scispace - formally typeset
Search or ask a question

Showing papers in "IT Professional in 1999"


Journal ArticleDOI
TL;DR: The concepts the authors outline are just a task list in the work to establish an enterprise architecture, but they give you some idea of the breadth of the job ahead of you.
Abstract: It makes sense to plan the growth of your information systems. But many attempts to create a road map start at the wrong level. Ensuring a consistent, coherent vision to direct the evolution of the enterprise's information systems is difficult enough with a development framework. Without one, it's impossible. The concepts we outline are just a task list in the work to establish an enterprise architecture, but they give you some idea of the breadth of the job ahead of you. However, we hope we've given you a start toward a more realistic vision of your enterprise architecture.

208 citations


Journal ArticleDOI
TL;DR: The article shows how to scope the project, set up the development team, and form a target architecture vision to achieve specific goals in an enterprise information technology architecture.
Abstract: For most organizations, getting started may be the hardest part of building an enterprise information technology architecture. One reason is that people have only a hazy idea of how to use a systematic architecting process to achieve specific goals. The entire idea of enterprise architecting seems grand and out of reach, so they feel more comfortable chipping away at it with patches. Unfortunately, these patches evolve to something only slightly more sophisticated. Some efforts never get that far. The architects get caught in a never-ending series of analyses and end up with nothing but a long to-do list just as the money runs out and the CEO expects to start seeing a return on investment. The article shows how to scope the project, set up the development team, and form a target architecture vision.

130 citations


Journal ArticleDOI
TL;DR: The real difficulty in implementing an ERP environment is not because it's a new system or because it means making changes, but because it instills discipline into an undisciplined organization as mentioned in this paper.
Abstract: An ERP environment emphasizes constant change and reassessment of organizational processes and strategic vendor alliances. Processes are standardized, but they aren't static. Unlike the legacy systems that inhibit making changes, regular ERP updates force change on already dynamic organizations. The real difficulty in implementing an ERP isn't because it's a new system or because it means making changes. The challenge is that it instills discipline into an undisciplined organization. And while it helps the organization as a whole respond to changes in market demands and customer needs, employees don't necessarily see this cultural change as an improvement.

107 citations


Journal ArticleDOI
TL;DR: This work believes the essential role of middleware is to manage the complexity and heterogeneity of distributed infrastructures and thereby provide a simpler programming environment for distributed-application developers.
Abstract: Traditionally, most definitions seeking to characterize middleware suggest that it is the software that facilitates remote database access and systems transactions. More recently, the term has come to be associated-somewhat limitingly-with distributed platforms such as the Open Software Foundation's Distributed Computing Environment (DCE) and the Object Management Group's Common Object Request Broker Architecture (CORBA). And some have loosely applied it to systems as diverse as workflow support environments and even to the Web itself. We believe the essential role of middleware is to manage the complexity and heterogeneity of distributed infrastructures and thereby provide a simpler programming environment for distributed-application developers. It is therefore most useful to define middleware as any software layer that is placed above the distributed system's infrastructure-the network OS and APIs-and below the application layer.

70 citations


Journal ArticleDOI
TL;DR: The world’s progress toward Y2K compliance, the extent of system and essential-service failures likely on 1 January 2000, and what measures IT professionals can take to ensure that their systems and the businesses they support continue to function are discussed.
Abstract: J ohn Koskinen chairs the President’s Council on Year 2000 Conversion, which coordinates the US government’s efforts to address the Y2K problem. IT Professional Associate Editor-in-Chief Frank E. Ferrante spoke with Koskinen about the world’s progress toward Y2K compliance,the extent of system and essential-service failures likely on 1 January 2000,and what measures IT professionals can take to ensure that their systems and the businesses they support continue to function.

37 citations


Journal ArticleDOI
TL;DR: Analysts and some early adopters say XML will help simplify this complex, labor-intensive process because it lets developers precisely identify pieces of data on the basis of content.
Abstract: Many companies have a wealth of information in their databases and applications, and want to leverage these assets. They are beginning to see that XML could help them do this by providing a standard data format for cross-platform information exchange. XML thus offers a powerful new way to integrate new and existing applications within companies. Today much of that linking must be done using enterprise application integration software, which is often complex and quite costly. Developers may have to translate legacy APIs to new component APIs or change flow data and workflow processes are structured to permit data exchange between incompatible applications. Analysts and some early adopters say XML will help simplify this complex, labor-intensive process because it lets developers precisely identify pieces of data on the basis of content.

35 citations


Journal ArticleDOI
TL;DR: Only a complete rethinking of the elements of software design to incorporate both support information and guidance will yield increased functionality and improved user performance.
Abstract: Knowledge management applications must convey two types of information. The first type, support information, includes descriptive explanations that serve as a basis for understanding (who, what, when, where, with what, and why). The second type, guidance, strengthens your ability to act, through explanations of how to accomplish a task. The relationship between IT and knowledge management is strong and much needed. Only a complete rethinking of the elements of software design to incorporate both support information and guidance will yield increased functionality and improved user performance. In choosing or developing various products, ask yourself: Will this information technology help users gain understanding? Will it improve their ability to act? Information technology that is designed to enhance both understanding and action can add great value to business applications. Taking this next step in IT design will enable dramatic improvements in workplace performance.

29 citations


Journal ArticleDOI
Andrew Odlyzko1
TL;DR: In fact, corporate data networks in the US are lightly utilized as mentioned in this paper, with much lower average use than the Internet backbones, and they run at three to five percent in an average week.
Abstract: If you think data networks run at full capacity, think again. Most run at three to five percent in an average week. In fact, corporate data networks in the US are lightly utilized, with much lower average use than the Internet backbones. But low utilization is not necessarily a problem. It may in fact be the most efficient solution in terms of total system cost. Given the nature of the beast, there may be no way around it; utilization will stay low as long as data networks must accommodate bursty transmissions, users concentrate traffic during regular business hours, and network administrators have to provide spare capacity for the rapid introduction of new services.

27 citations


Journal ArticleDOI
TL;DR: In this article, basic data mining techniques helped the US Department of Agriculture's Rural Housing Service better understand and classify problem loans, and the results showed that some USDA loans perform better than others.
Abstract: The USDA's (US Department of Agriculture) Rural Housing Service administers a loan program that lends or guarantees mortgage loans to people living in rural areas. To administer these nearly 600000 loans, the department maintains extensive information about each one in its data warehouse. As with most lending programs, some USDA loans perform better than others. Basic data mining techniques helped the USDA's Rural Housing Service better understand and classify problem loans.

26 citations


Journal ArticleDOI
TL;DR: In this paper, the authors predicted that the market for wireless data networks will grow to 6 to 8 million users with seven percent of the total wireless revenues within five years, and the combination of portable gadgets and wireless data services provides exciting opportunities for mobile computing applications.
Abstract: Mobile computing applications allow anytime, anywhere access to the Internet and corporate intranets. For several reasons, the market for wireless data services has grown at a much slower rate than wireless voice. Until recently, portable data devices were bulky, required heavy batteries, and didn't have integrated networking. Wireless services have also had to contend with narrow bandwidths, high access latency, and frequent disconnection. Added to this were inadequate coverage, expensive services, and perceived security problems. Finally, few applications were specifically designed with mobility in mind. New mobile technologies address these problems, making wireless data transmission an attractive alternative for individuals and enterprises. The next few years will see wireless data networks come into their own. Next year (year 2000), the market for wireless data networks is predicted to grow to six to eight million users with seven percent of the total wireless revenues. In fact, wireless data service is projected to be a multibillion-dollar market within five years. The combination of portable gadgets and wireless data services provides exciting opportunities for mobile computing applications.

25 citations


Journal ArticleDOI
TL;DR: A wide range of metrics can aid you in managing projects, but here the author focuses on a particular set of product metrics that highlight and quantify a system's object-oriented (OO) properties.
Abstract: While there are many ways you can capture your development experiences, metrics can help quantify previous work in a way that can directly guide future efforts. For example, projects of different sizes can require vastly different levels of effort, organizational structure, and management discipline. If you let experience be your guide and understand how a newly proposed system compares to projects you've already completed, you have a much better chance of finishing on time and under budget. A wide range of metrics can aid you in managing projects, but here the author focuses on a particular set of product metrics that highlight and quantify a system's object-oriented (OO) properties. He draws many of the results mentioned here from an analysis of 18 production-level applications built in PowerBuilder-a common GUI tool used for developing client-server database applications on a variety of platforms. (The PowerBuilder metrics analyzer is available free from American Management Systems-http:// www.amsinc.com.) Although these results are derived mainly from PowerBuilder applications, they should still provide practical guidance for development in most OO languages.

Journal ArticleDOI
TL;DR: How effective mentoring is key to providing this support toIT professionals is considered, with the organization providing structured, systematic support.
Abstract: IT professionals must apply new information on a continuing basis. How does an organization ensure that its developers are up to speed and effectively applying the latest technology? Companies have long since discovered the value of formal training, but transferring development skills and advanced technology also requires hands-on, face-to-face assistance. The paper considers how effective mentoring is key to providing this support. A mentor has the experience and knowledge needed to offer expert guidance. Mentoring can be informal, with one team member helping another with a specific problem as needed, or it can be much more formal, with the organization providing structured, systematic support.

Journal ArticleDOI
TL;DR: The most productive way to reverse engineer a database is to build a model that conveys the software's scope and intent, usually expressed as Unified Modeling Language (UML) object models.
Abstract: It may seem hard to choose between two software products, but studying their databases can reveal a clear winner and save you years of grief. The most productive way to reverse engineer a database is to build a model that conveys the software's scope and intent. For a clean database, you'll most likely want to prepare a model; for a flawed and poorly documented database, it may be best to stop after studying the style and quality of the database structure. At OMT Associates, we generally construct models-usually expressed as Unified Modeling Language (UML) object models. We typically organize reverse engineering into three phases-implementation recovery, design recovery, and analysis recovery. Reverse engineering is more than just a process for studying databases; it has profound implications for software development in general. You might view the reverse engineering of vendor databases as a creative response to the so-called software crisis. The current approach of preaching methodology and discipline isn't working, Software quality and development productivity still badly lag behind our desires. Database reverse engineering gives us both a carrot and a stick. The flaws and excellence of various products become more obvious and more heavily influence product success and failure. For a large corporation, the cost of the evaluation (as little as a few person-weeks) is trivial compared to the millions spent buying and deploying new software.

Journal ArticleDOI
TL;DR: In today's fast-paced IT environment, technology and skill sets change very quickly, and IT managers have no choice but to prepare for a future that includes outsourcing.
Abstract: Many IT managers are struggling with the question of whether and how to outsource various functions. Businesses of all sizes are seriously considering shifting some IT assets to a third party. In today's fast-paced IT environment, technology and skill sets change very quickly. In reality, IT managers have no choice but to prepare for a future that includes outsourcing. IT staff have long been pressured to cut costs. But now, they're also expected to discover new revenue streams. To meet these bottom-line objectives, IT managers must deal with change, manage complexity, and find skilled workers. That's where outsourcing is seen to greatly improve the efficiency of an IT operation.

Journal ArticleDOI
TL;DR: As analysts explicitly integrate models using MBASE, they can recognize and reconcile model clashes as a matter of course, instead of after the fact.
Abstract: Sooner or later, the assumptions people make about what a system should do will conflict. Here's how to recognize it before it's too late. Systems analysis is rapidly coming of age. Many projects have successfully used a new approach called MBASE (Model-Based System Architecting and Software Engineering). The MBASE approach integrates the four common development models (success, product, process, and property) around the creation and use of a software architecture package. As analysts explicitly integrate models using MBASE, they can recognize and reconcile model clashes as a matter of course, instead of after the fact.

Journal ArticleDOI
TL;DR: The article shows how you, as a security products consumer, can use the Common Criteria for Information Technology Security Evaluation standard to help determine if a given product meets your security needs.
Abstract: The Common Criteria for Information Technology Security Evaluation standard (CC) promises to replace scattered and often conflicting regional and national security standards. An emerging international standard, it is intended to support developers, evaluators and consumers of security products. The CC provides a framework to rate products by evaluation assurance level (EAL). Each EAL embodies a recommended set of assurance requirements: the higher the EAL, the more secure the product. You can use EALs to pick and choose which assurance requirements you want to satisfy. Think of the EALs as you would think of bandwidth or processor speed. Not everyone in your organization needs a dedicated T3 line or a 450 MHz desktop. Likewise, not every security product you use needs an EAL7 rating. The article shows how you, as a security products consumer, can use the CC to help determine if a given product meets your security needs. By rating different products according to their EALs, the CC can help you comparison shop and select an appropriately secure product. Further, the standard's international scope can help you integrate your system's security components with those in other countries-whether those components belong to customers, vendors, or other divisions of your own enterprise.

Journal ArticleDOI
TL;DR: On the basis of the involvement in the technology sector, Australia views e-commerce as the use of modern technologies to conduct business transactions and make online interactions easier.
Abstract: On the basis of our involvement in the technology sector, we believe that Australia views e-commerce as the use of modern technologies to conduct business transactions and make online interactions easier. Transactions involve the Internet, as well as smart cards, automated phone systems, and electronic communications to solicit, service, and maintain business relationships. Overcoming trust issues is a top priority for both business-to-consumer and business-to-business e-commerce in Australia.

Journal ArticleDOI
TL;DR: Advice is given on how to achieve effective IT architecture management through a clear and manageable architecture definition.
Abstract: An IT architecture is a series of principles, guidelines, drawings, standards, and rules that guide an organization through acquiring, building, modifying, and interfacing IT resources. These resources include hardware, software, communication protocols, application development methodologies, database systems, modeling tools, IT organizational structures, data, and more. It should provide a purposeful and executable design so that you know what you need to build, what you are actually building, and how you can make transformations at maximum speed with minimal cost and disruption. Blueprints visualize and communicate that design by illustrating architectural adaptability points. They are the focal point for understanding the relationships between IT assets and for changing those relationships. Many companies end up with an architectural mess because they never institute a clear and manageable architecture definition. They take isolated actions under the rubric of architecture, but never institute effective ways to govern, change, and record architecture. The article gives advice on how to achieve effective IT architecture management.

Journal ArticleDOI
TL;DR: The Iceberg project is exploring the research issues in establishing the interfaces between IP and telecom, and it aims to answer some hard questions along the way.
Abstract: Truly ubiquitous and seamless integration of wireless networks and services will require clear interfaces between IP and telecom. Today, the intersection of IP and telecom contains uncharted waters, ungoverned by any standards, de facto or otherwise. Before conflicting standards and technologies arise, the Iceberg project is exploring the research issues in establishing the interfaces-and it aims to answer some hard questions along the way.

Journal ArticleDOI
TL;DR: The I'Net age (the combination of the Internet, intranets, and extranets) supports real-time or synchronous interaction, and RTC tools help communicate graphical and text-based information in a synchronous fashion.
Abstract: The I'Net age (the combination of the Internet, intranets, and extranets) supports real-time or synchronous interaction. Synchronous interactions are those in which a response typically occurs in less than 10 seconds. Relying on a standard Java-enabled 4.x browser, many organizations are collaborating in real time on decisions, proposals, customer service, e-commerce, marketing documents, and more. As defined by our consultancy, Collaborative Strategies, the functionality of a real-time collaboration (RTC) tool resides between the phone and email. RTC tools help communicate graphical and text-based information in a synchronous fashion. To date, users have typically run interactive sessions in conjunction with a conference call, since voice over IP can have unreliable quality, especially over the Internet.

