Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Paramithiotti, Andrea
Freelance IT Consultant
Milano, Italy
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

After receiving a BS and MS in Computer Science from the Polytechnic University of Milan, Andrea was employed for some time in the information technology (IT) department of a large logistics and warehousing company. Andrea soon discovered that the nine-to-five life was rather dull for him; so, in search of more stimulating experiences, he established his own IT practice. At first he just helped small enterprises get started with IT, but soon this activity became more and more structured as a network of collaborations took shape, for example, on the academic side with AICA (Associazione Italiana Calcolo Automatico). Andreas collaborated with AICA in the establishment of the European e-Competence Framework, a reference to the competences needed in the information and communications technology (ICT) profession and a project developed on behalf of the European Union (EU).

Nowadays, with the ever-growing strategic role of ICT in companies of all sizes, Andrea’s practice has expanded into an established network of collaborators that offer advice and solutions on most aspects of enterprise ICT, from infrastructure design to application development to data husbandry, transforming the ICT infrastructure of his customers from an undefined assortment of almost casual activities to a structured driver for business value.

Andrea often lectures on these topics for enterprises and professional associations, as well as the general public. He has been a reviewer for Computing Reviews since 2004. He is currently working on transforming his experiences in the field into guidelines, for the establishment and evolution of a sound IT environment for small and medium-sized enterprises (SMEs).

 
 
Options:
Date Reviewed  
 
1
- 10 of 113 reviews

   
  TSLAM: A trust-enabled self-learning agent model for service matching in the cloud market
Li W., Cao J., Qian S., Buyya R.  ACM Transactions on Autonomous and Adaptive Systems 13(4): 1-41, 2019. Type: Article

Cloud services and cloud computing in general have experienced explosive growth. Undoubtedly it is easier for users, even sophisticated ones, to leave the task of running information and communications technology (ICT) infrastructure to specialize...

Feb 15 2022  
  Designing robot teams for distributed construction, repair, and maintenance
Wareham T.  ACM Transactions on Autonomous and Adaptive Systems 14(1): 1-29, 2019. Type: Article

Human beings consider some environments hostile, such as deep space, nuclear reactors, or contaminated areas, and thus are not very keen on working in them. In cases such as these, robots might just step in to accomplish tasks in place of humans. ...

Jul 30 2021  
  Self-awareness in software engineering: a systematic literature review
Elhabbash A., Salama M., Bahsoon R., Tino P.  ACM Transactions on Autonomous and Adaptive Systems 14(2): 1-42, 2019. Type: Article

As researchers in the field of distributed software systems, the authors feel as though software self-awareness is becoming more and more fundamental to their work. On the one hand, they see a great number of scientific publications available; on ...

Jan 29 2021  
  C is not a low-level language
Chisnall D.  Queue 16(2): 18-30, 2018. Type: Article

Early computers were programmed with low-level languages that were very close to their physical architecture. Although those languages guaranteed efficient use of machine resources, they were not particularly user-friendly, meaning it was hard for...

Oct 21 2020  
  Data sketching
Cormode G.  Queue 15(2): 49-67, 2017. Type: Article

This lively article deals with the creation of datasets for testing as standalone projects separate from their underlying applications. The starting assumption is simple: as live data is generally not suitable for demos due to privacy concerns, th...

Feb 28 2020  
  C programming and numerical analysis: an introduction
Nomura S.,  Morgan&Claypool Publishers, San Rafael, CA, 2018. 200 pp. Type: Book (978-1-681733-11-1)

It is often assumed that scientists are proficient in computer programming--after all, they use computers as their primary work tools, don’t they? Well, this is not always the case: computer programming is a field of its own, with its m...

Sep 25 2019  
  Take it or leave it: a survey study on operating system upgrade practices
Farhang S., Weidman J., Kamani M., Grossklags J., Liu P.  ACSAC 2018 (Proceedings of the 34th Annual Computer Security Applications Conference, San Juan, Puerto Rico,  Dec 3-7, 2018) 490-504, 2018. Type: Proceedings

Periodic software updates are a necessary evil to keep computers and other digital devices protected from viruses and other malicious forms of exploitation; still, many users resent reminders from vendors, often finding them rather aggressive and ...

Aug 19 2019  
  Improving lazy decision tree for imbalanced classification by using skew-insensitive criteria
Su C., Cao J.  Applied Intelligence 49(3): 1127-1145, 2019. Type: Article

Decision trees are powerful graphic tools representing decisions and their related outcomes as branches of a tree. They enable people to see both the overall picture and the local details at the same time. First developed in the 60s in the field o...

Jul 18 2019  
  STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzam D.  International Journal of Information Security 17(5): 569-585, 2018. Type: Article

As the data people commit to the Internet becomes more and more sensitive, user credential management becomes more and more important, and all the more so when dealing with government or other official sites. In Europe, this problem is often compo...

Dec 28 2018  
  Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
Li Y., Zhou F., Qin Y., Lin M., Xu Z.  International Journal of Information Security 17(5): 549-568, 2018. Type: Article

Nowadays, data is becoming more and more confidential and sensitive, hence the growing need for encryption. But once data is encrypted, so are the keywords needed to search for it. So people are faced with the challenging task of searching encrypt...

Dec 14 2018  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy