Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
November 27, 2015

NoSQL for mere mortals
NoSQL is one of the emerging big data technologies. Since the term “NoSQL” is only slightly less ambiguous than the term “big data,” a few words of explanation are in order. Structured query language (SQL) is the standard query language for relational databases. In a relational database, the data is organized into tables; SQL... more
The emphasis must be on getting good people. Good people, more so in computing than in other fields, are the staff of life. Get the good people first and the good technology will surely follow... more
- Aaron Finerman (1994)
Automated firearm identification: on using a novel multiple-slice-shape (MSS) approach for comparison and matching of firing pin impression topography: IH&MMSec 15

Digital forensics is an advancing field that finds and infers original evidence in the form of electronic data. More precisely, digital crime scene analysis... more

Size & Shape (I.4.7...) | Nov 23 15

How Amazon Web Services uses formal methods: Communications of the ACM

Formal methods are useful for providing irrefutable and credible evidence in the design and implementation of web service features. The use of formal specification and... more

Testing & Debugging (D.2.5) | Nov 19 15

Tricorder: building a program analysis ecosystem: ICSE 15

Static analysis tools are a great help for developers to discover bugs, anti-patterns, before they occur in production systems. Such tools are usually integrated with the integrated development environment... more

Testing & Debugging (D.2.5) | Nov 19 15

In the flow, being heard, and having opportunities: sources of power and power dynamics in global teams: CSCW 15

The US authors provide an important study of the power dynamics in nine global teams at GlobalTech, a software development organization. Four of... more

Organizational Impacts (K.4.3) | Nov 18 15

Leveraging topic modeling and part-of-speech tagging to support combinational creativity in requirements engineering: Requirements Engineering

Some of the most difficult challenges in software are related to requirements creativity. Building on previous work, this well-organized study investigates... more

Requirements/Specifications (D.2.1) | Nov 18 15

Automatic detection of learning styles: state of the art: Artificial Intelligence Review

This paper is a comprehensive examination of major learning styles and current approaches to automatically detect a student’s learning style. The introduction reports that over the... more

Computers & Education (K.3) | Nov 17 15

Programming the quantum future: Communications of the ACM

In a digital computer, the basic unit of information is the bit, or binary digit. A bit can only take one of two values: zero or one. On the other hand, in a quantum computer, the basic unit of information... more

Types & Design Styles (B.7.1) | Nov 17 15

Deep learning: methods and applications: Foundations and Trends in Signal Processing

Deep learning encompasses “machine learning techniques, where many layers of information processing stages ... are exploited for unsupervised feature learning and for pattern analysis... more

Learning (I.2.6) | Nov 13 15

A loss aware scalable topology for photonic on chip interconnection networks: The Journal of Supercomputing

A cycle-accurate simulation environment for evaluating the topologies aiming to reduce insertion loss in photonic networks is introduced in this paper. The paper considers the D-Mesh topology, which... more

Topology (B.4.3...) | Nov 13 15

An approach for selecting best available services through a new method of decomposing QoS constraints: Service Oriented Computing and Applications

A practical and theoretical problem that is very important in service-centric IT environments is addressed in this paper: a... more

Web-Based Services (H.3.5...) | Nov 13 15

Fundamentals of complex networks: models, structures and dynamics

This textbook covers the area of complex networks; as such, it is long overdue. Complex networks (and complex adaptive systems, two terms that are very close) are one of the most fundamental and significant... more
General (I.6.0) | Nov 25 15

A guide to numerical modelling in systems biology

I had hoped to acquire further notions in systems biology, a new interdisciplinary area aimed at modeling and identifying the parameters of biochemical, physiological, molecular, and genetic processes, while also finding tools to build such... more
Model Development (I.6.5) | Nov 24 15

Agile IT organization design: for digital transformation and continuous delivery

Continuous delivery is often viewed from a technical side. Instead, Narayan addresses it from an organizational and business side. He focuses on agile organization design. The book considers the 12... more
Business (J.1...) | Nov 24 15

Ruby on Rails tutorial: learn web development with Rails (3rd ed.)

David Heinemeier Hansson released Ruby on Rails in 2004. Known as Rails, it is a model-view-controller (MVC) framework for developing web applications using standards such as JavaScript Object Notation (JSON) and... more
Ruby on Rails (D.3.2...) | Nov 20 15

Dissecting the hack: the v3rb0t3n network

Stop! Do not expect a technical review of a book of which half is a Hollywood story and the other half is a brief explanation of key techniques and tools. In between, there are a few interviews with professional hackers. The story approach is a... more
Security & Protection (K.6.5) | Nov 19 15

The cloud security ecosystem: technical, legal, business and management issues

Cloud computing has been around for quite a few years. However, according to the RightScale 2015 State of the Cloud Report, security is still the major concern of users. We have all heard cases of... more
Security & Protection (K.6.5) | Nov 19 15

Security issues in mobile NFC devices

Mobile phones and other portable devices are widely used for communication and a variety of other uses. Near field communication (NFC) enables two electronic devices (including mobile phones) to establish radio communication by bringing them close enough... more
Security & Protection (K.6.5) | Nov 19 15

Building your next big thing with Google Cloud Platform

Web-based services can be confusing to deploy, and this title attempts to make it less so for the Google Cloud Platform (whose major public competitor is AWS). It is written by two experienced coders... more
Distributed Programming (D.1.3...) | Nov 18 15

Designing socially embedded technologies in the real-world

It is often argued that society adapted to technology more quickly in the postmodern era, leading to globalization, industrialization, and networking. The infusion of information and communications technology (ICT)-enabled artifacts with Internet-enabled... more
General (K.4.0) | Nov 18 15

Anticipation: learning from the past

The best place to start while trying to understand this volume is to define the science of anticipation. In the introduction, the volume provides a definition: “an anticipatory system is a system whose current state depends not only upon previous states, but... more
Cognitive Simulation (I.2.0...) | Nov 16 15

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2015 ThinkLoud, Inc.
Terms of Use
| Privacy Policy