Journal ArticleDOI
TL;DR: After Y2K, what's the best way to position your organization for e-commerce, information sharing, and resource use? Here's one city's plan as discussed by the authors In 1997, the Metropolitan Planning Council of Chicago concluded that the digital network infrastructure was becoming vital to the health of the entire region Yet the council also saw that infrastructure development was disjointed and likely to be incomplete.
Abstract: After Y2K, what's the best way to position your organization for e-commerce, information sharing, and resource use? Here's one city's plan In 1997, the Metropolitan Planning Council of Chicago concluded that the digital network infrastructure was becoming vital to the health of the entire region Yet the council also saw that infrastructure development was disjointed and likely to be incomplete A thorough IT strategic plan, the council concluded, was overdue The council turned to Northwestern University's Information Technology Division to analyze the situation and make recommendations The report was to address not only the key issues but also how the digital network will become the newest universally available infrastructure in metropolitan Chicago The report (http://wwwnwuedu/it/metrochicago) evolved from a series of papers by Northwestern faculty discussions and seminars with faculty and regional professionals, and research gleaned from across the country (USA) The report takes a look at the opportunities and challenges facing a global city when it decides to leverage its resources to position itself for the 21st century What was found applies equally well to other regions and even to large companies, which also have information ecosystems, quality-of-life issues, and complex infrastructure requirements

Journal ArticleDOI
TL;DR: Companies still value career fairs, on-campus interviews, advertising, and promotional publications, but analysts and service providers agree that posting jobs or resumes on Web sites is just one of many avenues employers and workers can use.
Abstract: Companies are using new, high-tech techniques to find skilled IT workers more efficiently. For example, the Web has changed the way employers can screen candidates. Web-accessible databases enable employers to screen hundreds of resumes in seconds. Recruiting executives agree that the efficiencies generated by centralized databases generate huge savings per hire, in cash and time. Job seekers are also adapting their methods to make their availability and qualifications known. With the single click of a button, job seekers can post their resumes to one or more sites, and Internet service providers have a simple way to collect resumes and route them. Nonetheless, analysts and service providers agree that posting jobs or resumes on Web sites is just one of many avenues employers and workers can use. Companies still value career fairs, on-campus interviews, advertising, and promotional publications.

Journal ArticleDOI
TL;DR: The author considers how integration is a particular problem because the portable devices operate on a variety of platforms and use a range of communications protocols.
Abstract: Today's mobile workforce is using mobile tools for communication and computing. To stay connected and keep up with their workflow while on the road, many workers have turned to smart phones, personal digital assistants (PDAs), notebook computers, and other portable devices that provide network and Internet connectivity. While on the road, these mobile workers may want access to enterprise applications and databases. When they circle back to home base, they will likely want to upload information from their portable devices into their primary workstations or onto the company network. These activities raise critical access and security concerns. The author considers how integration is a particular problem because the portable devices operate on a variety of platforms and use a variety of communications protocols.

Journal ArticleDOI
TL;DR: The article examines various system security methods, including: identification and authentication techniques; firewalls; audit trails; and automated intrusion detection systems.
Abstract: Making your system safe is no cinch, but here's a guide to getting started. The article examines various system security methods, including: identification and authentication techniques; firewalls; audit trails; and automated intrusion detection systems.

Journal ArticleDOI
A.W. Bragg1
TL;DR: ATM has offered QoS guarantees for nearly a decade, but the push is now for IP-based solutions, and vendors are beginning to ship QoS-capable hardware and software.
Abstract: ATM has offered QoS guarantees for nearly a decade, but the push is now for IP-based solutions. IP is ubiquitous in today's congested networks. Applications are more complex, users are more demanding, standards bodies are more receptive, and technology is more sophisticated. All this has focused attention on ways to add QoS to IP networks without exorbitant cost. But with progress has come some confusion. Telecommunications carriers and service providers are already enticing customers by offering two or three distinct classes of service over their IP networks. Vendors are beginning to ship QoS-capable hardware and software. ATM is firmly established in the Internet's core. A lot has happened in a short time, which means that users and providers must be aware of where things are going and what the various QoS technologies can actually do. Some QoS mechanisms deliver strict, absolute performance guarantees. Others merely offer assurances that one service class will take priority over another when resources are scarce.

Journal ArticleDOI
TL;DR: Ventana Corp., markets GroupSystems, the first virtual teaming system, which applies computing technology to team work, using automation to accelerate collaborative thinking, consensus building, decision making, and planning.
Abstract: Virtual teaming systems (VTS) can provide your organization with new capabilities that will enhance its competitiveness. Our company, Ventana Corp., markets GroupSystems, the first virtual teaming system. The ideas behind GroupSystems came from years of rigorous academic research into the ways people collaborate. A VTS applies computing technology to team work, using automation to accelerate collaborative thinking, consensus building, decision making, and planning. It also provides the seed for a knowledge base of organizational expertise.

Journal ArticleDOI
TL;DR: It behooves everyone to create an environment that encourages ethical behavior while identifying and discouraging unethical behavior during software certification, if enough discerning customers shun low-quality, uncertified software.
Abstract: Society and the software industry are well served if certifiers do their job ethically. Thus it behooves everyone to, as much as possible, create an environment that encourages ethical behavior while identifying and discouraging unethical behavior during software certification. If enough discerning customers shun low-quality, uncertified software, those products will be replaced by higher quality, certified software. This reasoning implies, however, that options exist; the continuing trend of companies absorbing or merging with other companies could result in a shrinking pool of developers, offering customers fewer and fewer software options. Reduced competition may also reduce the probability that software adhering to quality standards will be available in the marketplace. To avoid this fate, the software development industry must mature professionally. Society needs this maturity as computing and telecommunications become ubiquitous. Software professionals must demand ethical behavior of themselves and an ethical environment to work in. Software certifiers, properly supported, could became an important part of an ethical software development environment.

Journal ArticleDOI
TL;DR: To gain support from senior management, you must link technical metrics to business metrics-you must show how increases in productivity and quality translate into a better bottom line.
Abstract: A firm grasp of metrics and how to implement them can prove vital to the health of your organization-and your career. To gain support from senior management, you must link technical metrics to business metrics-you must show how increases in productivity and quality translate into a better bottom line. So your business and strategy determine the metrics you track. Select measures that are obtainable and that truly matter to your organization's work. You also must be able to collect or derive the metrics data without undue burden. Remember that it's not the measures themselves that matter, but the decisions that will be based upon them. Measures that are expensive or cumbersome to collect will detract from the measurement program's perceived value. Overly intrusive or complex data collection can turn people off and encourage them to invent numbers. The best measures are those that are a natural outcome of people's work, like the number of batch jobs processed in a day or the amount of downtime a system records.

Journal ArticleDOI
TL;DR: The developers of IPv6 specifically refer to supporting a future in which low-power, handheld devices may tap into the Internet, as may refrigerators, soda machines, and electric meters.
Abstract: Want to multicast real time applications over IPv4 without upgrading? Two protocols can help right now. New protocols are a response to the growing variety and volume of traffic on the Internet and intranets. The developers of IPv6 specifically refer to supporting a future in which low-power, handheld devices may tap into the Internet, as may refrigerators, soda machines, and electric meters. They acknowledge that any protocol developed will be viable only if it remains compatible with current standards and plans for incremental change-few companies can afford to change their systems all at once. Protocols such as IPv6, RSVP (Resource Reservation Protocol), and RTP (Real-Time Transport Protocol) are attempting to take the Internet into the future while meeting the needs of users today.

Journal ArticleDOI
TL;DR: The authors consider how one free tool can help find malicious code in Java apps and discuss white-box testing, cryptography and firewall testing.
Abstract: Industry and government are promoting open security testing. The authors consider how one free tool can help find malicious code in Java apps. They discuss white-box testing, cryptography and firewall testing.