|
|
|
|
| After receiving a BS and MS in Computer Science from the Polytechnic University of Milan, Andrea was employed for some time in the information technology (IT) department of a large logistics and warehousing company. Andrea soon discovered that the nine-to-five life was rather dull for him; so, in search of more stimulating experiences, he established his own IT practice. At first he just helped small enterprises get started with IT, but soon this activity became more and more structured as a network of collaborations took shape, for example, on the academic side with AICA (Associazione Italiana Calcolo Automatico). Andreas collaborated with AICA in the establishment of the European e-Competence Framework, a reference to the competences needed in the information and communications technology (ICT) profession and a project developed on behalf of the European Union (EU).
Nowadays, with the ever-growing strategic role of ICT in companies of all sizes, Andrea’s practice has expanded into an established network of collaborators that offer advice and solutions on most aspects of enterprise ICT, from infrastructure design to application development to data husbandry, transforming the ICT infrastructure of his customers from an undefined assortment of almost casual activities to a structured driver for business value.
Andrea often lectures on these topics for enterprises and professional associations, as well as the general public. He has been a reviewer for Computing Reviews since 2004. He is currently working on transforming his experiences in the field into guidelines, for the establishment and evolution of a sound IT environment for small and medium-sized enterprises (SMEs).
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 113
reviews
|
|
|
 |
 |
 |
 |
|
TSLAM: A trust-enabled self-learning agent model for service matching in the cloud market Li W., Cao J., Qian S., Buyya R. ACM Transactions on Autonomous and Adaptive Systems 13(4): 1-41, 2019. Type: Article Cloud services and cloud computing in general have experienced explosive growth. Undoubtedly it is easier for users, even sophisticated ones, to leave the task of running information and communications technology (ICT) infrastructure to specialize...
|
Feb 15 2022 |
|
 |
 |
 |
 |
|
Designing robot teams for distributed construction, repair, and maintenance Wareham T. ACM Transactions on Autonomous and Adaptive Systems 14(1): 1-29, 2019. Type: Article Human beings consider some environments hostile, such as deep space, nuclear reactors, or contaminated areas, and thus are not very keen on working in them. In cases such as these, robots might just step in to accomplish tasks in place of humans. ...
|
Jul 30 2021 |
|
 |
 |
 |
 |
|
Self-awareness in software engineering: a systematic literature review Elhabbash A., Salama M., Bahsoon R., Tino P. ACM Transactions on Autonomous and Adaptive Systems 14(2): 1-42, 2019. Type: Article As researchers in the field of distributed software systems, the authors feel as though software self-awareness is becoming more and more fundamental to their work. On the one hand, they see a great number of scientific publications available; on ...
|
Jan 29 2021 |
|
 |
 |
 |
 |
|
C is not a low-level language Chisnall D. Queue 16(2): 18-30, 2018. Type: Article Early computers were programmed with low-level languages that were very close to their physical architecture. Although those languages guaranteed efficient use of machine resources, they were not particularly user-friendly, meaning it was hard for...
|
Oct 21 2020 |
|
 |
 |
 |
 |
|
Data sketching Cormode G. Queue 15(2): 49-67, 2017. Type: Article This lively article deals with the creation of datasets for testing as standalone projects separate from their underlying applications. The starting assumption is simple: as live data is generally not suitable for demos due to privacy concerns, th...
|
Feb 28 2020 |
|
 |
 |
 |
 |
|
C programming and numerical analysis: an introduction Nomura S., Morgan&Claypool Publishers, San Rafael, CA, 2018. 200 pp. Type: Book (978-1-681733-11-1) It is often assumed that scientists are proficient in computer programming--after all, they use computers as their primary work tools, don’t they? Well, this is not always the case: computer programming is a field of its own, with its m...
|
Sep 25 2019 |
|
 |
 |
 |
 |
|
Take it or leave it: a survey study on operating system upgrade practices Farhang S., Weidman J., Kamani M., Grossklags J., Liu P. ACSAC 2018 (Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, Puerto Rico, Dec 3-7, 2018) 490-504, 2018. Type: Proceedings Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors, often finding them rather aggressive and ...
|
Aug 19 2019 |
|
 |
 |
 |
 |
|
Improving lazy decision tree for imbalanced classification by using skew-insensitive criteria Su C., Cao J. Applied Intelligence 49(3): 1127-1145, 2019. Type: Article Decision trees are powerful graphic tools representing decisions and their related outcomes as branches of a tree. They enable people to see both the overall picture and the local details at the same time. First developed in the 60s in the field o...
|
Jul 18 2019 |
|
 |
 |
 |
 |
|
STORK: a real, heterogeneous, large-scale eID management system Ribeiro C., Leitold H., Esposito S., Mitzam D. International Journal of Information Security 17(5): 569-585, 2018. Type: Article As the data people commit to the Internet becomes more and more sensitive, user credential management becomes more and more important, and all the more so when dealing with government or other official sites. In Europe, this problem is often compo...
|
Dec 28 2018 |
|
 |
 |
 |
 |
|
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage Li Y., Zhou F., Qin Y., Lin M., Xu Z. International Journal of Information Security 17(5): 549-568, 2018. Type: Article Nowadays, data is becoming more and more confidential and sensitive, hence the growing need for encryption. But once data is encrypted, so are the keywords needed to search for it. So people are faced with the challenging task of searching encrypt...
|
Dec 14 2018 |
|
 |
 |
 |
 |
|
|
|
|
|
|