Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
Andrea F Paramithiotti
Freelance IT Consultant
Milano, Italy
 

After receiving a BS and MS in Computer Science from the Polytechnic University of Milan, Andrea was employed for some time in the information technology (IT) department of a large logistics and warehousing company. Andrea soon discovered that the nine-to-five life was rather dull for him; so, in search of more stimulating experiences, he established his own IT practice. At first he just helped small enterprises get started with IT, but soon this activity became more and more structured as a network of collaborations took shape, for example, on the academic side with AICA (Associazione Italiana Calcolo Automatico). Andreas collaborated with AICA in the establishment of the European e-Competence Framework, a reference to the competences needed in the information and communications technology (ICT) profession and a project developed on behalf of the European Union (EU).

Nowadays, with the ever-growing strategic role of ICT in companies of all sizes, Andrea’s practice has expanded into an established network of collaborators that offer advice and solutions on most aspects of enterprise ICT, from infrastructure design to application development to data husbandry, transforming the ICT infrastructure of his customers from an undefined assortment of almost casual activities to a structured driver for business value.

Andrea often lectures on these topics for enterprises and professional associations, as well as the general public. He has been a reviewer for Computing Reviews since 2004. He is currently working on transforming his experiences in the field into guidelines, for the establishment and evolution of a sound IT environment for small and medium-sized enterprises (SMEs).


     

Self-awareness in software engineering: a systematic literature review
Elhabbash A., Salama M., Bahsoon R., Tino P.  ACM Transactions on Autonomous and Adaptive Systems 14(2): 1-42, 2019. Type: Article

As researchers in the field of distributed software systems, the authors feel as though software self-awareness is becoming more and more fundamental to their work. On the one hand, they see a great number of scientific publications available; on ...

 

Designing robot teams for distributed construction, repair, and maintenance
Wareham T.  ACM Transactions on Autonomous and Adaptive Systems 14(1): 1-29, 2019. Type: Article

Human beings consider some environments hostile, such as deep space, nuclear reactors, or contaminated areas, and thus are not very keen on working in them. In cases such as these, robots might just step in to accomplish tasks in place of humans. ...

 

Improving lazy decision tree for imbalanced classification by using skew-insensitive criteria
Su C., Cao J.  Applied Intelligence 49(3): 1127-1145, 2019. Type: Article

Decision trees are powerful graphic tools representing decisions and their related outcomes as branches of a tree. They enable people to see both the overall picture and the local details at the same time. First developed in the 60s in the field o...

 

STORK: a real, heterogeneous, large-scale eID management system
Ribeiro C., Leitold H., Esposito S., Mitzam D.  International Journal of Information Security 17(5): 569-585, 2018. Type: Article

As the data people commit to the Internet becomes more and more sensitive, user credential management becomes more and more important, and all the more so when dealing with government or other official sites. In Europe, this problem is often compo...

 

Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
Li Y., Zhou F., Qin Y., Lin M., Xu Z.  International Journal of Information Security 17(5): 549-568, 2018. Type: Article

Nowadays, data is becoming more and more confidential and sensitive, hence the growing need for encryption. But once data is encrypted, so are the keywords needed to search for it. So people are faced with the challenging task of searching encrypt...

 
  more...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy