Big Data Annotated Bibliography Annotated Bibliography

Length: 4 pages Subject: Engineering Type: Annotated Bibliography Paper: #3242338 Related Topics: Data Mining, Forensic Accounting, Data Collection, Data Analysis
Excerpt from Annotated Bibliography :

Zaslavsky is the leader of the Semantic Data Management Science Area (SMSA). He has published more than 300 publications on science and technology. Perera has vast experience in computing and technology as he is a member of the Commonwealth Scientific and Industrial Research Organization alongside publishing numerous journals. Georgakopoulos is the Director of Information Engineering Laboratory. He has published over 100 journals on issues related to science and technology (Big Data).

Cohen, J., Dolan, B., Dunlap, M., Hellerstein, J.M., & Welton, C. (2009). MAD Skills: New

Analysis Practices for Big Data. Proc. VLDB Endow., 2(2), 1481 -- 1492.

The article focuses on the Magnetic, Agile, Deep (MAD) that proves more effective in data analysis than the traditional Enterprise Data Warehouse and Business Intelligence. The strength of their article lies on the fact that, it presents the philosophy behind the design of the technology, techniques, and positive experiences associated with the use of the MAD technology of data analysis. The authors provide more insight into the benefits of the technology in contributing to the realization of the objectives of the Big Data that, the system supports agility of data analysis and provides sophisticated data statistical techniques for data analysis. The most contribution to the study is the approaches presented used by the technology as presented by the authors. The study also is significant as it provides directions for future directions of the MAD technology and recommendations applicable in improving the future outcomes of data storage and analysis.

Author Notes: The authors of this article have a variety of professional backgrounds. Cohen has vast experience in programming; Dunlap works with the Evergreen Technologies, and Hellerstein works with the Berkeley University. Welton works with the Greenplum as Senior Director of Programming Services.

Herodotou, H., Lim, H., Luo, G., Borisov, N., Dong, L., Cetin, F.B., & Babu, S. (2011). Starfish?: A Self-tuning System for Big Data Analytics. CIDR, 11, 261 -- 272. doi:10.1.1.222.6934

The authors of this article introduce the Starfish, one of the self-tunings systems that ensure the effectiveness and efficiency of the big data. The starfish provides automation of activities without the need for...

...

The starfish combines the principles of agility, depth, and magnetism that constitute the previously analyzed MAD to ensure effectiveness of the big data in information storage and analysis. The authors strengthened their argument by providing ways that the starfish can eliminate challenges associated with the traditional MAD like slowed data processing and file-based processing. The article proves applicable for the study because, starfish focuses enhancing optimization of organizational activities using different principles such as the principle of thumb for parameter tuning and dynamic instrumentation that influence the effectiveness of data storage and analysis.

Author Notes: The authors work at the Duke University, Department of Computer Science. They are also senior researchers at Data Management, Exploration and Mining (DMX). Long works as an associate professor at the Baylor University. Borisov has published over 150 studies similar to Luo, Cetin and Babu's.

Grove, R. (2009). Web Based Application Development. Jones & Bartlett Learning.

Grove (2009) provides a detailed analysis of web based theories, concepts, tools, languages, and practices that can be used in the development of systems aiming at eliminating security threats. The author also provides fundamental applications that can be used to put Big Data ideas and other programming related interventions into practice. The book is important for the study as it provides theoretical frameworks applicable in the development of reliable architecture of for handling cyber related insecurities.

Author Notes: Grove teaches SoftWare Engineering in the Department of Computer Science, Madison University.

Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York:

Peitz and Waldfogel (2012)'s book provides an up-to-date analysis of the main concerns associated with digital technology having an impact on the global security. The book is important for the study because it provides a pathway for conducting research on issues related to data storage affecting the global environment. It focuses on the key problems facing large industries, businesses, and issues associated with data storage and digital industry.

Author Notes: Peitz works with the University of Manheim as a Professor of Economics. He has published numerous journals and books such as Regulation and Entry into Telecommunications Markets. Waldfogel works with the Carlson School of Management, Minnesota as a professor of Applied Economics. He has published over 50 articles and…

Sources Used in Documents:

Peitz, M., & Waldfogel, J. (2012). The Oxford handbook of the digital economy. New York:

Peitz and Waldfogel (2012)'s book provides an up-to-date analysis of the main concerns associated with digital technology having an impact on the global security. The book is important for the study because it provides a pathway for conducting research on issues related to data storage affecting the global environment. It focuses on the key problems facing large industries, businesses, and issues associated with data storage and digital industry.

Author Notes: Peitz works with the University of Manheim as a Professor of Economics. He has published numerous journals and books such as Regulation and Entry into Telecommunications Markets. Waldfogel works with the Carlson School of Management, Minnesota as a professor of Applied Economics. He has published over 50 articles and 2 books such as, Scroogenomics: Why You Shouldn't Buy Presents for the Holidays.


Cite this Document:

"Big Data Annotated Bibliography" (2014, April 02) Retrieved May 15, 2021, from
https://www.paperdue.com/essay/big-data-annotated-bibliography-186661

"Big Data Annotated Bibliography" 02 April 2014. Web.15 May. 2021. <
https://www.paperdue.com/essay/big-data-annotated-bibliography-186661>

"Big Data Annotated Bibliography", 02 April 2014, Accessed.15 May. 2021,
https://www.paperdue.com/essay/big-data-annotated-bibliography-186661

Related Documents
Big Data Annotated Bibliography
Words: 1639 Length: 4 Pages Topic: Business Paper #: 12685433

Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes. Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/ The article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. The article shows the significant

Bigger Data
Words: 1215 Length: 4 Pages Topic: Education - Computers Paper #: 88649065

component graded. The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a

Annotated Bibliography Academic Honesty in Nursing Profession
Words: 2041 Length: 4 Pages Topic: Film Paper #: 32059925

Academic Honesty in Nursing Profession: Annotated Bibliography Kececi, A., Bulduk, S., Oruc, D. & Celik, S. (2011). Academic Dishonesty among Nursing Students: A Descriptive Study. Nursing Ethics 18(5) 725-733 This cross-sectional, descriptive research's objective is assessment of academic dishonesty in Turkish university-level nursing students. The sample size for this research was 196 students. Data collection employed two instruments, which, on an average, could be completed in about 10 to 15 minutes: 1)

Information Technology -- Annotated Bibliography Information Technology...
Words: 1128 Length: 4 Pages Topic: Education - Computers Paper #: 81460176

Information Technology -- Annotated Bibliography Information Technology Baker, N. (2011). The Borderless Enterprise. Internal Auditor, August, 28 -- 33. This article endeavors to explain the various trends in digital media. The author contends the use of digital technology is evidence of a deeper trend and shift in global culture. The article is as philosophical as it is technical. This article could be considered a technical article or a philosophy of technology article. Durkee, D.

Postoperative Patient Falls an Annotated Bibliography
Words: 3307 Length: 9 Pages Topic: Health Paper #: 32867843

Postoperative Patient Falls Hospitalized patient falls affect health in huge way as they directly affect safety of patients as well as the concern for the quality of healthcare public health facilities around the world provide to patients. While limited data and information is available concerning inpatient falls following patients going on surgery, falls among hospitalized patients have been extensively studies. Falls is one of the major causes of morbidity like lacerations,

Annotated Bibliography on Corruption
Words: 1003 Length: 4 Pages Topic: Criminal Justice Paper #: 46559904

Barker, T. (2011). Police ethics: Crisis in law enforcement. Springfield, IL: Thomas. This book deals with problems experienced in law enforcement that demonstrate the inability of police officers to make lawful decisions. Chapter 8 deals specifically with police corruption and identifies three elements that exist in police corruption. The first is, the behave must be forbidden, the second is misuse of officer's position, and third, the reward. Although this chapter offers