Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Information Storage And Retrieval (H.3) > Online Information Services (H.3.5)  
 
Options:
 
  1-10 of 234 Reviews about "Online Information Services (H.3.5)": Date Reviewed
  Oracle Visual Builder cloud service revealed: rapid application development for web and mobile
Vesterli S., Apress, New York, NY, 2019. 316 pp.  Type: Book (978-1-484249-28-4)

Oracle Visual Builder is a very effective tool for significantly reducing the time spent coding, for example, from weeks to just a day or two. This tool is one of the great options available to build add-ons for other existing services...

Aug 10 2020
  Computing with data: an introduction to the data industry
Lebanon G., El-Geish M., Springer International Publishing, New York, NY, 2018. 576 pp.  Type: Book (978-3-319981-48-2)

This book is envisioned as a companion volume on modern cloud computing. However, it is too broad, and in my opinion provides only superficial coverage of many subjects. It is certainly a deliberate (and courageous) decision by the aut...

Oct 11 2019
  Website hosting and migration with Amazon Web Services: a practical guide to moving your website to AWS
Nadon J., Apress, New York, NY, 2017. 257 pp.  Type: Book (978-1-484225-88-2)

Amazon Web Services (AWS) is one of the key players in providing modern cloud infrastructure to businesses of all sizes. This book is a good introductory resource for a person who wants to dive into the AWS world. It is a practical and...

Apr 13 2018
   Introduction to middleware: web services, object components, and cloud computing
Etzkorn L., Chapman & Hall/CRC, Boca Raton, FL, 2017. 688 pp.  Type: Book (978-1-498754-07-1)

Middleware, as necessary pervasive software aimed at supporting distributed applications in a heterogeneous environment, played and still plays an important role in the advance of Internet technologies and the development of new applic...

Feb 8 2018
  Service-oriented architecture: analysis and design for services and microservices (2nd ed.)
Erl T., Prentice Hall Press, Upper Saddle River, NJ, 2016. 416 pp.  Type: Book (978-0-133858-58-7)

The study of software architecture has evolved immensely over the years, attracting the attention of architects, designers, and developers handling projects. Software architecture and its underlying philosophy suggest longer life cycle...

Nov 21 2017
  Unveiling correlations via mining human-thing interactions in the Web of Things
Yao L., Sheng Q., Ngu A., Li X., Benattalah B. ACM Transactions on Intelligent Systems and Technology 8(5): 1-25, 2017.  Type: Article

Today we find ourselves in a situation where there is an overabundance of data in information networks. This being the case, there is an overwhelming need to identify pieces of data that could be critical in decision making. Time and t...

Sep 11 2017
  A taxonomy and survey of cloud resource orchestration techniques
Weerasiri D., Barukh M., Benatallah B., Sheng Q., Ranjan R. ACM Computing Surveys 50(2): 1-41, 2017.  Type: Article

Cloud services provide computing resources (for example, infrastructure, platform, and software) as services. Utilizing these cloud resources requires a complex life cycle process that involves select, describe, configure, deploy, and ...

Aug 9 2017
  Value and misinformation in collaborative investing platforms
Wang T., Wang G., Wang B., Sambasivan D., Zhang Z., Li X., Zheng H., Zhao B. ACM Transactions on the Web 11(2): 1-32, 2017.  Type: Article

Collaborative investing platforms often rely on the common “wisdom of the crowd” concept in a domain in which even highly paid, well-educated, and experienced professionals make mistakes, providing wrong or inaccura...

Jul 5 2017
  Data philanthropy and individual rights
Taddeo M. Minds and Machines 27(1): 1-5, 2017.  Type: Article

Sometimes there exists a delicate line between data security and usability and availability. Data security is many times enhanced using several complicated methods and algorithms. While this process enhances data security, it also unde...

May 31 2017
   Catching synchronized behaviors in large networks: a graph mining approach
Jiang M., Cui P., Beutel A., Faloutsos C., Yang S. ACM Transactions on Knowledge Discovery from Data 10(4): 1-27, 2016.  Type: Article

The automatic detection and accurate interpretation of suspicious graph patterns is one of the key issues in spotting malicious activities inside real-world systems, such as fake followers in Twitter, social network manipulation, and d...

Nov 10 2016
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy