Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help

Select Issue:

Here we go again: Why is it difficult for developers to learn another programming language?: Communications of the ACM
It is common for programmers to switch programming languages--quite often, new work happens to involve a new programming language and the programmer has to just dive into it...
General (D.3.0) | Jun 7 22

A survey on end-edge-cloud orchestrated network computing paradigms: ACM Computing Surveys
Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud...
Human Factors (H.1.2...) | Jun 17 22

Technology and global public health

Applications of modern technology in various traditional domains are gaining momentum. In particular, various modern technologies in healthcare can improve treatment outcomes and quality of life for both medical practitioners and patients. Technology and...
Health (J.3...) | Jun 1 22

Automation and autonomy: labour, capital and machines in the artificial intelligence industry

This book is a Marxist critique of the impact that artificial intelligence (AI), specifically machine learning, will have on labor. It was originally a dissertation, which was modified for release as a book. This is...
Economics (J.4...) | Jun 6 22

Securing 5G and evolving architectures

Security is an important aspect of architectures. Security analysis at the architecture level is very useful. Fifth-generation (5G) wireless networks have been in use for a few years now. Securing 5G network architecture has many challenges not present in...
Security and Protection (D.4.6) | Jun 9 22

China livestreaming e-commerce industry insights

We know the term “TikTok” refers to a form of short videos. But we might not have related it to commerce. In this 100-page book, Ruo Si vividly introduces readers to the essence of the livestreaming e-commerce industry in China. The book reviews the history...
Electronic Commerce (K.4.4) | Jun 13 22

A world without email

Intellectual work draws a lot from communication between collaborating parties. Speed and ease of communication have enormously improved--both qualitatively and quantitatively--in the course of the last decades. So, how come the day-to-day life of...
Project And People Management (K.6.1) | Jun 15 22

Clean craftsmanship: disciplines, standards, and ethics

Software craftsmanship is a mindset that emphasizes technical excellence over mere execution. The author of this book, Robert C. Martin, commonly referred to as “Uncle Bob,” was one of the signatories of the manifesto on software craftsmanship. In this book, he explains...
General (D.0) | Jun 16 22

Behavioral cybersecurity: applications of personality psychology and computer science

It is a well-known fact that the weakest element of all cryptographic systems is a human being. No matter how smart mathematical methods are embedded to protect our network and computer infrastructures, nor how precisely we design the precautionary...
Security (K.6.m...) | Jun 21 22

Judgement-proof robots and artificial intelligence: a comparative law and economics approach

Artificial intelligence (AI) research is moving incredibly fast and requires regulation. For instance, a recent study reversed a machine learning model that creates nontoxic drugs and made it create toxic drugs [1]. This is...
General (K.5.0) | Jun 22 22

The modern security operations center

Cybersecurity involves carrying out complete and continuous activities to investigate and eliminate threats. As a recommended solution, a security operations center (SOC) allows an organization to achieve a level of security by monitoring the operation of information systems...
Security and Protection (K.6.5) | Jun 24 22

Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy