Reviewers have found these items notable and have self-selected them for review.
All Media Types
Data architecture: a primer for the data scientist (2nd ed.)
Inmon W., Linstedt D., Levins M., Academic Press, Inc., San Diego, CA, 2019. 431 pp. Type: Book (978-0-128169-16-2)
Showing a perceptible pattern as a line-edited transcript consolidated from one or more slide-based seminars, this book provides many illustrations that would otherwise have been the focus of a presenter’s lecture and interactive session. Ho...
Jul 31 2020
Should researchers use data from security breaches?
Douglas D. Communications of the ACM 62(12): 22-24, 2019. Type: Article
The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and information technology (IT) computing ethics specialists. Should computing research practiti...
Jul 30 2020
Future automation: changes to lives and to businesses
Carone T., World Scientific Publishing Co, Inc., River Edge, NJ, 2018. 230 pp. Type: Book
Timothy Carone provides a visionary outlook on what will probably be called our digitized future. The book is split into 11 chapters. First, the author introduces autonomous systems (ASs). ASs are (in addition to the Internet of Things, IoT) the c...
Jul 29 2020
Practical Flutter: improve your mobile development with Google’s latest open-source SDK
Zammetti F., Apress, New York, NY, 2019. 416 pp. Type: Book (978-1-484249-71-0)
One of the reasons a business may develop an application for mobile devices is for its branding and digital presence. In today’s market, that requires making the application available for both Android and iOS. The traditional way to accompli...
Jul 27 2020
Management system for secure mobile application development
Guo W. ACM TURC 2019 (Proceedings of the ACM Turing Celebration Conference - China, Chengdu, China, May 17-19, 2019) 1-4, 2019. Type: Proceedings
Our increasing reliance on mobile apps elevates their insecurities and shines a spotlight on their vulnerabilities. The author introduces a secure mobile app development approach that is proactive and provides verifiable security. Application secu...
Jul 22 2020
What makes a great manager of software engineers?
Kalliamvakou E., Bird C., Zimmermann T., Begel A., DeLine R., German D. IEEE Transactions on Software Engineering 45(1): 87-106, 2019. Type: Article
The non-physical nature of software is unique among products developed in the field of engineering; this fact places extreme importance on the qualities that the members of the software engineering team provide. The role of the manager within such...
Jul 21 2020
Social practices and dynamic non-humans: nature, materials and technologies
Maller C., Strengers Y., Palgrave Macmillan, Cham, Switzerland, 2019. 264 pp. Type: Book (978-3-319921-88-4)
In the contemporary world, there is perhaps an implicit, or even explicit, presumption that human experience matters above all--human society and actions seek to quash, or at least subjugate to the extreme, all nonhuman actors and their effec...
Jul 20 2020
Applied machine learning
Forsyth D., Springer International Publishing, New York, NY, 2019. 494 pp. Type: Book (978-3-030181-13-0)
Machine learning methods find application in almost any domain that makes use of some form of computation. These algorithms build appropriate models that help in making predictions; thus, they are of interest in industry as well as in business sce...
Jul 17 2020
Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C., Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)
A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state actors” a...
Jul 16 2020
Local distance restricted bribery in voting
Dey P. AAMAS 2019 (Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, Montreal, QC, Canada, May 13-17, 2019) 1925-1927, 2019. Type: Proceedings
The bribery problem asks whether there exists an appropriate-“cost” collection of voters in an election such that, if one strategically changes their votes, one’s favored candidate will win. In that model, each voter comes with a...
Jul 6 2020
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2020 ThinkLoud, Inc.