Pages: pp. 56-58
22–24. IEEE International Conference on e-Business Engineering (ICEBE 2008; http://conferences.computer.org/icebe), Xi'an, China. Conference topics include IT infrastructure, platforms, and middleware; enterprise resource planning and supply chain management; and component and service-based solutions for enterprise applications.
24–26. The 10th International Conference on Information Integration and Web-Based Applications & Services (iiWAS 2008; www.iiwas.org/conferences/iiwas2008/), Linz, Austria. Topics include Web-based enterprise systems and business processes and the impact of dependability and security in Web services. Online registration runs from 1 September through 21 November. The conference is held in conjunction with the Sixth International Conference on Advances in Mobile Computing & Multimedia (MoMM 2008; www.iiwas.org/conferences/momm2008/).
27–28. Australasian Data Mining Conference (AusDM 2008; http://ausdm08.togaware.com), Stamford Grand, Adelaide, Australia. This conference brings together the data mining and business analytics community to share research and developments in data mining algorithms and their applications. The proceedings will be published under the "Conferences in Research and Practice in Information Technology" series for distribution at the conference with a followup book to be published.
9–12. IEEE/WIC/ACM International Conference on Web Intelligence (WI 08; http://datamining.it.uts.edu.au/conferences/wi08/), Sydney, Australia. This conference explores Web intelligence, a new direction for artificial intelligence and advanced IT. Topics include knowledge representation, planning, knowledge discovery and data mining, intelligent agents, social network intelligence, wireless networks, ubiquitous devices, social networks, the semantic Web, and grids.
15–19. IEEE International Conference on Data Mining (ICDM 2008; http://icdm08.isti.cnr.it), Pisa, Italy. Topics include data mining algorithms, software and systems, and applications, with a particular focus on statistics, machine learning, pattern recognition, databases and data warehousing, data visualization, knowledge-based systems, and high-performance computing. The conference features workshops, tutorials, panels, and a data mining contest.
6–8. IEEE CS International Conference on Communications and Mobile Computing (CMC 2009; www.world-research-institutes.org/conferences/CMC/2009/), Kunming, Yunnan, China. This conference focuses on topic areas such as wireless communications, wireless networking, optical communications and networking, mobile computing and the Internet, and computer and network security.
8–10. International Conference on Web Intelligence Systems (ICWIS 09; www.rajalakshmi.org/icwis09/), Chennai, India. Topics include Internet technology, Web mining, the Semantic Web, ontology engineering, Web information systems, and knowledge engineering. Registration deadline is 7 December.
8–10. International Conference on Web Intelligence Systems (ICWIS 09; www.rajalakshmi.org/icwis09/dates.html), Chennai, India. This conference covers Internet technology, Web mining, the semantic Web, ontology engineering, Web information systems and knowledge engineering, among other topics. Registration deadline is 7 December.
17–19. IEEE CS Conference on Software Engineering Education and Training (CSEE&T 09; http://serl.iiit.ac.in/CSEET/), Hyderabad, India. Areas of particular focus include large-scale distributed software engineering; collaborative environments; and computer-supported cooperative software engineering, tools, and processes for agile methods.
18–20. Conference on Information Sciences and Systems (CISS 09; http://ciss.jhu.edu), Baltimore, Maryland. Topics include signal and image processing and analysis, systems biology and control, communication and information theory, computer engineering, and photonic systems. Submission deadline for papers is 5 January 2009.
The About.com people have produced a site ( http://netsecurity.about.com) dedicated to computer security. Tony Bradley, a well-known information security author, provides a daily blog that offers tips, tutorials, and reviews to help users of all levels understand the concepts of network security. The site also features articles on topics such as wireless, Web browser and phishing security, popups and spyware, and viruses and malware, along with product and book reviews.
ITtoolkit ( www.ittoolkit.com) is aimed at IT and project management professionals. The site offers a series of management kits and planning templates for purchase. The products combine e-books, interactive forms, and document templates that cover topics such as project risk management, project reviews, and disaster recovery planning. The site also offers a collection of free articles, forms, templates, and white papers in three primary subject areas: project management, IT operations, and general management.
Produced by Penn State University's information technology department, Academic Services and Emerging Technologies (ASET, http://aset.its.psu.edu) investigates new IT technologies, architectures, and strategies. Current ASET investigative areas represent a broad cross-section of IT areas. ASET hopes to play a crucial role in helping identify, prototype, and perhaps build systems in emerging technologies that can serve the disparate needs of Penn State students, faculty, and staff. Some ASET initiatives originate externally, from Penn State peers or other universities and institutions or agencies, and some stem from interactions within the ASET group. Current investigative areas include spam prevention, large network storage, and location-aware computing.
The nonprofit Data Management Institute (DMI, www.datainstitute.org) is a membership-driven community in which administrators and managers of data storage, management, and protection technologies can ask questions and share their experiences with common storage problems. Members can also get unbiased information about storage technology products and services from peers and industry experts, and acquire skills and knowledge to further their development as data management professionals.
Eclipse ( www.eclipse.org) is dedicated to building an open development platform comprising extensible frameworks, tools, and runtimes for software across the life cycle. The nonprofit member-supported Eclipse Foundation hosts Eclipse projects and helps cultivate both an open source community and an ecosystem of complementary products and services. IBM originally created the Eclipse Project in 2001 to be supported by a consortium of software vendors. Today, the Eclipse community consists of individuals and organizations from across the software industry.
To assist in the Eclipse ecosystem's development, the Eclipse Foundation organizes several activities, including cooperative marketing events, community conferences (EclipseCon and Eclipse Summit Europe), online resource catalogs (EPIC and Eclipse Live), biannual member meetings, and other programs to promote the entire Eclipse community.
The Cornell University Wireless Networks Laboratory (WNL, http://people.ece.cornell.edu) focuses on wireless communication and networking protocols and algorithms as part of its goal to provide ubiquitous access for mobile and multimedia users. The lab's research emphasis is on ad hoc networking technology, self-reconfigurable systems, and power-limited communication protocols. Recently, WNL explored several new directions, such as applying communication and networking technologies to solve biological problems, designing biologically inspired protocols, and improving delay-tolerant communication. Governmental agencies such as the US National Science Foundation and the Office of Naval Research and industrial companies such as Nortel Networks, Boeing, and Scientific Research Corporation sponsor this research.
In Reconfiguring the Firewall: Recruiting Women to Information Technology Across Cultures and Continents (Transatlantic Publishers Group, 2007, ISBN 978-1-5688-1314-1, 253 pages), editors Carol Burger, Elizabeth Creamer, and Peggy Meszaros uncover the factors that influence women's interest in and choice of IT as a career field, and how these factors vary across cultures and regions. The results of their studies are prescriptive for designing and implementing recruitment programs in both educational and professional settings.
Covering 127 economies worldwide, the seventh edition of The Global Information Technology Report (Palgrave Macmillan, 2008, ISBN 978-1-4039-9932-0, 376 pages) assesses the impact of information and communication technology (ICT) on national development and competitiveness. Authors Soumitra Dutta and Irene Mia provide key statistics and analytics from the Networked Readiness Index, which measures the propensity for countries to exploit opportunities offered by information and communications technology. They also provide essays on various issues related to networked readiness, showcasing the best policies for leveraging ICT in growth and development. The report is the result of collaboration between the World Economic Forum and the European Institute of Business Administration (INSEAD).
Even in "employment at will" companies, IT managers can be exposed to significant expenses when terminating computer professionals. You're Fired! Firing Computer Professionals: The IT Manager Guide (Rampant Techpress, 2005, ISBN 0-9744486-4-8, 224 pages) is a guide for IT managers to justify firing employees "for cause." Just as employers are under duty to provide good working environments, employees are bound by rules of ethics, disclosure, and proper use of computing resources. By identifying cases of fraud, unauthorized disclosure, and resource abuse, author Robert Papaj shows how to fire an IT employee for just cause.