engineering, focusing primarily on the process and product dimensions.
 
Engineering the Success of Software Development
Found in: IT Professional
By Simon Liu
Issue Date:September 2013
pp. 4-5
Why are software failure rates so high and the impact so large? What are the main reasons for software failure? The five articles in this issue provide a glimpse of software engineering, focusing primarily on the process and product dimensions.
 
Exploring the Future of Computing
Found in: IT Professional
By Simon Liu
Issue Date:January 2013
pp. 2-3
Now more than ever, IT professionals must embrace what Simon Liu refers to as the "future-computing" paradigm, anticipating and adopting new concepts, strategies, approaches, and skills. In 2013, IT Pro will cover many aspects of what matters mos...
 
Mobile Health
Found in: IT Professional
By Simon Liu,Thomas Jepsen
Issue Date:May 2012
pp. 11-12
The unprecedented proliferation of mobile devices and growing innovation and sophistication in mobile software applications to address healthcare priorities has evolved into a new field known as mobile health. This field adds modern technology advances to ...
 
New Perspectives for IT
Found in: IT Professional
By Simon Liu
Issue Date:January 2012
pp. 2-4
Get a preview of the technology, topics, and challenges IT Professional will cover in 2012.
 
Real-Time Location Systems and RFID
Found in: IT Professional
By J. Morris Chang, Yo-Ping Huang, Simon Liu
Issue Date:March 2011
pp. 12-13
<p>RFID has revolutionized asset tracking and new applications are constantly appearing in the fields of transportation, banking, healthcare, and security. This special issue reports on recent experiences in developing RFID applications, middleware, ...
 
IT Professional in 2011
Found in: IT Professional
By Simon Liu
Issue Date:January 2011
pp. 4-5
For IT professionals, 2011 brings new challenges. The growing importance of green computing, the increase of context-aware applications, the intensity of cyberattacks, the proliferation of social networking and collaboration, the promise of next-generation...
 
Supporting a Mobile Workforce
Found in: IT Professional
By Simon Liu
Issue Date:May 2010
pp. 4-5
<p>There's no technological panacea for the mobile workforce; technology alone won't enable enterprises to manage the full scale of mobility challenges. Yet depending solely on skilled people is unrealistic and non-repeatable. Organizations need poli...
 
Data Loss Prevention
Found in: IT Professional
By Simon Liu, Rick Kuhn
Issue Date:March 2010
pp. 10-13
Today's movement toward extensive use of electronic medical records can present a new class of risk for both the consumer and the organization.
 
The IT Professional Outlook: Where Do We Go from Here?
Found in: IT Professional
By Simon Liu
Issue Date:January 2010
pp. 4-5
IT Pro's new editor in chief, Simon Liu, lays out his plans for the magazine's articles and departments for the year ahead, describing an editorial calendar that promises to be as diverse as it is relevant.
 
Practical Interdomain Routing Security
Found in: IT Professional
By Rick Kuhn, Simon Liu, Hart Rossman
Issue Date:November 2009
pp. 54-56
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vul...
 
Guest Editor's Introduction: Cybersecurity in a Falling Economy
Found in: IT Professional
By Simon Liu
Issue Date:May 2009
pp. 12-13
As organizations suffer through a declining economy, many will be forced to make security cutbacks they wouldn't ordinarily consider to be acceptable. IT leaders and managers making security cuts must ensure that their cyberdefense continues to meet organi...
 
Understanding Insecure IT: Practical Risk Assessment
Found in: IT Professional
By Simon Liu, Rick Kuhn, Hart Rossman
Issue Date:May 2009
pp. 57-59
Risk assessment involves gathering and evaluating risk information so that enterprise stakeholders can make mitigation decisions. Once we identify the risks, we can rank the probability of each one's occurrence and its impact on the organization. Some risk...
 
From Ancient Fortress to Modern Cyberdefense
Found in: IT Professional
By Simon Liu, Jerry Ormaner
Issue Date:May 2009
pp. 22-29
Establishing an effective enterprise cyberdefense mechanism is conceptually similar to building a fortress city in ancient times. The authors describe the parallels by comparing observation towers, fortified walls, gates, alarms, guards, and cyberdefense.
 
Cyberattacks: Why, What, Who, and How
Found in: IT Professional
By Simon Liu, Bruce Cheng
Issue Date:May 2009
pp. 14-21
Enterprises rely extensively on computerized information systems and electronic data in cyberspace to perform their daily activities and business. Today, virtually all public and private organizations connect to and live in cyberspace. As computers, inform...
 
Surviving Insecure IT: Effective Patch Management
Found in: IT Professional
By Simon Liu, Rick Kuhn, Hart Rossman
Issue Date:March 2009
pp. 49-51
The amount of time to protect enterprise systems against potential vulnerability continues to shrink. Enterprises need an effective patch management mechanism to survive the insecure IT environment. Effective patch management is a systematic and repeatable...
 
Introducing
Found in: IT Professional
By Rick Kuhn, Hart Rossman, Simon Liu
Issue Date:January 2009
pp. 24-26
This article introduces
 
Reflections on Ten Years
Found in: IT Professional
By Simon Liu
Issue Date:November 2008
pp. 4-6
In the past ten years, IT Professional has published articles, columns, and news briefs with high-quality overviews and surveys in hot topics, critical issues, best practices, emerging trends and technologies, infrastructure products and services, and busi...
 
Enabling Electronic Healthcare Information Exchange
Found in: IT Professional
By Simon Liu
Issue Date:November 2007
pp. 17-23
The Unified Medical Language System (UMLS) Metathesaurus enables the standardized representation of healthcare information so that it can be correctly stored, manipulated, retrieved, and exchanged.
 
A Practical Vulnerability Assessment Program
Found in: IT Professional
By Simon Liu, Larry Holt, Bruce Cheng
Issue Date:November 2007
pp. 36-42
Firewalls, malicious-code-screening servers, and intrusion-detection systems aren't sufficiently comprehensive to ensure appropriate and ongoing information confidentiality, integrity, and availability. A practical vulnerability assessment program lets org...
 
RxNorm: Prescription for Electronic Drug Information Exchange
Found in: IT Professional
By Simon Liu, Wei Ma, Robin Moore, Vikraman Ganesan, Stuart Nelson
Issue Date:September 2005
pp. 17-23
The nomenclature for today's commercial drug information systems follows a variety of naming conventions. Within any given hospital, there might be one system for ordering, another for inventory management, and yet another for recording dose adjustments. A...
 
Service-Based Computing Strategy & Planning
Found in: Services Computing, IEEE International Conference on
By Frank E. Ferrante, Arnold Bragg, Ken Christensen, Wayne Clark, Simon Liu, Joseph Williams, Liang-Jie Zhang
Issue Date:July 2005
pp. xxvii-xxviii
No summary available.
   
Improving Web Access for Visually Impaired Users
Found in: IT Professional
By Simon Liu, Wei Ma, Dale Schalow, Kevin Spruill
Issue Date:July 2004
pp. 28-33
The NIH Senior Health Web site offers a case study in developing a robust audio and visual interface for older adults with visual impairments
 
Successful CIOs: Pushing the IT Business Value Envelope
Found in: IT Professional
By John D. Hwang, Simon Liu
Issue Date:March 2004
pp. 10-16
Any IT system should add value to the business. Frameworks help you determine whether your IT investments make sense.
 
Business Line Implementation for Electronic Services
Found in: IT Professional
By John Dodd, Chander Ramchandani, Simon Liu
Issue Date:May 2003
pp. 30-36
<p>Business lines can help diverse agencies collaborate to deliver efficient electronic services. Find out how to implement them.</p>
 
Challenges to Transforming IT in the US Government
Found in: IT Professional
By Simon Liu, John D. Hwang
Issue Date:May 2003
pp. 10-15
<p>Nearly seven years ago, the US Congress passed the Clinger-Cohen Act to revolutionize IT management in federal agencies. So, where's the e-government?</p>
 
A Practical Framework for Discussing IT Infrastructure
Found in: IT Professional
By Simon Liu
Issue Date:July 2002
pp. 14-21
<p>Although increasingly important, IT infrastructure remians poorly defined. These tips can help you think more clearly about infrastructure issues.</p>
 
A Practical Approach to Enterprise IT Security
Found in: IT Professional
By Simon Liu, John Sullivan, Jerry Ormaner
Issue Date:September 2001
pp. 35-42
<p>Don't wait until you have a damaging security incident to build a security architecture. Here's a practical blueprint for starting one now.</p>
 
A Practical Guide to Biometric Security Technology
Found in: IT Professional
By Simon Liu, Mark Silverman
Issue Date:January 2001
pp. 27-32
<p>Technology-savvy organizations looking to develop a competitive advantage should carefully watch developments in biometrics.</p>
 
 1