Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Kohlhepp, Bayard
Nexus Technologies Inc
Fletcher, North Carolina
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Bayard Kohlhepp received a BS degree in computer science from Millersville University, Millersville, PA, in 1981. He spent the next 20-plus years designing software, managing project teams, teaching Unix and C programming, and running data centers. Most of his time was spent creating distributed real-time embedded (DRE) systems. He culminated his "geek" career as VP of R&D for a point-of-sale hardware manufacturer, and then traded science for art to pursue new creative paths.

Bayard now resides in the Blue Ridge Mountains of North Carolina where he works as a professional photographer, music producer, video editor, and high school math and science teacher.

--

Read our Q&A with Bayard Kohlhepp here.

 
 
Options:
Date Reviewed  
 
1
- 10 of 99 reviews

   
  Mobile sensors and context-aware computing
Gajjar M.,  Morgan Kaufmann Publishers Inc., San Francisco, CA, 2017. 356 pp. Type: Book (978-0-128016-60-2)

I am disappointed in this book. I’m an engineer designing distributed Internet of Things (IoT) systems as well as a part-time college instructor, and I was hoping for a future-oriented discussion of the evolution of contextual computing. Whi...

Nov 16 2017  
  Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A.  Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article

I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “privacy information pr...

Nov 7 2017  
  Improving resource efficiency at scale with Heracles
Lo D., Cheng L., Govindaraju R., Ranganathan P., Kozyrakis C.  ACM Transactions on Computer Systems 34(2): Article No. 6, 2016. Type: Article

Most of the paper’s authors are connected to Google, and their work centers on Google workload performance improvement. They’ve developed runtime controller software, Heracles, that uses real-time feedback and static modeling rules to ...

Sep 6 2017  
   Industrial Internet of Things: cybermanufacturing systems
Jeschke S., Brecher C., Song H., Rawat D.,  Springer International Publishing, New York, NY, 2016. 715 pp. Type: Book (978-3-319425-58-0)

When digital sensors and telemetry analysis (big data, machine learning) were applied to the manufacturing process itself, Industry 4.0--the fourth industrial revolution--was born (or, more precisely, christened). Automated cyber-physica...

Jul 3 2017  
   Passive Wi-Fi: bringing low power to Wi-Fi transmissions
Kellogg B., Talla V., Gollakota S., Smith J.  NSDI 2016 (Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation, Santa Clara, CA,  Mar 16-18, 2016) 151-164, 2016. Type: Proceedings

Low-power Wi-Fi fills a definite need in the Internet of Things (IoT) infrastructure, and this paper’s ideas advance its evolution. While consumer IoT is built atop “large” devices (Linux/Android/iOS with 4-plus GB of RAM) with b...

Mar 31 2017  
  SleepExplorer: a visualization tool to make sense of correlations between personal sleep data and contextual factors
Liang Z., Ploderer B., Liu W., Nagata Y., Bailey J., Kulik L., Li Y.  Personal and Ubiquitous Computing 20(6): 985-1000, 2016. Type: Article

For sleep researchers, this paper is interesting for two reasons. One, the authors have contributed a useful new tool called SleepExplorer that correlates multiple contextual measurements and even introduces a new structure for organizing sleep me...

Jan 25 2017  
  Metadata
Pomerantz J.,  The MIT Press, Cambridge, MA, 2015. 256 pp. Type: Book (978-0-262528-51-1)

This book is surprising in several ways....

Jun 28 2016  
  Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Schrittwieser S., Katzenbeisser S., Kinder J., Merzdovnik G., Weippl E.  ACM Computing Surveys 49(1): 1-37, 2016. Type: Article

Software obfuscation is an attempt to hide the real intent of a piece of software. The first obfuscated malware appeared in 1986, and sophistication has steadily increased since then. Commercial vendors obfuscate their software to block reverse en...

Jun 22 2016  
  Dark territory: the secret history of cyber war
Kaplan F.,  Simon & Schuster, New York, NY, 2016. 352 pp. Type: Book (978-1-476763-25-5)

This book amazes on many levels. First, the level of detail is staggering. Dates, names, conversations--the facts sometimes come so fast and furious you have to stop and take a breath. This is old-school journalistic research, not the post-
Jun 7 2016  
  Industrial applications of high-performance computing: best global practices
Osseyran A., Giles M.,  Chapman & Hall/CRC, Boca Raton, FL, 2015. 410 pp. Type: Book (978-1-466596-80-1), Reviews: (1 of 2)

The editors have created a very thorough survey of supercomputers in industrial (versus government, academic, and so on) applications. The book opens with a condensed history of computing up through modern supercomputers. That’s followed by ...

Jan 13 2016  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy